Вы находитесь на странице: 1из 1994

Title page

1350 OMS | 9.6


1350 OMS PKT Guide
8DG42227DAAA
Issue 3 | December 2012

Legal notice
Legal notice

Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective
owners.
The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein.
Copyright 2012 Alcatel-Lucent. All rights reserved.
Notice

Every effort was made to ensure that the information in this document was complete and accurate at the time of printing. However, information is subject to
change.
Warranty

Alcatel-Lucent provides a limited warranty for this product. For more information, consult your local Alcatel-Lucent customer support team.
Ordering information

The ordering number for this document is 8DG42227DAAA. To order 1350 OMS information products, contact your local Alcatel-Lucent customer support
team.
Technical support

For technical support, contact your local customer support team. You can reach them through the Web at the Alcatel-Lucent Customer Support web site
(http://www. alcatel-lucent.com/support) or the customer support telephone number listed at the Alcatel-Lucent Contact Us web site (http://www.alcatellucent.com/contact).
Information product support

For questions or concerns about this or any other Alcatel-Lucent information product, please contact us at one of the following numbers: (888) 727-3615 (for
the continental United States), +1 (630) 713-5000 (for all countries).

Contents

About this document


Purpose

......................................................................................................................................................................................... lxix
lxix

Reason for reissue ..................................................................................................................................................................... lxix


lxix
Safety information

.................................................................................................................................................................... lxix
lxix

Intended audience

...................................................................................................................................................................... lxx
lxx

How to use this information product ................................................................................................................................... lxx


Related documentation ......................................................................................................................................................... lxxiii
lxxiii
Ordering information
How to comment

............................................................................................................................................................ lxxiii
lxxiii

.................................................................................................................................................................... lxxiv
lxxiv

Part I: Introduction
1

Product Overview
Overview ...................................................................................................................................................................................... 1-1
1-1
1350 OMS Overview ............................................................................................................................................................... 1-2
1-2
1350 OMS Modules for System Resiliency and Northbound Communication ................................................. 1-5
1-5

Introduction to Administration
Application Administration ................................................................................................................................................... 2-1
2-1
View Application Release Information ............................................................................................................................. 2-4
2-4

Part II: Administration


3

1350 OMS PKT Configuration


Overview ...................................................................................................................................................................................... 3-1
3-1
1350 OMS PKT Configuration ............................................................................................................................................ 3-2
3-2
Access the System Configuration Window and Configure 1350 OMS PKT

..................................................... 3-3
3-3

....................................................................................................................................................................................................................................
1350 OMS
iii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Integrate the 1350 OMS PKT with Other NMSs

.......................................................................................................... 3-8
3-8

Integrate 1350 OMS PKT Client Workstations with the Master Workstation .................................................... 3-9
3-9
4

1350 OMS PKT Process Monitoring


Overview ...................................................................................................................................................................................... 4-1
4-1
Process Monitoring Overview .............................................................................................................................................. 4-2
4-2
Run Levels ................................................................................................................................................................................... 4-5
4-5

1350 OMS PKT User Management


Overview ...................................................................................................................................................................................... 5-1
5-1
User Profiles

............................................................................................................................................................................... 5-2
5-2

Construction Macro Functions and Default User Profiles ......................................................................................... 5-3


5-3
MPLS Macro Functions and Default User Profiles ...................................................................................................... 5-7
5-7
Ethernet Macro Functions and Default User Profiles .................................................................................................. 5-9
5-9
6

1350 OMS PKT System Log Management


Overview ...................................................................................................................................................................................... 6-1
6-1
SMF/Commands/Event Log File Overview

................................................................................................................... 6-2
6-2

Failure Management Log File Overview ......................................................................................................................... 6-5


6-5
Trace Management Overview
7

.............................................................................................................................................. 6-6
6-6

1350 OMS PKT Parameters


Overview ...................................................................................................................................................................................... 7-1
7-1
Parameter Overview

................................................................................................................................................................ 7-2
7-2

1350 OMS PKT Parameters for Core NMA ................................................................................................................... 7-3


7-3
1350 OMS PKT Parameters for GUI NMA .................................................................................................................... 7-4
7-4
1350 OMS PKT Parameters for MW-INT ....................................................................................................................... 7-5
7-5
1350 OMS PKT Parameters for Oracle Management ................................................................................................. 7-6
7-6
Set PKT Parameters

................................................................................................................................................................. 7-7
7-7

1350 OMS PKT Parameter List ........................................................................................................................................... 7-9


7-9
8

1350 OMS PKT Ethernet Multi-Manager Management Configurations


Overview ...................................................................................................................................................................................... 8-1
8-1

....................................................................................................................................................................................................................................
1350 OMS
iv
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Multi-Manager Management Overview ........................................................................................................................... 8-2


8-2
Operational Guidelines
9

........................................................................................................................................................... 8-3
8-3

1350 OMS PKT MIB Realignment and the ISA Board


Overview ...................................................................................................................................................................................... 9-1
9-1
MIB Alignment and ISA Board Overview

...................................................................................................................... 9-2
9-2

Realign an ISA Board MIB ................................................................................................................................................... 9-4


9-4
10

1350 OMS PKT AlignDBSDHPathID Tool


Overview

................................................................................................................................................................................... 10-1
10-1

AlignDBSDHPathID Overview ........................................................................................................................................ 10-2


10-2
Run AlignDBSDHPathID Tool

......................................................................................................................................... 10-3
10-3

Part III: Basic Functions


11

Generalities
Overview

................................................................................................................................................................................... 11-1
11-1

About 1350 OMS PKT application


Main features ............................................................................................................................................................................ 11-3
11-3
Management Layers

.............................................................................................................................................................. 11-5
11-5

Main concepts .......................................................................................................................................................................... 11-6


11-6
Network architecture overview

......................................................................................................................................... 11-7
11-7

Ethernet Services Attributes ............................................................................................................................................. 11-12


11-12
Classification of Ethernet Services ................................................................................................................................ 11-15
11-15
Definition of Ethernet Services by MEF ..................................................................................................................... 11-27
11-27
Network Topology Description ....................................................................................................................................... 11-30
11-30
How to access the application
Web access .............................................................................................................................................................................. 11-38
11-38
The graphical interface (MS-GUI)

................................................................................................................................ 11-39
11-39

Confirm the action ............................................................................................................................................................... 11-40


11-40
The application interfaces
Software interfaces .............................................................................................................................................................. 11-42
11-42
....................................................................................................................................................................................................................................
1350 OMS
v
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Multi-Manager environment ............................................................................................................................................ 11-44


11-44
Functional Domain
Overview about functional domains
Network Topology Construction

............................................................................................................................. 11-45
11-45

.................................................................................................................................... 11-47
11-47

Traffic Management ............................................................................................................................................................ 11-53


11-53
MPLS Management

............................................................................................................................................................ 11-65
11-65

Maintenance Management ................................................................................................................................................ 11-69


11-69
User Profile Management
12

................................................................................................................................................. 11-71
11-71

Managing your Network


Overview

................................................................................................................................................................................... 12-1
12-1

Network configuration
Create the network objects .................................................................................................................................................. 12-3
12-3
External Network Reference ............................................................................................................................................ 12-14
12-14
Create Physical Connection

............................................................................................................................................. 12-20
12-20

Create LAG ............................................................................................................................................................................ 12-24


12-24
Create Domain
Create Domain

...................................................................................................................................................................... 12-27
12-27

Assign resource to Domain

.............................................................................................................................................. 12-31
12-31

Define NE ............................................................................................................................................................................... 12-35


12-35
Traffic categories
Create Traffic Descriptor ................................................................................................................................................... 12-39
12-39
Create Traffic Classifier ..................................................................................................................................................... 12-43
12-43
L2 Encapsulation .................................................................................................................................................................. 12-46
12-46
NML-EML synchronization
1350 OMS PKT resynchronization ............................................................................................................................... 12-60
12-60
Alignment after deletion and recreation of SDH Path ............................................................................................ 12-61
12-61
VPWS Ethernet PM management procedure
PM feature for the ISA ES1 1.0 board

......................................................................................................................... 12-62
12-62

....................................................................................................................................................................................................................................
1350 OMS
vi
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Provider network operating as a distributed MAC Bridge


Single-Customer, No-VLAN, RSTP provisioning
Provisioning procedure (MAC-SC-NV-RSTP)

................................................................................... 12-67
12-67

.................................................................................................. 12-69
12-69

........................................................................................................ 12-70
12-70

VLAN configuration scenario


VLAN configuration ........................................................................................................................................................... 12-75
12-75
MAC Bridge Network Configuration
MAC Bridge Basics ............................................................................................................................................................ 12-77
12-77
13

Network Organization Management


Overview

................................................................................................................................................................................... 13-1
13-1

Managing Subnetworks
Overview about Subnetworks ............................................................................................................................................ 13-5
13-5
View the list of subnetworks .............................................................................................................................................. 13-7
13-7
Create a Subnetwork

............................................................................................................................................................. 13-8
13-8

Modify a Subnetwork ......................................................................................................................................................... 13-10


13-10
Delete a Subnetwork ........................................................................................................................................................... 13-13
13-13
View the details of the subnetworks

............................................................................................................................. 13-14
13-14

Managing Domains
Overview about Domains

................................................................................................................................................. 13-15
13-15

View the list of Domains ................................................................................................................................................... 13-17


13-17
Description of the list of Domains ................................................................................................................................. 13-18
13-18
Create a Domain ................................................................................................................................................................... 13-20
13-20
Modify a Domain ................................................................................................................................................................. 13-22
13-22
Delete a Domain ................................................................................................................................................................... 13-24
13-24
View the details of the domain ........................................................................................................................................ 13-25
13-25
Details of a Domain

............................................................................................................................................................ 13-26
13-26

Assign resources to a Domain ......................................................................................................................................... 13-27


13-27
Assign a NE to a Domain .................................................................................................................................................. 13-29
13-29
Deassign a NE from a Domain

....................................................................................................................................... 13-30
13-30

....................................................................................................................................................................................................................................
1350 OMS
vii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

View the inventory of NE in a Domain

....................................................................................................................... 13-31
13-31

View the inventory of Transport Links in a Domain

.............................................................................................. 13-32
13-32

View the inventory of VT Queue Profiles in a Domain ......................................................................................... 13-33


13-33
Create Topological View in a Domain

......................................................................................................................... 13-34
13-34

Assign an Ethernet Physical Port to a Domain

......................................................................................................... 13-35
13-35

Deassign an Ethernet Physical Port from a Domain ............................................................................................... 13-36


13-36
Managing service nodes
Overview about service nodes

........................................................................................................................................ 13-37
13-37

View the inventory of NE in a Service Node

............................................................................................................ 13-38
13-38

View the list of service nodes .......................................................................................................................................... 13-39


13-39
Managing Network Elements
Overview about Network Elements

.............................................................................................................................. 13-40
13-40

View the list of Network Elements ................................................................................................................................ 13-42


13-42
Define a NE ............................................................................................................................................................................ 13-43
13-43
Add a NE to a Subnetwork ............................................................................................................................................... 13-46
13-46
Modify a NE

.......................................................................................................................................................................... 13-49
13-49

View the details of the NEs .............................................................................................................................................. 13-52


13-52
View the list of available Network Elements ............................................................................................................. 13-53
13-53
Upload the Ethernet physical ports
Upload the TDM terminations

............................................................................................................................... 13-54
13-54

........................................................................................................................................ 13-57
13-57

Upload the Links Over TDM ........................................................................................................................................... 13-59


13-59
Audit the TDM terminations ............................................................................................................................................ 13-62
13-62
Synchronize the TDM terminations .............................................................................................................................. 13-64
13-64
View the list of TDM terminations ................................................................................................................................ 13-66
13-66
View the details of the TDM terminations .................................................................................................................. 13-67
13-67
Acknowledge the NE LAC state .................................................................................................................................... 13-68
13-68
Show the equipment view ................................................................................................................................................. 13-70
13-70
View the inventory of VT Queue Profiles in a NE .................................................................................................. 13-73
13-73
Upload the Links Over Cable .......................................................................................................................................... 13-74
13-74
....................................................................................................................................................................................................................................
1350 OMS
viii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Upload the Radio Ports ...................................................................................................................................................... 13-75


13-75
Create VT Queue Profile ................................................................................................................................................... 13-76
13-76
Create Topological View from NE or ENE ................................................................................................................ 13-77
13-77
Managing External Network Elements
Overview about External Network Elements

............................................................................................................ 13-78
13-78

View the list of External Network Elements .............................................................................................................. 13-80


13-80
Description of the list of ENE ......................................................................................................................................... 13-81
13-81
Create an ENE ....................................................................................................................................................................... 13-82
13-82
Modify an ENE ..................................................................................................................................................................... 13-85
13-85
Delete an ENE ....................................................................................................................................................................... 13-87
13-87
View the details of the ENEs ........................................................................................................................................... 13-88
13-88
Details of an ENE ................................................................................................................................................................ 13-89
13-89
View the list of ETPs .......................................................................................................................................................... 13-90
13-90
Description of the list of ETPs ........................................................................................................................................ 13-91
13-91
Create an ETP

....................................................................................................................................................................... 13-92
13-92

Delete an ETP

....................................................................................................................................................................... 13-94
13-94

Managing Ethernet Physical ports


View the list of Ethernet Physical ports ....................................................................................................................... 13-96
13-96
Description of the list of Ethernet physical ports ..................................................................................................... 13-97
13-97
Configure an Ethernet physical port
Modify an Ethernet Physical Port

............................................................................................................................. 13-99
13-99

.............................................................................................................................. 13-104
13-104

Assign a Port to Network Access Domain

............................................................................................................... 13-106
13-106

View the details of the Ethernet physical ports

...................................................................................................... 13-108
13-108

Details of an Ethernet Physical Port ........................................................................................................................... 13-109


13-109
View the list of Equipment ports .................................................................................................................................. 13-111
13-111
Description of the list of Equipment ports

............................................................................................................... 13-112
13-112

Managing Link Aggregation (LAG) ports


Description of Link Aggregation (LAG) function ................................................................................................. 13-113
13-113
View the list of LAG ports ............................................................................................................................................. 13-116
13-116
....................................................................................................................................................................................................................................
1350 OMS
ix
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Description of the list of LAG ports ........................................................................................................................... 13-117


13-117
Create a LAG port ............................................................................................................................................................. 13-118
13-118
Modify a LAG port ........................................................................................................................................................... 13-120
13-120
Assign LAG port to Network Access Domain

....................................................................................................... 13-125
13-125

View the details of the LAG ports ............................................................................................................................... 13-126


13-126
Details of a LAG port

...................................................................................................................................................... 13-127
13-127

View the ports member of a LAG

............................................................................................................................... 13-128
13-128

Description of the list of LAG ports ........................................................................................................................... 13-129


13-129
Network Access Domain (NAD) Management
View the list of NADs ...................................................................................................................................................... 13-130
13-130
Description of the list of NADs
Create a NAD

................................................................................................................................... 13-131
13-131

..................................................................................................................................................................... 13-132
13-132

Modify a NAD .................................................................................................................................................................... 13-133


13-133
Delete a NAD

..................................................................................................................................................................... 13-134
13-134

Managing Jumbo Frames (through NAV)


Overview about Jumbo Frames

.................................................................................................................................. 13-135
13-135

Workflow to configure Interfaces for Jumbo Traffic ............................................................................................ 13-137


13-137
Particular configuration procedures
Managing ports on 1678MCC Network Elements ................................................................................................ 13-140
13-140
ISA BCE Ethernet Board ................................................................................................................................................ 13-146
13-146
14

Transport Link Management


Overview

................................................................................................................................................................................... 14-1
14-1

Overview about Transport links


Transport link definition

...................................................................................................................................................... 14-4
14-4

Transport link classification

............................................................................................................................................... 14-5
14-5

Concatenated VC management ....................................................................................................................................... 14-11


14-11
Setting parameters of Transport Links ......................................................................................................................... 14-12
14-12
Implicit configuration ......................................................................................................................................................... 14-14
14-14
....................................................................................................................................................................................................................................
1350 OMS
x
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Managing Links Over TDM


Overview ................................................................................................................................................................................. 14-17
14-17
Introduction ............................................................................................................................................................................ 14-18
14-18
View the list of Links Over TDM .................................................................................................................................. 14-19
14-19
Create Link Over TDM

..................................................................................................................................................... 14-21
14-21

Delete a Link Over TDM .................................................................................................................................................. 14-24


14-24
Configure a Link Over TDM ........................................................................................................................................... 14-25
14-25
Get the Link Over TDM Extremities ............................................................................................................................ 14-27
14-27
Remove inconsistent TDM paths ................................................................................................................................... 14-29
14-29
Assign a Link Over TDM to a Domain

....................................................................................................................... 14-30
14-30

Deassign a Link Over TDM from a Domain


Assign NAccess Domain

............................................................................................................. 14-31
14-31

.................................................................................................................................................. 14-32
14-32

View the details of the Links Over TDM .................................................................................................................... 14-34


14-34
Get the Fault Localization

................................................................................................................................................ 14-36
14-36

Managing Links Over Cable


Overview about Link Over Cables ................................................................................................................................ 14-38
14-38
View the list of Links Over Cables ................................................................................................................................ 14-41
14-41
Create a Link Over Cable

................................................................................................................................................. 14-42
14-42

Modify a Link Over Cable


Delete a Link Over Cable

............................................................................................................................................... 14-44
14-44

................................................................................................................................................. 14-46
14-46

Get the Link Over Cable extremities ............................................................................................................................ 14-48


14-48
View the details of the Link Over Cables

................................................................................................................... 14-50
14-50

Link Over Cable Split/Join ............................................................................................................................................... 14-52


14-52
Configure Split/Join ............................................................................................................................................................ 14-54
14-54
Configure a Link Over Cable

.......................................................................................................................................... 14-57
14-57

Assign NAD ........................................................................................................................................................................... 14-58


14-58
Get the Fault Localization

................................................................................................................................................ 14-59
14-59

Assign a Link Over Cable to a Domain ....................................................................................................................... 14-60


14-60
Deassign a Link Over Cable from a Domain ............................................................................................................. 14-61
14-61
....................................................................................................................................................................................................................................
1350 OMS
xi
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Managing LAG Links Over Cable


View the list of LAG Links Over Cables .................................................................................................................... 14-62
14-62
Create a LAG Link Over Cable from extremities .................................................................................................... 14-63
14-63
Create a LAG Link Over Cable from Links ............................................................................................................... 14-66
14-66
Create a LAG Link VCG from extremities ................................................................................................................ 14-69
14-69
Create a LAG Link VCG from Links ........................................................................................................................... 14-72
14-72
Modify a LAG Link Over Cable .................................................................................................................................... 14-75
14-75
Delete a LAG Link Over Cable ...................................................................................................................................... 14-77
14-77
Get the LAG Link Over Cable extremities ................................................................................................................. 14-79
14-79
View the details of the LAG Link Over Cables ........................................................................................................ 14-80
14-80
Details of the list of LAG Link Over Cables ............................................................................................................. 14-81
14-81
Managing links over WDM
Overview about links over WDM .................................................................................................................................. 14-82
14-82
View the list of links over WDM ................................................................................................................................... 14-83
14-83
Get the Link Over WDM extremities ........................................................................................................................... 14-84
14-84
Description of a Link Over WDM Extremities ......................................................................................................... 14-85
14-85
View the details of the links over WDM ..................................................................................................................... 14-86
14-86
Managing links over MPLS
Overview about links over MPLS

................................................................................................................................. 14-88
14-88

View the list of links over MPLS ................................................................................................................................... 14-89


14-89
Get the Link Over MPLS extremities ........................................................................................................................... 14-90
14-90
View the details of the links over MPLS ..................................................................................................................... 14-91
14-91
Managing Link over Radio
View the list of links over Radio .................................................................................................................................... 14-93
14-93
Managing links over T-MPLS
Overview about links over T-MPLS

............................................................................................................................. 14-94
14-94

View the list of links over T-MPLS ............................................................................................................................... 14-95


14-95
Get the Link Over T-MPLS extremities ....................................................................................................................... 14-96
14-96
View the details of the links over T-MPLS

................................................................................................................ 14-97
14-97

....................................................................................................................................................................................................................................
1350 OMS
xii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Managing MPLS/T-MPLS infrastructure


Overview about MPLS/T-MPLS infrastructure ........................................................................................................ 14-99
14-99
View the list of T-MPLS sections ................................................................................................................................ 14-100
14-100
Get the T-MPLS section extremities ........................................................................................................................... 14-101
14-101
View the details of the links over T-MPLS .............................................................................................................. 14-102
14-102
Managing Transport Links by Domain
View the list of Transport Links ................................................................................................................................... 14-104
14-104
15

MPLS Provisioning Management


Overview

................................................................................................................................................................................... 15-1
15-1

Managing Traffic Descriptors (MPLS)


....................................................................................................................................................................................................... 15-4
15-4

Overview about Traffic Descriptors (MPLS) ............................................................................................................... 15-5


15-5
View the list of Traffic Descriptors (MPLS) ................................................................................................................ 15-6
15-6
Description of the list of Traffic Descriptors ................................................................................................................ 15-7
15-7
Create a Traffic Descriptor (MPLS) ................................................................................................................................ 15-8
15-8
Modify a Traffic Descriptor (MPLS) ............................................................................................................................ 15-12
15-12
Delete a Traffic Descriptor (MPLS) .............................................................................................................................. 15-15
15-15
View the details of the Traffic Descriptors (MPLS) ................................................................................................ 15-16
15-16
Details of a Traffic Descriptor ......................................................................................................................................... 15-17
15-17
Get the Traffic Descriptor inventory list (MPLS) .................................................................................................... 15-18
15-18
Description of the Traffic Descriptor inventory

....................................................................................................... 15-19
15-19

Managing Transport Links (MPLS)


Overview ................................................................................................................................................................................. 15-20
15-20
Overview about Transport Links .................................................................................................................................... 15-21
15-21
View the list of Transport Links ..................................................................................................................................... 15-23
15-23
Define the Transport Link characteristics ................................................................................................................... 15-25
15-25
Get the Transport Link extremities ................................................................................................................................ 15-28
15-28
Description of the list of Transport Link Extremities ............................................................................................. 15-30
15-30
....................................................................................................................................................................................................................................
1350 OMS
xiii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

View the details of the Transport Links ....................................................................................................................... 15-31


15-31
Details of a Transport Link ............................................................................................................................................... 15-32
15-32
View the bandwidth load of Transport Links
View the inventory of Transport Links

........................................................................................................... 15-33
15-33

........................................................................................................................ 15-36
15-36

Description of the Transport Link Inventory ............................................................................................................. 15-38


15-38
Managing LSP Tunnels (MPLS)
Overview ................................................................................................................................................................................. 15-39
15-39
Overview about LSP Tunnels .......................................................................................................................................... 15-40
15-40
View the list of LSP tunnels ............................................................................................................................................. 15-41
15-41
Description of the list of LSP Tunnels
Create an LSP tunnel

.......................................................................................................................................................... 15-43
15-43

Modify an LSP tunnel


Delete an LSP tunnel
Allocate LSP tunnel

......................................................................................................................... 15-42
15-42

........................................................................................................................................................ 15-45
15-45

.......................................................................................................................................................... 15-47
15-47

............................................................................................................................................................ 15-48
15-48

Deallocate LSP tunnel ........................................................................................................................................................ 15-51


15-51
List the constraints of an LSP tunnel

........................................................................................................................... 15-53
15-53

Description of constraints of LSP tunnel


Add a constraint to an LSP tunnel

.................................................................................................................... 15-55
15-55

................................................................................................................................. 15-56
15-56

Delete a constraint from an LSP tunnel ....................................................................................................................... 15-58


15-58
View the details of the LSP tunnel constraints .......................................................................................................... 15-60
15-60
Details of a LSP Tunnel Constraint ............................................................................................................................... 15-62
15-62
View the list of cross connections .................................................................................................................................. 15-63
15-63
Description of the list of LSP cross connections ...................................................................................................... 15-64
15-64
Implement an LSP tunnel .................................................................................................................................................. 15-65
15-65
Get the LSP tunnel extremities

....................................................................................................................................... 15-67
15-67

Description of the list of LSP Tunnel Extremities

.................................................................................................. 15-69
15-69

View the details of the LSP tunnels ............................................................................................................................... 15-70


15-70
Details of a LSP Tunnel ..................................................................................................................................................... 15-71
15-71
View the inventory of VC-LSPs ..................................................................................................................................... 15-72
15-72
....................................................................................................................................................................................................................................
1350 OMS
xiv
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Description of the LSP Tunnel Inventory

................................................................................................................... 15-73
15-73

View the bandwidth load of LSPs .................................................................................................................................. 15-74


15-74
View the route of LSP Tunnels

...................................................................................................................................... 15-77
15-77

View the list of the Transport Links related to an LSP Tunnel

........................................................................... 15-79
15-79

Description of the LSP Tunnel inventory .................................................................................................................... 15-80


15-80
Managing VC-LSP (MPLS)
Overview ................................................................................................................................................................................. 15-81
15-81
Overview about VC-LSP

.................................................................................................................................................. 15-82
15-82

View the list of VC-LSPs .................................................................................................................................................. 15-83


15-83
Description of the list of VC-LSPs ................................................................................................................................ 15-84
15-84
Create a VC-LSP .................................................................................................................................................................. 15-85
15-85
Modify a VC-LSP ................................................................................................................................................................ 15-89
15-89
Delete a VC-LSP .................................................................................................................................................................. 15-91
15-91
Implement a VC-LSP

......................................................................................................................................................... 15-92
15-92

De-implement a VC-LSP .................................................................................................................................................. 15-94


15-94
Commission a VC-LSP ...................................................................................................................................................... 15-96
15-96
De-commission a VC-LSP

............................................................................................................................................... 15-98
15-98

Get the VC-LSP extremities ............................................................................................................................................. 15-99


15-99
Description of the list of VC-LSP Extremities

....................................................................................................... 15-101
15-101

View the details of the VC-LSPs ................................................................................................................................. 15-102


15-102
Details of a VC-LSP ......................................................................................................................................................... 15-103
15-103
16

T-MPLS Provisioning Management


Overview

................................................................................................................................................................................... 16-1
16-1

Managing T-MPLS PHB profile


Overview about PHB profile management
View the list of PHB profiles (T-MPLS)

.................................................................................................................. 16-5
16-5

....................................................................................................................... 16-6
16-6

Description of the list of T-MPLS PHB Profiles


Create a PHB profile (T-MPLS)

........................................................................................................ 16-7
16-7

....................................................................................................................................... 16-8
16-8

Modify a PHB profiles (T-MPLS)

................................................................................................................................... 16-9
16-9

....................................................................................................................................................................................................................................
1350 OMS
xv
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Delete a PHB profile (T-MPLS) ..................................................................................................................................... 16-11


16-11
View the details of the PHB profiles (T-MPLS)

...................................................................................................... 16-13
16-13

Managing Transport Links (T-MPLS)


Overview about Transport Links .................................................................................................................................... 16-14
16-14
View the list of Transport Links ..................................................................................................................................... 16-16
16-16
Description of the list of T-MPLS Transport Links ................................................................................................. 16-17
16-17
Define the Transport Link characteristics ................................................................................................................... 16-18
16-18
Get the Transport Link extremities ................................................................................................................................ 16-20
16-20
Description of the list of Transport Link Extremities ............................................................................................. 16-22
16-22
View the details of the Transport Links ....................................................................................................................... 16-23
16-23
Details of a T-MPLS Transport Link

............................................................................................................................ 16-24
16-24

View the bandwidth load of Transport Links


View the inventory of Transport Links

........................................................................................................... 16-25
16-25

........................................................................................................................ 16-28
16-28

Description of the inventory of Transport Links ...................................................................................................... 16-30


16-30
Managing Virtual Transport (T-MPLS)
Overview about Virtual Transports

............................................................................................................................... 16-31
16-31

View the list of Virtual Transports ................................................................................................................................. 16-33


16-33
Description of the list of Virtual Transports ............................................................................................................... 16-34
16-34
Create a Virtual Transport ................................................................................................................................................. 16-35
16-35
Modify a Virtual Transport ............................................................................................................................................... 16-37
16-37
Delete a Virtual Transport ................................................................................................................................................. 16-39
16-39
View the details of the Virtual Transport ..................................................................................................................... 16-40
16-40
Details of a Virtual Transport

.......................................................................................................................................... 16-41
16-41

Configuration of a Virtual Transport


Implement a Virtual Transport

........................................................................................................................... 16-42
16-42

........................................................................................................................................ 16-44
16-44

De-implement a Virtual Transport ................................................................................................................................. 16-46


16-46
View the Virtual Transport extremities ........................................................................................................................ 16-48
16-48
Description of the list of Virtual Transports ............................................................................................................... 16-49
16-49

....................................................................................................................................................................................................................................
1350 OMS
xvi
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Managing Pseudo Wires (T-MPLS)


Overview about Pseudo Wires

........................................................................................................................................ 16-50
16-50

View the list of Pseudo Wires .......................................................................................................................................... 16-51


16-51
Description of the list of Pseudo Wires ........................................................................................................................ 16-52
16-52
Create a Pseudo Wire .......................................................................................................................................................... 16-53
16-53
Modify a PseudoWire ......................................................................................................................................................... 16-55
16-55
Delete a Pseudo Wire .......................................................................................................................................................... 16-57
16-57
View the details of the Pseudo Wires

........................................................................................................................... 16-58
16-58

Details of a Pseudo Wire ................................................................................................................................................... 16-59


16-59
Configuration of the route of a Pseudo Wire ............................................................................................................. 16-60
16-60
Delete a constraint from a Pseudo Wire

...................................................................................................................... 16-62
16-62

Configuration of PHB profile of a Pseudo Wire ....................................................................................................... 16-64


16-64
Configuration of Layer-2 encapsulation of a Pseudo Wire ................................................................................... 16-66
16-66
Allocate Pseudo Wire ......................................................................................................................................................... 16-67
16-67
De-allocate Pseudo Wire ................................................................................................................................................... 16-70
16-70
Implement a Pseudo Wire ................................................................................................................................................. 16-72
16-72
De-implement a Pseudo Wire .......................................................................................................................................... 16-74
16-74
List the constraints of a Pseudo Wire

.......................................................................................................................... 16-76
16-76

Description of the list of Pseudo Wire Constraints .................................................................................................. 16-77


16-77
View the details of the Pseudo Wire constraints ....................................................................................................... 16-78
16-78
Details of a Pseudo Wire Constraint ............................................................................................................................. 16-79
16-79
View the list of cross connections .................................................................................................................................. 16-80
16-80
Description of the list of PW Cross Connections ..................................................................................................... 16-81
16-81
View the Pseudo Wire extremities ................................................................................................................................. 16-82
16-82
Description of the list of PW Extremities ................................................................................................................... 16-83
16-83
View the section inventory from Pseudo Wire .......................................................................................................... 16-84
16-84
Description of the T-MPLS section Inventory

.......................................................................................................... 16-85
16-85

View the bandwidth load of Pseudo Wire ................................................................................................................... 16-86


16-86
View the route of Pseudo Wires

.................................................................................................................................... 16-87
16-87

....................................................................................................................................................................................................................................
1350 OMS
xvii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

View the Pseudo Wires crossing a Pseudo Wire ....................................................................................................... 16-88


16-88
Description of the list of Pseudo Wires ........................................................................................................................ 16-89
16-89
T-MPLS tunnel schema
T-MPLS tunnel schema

..................................................................................................................................................... 16-90
16-90

Ethernet Services in the T-MPLS Domain

................................................................................................................ 16-93
16-93

Managing T-MPLS tunnels


T-MPLS tunnel description

.............................................................................................................................................. 16-97
16-97

View the list of T-MPLS tunnels .................................................................................................................................... 16-99


16-99
Description of the list of T-MPLS tunnels

............................................................................................................... 16-100
16-100

Create a T-MPLS tunnel .................................................................................................................................................. 16-101


16-101
Modify a T-MPLS tunnel ................................................................................................................................................ 16-104
16-104
Delete a T-MPLS tunnel .................................................................................................................................................. 16-106
16-106
View the details of the T-MPLS tunnels

................................................................................................................... 16-107
16-107

Details of a T-MPLS tunnel ........................................................................................................................................... 16-108


16-108
Configuration of the route of a T-MPLS tunnel ..................................................................................................... 16-109
16-109
Delete a constraint from a T-MPLS tunnel ............................................................................................................... 16-111
16-111
Configuration of PHB profile of a T-MPLS tunnel ............................................................................................... 16-113
16-113
Configuration of Layer-2 encapsulation of a tunnel ............................................................................................. 16-115
16-115
Allocate T-MPLS tunnel

................................................................................................................................................. 16-117
16-117

De-allocate T-MPLS tunnel ........................................................................................................................................... 16-120


16-120
Implement a T-MPLS tunnel ......................................................................................................................................... 16-122
16-122
De-implement a T-MPLS tunnel .................................................................................................................................. 16-124
16-124
List the constraints of a T-MPLS tunnel

.................................................................................................................. 16-126
16-126

Description of the list of T-MPLS tunnel Constraints .......................................................................................... 16-127


16-127
View the details of the T-MPLS tunnel constraints ............................................................................................... 16-128
16-128
Details of a T-MPLS tunnel Constraint ..................................................................................................................... 16-129
16-129
View the list of cross connections ............................................................................................................................... 16-130
16-130
Description of the list of T-MPLS tunnel Cross Connections ........................................................................... 16-131
16-131
View the T-MPLS tunnel extremities ......................................................................................................................... 16-132
16-132
....................................................................................................................................................................................................................................
1350 OMS
xviii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Description of the list of T-MPLS tunnel Extremities

......................................................................................... 16-133
16-133

View the section inventory from T-MPLS tunnel .................................................................................................. 16-134


16-134
Description of the Inventory of sections ................................................................................................................... 16-135
16-135
View the bandwidth load of T-MPLS tunnel ........................................................................................................... 16-136
16-136
View the route of T-MPLS tunnels

............................................................................................................................ 16-137
16-137

View the Pseudo Wires crossing a T-MPLS tunnel ............................................................................................... 16-138


16-138
Description of the list of Pseudo Wires ..................................................................................................................... 16-139
16-139
Tunnel protection
Tunnel protection create .................................................................................................................................................. 16-140
16-140
T-MPLS Routing display ................................................................................................................................................ 16-144
16-144
Tunnel switch commands ............................................................................................................................................... 16-147
16-147
Other info on T-MPLS routing display ...................................................................................................................... 16-152
16-152
MAC Flushing Protection
Overview

.............................................................................................................................................................................. 16-156
16-156

MAC flushing protection description

........................................................................................................................ 16-157
16-157

MAC flushing protection creation ............................................................................................................................... 16-158


16-158
MAC flushing protection list

........................................................................................................................................ 16-160
16-160

Attributes of MAC-flushing protection ..................................................................................................................... 16-161


16-161
Interconnection Scheme list ........................................................................................................................................... 16-162
16-162
Attributes of Interconnection Schemes

..................................................................................................................... 16-163
16-163

TMPLS EVC: Force MAC flushing ........................................................................................................................... 16-164


16-164
Tunnel Redundancy
Overview

.............................................................................................................................................................................. 16-165
16-165

Description ........................................................................................................................................................................... 16-166


16-166
Create one-to-one-open protection .............................................................................................................................. 16-173
16-173
Create Dual-point-to-point Protection

....................................................................................................................... 16-175
16-175

Create MAC Flushing Protection Schema


EVC setup

.............................................................................................................. 16-177
16-177

............................................................................................................................................................................ 16-178
16-178

....................................................................................................................................................................................................................................
1350 OMS
xix
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

17

EVC over T-MPLS


Overview

................................................................................................................................................................................... 17-1
17-1

Create T-MPLS Structure


Create Link over Cable
T-MPLS tunnel create

........................................................................................................................................................ 17-2
17-2

........................................................................................................................................................ 17-14
17-14

T-MPLS-Create PW ............................................................................................................................................................ 17-21


17-21
EVC on T-MPLS
Create EVC over T-MPLS wizard ................................................................................................................................. 17-27
17-27
List the T-MPLS EVC ........................................................................................................................................................ 17-32
17-32
Description of the list of T-MPLS EVC

...................................................................................................................... 17-33
17-33

Create EVC over T-MPLS EVPL bottom up ............................................................................................................. 17-34


17-34
Create EVC over T-MPLS EVPL top down ............................................................................................................... 17-55
17-55
Create EVC over T-MPLS EVPLAN ........................................................................................................................... 17-72
17-72
Create EVC over T-MPLS BTV ..................................................................................................................................... 17-86
17-86
Create EVC over T-MPLS HSI ....................................................................................................................................... 17-90
17-90
Alarms EVC T-MPLS

........................................................................................................................................................ 17-94
17-94

Delete NE with EVC over T-MPLS


What to do deleting a NE .................................................................................................................................................. 17-97
17-97
Delete NE detailed procedure .......................................................................................................................................... 17-98
17-98
Verify create EVC over T-MPLS
Verify create EVC over T-MPLS ................................................................................................................................. 17-114
17-114
18

End to End Ethernet Provisioning Management


Overview

................................................................................................................................................................................... 18-1
18-1

IP DSCP/TOS and EtherType


Classification of the frames ................................................................................................................................................ 18-6
18-6
Managing Customer
Overview about Customer

.................................................................................................................................................. 18-8
18-8

Display the Customer List ................................................................................................................................................... 18-9


18-9
....................................................................................................................................................................................................................................
1350 OMS
xx
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Description of the list of Customers

............................................................................................................................. 18-10
18-10

Create a Customer ................................................................................................................................................................ 18-11


18-11
Modify a Customer
Delete a Customer

............................................................................................................................................................. 18-12
18-12

............................................................................................................................................................... 18-14
18-14

Get Details of the Customer ............................................................................................................................................. 18-15


18-15
Details of a Customer ......................................................................................................................................................... 18-16
18-16
Managing Ethernet Services
Overview about Ethernet Services

................................................................................................................................ 18-17
18-17

Display the Service List ..................................................................................................................................................... 18-20


18-20
Description of the list of Services .................................................................................................................................. 18-21
18-21
Create a Service .................................................................................................................................................................... 18-22
18-22
Service Setup ......................................................................................................................................................................... 18-24
18-24
Modify a Service .................................................................................................................................................................. 18-30
18-30
Delete a Service .................................................................................................................................................................... 18-32
18-32
Get details of the Service
Details of a Service

.................................................................................................................................................. 18-33
18-33

............................................................................................................................................................. 18-35
18-35

Display the Services of a Customer

.............................................................................................................................. 18-36
18-36

Managing ETS Ethernet Virtual Connections (EVC)


Overview about ETS Ethernet Virtual Connections ................................................................................................ 18-37
18-37
Resource Reservation for Private Services ................................................................................................................. 18-39
18-39
Display the list of Connection Oriented EVC ........................................................................................................... 18-42
18-42
Description of the list of EVCs ....................................................................................................................................... 18-43
18-43
Create a Connection Oriented EVC .............................................................................................................................. 18-44
18-44
Modify an ETS EVC
Delete an ETS EVC

.......................................................................................................................................................... 18-47
18-47

............................................................................................................................................................ 18-49
18-49

Get the EVC properties ...................................................................................................................................................... 18-51


18-51
Details of a EVC

.................................................................................................................................................................. 18-53
18-53

Allocate ETS EVC

.............................................................................................................................................................. 18-54
18-54

Deallocate ETS EVC .......................................................................................................................................................... 18-55


18-55
....................................................................................................................................................................................................................................
1350 OMS
xxi
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Implement ETS EVC .......................................................................................................................................................... 18-56


18-56
Deimplement ETS EVC .................................................................................................................................................... 18-57
18-57
Commission ETS EVC ...................................................................................................................................................... 18-58
18-58
Decommission ETS EVC

................................................................................................................................................. 18-59
18-59

List the EVC terminations ................................................................................................................................................ 18-60


18-60
Description of the list of terminations .......................................................................................................................... 18-61
18-61
Delete an EVC Termination ............................................................................................................................................. 18-62
18-62
Get the EVC termination properties .............................................................................................................................. 18-63
18-63
Details of a Termination

.................................................................................................................................................... 18-65
18-65

Add an EVC termination ................................................................................................................................................... 18-66


18-66
EVC Fault Localization ..................................................................................................................................................... 18-68
18-68
Description of the list of Fault Localization
Description of the list of Alarms
Start PM on an EVC

.............................................................................................................. 18-69
18-69

.................................................................................................................................... 18-70
18-70

........................................................................................................................................................... 18-71
18-71

Stop PM on an EVC ............................................................................................................................................................ 18-72


18-72
Synchronize PM on an EVC ............................................................................................................................................ 18-73
18-73
Show PM on an EVC

......................................................................................................................................................... 18-74
18-74

View the Routing Display on an EVC

......................................................................................................................... 18-75
18-75

Managing End-to-End Ethernet Virtual Connections (E2E EVC)


Overview about E2E Ethernet Virtual Connections ................................................................................................ 18-76
18-76
Display the list of E2E EVC ............................................................................................................................................ 18-78
18-78
Description of the list of EVCs ....................................................................................................................................... 18-79
18-79
Create an E2E EVC ............................................................................................................................................................. 18-80
18-80
Create a full E2E EVC ....................................................................................................................................................... 18-84
18-84
Create a raw E2E EVC

...................................................................................................................................................... 18-86
18-86

Modify a full E2E EVC ..................................................................................................................................................... 18-87


18-87
Join E2E EVC

....................................................................................................................................................................... 18-89
18-89

Managing an E2E EVC

..................................................................................................................................................... 18-91
18-91

....................................................................................................................................................................................................................................
1350 OMS
xxii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

EVC over SDH


Structure for EVC over SDH ........................................................................................................................................... 18-93
18-93
Assign ports to domain .................................................................................................................................................... 18-102
18-102
EVC over SDH ................................................................................................................................................................... 18-106
18-106
Alarms EVC T-MPLS ...................................................................................................................................................... 18-118
18-118
Full EVC Takeover
Overview about Full EVC Takeover procedure ..................................................................................................... 18-121
18-121
Full EVC Takeover Procedure ...................................................................................................................................... 18-122
18-122
T-MPLS Takeover
T-MPLS Takeover description ...................................................................................................................................... 18-130
18-130
Takeover procedure for T-MPLS ................................................................................................................................. 18-131
18-131
Managing Color Profiles
Overview about Color Profiles ..................................................................................................................................... 18-133
18-133
Display the Color Profile list ......................................................................................................................................... 18-134
18-134
Create a Color Profile

...................................................................................................................................................... 18-135
18-135

Modify a Color Profile


Delete a Color Profile

.................................................................................................................................................... 18-136
18-136

...................................................................................................................................................... 18-139
18-139

Get the Color Profile Properties ................................................................................................................................... 18-140


18-140
Managing Traffic Descriptors
Overview about Traffic Descriptor

............................................................................................................................. 18-142
18-142

Display the Traffic Descriptor list ............................................................................................................................... 18-144


18-144
Description of the list of Traffic Descriptors ........................................................................................................... 18-145
18-145
Create a Traffic Descriptor ............................................................................................................................................. 18-146
18-146
Modify a Traffic Descriptor ........................................................................................................................................... 18-149
18-149
Delete a Traffic Descriptor ............................................................................................................................................. 18-152
18-152
Get the Traffic Descriptor Properties
Details of a Traffic Descriptor

......................................................................................................................... 18-153
18-153

...................................................................................................................................... 18-155
18-155

....................................................................................................................................................................................................................................
1350 OMS
xxiii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Managing Traffic Classifiers


Overview about Traffic Classifiers

............................................................................................................................. 18-156
18-156

Display the Traffic Classifier list ................................................................................................................................. 18-158


18-158
Description of the list of Traffic Classifiers ............................................................................................................. 18-159
18-159
Create a Traffic Classifier ............................................................................................................................................... 18-160
18-160
Modify a Traffic Classifier ............................................................................................................................................. 18-162
18-162
Delete a Traffic Classifier ............................................................................................................................................... 18-164
18-164
Get the Traffic Classifier Properties ........................................................................................................................... 18-165
18-165
Details of a Traffic Classifier ........................................................................................................................................ 18-167
18-167
Managing Ethernet ETS Edge Physical Ports
Overview about Ethernet edge physical ports

....................................................................................................... 18-168
18-168

Display the ETS edge port list ...................................................................................................................................... 18-169


18-169
Modify an edge port

......................................................................................................................................................... 18-170
18-170

Configure an ETS Edge Port ......................................................................................................................................... 18-172


18-172
Get the ETS Edge Port Properties ............................................................................................................................... 18-175
18-175
Display the traffic parameter list .................................................................................................................................. 18-177
18-177
Description of the list of Traffic Parameters

........................................................................................................... 18-178
18-178

Details of Traffic Parameters ......................................................................................................................................... 18-179


18-179
Navigation to equipment ................................................................................................................................................. 18-180
18-180
Show PM on an Edge Port ............................................................................................................................................. 18-182
18-182
Show External Termination Point

............................................................................................................................... 18-183
18-183

Managing Ethernet Transport Links


Overview about Ethernet Transport Links

............................................................................................................... 18-184
18-184

Display the Ethernet ETS Transport Link list ......................................................................................................... 18-186


18-186
Description of the list of ETS Transport Links ....................................................................................................... 18-187
18-187
Configure an ETS Transport Link ............................................................................................................................... 18-188
18-188
Get the Transport Link extremities
Get the Transport Link properties

............................................................................................................................. 18-190
18-190

............................................................................................................................... 18-193
18-193

Details of ETS Transport Links .................................................................................................................................... 18-195


18-195
....................................................................................................................................................................................................................................
1350 OMS
xxiv
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Display the Transport Link bandwidth load

............................................................................................................ 18-196
18-196

Managing Ethernet Segments


Overview about Ethernet Segments
Display the Ethernet Segment list

........................................................................................................................... 18-197
18-197

............................................................................................................................... 18-199
18-199

Description of the list of Ethernet Segments ........................................................................................................... 18-200


18-200
Create an Ethernet Segment

.......................................................................................................................................... 18-202
18-202

Modify an Ethernet Segment


Delete an Ethernet Segment

........................................................................................................................................ 18-205
18-205

.......................................................................................................................................... 18-208
18-208

Associate a Traffic Classifier to an Ethernet Segment ......................................................................................... 18-209


18-209
Disassociate a Traffic Classifier to an Ethernet Segment
Add a constraint to an Ethernet Segment

................................................................................... 18-211
18-211

................................................................................................................. 18-213
18-213

List the constraints related to an Ethernet Segment .............................................................................................. 18-216


18-216
Description of the list of Constraints .......................................................................................................................... 18-217
18-217
Delete an Ethernet Segment Constraint

.................................................................................................................... 18-218
18-218

Get the Ethernet Segment Constraint Properties .................................................................................................... 18-219


18-219
Details of an Ethernet Segment Constraint .............................................................................................................. 18-221
18-221
Modify a Constraint .......................................................................................................................................................... 18-222
18-222
VLAN Push/Pop at ETS NNI Interface

.................................................................................................................... 18-225
18-225

Allocate an Ethernet Segment ....................................................................................................................................... 18-226


18-226
Deallocate an Ethernet Segment

................................................................................................................................. 18-227
18-227

Implement an Ethernet Segment .................................................................................................................................. 18-229


18-229
Deimplement an Ethernet Segment
Configure an Ethernet Segment

............................................................................................................................ 18-231
18-231

................................................................................................................................... 18-233
18-233

Get the Ethernet Segment extremities ........................................................................................................................ 18-235


18-235
Description of the list of Ethernet Segment Extremities ..................................................................................... 18-239
18-239
Get the Ethernet Segment properties .......................................................................................................................... 18-240
18-240
Details of an Ethernet Segment .................................................................................................................................... 18-241
18-241
Display the route of an Ethernet Segment ................................................................................................................ 18-242
18-242
Display the connectivity view of an Ethernet Segment ....................................................................................... 18-244
18-244
....................................................................................................................................................................................................................................
1350 OMS
xxv
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Managing VLAN types


Overview about VLAN types

....................................................................................................................................... 18-246
18-246

Display the VLAN type list ........................................................................................................................................... 18-247


18-247
Create a VLAN type ......................................................................................................................................................... 18-248
18-248
Modify a VLAN type ....................................................................................................................................................... 18-251
18-251
Delete a VLAN type ......................................................................................................................................................... 18-253
18-253
19

Bridge Network Management


Overview

................................................................................................................................................................................... 19-1
19-1

Connection Less Networks


Bridge Network Management ............................................................................................................................................ 19-4
19-4
Bridge Traffic Management ................................................................................................................................................ 19-6
19-6
Spanning Tree Instance Management ............................................................................................................................. 19-8
19-8
VLAN management ............................................................................................................................................................ 19-10
19-10
EVC Data Plane .................................................................................................................................................................... 19-11
19-11
The EVC life cycle .............................................................................................................................................................. 19-13
19-13
Layer-2 Control Protocol Processing ............................................................................................................................ 19-16
19-16
Bandwidth Profile per UNI

.............................................................................................................................................. 19-18
19-18

View the list of bridge NEs

.............................................................................................................................................. 19-22
19-22

Description of the list of Bridge NEs


View the list of bridge ENEs

........................................................................................................................... 19-23
19-23

........................................................................................................................................... 19-24
19-24

Description of the list of Bridge ENEs

........................................................................................................................ 19-25
19-25

View the Provider Bridge Flows of an EVC .............................................................................................................. 19-26


19-26
Connection Less Transport Link Management
Display the Ethernet Bridge Transport Link list ....................................................................................................... 19-27
19-27
Description of the list of Bridge Transport Links
Configure a transport Link

.................................................................................................... 19-29
19-29

............................................................................................................................................... 19-30
19-30

Get the Transport Link extremities ................................................................................................................................ 19-34


19-34
Description of the list of Transport Link extremities .............................................................................................. 19-37
19-37
Get the Transport Link properties .................................................................................................................................. 19-38
19-38
....................................................................................................................................................................................................................................
1350 OMS
xxvi
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Details of an ETB Transport Link .................................................................................................................................. 19-40


19-40
Activate a Bridge Transport Link ................................................................................................................................... 19-41
19-41
Deactivate a Bridge Transport Link .............................................................................................................................. 19-42
19-42
View the list of Bridge Edge Ports

................................................................................................................................ 19-43
19-43

Description of the list of Bridge Edge Ports


Activate a Bridge Edge Port

.............................................................................................................. 19-44
19-44

............................................................................................................................................ 19-45
19-45

Deactivate a Bridge Edge Port ........................................................................................................................................ 19-46


19-46
Connection Less EVC Management
View the Connection Less EVC list .............................................................................................................................. 19-47
19-47
Description of the list of Bridge EVCs ........................................................................................................................ 19-48
19-48
Create a Bridge EVC .......................................................................................................................................................... 19-49
19-49
Modify a Bridge EVC ........................................................................................................................................................ 19-53
19-53
Delete a Bridge EVC .......................................................................................................................................................... 19-56
19-56
Get the EVC properties ...................................................................................................................................................... 19-58
19-58
Details of a Bridge EVC .................................................................................................................................................... 19-60
19-60
Configure a Bridge or an ETS EVC .............................................................................................................................. 19-61
19-61
Add bridge Transport Link to EVC ............................................................................................................................... 19-62
19-62
Remove bridge Transport Link to EVC ....................................................................................................................... 19-63
19-63
Inventory of bridge Transport Links of an EVC ....................................................................................................... 19-64
19-64
EVC Fault Localization ..................................................................................................................................................... 19-65
19-65
Description of the list of Fault Localization
Description of the list of Alarms

.............................................................................................................. 19-68
19-68

.................................................................................................................................... 19-69
19-69

Navigation to AS .................................................................................................................................................................. 19-70


19-70
Bridge EVC Termination Management
View the list of EVC terminations ................................................................................................................................. 19-72
19-72
Description of the list of EVC Terminations

............................................................................................................. 19-73
19-73

Add Connection Less EVC Termination ..................................................................................................................... 19-74


19-74
Delete a Bridge EVC Termination ................................................................................................................................. 19-81
19-81
Configure a Bridge EVC Termination .......................................................................................................................... 19-83
19-83
....................................................................................................................................................................................................................................
1350 OMS
xxvii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Get the EVC termination properties .............................................................................................................................. 19-85


19-85
Details of an EVC Termination ....................................................................................................................................... 19-87
19-87
Workflow for Bridge Management
Overview about Workflow

.............................................................................................................................................. 19-88
19-88

Create a Domain ................................................................................................................................................................... 19-90


19-90
Add NE to a Domain

.......................................................................................................................................................... 19-91
19-91

Domain Configuration
Domain Modification

....................................................................................................................................................... 19-94
19-94

......................................................................................................................................................... 19-96
19-96

Configure a Network Element

........................................................................................................................................ 19-98
19-98

Link Over TDM configuration

..................................................................................................................................... 19-100
19-100

NE Ethernet Physical Port Configuration ................................................................................................................. 19-102


19-102
Create a Customer ............................................................................................................................................................. 19-104
19-104
Create an Ethernet Service ............................................................................................................................................. 19-107
19-107
Traffic Descriptor Definition ......................................................................................................................................... 19-109
19-109
EVC Allocation and Implementation

......................................................................................................................... 19-111
19-111

EVC Bandwidth Management


Dynamic change capability ............................................................................................................................................ 19-112
19-112
Function Description ........................................................................................................................................................ 19-113
19-113
Service Delimiting
Vlan Push/Pop On Provider Bridge UNI/IWI Management

............................................................................. 19-117
19-117

Spanning Tree
Show the Spanning Tree Instance of EVC ............................................................................................................... 19-119
19-119
Show the Spanning Tree Instance

............................................................................................................................... 19-120
19-120

Spanning Tree Instance configuration

....................................................................................................................... 19-121
19-121

Spanning Tree Instance Implementation ................................................................................................................... 19-123


19-123
Spanning Tree Instance Deimplementation ............................................................................................................. 19-124
19-124
20

Provider Backbone Bridge Network Management


Overview

................................................................................................................................................................................... 20-1
20-1

....................................................................................................................................................................................................................................
1350 OMS
xxviii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Provider Backbone Bridge (PBB) Networks


Provider Backbone Bridge Management ....................................................................................................................... 20-5
20-5
PBB EVC provisioning ........................................................................................................................................................ 20-8
20-8
Ethernet Ring Protocol (ERP) ......................................................................................................................................... 20-10
20-10
Network Configuration
Network Configuration ...................................................................................................................................................... 20-11
20-11
PBB Domain Create ............................................................................................................................................................ 20-12
20-12
Define NE ............................................................................................................................................................................... 20-14
20-14
Provisioning
Provisioning hardware reference .................................................................................................................................... 20-17
20-17
Transport link

....................................................................................................................................................................... 20-20
20-20

Create Ethernet Physical Connection

........................................................................................................................... 20-21
20-21

Assign Link over Cable to PBB domain

..................................................................................................................... 20-24
20-24

ERP configuration
Create ERP Ring

.................................................................................................................................................................. 20-30
20-30

Create an ERP Instance ...................................................................................................................................................... 20-38


20-38
Backbone VLAN ID
B-VID configuration ........................................................................................................................................................... 20-46
20-46
EVC-EVPLAN Service in PBB/ERP
Additional Info on PBB/ERP Service

.......................................................................................................................... 20-52
20-52

PBB EVC Termination Management


Add PBB EVC Termination ............................................................................................................................................. 20-56
20-56
Remove PBB EVC Termination ..................................................................................................................................... 20-59
20-59
Provider Backbone Bridge EVC Management
Overview ................................................................................................................................................................................. 20-60
20-60
View the PBB EVC list ...................................................................................................................................................... 20-61
20-61
Description of the list of PBB EVCs ............................................................................................................................ 20-62
20-62
Create PBB EVC .................................................................................................................................................................. 20-63
20-63
....................................................................................................................................................................................................................................
1350 OMS
xxix
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Allocate PBB EVC .............................................................................................................................................................. 20-65


20-65
Deallocate PBB EVC

......................................................................................................................................................... 20-67
20-67

Implement PBB EVC ......................................................................................................................................................... 20-68


20-68
Deimplement PBB EVC .................................................................................................................................................... 20-70
20-70
Add Termination on implemented PBB EVC

........................................................................................................... 20-71
20-71

Remove Termination on implemented EVC .............................................................................................................. 20-72


20-72
Configure PBB EVC

.......................................................................................................................................................... 20-73
20-73

Bridge Flows of PBB EVC

.............................................................................................................................................. 20-74
20-74

PBB EVC Broadcast Domain Containment ............................................................................................................... 20-76


20-76
Enable Broadcast Domain Containment

..................................................................................................................... 20-77
20-77

Disable Broadcast Domain Containment .................................................................................................................... 20-78


20-78
Automatic association UNI port - default VT ........................................................................................................... 20-79
20-79
Manual association UNI port - user VT

...................................................................................................................... 20-80
20-80

Configuration of the DEI bit ............................................................................................................................................ 20-81


20-81
B-VID Management
Overview ................................................................................................................................................................................. 20-82
20-82
View the B-VID list

............................................................................................................................................................ 20-83
20-83

Create PBB B-VID .............................................................................................................................................................. 20-84


20-84
Delete PBB B-VID .............................................................................................................................................................. 20-86
20-86
Allocate PBB B-VID .......................................................................................................................................................... 20-87
20-87
Deallocate PBB B-VID ...................................................................................................................................................... 20-88
20-88
Implement PBB B-VID

..................................................................................................................................................... 20-89
20-89

Deimplement PBB B-VID ................................................................................................................................................ 20-91


20-91
Domain Wide VID distribution ....................................................................................................................................... 20-93
20-93
Ring Association to a B-VID ........................................................................................................................................... 20-95
20-95
Ring Dissociation from B-VID ....................................................................................................................................... 20-97
20-97
Change ERP of a B-VID

................................................................................................................................................... 20-99
20-99

List ERP instances of a B-VID ..................................................................................................................................... 20-101


20-101
Association of Transport Link to B-VID .................................................................................................................. 20-102
20-102
....................................................................................................................................................................................................................................
1350 OMS
xxx
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Dissociation of Transport Link to B-VID ................................................................................................................. 20-104


20-104
Ethernet Ring Protection (ERP) Management
Overview

.............................................................................................................................................................................. 20-107
20-107

View the ERP ring list

..................................................................................................................................................... 20-108
20-108

Description of the list of ERP ....................................................................................................................................... 20-109


20-109
Create/delete ERP Ring ................................................................................................................................................... 20-110
20-110
Implement/deimplement the ERP
ERP Switch Command

............................................................................................................................... 20-112
20-112

.................................................................................................................................................... 20-113
20-113

ERP Switch Command From Port ............................................................................................................................... 20-114


20-114
Add/remove Transport Link in a Ring ....................................................................................................................... 20-115
20-115
Add/remove Node in a Ring .......................................................................................................................................... 20-116
20-116
Create/delete ERP Ring bundle .................................................................................................................................... 20-117
20-117
Add/remove ERP Ring in a bundle ............................................................................................................................. 20-118
20-118
ERP Instance Management
Overview

.............................................................................................................................................................................. 20-120
20-120

View the ERP instance list

............................................................................................................................................. 20-121
20-121

Description of the list of ERP instances .................................................................................................................... 20-122


20-122
Create/delete ERP instance ............................................................................................................................................ 20-123
20-123
Implement/deimplement the ERP instance
Associate OAM to the ERP instance

............................................................................................................. 20-125
20-125

......................................................................................................................... 20-126
20-126

Get a graphical view of the ERP instance

............................................................................................................... 20-127
20-127

Modify Defined ERP instance ...................................................................................................................................... 20-129


20-129
Modify implemented ERP instance

............................................................................................................................ 20-131
20-131

PBB Fault Management


Overview

.............................................................................................................................................................................. 20-133
20-133

PBB Fault Localization and navigation to AS ........................................................................................................ 20-134


20-134
Workflow for PBB Management
Overview about Workflow

............................................................................................................................................ 20-135
20-135

Create a PBB Domain ...................................................................................................................................................... 20-137


20-137
....................................................................................................................................................................................................................................
1350 OMS
xxxi
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Add NE to a Domain ........................................................................................................................................................ 20-138


20-138
Add Transport Link to a Domain ................................................................................................................................. 20-139
20-139
ERP provisioning ............................................................................................................................................................... 20-141
20-141
Configure B-VID

............................................................................................................................................................. 20-143
20-143

Create a PBB EVC ............................................................................................................................................................ 20-144


20-144
PBB EVC traffic classification ..................................................................................................................................... 20-153
20-153
Traffic Descriptor Definition ......................................................................................................................................... 20-154
20-154
EVC Allocation and Implementation ......................................................................................................................... 20-155
20-155
In Band Management
Overview

.............................................................................................................................................................................. 20-156
20-156

Address Configuration of the Network Elements .................................................................................................. 20-157


20-157
Lag Port Creation (Via Zic) ........................................................................................................................................... 20-165
20-165
NMS Start Supervision (NE Not Defined On NMS)
21

........................................................................................... 20-183
20-183

Broadcast TV Service Management


Overview

................................................................................................................................................................................... 21-1
21-1

Section I: Introduction
Overview

................................................................................................................................................................................... 21-3
21-3

Overview about Broadcast TV

.......................................................................................................................................... 21-4
21-4

Managing Broadcast TV Elements

.................................................................................................................................. 21-5
21-5

View the list of Broadcast TV Elements ........................................................................................................................ 21-6


21-6
Create a BTV Element .......................................................................................................................................................... 21-8
21-8
Modify a BTV Element

..................................................................................................................................................... 21-11
21-11

Delete a BTV Element ....................................................................................................................................................... 21-14


21-14
View the details of the BTV Elements ......................................................................................................................... 21-16
21-16
Details of a BTV Elements

............................................................................................................................................. 21-17
21-17

View the list of ETPs belonging to a BTV Element ................................................................................................ 21-18


21-18
Description of the list of BTV ENE inventory .......................................................................................................... 21-19
21-19
Create an ETP in a BTV Element

.................................................................................................................................. 21-20
21-20

Delete an ETP in a BTV Element

.................................................................................................................................. 21-22
21-22

....................................................................................................................................................................................................................................
1350 OMS
xxxii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Section II: Workflow for BTV construction


Overview ................................................................................................................................................................................. 21-24
21-24
Create path on 1350 OMS SDH application .............................................................................................................. 21-25
21-25
Create Broadcast TV Element ......................................................................................................................................... 21-26
21-26
Create Link Broadcast TV ................................................................................................................................................ 21-29
21-29
Section III: Workflow for BTV Service Management
Overview ................................................................................................................................................................................. 21-33
21-33
Create a Customer

.............................................................................................................................................................. 21-34
21-34

Create Ethernet Service

..................................................................................................................................................... 21-35
21-35

Create a Connection Oriented EVC .............................................................................................................................. 21-37


21-37
Section IV: Bridge Based BTV Service
Overview ................................................................................................................................................................................. 21-40
21-40
Overview about the Services

........................................................................................................................................... 21-41
21-41

IGMP Snooping Management ......................................................................................................................................... 21-42


21-42
IGMP Snooping State Management .............................................................................................................................. 21-44
21-44
22

Network Supervision
Overview

................................................................................................................................................................................... 22-1
22-1

Managing alarms
Overview about alarms ......................................................................................................................................................... 22-2
22-2
Alarms from ISA E/FE/GE board
Alarms from ISA ES1/4 board

.................................................................................................................................... 22-3
22-3

.......................................................................................................................................... 22-4
22-4

Alarms from ISA ES16 board ............................................................................................................................................ 22-6


22-6
Alarms or Events on SDH paths from 1350 OMS SDH .......................................................................................... 22-8
22-8
Alarm status management ................................................................................................................................................... 22-9
22-9
Alarm correlation and generation toward AS

............................................................................................................ 22-11
22-11

Managing Fault Localization


Display the Fault Localization list ................................................................................................................................. 22-12
22-12
Description of Fault Localization

.................................................................................................................................. 22-14
22-14

....................................................................................................................................................................................................................................
1350 OMS
xxxiii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Manual Synchronization of Alarms on NE

................................................................................................................ 22-15
22-15

Specific Behavior
Client Signal Fail Alarm Management ......................................................................................................................... 22-16
22-16
23

Network Utilities
Overview

................................................................................................................................................................................... 23-1
23-1

Audit, Alignment, Reservation, Recovery


Overview

................................................................................................................................................................................... 23-2
23-2

The AAR procedure

............................................................................................................................................................. 23-3
23-3

NE Audit tool ........................................................................................................................................................................... 23-6


23-6
Results of Audit ....................................................................................................................................................................... 23-8
23-8
Reservation tool .................................................................................................................................................................... 23-13
23-13
Align Up of Ethernet Domain Data ............................................................................................................................... 23-15
23-15
Start the audit, alignment, reserve procedure

............................................................................................................ 23-16
23-16

Stop the audit, alignment, reserve procedure ............................................................................................................. 23-17


23-17
View the list of auditable NEs ......................................................................................................................................... 23-18
23-18
Description of the list of auditable NEs ....................................................................................................................... 23-19
23-19
Perform an audit on a NE .................................................................................................................................................. 23-20
23-20
View the list of Audited NEs

........................................................................................................................................... 23-22
23-22

Description of the list of Audited NEs ......................................................................................................................... 23-23


23-23
View the results of an audit .............................................................................................................................................. 23-24
23-24
Perform an alignment on a NE ........................................................................................................................................ 23-26
23-26
NE Alignment tool
Overview ................................................................................................................................................................................. 23-27
23-27
Workflow to align up Ethernet Data

............................................................................................................................. 23-28
23-28

ISA Board Replacement Procedure ............................................................................................................................... 23-30


23-30
Perform a reservation on a NE ........................................................................................................................................ 23-32
23-32
Restore procedure for ISA board .................................................................................................................................... 23-33
23-33

....................................................................................................................................................................................................................................
1350 OMS
xxxiv
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

24

Operation, Administration, and Maintenance (OAM) Management


Overview

................................................................................................................................................................................... 24-1
24-1

Ethernet OAM
OAM main functions

............................................................................................................................................................ 24-3
24-3

Create OAM Domain ............................................................................................................................................................ 24-7


24-7
List OAM Domains

............................................................................................................................................................... 24-8
24-8

Description of the list of OAM MD


OAM Domain Properties

................................................................................................................................ 24-9
24-9

.................................................................................................................................................. 24-10
24-10

Details of OAM MD ........................................................................................................................................................... 24-11


24-11
Modify OAM Domain

....................................................................................................................................................... 24-12
24-12

Configure OAM Domain

.................................................................................................................................................. 24-13
24-13

Deimplement OAM Domain

........................................................................................................................................... 24-14
24-14

Inventory of OAM items from MD ............................................................................................................................... 24-15


24-15
Inventory of OAM monitored objects from MD ...................................................................................................... 24-16
24-16
Maintenance Association (MA)
Maintenance Associations

................................................................................................................................................ 24-17
24-17

List Maintenance Association (MA) ............................................................................................................................. 24-18


24-18
Description of the list of OAM MA .............................................................................................................................. 24-19
24-19
Properties of Maintenance Association (MA) ........................................................................................................... 24-20
24-20
Details of the OAM MA .................................................................................................................................................... 24-21
24-21
Modify Maintenance Association (MA) ...................................................................................................................... 24-22
24-22
Configure Maintenance Association (MA)

............................................................................................................... 24-23
24-23

Enable/Disable Continuity Check (CC) ....................................................................................................................... 24-24


24-24
Deimplement OAM MA

................................................................................................................................................... 24-25
24-25

Inventory of OAM items from MA ............................................................................................................................... 24-26


24-26
Inventory of OAM monitored objects from MA ...................................................................................................... 24-27
24-27
Maintenance Activation
Maintenance Activation on EVC

................................................................................................................................... 24-28
24-28

....................................................................................................................................................................................................................................
1350 OMS
xxxv
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Loopback
Loopback activation ............................................................................................................................................................ 24-29
24-29
Linktrace
Linktrace activation ............................................................................................................................................................. 24-31
24-31
Delay measurement and Loss measurement
Overview ................................................................................................................................................................................. 24-33
24-33
Packet Delay measurement

.............................................................................................................................................. 24-34
24-34

Packet Loss measurement ................................................................................................................................................. 24-35


24-35
Configure Maintenance End Points ............................................................................................................................... 24-36
24-36
List the OAM ETH DM Tool

.......................................................................................................................................... 24-38
24-38

List the OAM ETH SLM Tool ........................................................................................................................................ 24-40


24-40
Create ETH DM Tool ......................................................................................................................................................... 24-42
24-42
Create ETH SLM Tool ....................................................................................................................................................... 24-44
24-44
Activate/Deactivate OAM ETH DM Tool .................................................................................................................. 24-46
24-46
Activate/Deactivate OAM ETH SLM Tool ................................................................................................................ 24-47
24-47
Inventory from OAM ETH DM Tool ........................................................................................................................... 24-48
24-48
Inventory from OAM ETH SLM Tool ......................................................................................................................... 24-49
24-49
Configure OAM ETH DM Tool ..................................................................................................................................... 24-50
24-50
Configure OAM ETH SLM Tool ................................................................................................................................... 24-52
24-52
25

Circuit Emulation Service Management


Overview

................................................................................................................................................................................... 25-1
25-1

CES Overview
Circuit Emulation Services definition ............................................................................................................................. 25-4
25-4
TDM client synchronization ............................................................................................................................................... 25-8
25-8
Protection setup after link creation

.................................................................................................................................. 25-9
25-9

CAC tolerance and modulation mode

.......................................................................................................................... 25-11
25-11

Resource assignment to Packet Radio domain .......................................................................................................... 25-12


25-12
Resource assignment to T-MPLS domain ................................................................................................................... 25-14
25-14
....................................................................................................................................................................................................................................
1350 OMS
xxxvi
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Packet Radio domain OAM and protections


Packet Radio performance monitoring

............................................................................................................. 25-17
25-17

........................................................................................................................ 25-19
25-19

Packet Radio protection group ........................................................................................................................................ 25-20


25-20
Loopback management ...................................................................................................................................................... 25-21
25-21
T-MPLS domain OAM and protections ....................................................................................................................... 25-22
25-22
Packet Radio domain QoS management

..................................................................................................................... 25-24
25-24

Packet Radio domain inter-working .............................................................................................................................. 25-25


25-25
T-MPLS domain inter-working ....................................................................................................................................... 25-26
25-26
Circuit Emulation Service Management

..................................................................................................................... 25-27
25-27

MEF8 CES terminated service ........................................................................................................................................ 25-33


25-33
Generic Circuit Emulation implementation

............................................................................................................... 25-36
25-36

MEF8 Circuit Emulation Service implementation

.................................................................................................. 25-38
25-38

SATOP Circuit Emulation Service implementation ................................................................................................ 25-43


25-43
Generic Circuit Emulation Service OAM and protections ................................................................................... 25-45
25-45
MEF8 Circuit Emulation Service OAM and protections ...................................................................................... 25-46
25-46
SATOP Circuit Emulation Service OAM and protections

................................................................................... 25-48
25-48

Circuit Emulation AAR Network Operation .............................................................................................................. 25-50


25-50
CES Takeover description

................................................................................................................................................ 25-52
25-52

CES Procedures
.................................................................................................................................................................................................... 25-53
25-53

Circuit Emulation Service graphical inventory ......................................................................................................... 25-55


25-55
View the list of CES Domains (Packet Radio) .......................................................................................................... 25-58
25-58
View the details of CES Domain (Packet Radio) ..................................................................................................... 25-59
25-59
Inventory from CES Domain (Packet Radio) ............................................................................................................ 25-60
25-60
Create CES Domain (Packet Radio) ............................................................................................................................. 25-61
25-61
Assign/Deassign resources to Packet Radio Domain ............................................................................................. 25-62
25-62
Assign/Deassign resources to T-MPLS Domain

...................................................................................................... 25-63
25-63

View the list of CES NEs .................................................................................................................................................. 25-64


25-64
Description of the list of CES NEs ................................................................................................................................ 25-65
25-65
....................................................................................................................................................................................................................................
1350 OMS
xxxvii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

View the details of CES NE ............................................................................................................................................. 25-66


25-66
Details of CES NE ............................................................................................................................................................... 25-67
25-67
Inventory from CES NE .................................................................................................................................................... 25-68
25-68
Inventory from Protection Group ................................................................................................................................... 25-70
25-70
View the list of CES Transport Links ........................................................................................................................... 25-71
25-71
Description of the list of CES Transport Links ......................................................................................................... 25-72
25-72
View the details of CES Transport Link ...................................................................................................................... 25-73
25-73
Details of the CES Transport Link

................................................................................................................................ 25-74
25-74

Inventory from CES Transport Link ............................................................................................................................. 25-75


25-75
Inventory from CES Transport Link extremity ......................................................................................................... 25-76
25-76
View the list of CES PDH Ports ..................................................................................................................................... 25-78
25-78
Description of the list of CES PDH Ports ................................................................................................................... 25-79
25-79
View the details of CES PDH Port ................................................................................................................................ 25-82
25-82
Details of CES PDH Port .................................................................................................................................................. 25-83
25-83
Inventory from CES PDH Port
List CES Edge Ports

....................................................................................................................................... 25-84
25-84

........................................................................................................................................................... 25-85
25-85

Description of the list of CES Port ................................................................................................................................ 25-86


25-86
View the details of CES Edge Port ................................................................................................................................ 25-87
25-87
Details of CES Port ............................................................................................................................................................. 25-88
25-88
Inventory from CES Edge Port ....................................................................................................................................... 25-89
25-89
View the list of CES Links Over Radio ....................................................................................................................... 25-90
25-90
Description of the list of CES Links Over Radio ..................................................................................................... 25-91
25-91
View the details of CES Link Over Radio .................................................................................................................. 25-92
25-92
Details of CES Link Over Radio .................................................................................................................................... 25-93
25-93
Inventory from CES Link Over Radio ......................................................................................................................... 25-94
25-94
Synchronization of CES Link Over Radio

................................................................................................................. 25-96
25-96

View the list of CES Radio Ports ................................................................................................................................... 25-97


25-97
Description of the list of CES Radio Ports ................................................................................................................. 25-98
25-98
View the details of CES Radio Port .............................................................................................................................. 25-99
25-99
....................................................................................................................................................................................................................................
1350 OMS
xxxviii
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Details of CES Radio Port .............................................................................................................................................. 25-100


25-100
Inventory from CES Radio Port ................................................................................................................................... 25-101
25-101
View the list of CES VLAN Paths

.............................................................................................................................. 25-102
25-102

Description of the list of CES VLAN Paths ............................................................................................................ 25-103


25-103
Join CES tunnels ................................................................................................................................................................ 25-104
25-104
Stitch CES tunnels

............................................................................................................................................................ 25-105
25-105

View the list of Circuit Emulation Services ............................................................................................................. 25-106


25-106
Description of the list of Circuit Emulation Services

.......................................................................................... 25-107
25-107

View the list of CES Terminations .............................................................................................................................. 25-114


25-114
Description of the list of CES Terminations ............................................................................................................ 25-115
25-115
Create Circuit Emulation Service ................................................................................................................................ 25-122
25-122
Inventory from CES
Configure CES

........................................................................................................................................................ 25-126
25-126

.................................................................................................................................................................. 25-127
25-127

Routing display of CES ................................................................................................................................................... 25-130


25-130
Configure CES terminations

......................................................................................................................................... 25-131
25-131

Takeover procedure for MEF8 CES ........................................................................................................................... 25-132


25-132
Takeover procedure for SATOP CES ......................................................................................................................... 25-134
25-134

Part IV: Advanced Functions


26

TSS-320 versus TSS-40 with packet ring


Overview

................................................................................................................................................................................... 26-1
26-1

Create T-MPLS Tunnel and PW (SNI)


Create T-MPLS tunnel 320-40 (SNI) .............................................................................................................................. 26-2
26-2
Create T-MPLS PW 320-40 (SNI) ................................................................................................................................. 26-14
26-14
Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI) ........................................................................................................................... 26-21
26-21
Create T-MPLS PW 320-40 (DNI) ................................................................................................................................ 26-33
26-33
Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40 ................................................................................................................................. 26-40
26-40
....................................................................................................................................................................................................................................
1350 OMS
xxxix
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Verify creation of EVC over T-MPLS 320-40 ........................................................................................................... 26-58


26-58
27

Performance Monitoring
Overview

................................................................................................................................................................................... 27-1
27-1

PM in EVC create
PM in EVC create

.................................................................................................................................................................. 27-2
27-2

Performance Monitoring activate


PM activate ............................................................................................................................................................................... 27-7
27-7
PM consistency
PM consistency ..................................................................................................................................................................... 27-12
27-12
PM Reports create
PM Reports create

............................................................................................................................................................... 27-15
27-15

PM report generate
PM report generate .............................................................................................................................................................. 27-19
27-19
28

Enhanced Procedures
Overview

................................................................................................................................................................................... 28-1
28-1

TSS 5 In Band Management


Overview

................................................................................................................................................................................... 28-3
28-3

T-MPLS Subnetwork topology .......................................................................................................................................... 28-4


28-4
In-band configuration

........................................................................................................................................................... 28-8
28-8

Resources reservation for In fiber Inband ................................................................................................................... 28-11


28-11
Ethernet Linear Protection
Overview ................................................................................................................................................................................. 28-16
28-16
Link Over EVC ..................................................................................................................................................................... 28-18
28-18
Link over EVC: unlock EVC

.......................................................................................................................................... 28-20
28-20

Link over EVC creation ..................................................................................................................................................... 28-22


28-22
Link over EVC deletion ..................................................................................................................................................... 28-24
28-24
Link over EVC: Alarms ..................................................................................................................................................... 28-25
28-25
Link over EVC: OAM ........................................................................................................................................................ 28-26
28-26
....................................................................................................................................................................................................................................
1350 OMS
xl
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

Link over EVC: assign and deassign ............................................................................................................................ 28-27


28-27
Link over EVC: Transport Link configuration .......................................................................................................... 28-28
28-28
Link over EVC: activation and deactivation .............................................................................................................. 28-29
28-29
Link over EVC: Usage within an EVC

....................................................................................................................... 28-30
28-30

Link over EVC: AAR ......................................................................................................................................................... 28-31


28-31
Link over EVC: Routing Display

.................................................................................................................................. 28-32
28-32

Link over EVC: Inventory ................................................................................................................................................ 28-33


28-33
Ethernet Linear Protection (ELP)

.................................................................................................................................. 28-34
28-34

Add protection to PB EVC ............................................................................................................................................... 28-39


28-39
Remove protection from EVC

........................................................................................................................................ 28-41
28-41

Configure protection ........................................................................................................................................................... 28-42


28-42
ELP Protection properties

................................................................................................................................................ 28-43
28-43

Description of the properties

........................................................................................................................................... 28-44
28-44

Send APS command to protection group

.................................................................................................................... 28-45
28-45

Manual alignment of protection group ......................................................................................................................... 28-47


28-47
Implement a protected EVC ............................................................................................................................................. 28-48
28-48
Deimplement a protected EVC ....................................................................................................................................... 28-49
28-49
Disabled operations ............................................................................................................................................................. 28-50
28-50
Alarm propagation for protected EVCs ....................................................................................................................... 28-51
28-51
OAM on protected EVC .................................................................................................................................................... 28-52
28-52
Inventory of Transport Link from protected EVC ................................................................................................... 28-54
28-54
Inventory of MA from protected EVC ......................................................................................................................... 28-55
28-55
Routing Display of protected EVC
A

............................................................................................................................... 28-56
28-56

Use script changeNeShOperatorLabel.sh


Use the script changeNeShOperatorLabel.sh to change NEShOperator

............................................................ A-1
A-1

Application Limits
Limits ............................................................................................................................................................................................ B-1
B-1

....................................................................................................................................................................................................................................
1350 OMS
xli
8DG42227DAAA 9.6
Issue 3 December 2012

Contents
....................................................................................................................................................................................................................................

List of Abbreviations
Abbreviations

............................................................................................................................................................................ C-1
C-1

Index

....................................................................................................................................................................................................................................
1350 OMS
xlii
8DG42227DAAA 9.6
Issue 3 December 2012

List of tables

11-1

EVPL /ETS and ETB Provider Bridge .......................................................................................................... 11-16

11-2

EVPL /ETB Virtual Bridge

11-3

EVPL /ETB MAC Bridge .................................................................................................................................. 11-16

11-4

EPTL /ETS

11-5

EPTL /ETB Provider Bridge ............................................................................................................................. 11-17

11-6

EPTL /ETB Virtual Bridge

11-7

EPTL /ETB MAC Bridge

11-8

EPL /ETS and ETB Provider Bridge

11-9

EPL /ETB Virtual Bridge

.............................................................................................................................................................. 11-17
11-17

11-10 EPL /ETB MAC Bridge


11-11

............................................................................................................................... 11-16

................................................................................................................................ 11-17

.................................................................................................................................. 11-17
............................................................................................................. 11-18

................................................................................................................................... 11-18

..................................................................................................................................... 11-18

EVPLAN /ETS and ETB Provider Bridge

11-12 EVPLAN /ETB Virtual Bridge


11-13 EVPLAN /ETB MAC Bridge

.................................................................................................. 11-19

........................................................................................................................ 11-19

.......................................................................................................................... 11-19

11-14 Extended EVPL /ETS and ETB Provider Bridge ...................................................................................... 11-20
11-15 Extended EVPL /ETB Virtual Bridge
11-16 Extended EVPL /ETB MAC Bridge

........................................................................................................... 11-20

.............................................................................................................. 11-20

11-17 Extended EVPLAN /ETS and ETB Provider Bridge


11-18 Extended EVPLAN /ETB Virtual Bridge
11-19 Extended EVPLAN /ETB MAC Bridge

.............................................................................. 11-21

.................................................................................................... 11-21

...................................................................................................... 11-21

11-20 HSI /ETS and ETB Provider Bridge .............................................................................................................. 11-22


11-21 HSI /ETS Multicast

.............................................................................................................................................. 11-23
11-23

11-22 HSI /ETB Virtual Bridge .................................................................................................................................... 11-23


....................................................................................................................................................................................................................................
1350 OMS
xliii
8DG42227DAAA 9.6
Issue 3 December 2012

List of tables
....................................................................................................................................................................................................................................

11-23 HSI /ETB MAC Bridge


11-24 BTV /ETS Multicast

...................................................................................................................................... 11-23

............................................................................................................................................ 11-24
11-24

11-25 BTV /ETB Provider Bridge


11-26 BTV /ETB Virtual Bridge
11-27 BTV /ETB MAC Bridge
11-28 Broadcast /ETS

.............................................................................................................................. 11-24

.................................................................................................................................. 11-25

.................................................................................................................................... 11-25

...................................................................................................................................................... 11-26
11-26

11-29 Broadcast /ETB Provider Bridge


11-30 Broadcast /ETB Virtual Bridge
11-31 Broadcast /ETB MAC Bridge

.................................................................................................................... 11-26

........................................................................................................................ 11-26

.......................................................................................................................... 11-26

13-1

Network Elements supporting the Link Aggregation ............................................................................ 13-114

15-1

MPLS traffic contract and traffic parameter dependencies

15-2

ISA boards and MPLS traffic parameter dependencies

18-1

Connection Oriented Service Type relations

18-2

Class of services and traffic parameters dependencies ......................................................................... 18-142

18-3

ISA boards and Ethernet traffic parameters dependencies .................................................................. 18-143

18-4

Allowed combination of Traffic Classification criteria ........................................................................ 18-156

19-1

L2 Control Protocols

19-2

Service Type, Type, Resource Sharing relations

22-1

ISA E/FE/GE alarms

22-2

ISA ES1/4 alarms or events ................................................................................................................................. 22-4

22-3

ISA ES16 alarms or events

22-4

SDH Path Alarm management

24-1

Terminology Mapping

25-1

Allowed interface type, depending on link technology

25-2

Relation between CES transport type and encapsulation type

25-3

CoS supported vs. T-MPLS PHB Profile

25-4

E1 service bandwidth occupation for MPR R1.3/R1.4 ........................................................................... 25-34

25-5

E1 service bandwidth occupation since MPR R2.1

25-6

MEF8 CES termination alarms ........................................................................................................................ 25-46

..................................................................... 15-8

............................................................................ 15-8

............................................................................................. 18-40

........................................................................................................................................... 19-16
....................................................................................... 19-49

.............................................................................................................................................. 22-3
22-3

.................................................................................................................................. 22-6
........................................................................................................................... 22-8

........................................................................................................................................... 24-4
.......................................................................... 25-25
............................................................. 25-29

..................................................................................................... 25-29

................................................................................. 25-35

....................................................................................................................................................................................................................................
1350 OMS
xliv
8DG42227DAAA 9.6
Issue 3 December 2012

List of tables
....................................................................................................................................................................................................................................

25-7

SATOP CES termination alarms

25-8

Generic Tunnel attributes.

25-9

Packet Radio Tunnel attributes

..................................................................................................................... 25-48

................................................................................................................................. 25-55
........................................................................................................................ 25-56

25-10 Generic Tunnel segment attributes


25-11 Generic Tunnel Xconn attributes
25-12 CE transport link attributes

................................................................................................................. 25-56

.................................................................................................................... 25-57

............................................................................................................................... 25-74

25-13 9500MPR PDH port attributes ......................................................................................................................... 25-79


25-14 TSS-5C PDH port attributes

............................................................................................................................. 25-80

25-15 The CES port attributes

...................................................................................................................................... 25-86

25-16 Ethernet port attributes

....................................................................................................................................... 25-88
25-88

25-17 Link over radio attributes ................................................................................................................................... 25-91


25-18 Link over radio attributes ................................................................................................................................... 25-93
25-19 radio port properties ............................................................................................................................................. 25-98
25-20 radio port properties

.......................................................................................................................................... 25-100

25-21 Generic CES attributes


25-22 MEF8 CES attributes

..................................................................................................................................... 25-108

........................................................................................................................................ 25-109

25-23 SATOP CES attributes

...................................................................................................................................... 25-110

25-24 Generic CES termination attributes


25-25 MEF8 CES termination attributes

............................................................................................................. 25-115

................................................................................................................ 25-116

25-26 SATOP CES termination attributes .............................................................................................................. 25-117


28-1

EVC attributes for ELP

...................................................................................................................................... 28-36

B-1

Limits for Subnetworks

.......................................................................................................................................... B-1

B-2

Limits for Service Nodes

B-3

Limits for Domains

B-4

Limits for NEs

B-5

Limits for ENEs

B-6

Limits for ETPs in an ENE

B-7

Limits for LSPs .......................................................................................................................................................... B-2


B-2

B-8

Limits for Customers ............................................................................................................................................... B-2


B-2

....................................................................................................................................... B-1

.................................................................................................................................................. B-1
B-1

........................................................................................................................................................... B-1
B-1
........................................................................................................................................................ B-2
B-2
................................................................................................................................... B-2

....................................................................................................................................................................................................................................
1350 OMS
xlv
8DG42227DAAA 9.6
Issue 3 December 2012

List of tables
....................................................................................................................................................................................................................................

B-9

Limits for Ethernet Services

................................................................................................................................. B-2

B-10

Limits for Ethernet Virtual Connections

B-11

Limits for Ethernet Transport Links

B-12

Limits for Ethernet Segments ............................................................................................................................... B-3

B-13

Limits for Ethernet edge physical ports ............................................................................................................ B-3

B-14

Limits for Ethernet Traffic Descriptors

............................................................................................................ B-3

B-15

Limits for Ethernet Traffic Classifiers

.............................................................................................................. B-3

B-16

Limits for Ethernet Color Profiles

B-17

Limits for Ethernet switches

B-18

Limits for VLAN Types

B-19

Limits for MPLS Transport Links

B-20

Limits for MPLS Traffic Descriptors

B-21

Limits for MPLS VC-LSPs

B-22

Limits for each board

.......................................................................................................... B-2

.................................................................................................................. B-2

...................................................................................................................... B-3

................................................................................................................................. B-3

......................................................................................................................................... B-4
...................................................................................................................... B-4
................................................................................................................ B-4

................................................................................................................................... B-4

.............................................................................................................................................. B-4
B-4

....................................................................................................................................................................................................................................
1350 OMS
xlvi
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures

4-1

Process Monitoring Window

................................................................................................................................. 4-2

11-1

Global Network view ............................................................................................................................................. 11-8

11-2

Example of Bundling ........................................................................................................................................... 11-12

11-3

Example of Service Multiplexing on UNI A

11-4

Point to Point Topology

11-5

Hub & spoke Topology ....................................................................................................................................... 11-32

11-6

Hub & spoke with multi level aggregation topology ............................................................................... 11-33

11-7

Full meshed topology

11-8

Ring Topology

11-9

Interface description

.............................................................................................. 11-14

...................................................................................................................................... 11-30

.......................................................................................................................................... 11-34

....................................................................................................................................................... 11-36
11-36
............................................................................................................................................ 11-42
11-42

11-10 Ethernet Service delivered using different technologies


11-11

Inner ENE

........................................................................ 11-45

................................................................................................................................................................ 11-49
11-49

11-12 Customer Edge ....................................................................................................................................................... 11-50


11-50
11-13 Ethernet Frame Format

....................................................................................................................................... 11-54

11-14 Q-Tag Prefix Format ............................................................................................................................................ 11-55


11-15 Ethernet Frame Hierarchy

................................................................................................................................. 11-56

11-16 Customer VLAN Removal

................................................................................................................................ 11-59

11-17 Provider VLAN Removal

.................................................................................................................................. 11-60

11-18 Provider VLAN Addition ................................................................................................................................... 11-60


11-19 Provider VLAN Addition and Removal
11-20 Provider Tunneling Mode

....................................................................................................... 11-61

.................................................................................................................................. 11-61

11-21 Customer Tunneling Mode ................................................................................................................................ 11-62


....................................................................................................................................................................................................................................
1350 OMS
xlvii
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

11-22 Protocol Type configuration for multiple destinations ............................................................................ 11-63


11-23 Low Cost solution ................................................................................................................................................. 11-63
11-63
11-24 Protocol Type configuration for single destination

.................................................................................. 11-64

12-1

Actions>Create Subnetwork

............................................................................................................................... 12-4

12-2

Create Subnetwork box ......................................................................................................................................... 12-5

12-3

Create Subnetwork: Assign Children Nodes ................................................................................................. 12-6

12-4

Node to assign to subnetwork ............................................................................................................................. 12-7

12-5

Confirm subnetwork creation

12-6

Subnetwork present in the map

12-7

Actions>Modify subnetwork ............................................................................................................................ 12-10

12-8

Modify subnetwork

12-9

Select the node to add

............................................................................................................................. 12-8
.......................................................................................................................... 12-9

.............................................................................................................................................. 12-11
......................................................................................................................................... 12-12

12-10 Modify subn: adding a node

............................................................................................................................. 12-13

12-11 Actions>Physical>Create External Network .............................................................................................. 12-14


12-12 Create Ext Netw. dialog box ............................................................................................................................. 12-15
12-13 Actions>Modify subnetwork ............................................................................................................................ 12-16
12-14 Modify subnetwork .............................................................................................................................................. 12-17
12-15 Modify Subn box: new added node
12-16 New added node in the target map
12-17 Create>Physical Connection
12-18 Physcon create

............................................................................................................... 12-18

................................................................................................................. 12-19

............................................................................................................................ 12-20

....................................................................................................................................................... 12-21
12-21

12-19 Physcon create: port selection .......................................................................................................................... 12-22


12-20 Physcon list: Eth physcon defined .................................................................................................................. 12-23
12-21 Link over Cable list .............................................................................................................................................. 12-23
12-23
12-22 Actions>Packet>Construction>Create LAG Port ..................................................................................... 12-24
12-23 Create LAG Port

................................................................................................................................................... 12-25
12-25

12-24 LAG port and LAG port detail

........................................................................................................................ 12-26

12-25 Actions>Packet>Construction>Create Domain


12-26 Create Domain MAC-802.1D

........................................................................................ 12-27

.......................................................................................................................... 12-28

....................................................................................................................................................................................................................................
1350 OMS
xlviii
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

12-27 Create Domain

....................................................................................................................................................... 12-29
12-29

12-28 Search>Packet>Construction>Domains

...................................................................................................... 12-29

12-29 Domain list .............................................................................................................................................................. 12-30


12-30
12-30 Search>Packet>Construction>Network Elements>Defined NEs ....................................................... 12-31
12-31 NE: Search>Ethernet Physical Ports
12-32 Eth Ports: the port is now busy

............................................................................................................. 12-32

........................................................................................................................ 12-32

12-33 LoC: Actions>Assign Resources to Domain


12-34 Assign Resources to Domain
12-35 Defined NEs list

.............................................................................................. 12-33

........................................................................................................................... 12-34

.................................................................................................................................................... 12-35
12-35

12-36 Port Administrative state=DOWN .................................................................................................................. 12-36


12-37 Actions>Packet>Construction>Define Network Element ..................................................................... 12-37
12-38 Define Network Element

................................................................................................................................... 12-38

12-39 Actions>Packet>Services>Create Traffic Descriptor .............................................................................. 12-40


12-40 Create Traffic Descriptor:Regulated

.............................................................................................................. 12-41

12-41 Create Traffic Descriptor: Best Effort

........................................................................................................... 12-42

12-42 Actions>Packet>Services>Create Traffic Classifier


12-43 Create Traffic Classifier
12-44 Traffic Classifier list

............................................................................... 12-43

..................................................................................................................................... 12-44
12-44

............................................................................................................................................ 12-45
12-45

12-45 Create T-MPLS Tunnel step1

........................................................................................................................... 12-47

12-46 Create T-MPLS Tunnel step2

........................................................................................................................... 12-48

12-47 Tunnel list

................................................................................................................................................................ 12-49
12-49

12-48 Tunnel:Search>T-MPLS Segments ................................................................................................................ 12-49


12-49 T-MPLS segment:Search>T-MPLS L2 Encapsulation Profiles ........................................................... 12-50
12-50 Default L2 Encapsulation profile .................................................................................................................... 12-50
12-51 Actions>Packet>T-MPLS>Create T-MPLS L2 Encapsulation Profile ............................................. 12-51
12-52 Create T-MPLS L2 Encapsulation Profile
12-53 L2 Encapsulation Profiles list

................................................................................................... 12-52

.......................................................................................................................... 12-53

12-54 T-MPLS Segment: Actions>Configure ......................................................................................................... 12-53


12-55 T-MPLS Segment configuration

..................................................................................................................... 12-54

....................................................................................................................................................................................................................................
1350 OMS
xlix
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

12-56 Segment:Search>T-MPLS L2 Encapsulation Profiles

............................................................................ 12-55

12-57 L2 Encapsulation Profiles list

.......................................................................................................................... 12-55

12-58 Create T-MPLS Pseudo Wire

........................................................................................................................... 12-56

12-59 Create T-MPLS PW step2


12-60 PW list

................................................................................................................................. 12-57

...................................................................................................................................................................... 12-57
12-57

12-61 PW: Search>T-MPLS Segments

..................................................................................................................... 12-58

12-62 PW segment: Actions>Configur

..................................................................................................................... 12-58

12-63 T-MPLS Segment configuration box for PW


12-64 T-MPLS L2 Encapsulation Profiles for PW

............................................................................................. 12-59

............................................................................................... 12-59

12-65 Provider network operating as a distributed MAC Bridge

.................................................................... 12-67

12-66 Provider network operating as a distributed MAC Bridge

.................................................................... 12-68

12-67 Single-Customer, No-VLAN, RSTP-enabled

............................................................................................ 12-69

13-1

Subnetwork levels ................................................................................................................................................... 13-5


13-5

13-2

Subnetwork Creation window

13-3

Subnetwork Modification window

13-4

Domain management chain ............................................................................................................................... 13-16

13-5

Domain management chain ............................................................................................................................... 13-18

13-6

Define a Network Element ................................................................................................................................ 13-44

13-7

NE Adding window

13-8

Network Element Modification window ...................................................................................................... 13-50

13-9

Show Equipment View

............................................................................................................................ 13-9
................................................................................................................. 13-11

............................................................................................................................................. 13-47

....................................................................................................................................... 13-71

13-10 ENE management chain

..................................................................................................................................... 13-79

13-11 External Network Element Creation window


13-12 ETP Creation window

............................................................................................ 13-83

......................................................................................................................................... 13-93

13-13 Ethernet Physical Port Config. window (for PR EA or ES16 electrical board)
13-14 Ethernet Physical Port Config. window (for ES1 or ES4 electrical board)

.......................... 13-101

.................................. 13-102

13-15 Ethernet Physical Port Config. window (for ES1 or ES4 optical board) ....................................... 13-103
13-16 Ethernet Physical Port Assign NAD window
13-17 Scheme of a Link Aggregation

.......................................................................................... 13-107

...................................................................................................................... 13-114

....................................................................................................................................................................................................................................
1350 OMS
l
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

13-18 Jumbo frame configuration pattern .............................................................................................................. 13-135


13-19 Jumbo frame configuration pattern .............................................................................................................. 13-138
13-20 Create a port on 1678MCC NE ..................................................................................................................... 13-142
13-21 Remove port on 1678MCC NE ..................................................................................................................... 13-144
14-1

Link Over TDM between Q3 NEs

14-2

Link Over TDM between Q3 NE and SNMP NE

14-3

Link Over TDM between 2 SNMP NEs

14-4

Link Over Cable between SNMP NE and ENE ........................................................................................... 14-8

14-5

Link Over MPLS between 2 SNMP NEs

14-6

Link Over MPLS between SNMP NE and ENE based on VC-LSP

14-7

Network Element Supervision: Concatenated VC management

14-8

SDH Path Creation window .............................................................................................................................. 14-22

14-9

Link Over TDM Configuration window

14-10 Assign NAD window

.................................................................................................................... 14-6

......................................................................................................... 14-7

....................................................................................................... 14-9
.................................................. 14-10

......................................................... 14-11

...................................................................................................... 14-26

.......................................................................................................................................... 14-33

14-11 Link Over Cable Modification window


14-12 Link Over Cable Extremities window
14-13 Start Join window

....................................................................................... 14-6

....................................................................................................... 14-45

.......................................................................................................... 14-49

................................................................................................................................................. 14-53
14-53

14-14 Configure Split window

..................................................................................................................................... 14-55

14-15 Link Over Cable Creation window

................................................................................................................ 14-64

14-16 Link Over Cable Creation window

................................................................................................................ 14-67

14-17 Link VCG Creation window ............................................................................................................................. 14-70


14-18 LAG Link VCG Creation window

................................................................................................................. 14-73

15-1

Traffic Descriptor management chain

............................................................................................................. 15-5

15-2

Traffic Descriptor Creation window

15-3

Traffic Descriptor Modification window

15-4

MPLS Transport Link management chain ................................................................................................... 15-22

15-5

TL Characteristic Definition window (based on Link Over Cable)

15-6

TL Characteristic Definition window (based on Link Over TDM) .................................................... 15-27

15-7

Transport Link Extremities window

.............................................................................................................. 15-10
..................................................................................................... 15-13

................................................... 15-26

.............................................................................................................. 15-29

....................................................................................................................................................................................................................................
1350 OMS
li
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

15-8

Transport Link Over TDM Bandwidth Load window

............................................................................ 15-34

15-9

Transport Link Over Cable Bandwidth Load window ............................................................................ 15-35

15-10 Transport Link Inventory List window ......................................................................................................... 15-37


15-11 27 LSP Tunnel management chain

................................................................................................................. 15-40

15-12 LSP Tunnel Modification window (for an LSP tunnel defined) .......................................................... 15-46
15-13 Constraint List related to an LSP tunnel

...................................................................................................... 15-54

15-14 Add Constraint to an LSP tunnel window

................................................................................................... 15-57

15-15 LSP Tunnel Constraint Properties window


15-16 LSP Tunnel Implementation window
15-17 The LSP Tunnel Extremity window

................................................................................................. 15-61

............................................................................................................ 15-66

.............................................................................................................. 15-68

15-18 LSP Tunnel (Best Effort) Bandwidth Load window ................................................................................ 15-75
15-19 LSP Tunnel (Assured Forwarding) Bandwidth Load window

............................................................. 15-75

15-20 LSP Tunnel (Expedited Forwarding) Bandwidth Load window


15-21 LSP Tunnel Route window

......................................................... 15-76

............................................................................................................................... 15-78

15-22 VC-LSP management chain .............................................................................................................................. 15-82


15-23 VC-LSP Creation window ................................................................................................................................. 15-87
15-24 VC-LSP Modification window ........................................................................................................................ 15-90
15-25 VC-LSP Extremities window

........................................................................................................................ 15-100

16-1

T-MPLS Transport Link management chain

.............................................................................................. 16-15

16-2

Transport Link Extremities window

16-3

Transport Link Over TDM Bandwidth Load window

16-4

Transport Link Over Cable Bandwidth Load window ............................................................................ 16-27

16-5

Transport Link Inventory List window ......................................................................................................... 16-29

16-6

Layering

16-7

Tunnel entities ........................................................................................................................................................ 16-91


16-91

16-8

PW entities

16-9

DH EVPLINE infrastructure

.............................................................................................................. 16-21
............................................................................ 16-26

................................................................................................................................................................... 16-90
16-90

.............................................................................................................................................................. 16-92
16-92
........................................................................................................................... 16-95

16-10 Tunnel MAIN: Actions>T-MPLS Tunnel Protection Management ................................................. 16-141


16-11 T-MPLS Tunnel Protection Management .................................................................................................. 16-142
....................................................................................................................................................................................................................................
1350 OMS
lii
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

16-12 T-MPLS tunnel list

............................................................................................................................................ 16-143
16-143

16-13 T-MPLS tunnel: Search>Routing display

................................................................................................. 16-143

16-14 Search>Packet>T-MPLS>T-MPLS>Tunnels ........................................................................................... 16-144


16-15 T-MPLS tunnel: Actions menu ...................................................................................................................... 16-145
16-16 T-MPLS tunnel: Search>Routing display
16-17 T-MPLS Protection Group
16-18 Tunnel Switch: Actions

................................................................................................. 16-146

.............................................................................................................................. 16-147

.................................................................................................................................... 16-148

16-19 Tunnel:Actions>Remove Protection(keeping Main)

............................................................................ 16-149

16-20 Spare tunnel routing display ........................................................................................................................... 16-149


16-21 Don't care protection role and protection state
16-22 Main tunnel routing display

........................................................................................ 16-150

........................................................................................................................... 16-151

16-23 T-MPLS Node PHB Profile ............................................................................................................................ 16-152


16-24 T-MPLS Node Traffic Descriptor ................................................................................................................. 16-153
16-25 T-MPLS Segment ............................................................................................................................................... 16-154
16-26 T-MPLS Port

........................................................................................................................................................ 16-155
16-155

16-27 Tunnel Redundancy Reference network

.................................................................................................... 16-166

17-1

Physical map

............................................................................................................................................................. 17-3
17-3

17-2

Search>Packet>Construction>Network Elements>Defined NEs

17-3

NE: Search>Ethernet Physical Ports ................................................................................................................ 17-4

17-4

Ethernet Physical Ports

17-5

Create Physcon-basic ............................................................................................................................................. 17-6


17-6

17-6

Create Physcon: End Points

17-7

Physcon list

17-8

Search>Packet>Construction>Transport Links>Link over Cable

17-9

Link over Cable list

......................................................... 17-4

......................................................................................................................................... 17-5
17-5

................................................................................................................................ 17-7

............................................................................................................................................................... 17-8
17-8
........................................................ 17-8

................................................................................................................................................ 17-9
17-9

17-10 Actions>Packet>Construction>Create Link over Cable ........................................................................... 17-9


17-11 Create Link over Cable ....................................................................................................................................... 17-10
17-12 Actions>Assign Resources to Domain

......................................................................................................... 17-11

17-13 Assign Resources to Domain box ................................................................................................................... 17-12


....................................................................................................................................................................................................................................
1350 OMS
liii
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

17-14 Search>Packet>T-MPLS>T-MPLS Sections .............................................................................................. 17-13


17-15 T-MPLS Section list

............................................................................................................................................ 17-13
17-13

17-16 Actions>Packet>T-MPLS>Create T-MPLS tunnel


17-17 Create T-MPLS tunnel:Constraints

................................................................................................................ 17-15

17-18 Create T-MPLS tunnel: Quality of Service


17-19 Create T-MPLS tunnel: OAM

.................................................................................. 17-14

................................................................................................. 17-16

.......................................................................................................................... 17-17

17-20 Create T-MPLS tunnel: Protection

................................................................................................................. 17-18

17-21 Search>Packet>T-MPLS>T-MPLS Tunnels ............................................................................................... 17-19


17-22 Tunnel list

................................................................................................................................................................ 17-19
17-19

17-23 Actions>Implement T-MPLS Tunnel


17-24 The tunnel is implemented

............................................................................................................ 17-20

................................................................................................................................ 17-20

17-25 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire


17-26 Create T-MPLS Pseudo Wire: Constraints

..................................................................... 17-21

.................................................................................................. 17-22

17-27 Create T-MPLS Pseudo Wire: Quality of Service

.................................................................................... 17-23

17-28 Search>Packet>T-MPLS>T-MPLS Pseudo Wire

..................................................................................... 17-24

17-29 T-MPLS Pseudo Wires ........................................................................................................................................ 17-24


17-30 PW Implementation

............................................................................................................................................. 17-25
17-25

17-31 T-MPLS Pseudo wire implemented

............................................................................................................... 17-25

17-32 Search>Packet>Services>T-MPLS>T-MPLS Transport Links


17-33 T-MPLS Transport Links

........................................................... 17-26

................................................................................................................................... 17-26

17-34 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC

................................................................. 17-34

17-35 Create T-MPLS EVC: Specific ........................................................................................................................ 17-36


17-36 Create T-MPLS EVC: Detail
17-37 Create T-MPLS EVC: PM

............................................................................................................................ 17-37

................................................................................................................................. 17-38

17-38 Create T-MPLS EVC: Terminations Selection


17-39 Terminations Selection

.......................................................................................... 17-39

....................................................................................................................................... 17-40
17-40

17-40 Termination Settings ............................................................................................................................................ 17-42


17-42
17-41 Ingress flow create

............................................................................................................................................... 17-44
17-44

17-42 Ingress Flow: create monitoring ...................................................................................................................... 17-45


....................................................................................................................................................................................................................................
1350 OMS
liv
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

17-43 Egress Flow: Push

................................................................................................................................................ 17-47
17-47

17-44 Create Egress monitoring

.................................................................................................................................. 17-48

17-45 Create Ingress node A

......................................................................................................................................... 17-49

17-46 Create Egress node A

.......................................................................................................................................... 17-50

17-47 Transport Link selection

.................................................................................................................................... 17-51

17-48 Select the transport link

...................................................................................................................................... 17-52

17-49 Pseudo Wire selected ........................................................................................................................................... 17-53


17-53
17-50 T-MPLS EVC Allocate and Implement

........................................................................................................ 17-54

17-51 EVPL reference network .................................................................................................................................... 17-55


17-52 Actions>Packet>Services>Create Traffic Descriptor .............................................................................. 17-56
17-53 Create Traffic Descriptor

................................................................................................................................... 17-57

17-54 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC

................................................................. 17-58

17-55 Create T-MPLS EVC: Specific ........................................................................................................................ 17-59


17-56 Terminations Selection
17-57 Ingress Flow: create
17-58 Egress Flow: Push

....................................................................................................................................... 17-61
17-61

............................................................................................................................................. 17-63
17-63

................................................................................................................................................ 17-65
17-65

17-59 Transport Link selection

.................................................................................................................................... 17-67

17-60 Search>Packet>T-MPLS>T-MPLS Pseudo Wires

................................................................................... 17-68

17-61 PW list before EVC TD create ......................................................................................................................... 17-68


17-62 T-MPLS EVC Allocate and Implement
17-63 PW list after EVC TD create

........................................................................................................ 17-69

............................................................................................................................ 17-70

17-64 Search>Packet>T-MPLS>T-MPLS EVCs ................................................................................................... 17-70


17-65 EVC list: EVPL EVC allocate

......................................................................................................................... 17-71

17-66 EVC goes implemented ...................................................................................................................................... 17-71


17-67 EVPLAN reference network (3-nodes)

........................................................................................................ 17-72

17-68 EVPLAN network (4-nodes) ............................................................................................................................ 17-73


17-69 Create T-MPLS EVC: Specific ........................................................................................................................ 17-75
17-70 Terminations Selection

....................................................................................................................................... 17-77
17-77

17-71 EVPLAN: Ingress Flow: create ....................................................................................................................... 17-79


....................................................................................................................................................................................................................................
1350 OMS
lv
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

17-72 EVPLAN:Egress Flow

....................................................................................................................................... 17-81

17-73 Transport Link selection

.................................................................................................................................... 17-83

17-74 T-MPLS EVC Allocate and Implement


17-75 PW list after EVC TD create

........................................................................................................ 17-84

............................................................................................................................ 17-85

17-76 EVC goes implemented ...................................................................................................................................... 17-85


17-77 BTV reference network

..................................................................................................................................... 17-86

17-78 HSI reference network

....................................................................................................................................... 17-90

17-79 T-MPLS EVC list: Availability ........................................................................................................................ 17-94


17-80 EVC: Search>Fault Localization

.................................................................................................................... 17-95

17-81 Navigation to Transport Section ...................................................................................................................... 17-95


17-82 Navigate to Link over Cable ............................................................................................................................. 17-96
17-83 Search>Packet>Services>T-MPLS>T-MPLS EVCs
17-84 T-MPLS EVC:Actions>Deimplement
17-85 T-MPLS EVC:Actions>Deallocate

............................................................................... 17-98

.......................................................................................................... 17-99

................................................................................................................ 17-99

17-86 T-MPLS EVC: Search>T-MPLS Transport Links

................................................................................. 17-100

17-87 T-MPLS Transport Links ................................................................................................................................. 17-100


17-88 Search>Packet>T-MPLS>T-MPLS Pseudo Wires ................................................................................. 17-101
17-89 T-MPLS Pseudo Wire: Search>T-MPLS Tunnels

.................................................................................. 17-102

17-90 T-MPLS Tunnel: Search>T-MPLS Protection Involved Tunnel ....................................................... 17-103


17-91 T-MPLS Tunnel Routing Display

................................................................................................................ 17-103

17-92 Tunnel spare: Actions>Remove Protection keeping Main .................................................................. 17-104


17-93 Routing Display after Remove Protection
17-94 Tunnel: Search>T-MPLS Pseudo Wires

................................................................................................ 17-104

.................................................................................................... 17-105

17-95 T-MPLS EVC: Actions>Delete ..................................................................................................................... 17-105


17-96 EVC deletion evidence ..................................................................................................................................... 17-106
17-97 Pseudo Wires: Actions>Deimplement
17-98 Pseudo Wires: Actions>Delete
17-99 Delete Tunnel SPARE

........................................................................................................ 17-106

...................................................................................................................... 17-107

...................................................................................................................................... 17-107

17-100 Tunnel: Search>T-MPLS Section List ........................................................................................................ 17-108


....................................................................................................................................................................................................................................
1350 OMS
lvi
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

17-101 Tunnel related Section

...................................................................................................................................... 17-108

17-102 Delete T-MPLS tunnel ...................................................................................................................................... 17-109


17-103 Tunnel deletion evidence ................................................................................................................................. 17-109
17-104 Deassign LoC from Domain
17-105 Field Domain is deleted

.......................................................................................................................... 17-110

................................................................................................................................... 17-110

17-106 The associated Section is automatically deleted

..................................................................................... 17-111

17-107 Defined Node: Search>Ethernet Physical Ports

...................................................................................... 17-111

17-108 Deassign UNI port from the domain


17-109 Field domain is empty

........................................................................................................... 17-112

...................................................................................................................................... 17-112

17-110 Delete the NE ....................................................................................................................................................... 17-113


17-113
17-111 Search>Packet>Services>T-MPLS>T-MPLS EVCs ............................................................................. 17-114
17-112 T-MPLS EVCs

.................................................................................................................................................... 17-115
17-115

17-113 Allocate the EVC ................................................................................................................................................ 17-115


17-115
17-114 Implement the EVC

........................................................................................................................................... 17-116
17-116

18-1

Ethernet service containment tree ................................................................................................................... 18-19

18-2

EVPL/EPTL/EPL/Extended EVPL service creation wizard

18-3

Ethernet Service Properties window .............................................................................................................. 18-34

18-4

EVCs and Edge Ports relationships

18-5

EVC Modification window ............................................................................................................................... 18-48

18-6

EVC Properties window ..................................................................................................................................... 18-52

18-7

EVC Termination Properties window

18-8

Add EVC Termination window

18-9

Network schema for E2E connection

................................................................ 18-26

............................................................................................................... 18-38

........................................................................................................... 18-64

....................................................................................................................... 18-67
............................................................................................................ 18-91

18-10 Search>Packet>Construction>Transport Links>Links over TDM(Sdh/Sonet) ............................. 18-93


18-11 Links over TDM(Sdh/Sonet)

............................................................................................................................ 18-94

18-12 Search>Packet>Construction>Network Elements>Defined NEs ....................................................... 18-94


18-13 Defined NE:Search>Ethernet Physical Ports
18-14 Port:Actions>Assign Resource to Domain
18-15 ETS Domain selection

............................................................................................. 18-95

................................................................................................. 18-95

........................................................................................................................................ 18-96

....................................................................................................................................................................................................................................
1350 OMS
lvii
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

18-16 Assign port to ETS domain ............................................................................................................................... 18-97


18-17 Link over TDM (path): Actions>Assign Resources to Domain

.......................................................... 18-98

18-18 Select ETS domain ............................................................................................................................................... 18-98


18-98
18-19 Confirm the assignment

..................................................................................................................................... 18-99

18-20 Search>Packet>Services>Connection Oriented>ETS Transport Link ........................................... 18-100


18-21 Path commissioning

.......................................................................................................................................... 18-100

18-22 Path included in the Links over TDM


18-23 Transport Links

........................................................................................................ 18-101

................................................................................................................................................... 18-101
18-101

18-24 Port: Assign resources to Domain

................................................................................................................ 18-103

18-25 Assign resources to Domain ........................................................................................................................... 18-104


18-26 Search>Packet>Services>T-MPLS>T-MPLS Edge Ports ................................................................... 18-105
18-27 UNI ports became edge ports

........................................................................................................................ 18-105

18-28 Actions>Packet>Services>Connection Oriented(ETS)>Create EVC


18-29 EVC over SDH: EVC definition
18-30 Far end edge port selection

............................................ 18-106

.................................................................................................................. 18-107

............................................................................................................................. 18-108

18-31 Ethernet Segments definition ......................................................................................................................... 18-109


18-32 Search>Packet>Services>Connection Oriented(ETS)
18-33 ETS EVCs

......................................................................... 18-110

............................................................................................................................................................. 18-110
18-110

18-34 ETS EVC: Search>Ethernet Segments ....................................................................................................... 18-111


18-35 Ethernet segment list

......................................................................................................................................... 18-111
18-111

18-36 Actions>Add Constraints to an Ethernet Service


18-37 Add Constraints to an Ethernet Service

................................................................................... 18-112

..................................................................................................... 18-113

18-38 Segment:Actions>Associate to Traffic Classifier ................................................................................... 18-114


18-39 Traffic Classifier list .......................................................................................................................................... 18-114
18-114
18-40 Associate Traffic Classifier ............................................................................................................................. 18-115
18-41 Allocate the segment

......................................................................................................................................... 18-116
18-116

18-42 Implement the segment

.................................................................................................................................... 18-116

18-43 Both segments are implemented


18-44 EVC-ETS implemented

................................................................................................................... 18-117

................................................................................................................................... 18-117

....................................................................................................................................................................................................................................
1350 OMS
lviii
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

18-45 T-MPLS EVC list: Availability

..................................................................................................................... 18-118

18-46 EVC: Search>Fault Localization .................................................................................................................. 18-119


18-47 Navigation to Transport Section
18-48 Navigate to Link over Cable
18-49 Create Domain
18-50 Define NE

................................................................................................................... 18-119

.......................................................................................................................... 18-120

.................................................................................................................................................... 18-123
18-123

............................................................................................................................................................. 18-124
18-124

18-51 Create EVC

.......................................................................................................................................................... 18-125
18-125

18-52 Align Up window ............................................................................................................................................... 18-127


18-53 Enable Takeover

................................................................................................................................................. 18-128
18-128

18-54 Color Profile Modification window


18-55 Color Profile Properties window

............................................................................................................ 18-137

.................................................................................................................. 18-141

18-56 Traffic Descriptor Modification window ................................................................................................... 18-150


18-57 Traffic Descriptor (Ethernet Management) Properties window
18-58 Traffic Classifier Modification window
18-59 Traffic Classifier Properties window

........................................................ 18-154

.................................................................................................... 18-163

.......................................................................................................... 18-166

18-60 Edge Port Modification window ................................................................................................................... 18-171


18-61 Edge Port Configuration window ................................................................................................................. 18-173
18-62 Edge Port Properties window
18-63 Show Equipment window

........................................................................................................................ 18-176

............................................................................................................................... 18-181

18-64 Transport Link Extremities window ............................................................................................................ 18-191


18-65 Transport Link Properties window

.............................................................................................................. 18-194

18-66 Ethernet Segment representation

.................................................................................................................. 18-197

18-67 Ethernet Segment representation

.................................................................................................................. 18-200

18-68 Ethernet Segment Modification window

................................................................................................... 18-206

18-69 Traffic Classifier Association (to an Ethernet Segment) window

.................................................... 18-210

18-70 Traffic Classifier disassociation (from an Ethernet Segment) window


18-71 Add Constraint to an Ethernet Segment window (Pop)
18-72 Ethernet Segment constraint properties window

.......................................... 18-212

....................................................................... 18-214

.................................................................................... 18-220

18-73 Constraint Modification window .................................................................................................................. 18-223


....................................................................................................................................................................................................................................
1350 OMS
lix
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

18-74 Ethernet Segment Configuration window


18-75 Ethernet Segment Extremities window

................................................................................................. 18-234

...................................................................................................... 18-236

18-76 Ethernet Segment Extremity Modification window (Origin)

............................................................ 18-237

18-77 Ethernet Segment Extremity Modification window (Destination)


18-78 Route Display - Ethernet Segment window

............................................................................................. 18-243

18-79 Connectivity view - Ethernet Segment window


18-80 VLAN Type Creation window

.................................................. 18-238

..................................................................................... 18-245

...................................................................................................................... 18-249

18-81 VLAN Type Modification window

............................................................................................................. 18-252

19-1

Connection Less Transport Link List

............................................................................................................ 19-28

19-2

Transport Link Configuration window

19-3

Transport Link Extremities window

19-4

Transport Link Properties window ................................................................................................................. 19-39

19-5

EVC Modification window (Details)

19-6

EVC Properties window ..................................................................................................................................... 19-59

19-7

EVC Fault Localization window

19-8

Show Equipment from EVC Fault Localization

19-9

AS window for EVC Alarms ............................................................................................................................ 19-71

......................................................................................................... 19-32

.............................................................................................................. 19-35

............................................................................................................ 19-54

.................................................................................................................... 19-66
....................................................................................... 19-67

19-10 Add EVC termination window (General Panel) ........................................................................................ 19-75


19-11 Add EVC termination window (Egress Flow)

........................................................................................... 19-78

19-12 Add EVC termination window (L2 Control Protocol Panel)

............................................................... 19-80

19-13 EVC Termination Configuration window .................................................................................................... 19-84


19-14 EVC Termination Properties window

........................................................................................................... 19-86

19-15 Provider Domain Configuration window

.................................................................................................... 19-95

19-16 Domain Modification window ......................................................................................................................... 19-97


19-17 Network Element Configure window

........................................................................................................... 19-99

19-18 Client Type Selection ........................................................................................................................................ 19-101


19-101
19-19 Ethernet Physical Port

...................................................................................................................................... 19-102

19-20 Ethernet Physical Port Configuration window

........................................................................................ 19-103

19-21 Customer Creation window ............................................................................................................................ 19-105


....................................................................................................................................................................................................................................
1350 OMS
lx
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

19-22 Spanning Tree Instance Configuration window ...................................................................................... 19-122


20-1

PBB EVC provisioning ......................................................................................................................................... 20-8

20-2

Actions>Packet>Construction>Create Domain

20-3

Create PBB Domain

20-4

Search>Packet>Construction>Network Elements>Available NEs

20-5

Available NE: Actions>Define Network Element

20-6

Define Network Element dialog box

20-7

Defined NE list

20-8

Show Equipment view

20-9

Show Equipment: select the termination

20-10 Module setting

........................................................................................ 20-12

............................................................................................................................................ 20-13
20-13
.................................................... 20-14

.................................................................................... 20-15

............................................................................................................. 20-15

...................................................................................................................................................... 20-16
20-16
....................................................................................................................................... 20-17
..................................................................................................... 20-18

....................................................................................................................................................... 20-18
20-18

20-11 Show Equipment view of the terminating NE

........................................................................................... 20-19

20-12 Node: Actions>Physical>Synchronize>Synchronize NE


20-13 Actions>Physical>Create Physical Connection
20-14 Create Physical Connection

...................................................................... 20-19

....................................................................................... 20-21

.............................................................................................................................. 20-22

20-15 Create> Physical Connection step2

............................................................................................................... 20-23

20-16 Search>Packet>Construction>Transport Links>Links over Cable .................................................... 20-24


20-17 Links over Cable list ............................................................................................................................................ 20-25
20-25
20-18 Link over Cable: Actions>Assign Resources to Domain ....................................................................... 20-25
20-19 Assign Resources to Domain

........................................................................................................................... 20-26

20-20 Link over Cable list .............................................................................................................................................. 20-27


20-27
20-21 Link over Cable:Actions>Delete

.................................................................................................................... 20-28

20-22 Physical Connection:Actions>Remove

........................................................................................................ 20-28

20-23 Actions>Packet>ERP>Create ERP Ring


20-24 Create ERP Ring

..................................................................................................... 20-30

................................................................................................................................................... 20-31
20-31

20-25 Bridge Transport Links ....................................................................................................................................... 20-32


20-26 Create ERP Ring

................................................................................................................................................... 20-33
20-33

20-27 Search>Packet>ERP>Rings
20-28 List of ERP Rings

............................................................................................................................. 20-34

................................................................................................................................................. 20-34
20-34

....................................................................................................................................................................................................................................
1350 OMS
lxi
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

20-29 ERP ring: Actions>Implement ERP Ring


20-30 ERP Ring implemented

.................................................................................................... 20-35

...................................................................................................................................... 20-35

20-31 ERP Ring:Search>Nodes

................................................................................................................................... 20-36

20-32 Nodes belonging to the ring .............................................................................................................................. 20-36


20-33 ERP Ring:Search>Physical Links

.................................................................................................................. 20-36

20-34 Physcons belonging to the ring ........................................................................................................................ 20-37


20-35 ERP ring: Search>ERP Instances
20-36 Search of the ERP instances

................................................................................................................... 20-38

............................................................................................................................. 20-39

20-37 PBB domain:Search>ERP Instances

............................................................................................................. 20-39

20-38 Actions>Packet>ERP>Create ERP Instance


20-39 Create ERP Instance: General
20-40 Create ERP Instance: Timers

.............................................................................................. 20-40

.......................................................................................................................... 20-41

............................................................................................................................ 20-42

20-41 Create ERP Instance: Failures .......................................................................................................................... 20-43


20-42 Create ERP Instance

............................................................................................................................................ 20-44
20-44

20-43 ERP Instance: Actions>Implement ERP Instance

.................................................................................... 20-44

20-44 Actions>Packet>Services>ConnectionLess(Bridge)>Create B-VID ................................................ 20-46


20-45 Create B-VID wizard step1 ............................................................................................................................... 20-47
20-46 B-VID:Transport Links selection
20-47 Create B-VID
20-48 B-VID list

................................................................................................................... 20-48

......................................................................................................................................................... 20-49
20-49

................................................................................................................................................................ 20-50
20-50

20-49 B-VID: Actions>Implement

............................................................................................................................. 20-50

20-50 B-VID partially implemented (few secs)

..................................................................................................... 20-51

20-51 MIP creation policy .............................................................................................................................................. 20-53


20-53
20-52 Traffic Descriptor create step1 ......................................................................................................................... 20-54
20-53 Traffic Descriptor create step2 ......................................................................................................................... 20-55
20-54 EVC Termination list ........................................................................................................................................... 20-56
20-56
20-55 Actions> Add Connection Less EVC Termination

.................................................................................. 20-57

20-56 Add Connection Less EVC Termination dialog box


20-57 The new termination has been added

............................................................................... 20-58

............................................................................................................ 20-58

....................................................................................................................................................................................................................................
1350 OMS
lxii
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

20-58 ERP Graphical View example

....................................................................................................................... 20-128

20-59 Create PBB EVC: Termination Selection .................................................................................................. 20-146


20-60 Create PBB EVC: Termination Settings
20-61 Ingress flow create

.................................................................................................... 20-147

............................................................................................................................................. 20-148
20-148

20-62 Ingress Flow: create monitoring

................................................................................................................... 20-149

20-63 Egress Flow: Push .............................................................................................................................................. 20-150


20-64 EVC Allocate and Implement ........................................................................................................................ 20-151
20-65 Search>Packet>Connection Less(Bridge)>Bridge EVC

..................................................................... 20-152

20-66 Bridge EVC list ................................................................................................................................................... 20-152


20-152
20-67 TSS160C System ID Configuration

............................................................................................................ 20-157

20-68 TSS160C System ID Configuration form

................................................................................................. 20-158

20-69 TSS160C Q LAN Configuration (Gateway NE)

.................................................................................... 20-159

20-70 TSS160C Export of the Route ....................................................................................................................... 20-160


20-71 Tss160C OSI Routing Configuration .......................................................................................................... 20-161
20-72 TSS10 System ID Configuration .................................................................................................................. 20-162
20-73 TSS10 System IP Address ............................................................................................................................... 20-163
20-74 Tss10 LAN Interface Details .......................................................................................................................... 20-164
20-75 TSS160C Link Aggregation Group Management
20-76 Tss160C LAG Configuration (Client Type)

.................................................................................. 20-166

............................................................................................. 20-167

20-77 Tss160C LAG Configuration (Administration State)


20-78 Tss160C In Fiber In Band

.......................................................................... 20-168

............................................................................................................................... 20-169

20-79 Tss160C In Fiber In Band (OSPF) ............................................................................................................... 20-170


20-80 Tss160C In Fiber In Band Activate

............................................................................................................. 20-171

20-81 Tss160C port member of LAG ...................................................................................................................... 20-172


20-82 Tss160C port member of LAG configuration
20-83 Tss160C port member of LAG Actor

.......................................................................................... 20-173

......................................................................................................... 20-174

20-84 TSS10 Link Aggregation Group Management ........................................................................................ 20-176


20-85 Tss10 Enable the In Band Management ..................................................................................................... 20-177
20-86 TSS60 In Fiber In Band Configuration

...................................................................................................... 20-178

....................................................................................................................................................................................................................................
1350 OMS
lxiii
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

20-87 Tss10 portInLAG ................................................................................................................................................ 20-179


20-88 Tss10 port member of LAG configuration ................................................................................................ 20-180
20-89 Tss10_portInLAGconfigActor
20-90 Tss10_portInLAGadminState
20-91 NMS Start Supervision
20-92 NMS Synchronize NE

...................................................................................................................... 20-181

........................................................................................................................ 20-182

.................................................................................................................................... 20-183

...................................................................................................................................... 20-184

20-93 NMS add Node In Map .................................................................................................................................... 20-185


20-94 NMS Create Physical Connection ................................................................................................................ 20-186
20-95 NMS Create Physical Connection wizard ................................................................................................. 20-187
20-96 NMS Define NE

................................................................................................................................................. 20-188

20-97 NMS Ethernet Physical Port list

................................................................................................................... 20-189

20-98 Create LAG Link over Cable ......................................................................................................................... 20-190


20-99 Create Link Over Cable

................................................................................................................................... 20-191

20-100 NMS Link Over LAG list

............................................................................................................................... 20-192

21-1

BTV Element management chain

..................................................................................................................... 21-5

21-2

Broadcast TV Element List window

21-3

Broadcast TV Element Creation window ....................................................................................................... 21-9

21-4

External Network Element Modification window .................................................................................... 21-12

21-5

ETP Creation window

21-6

Path on 1350 OMS SDH .................................................................................................................................... 21-25

21-7

Broadcast TV Element Creation window

21-8

Link Over TDM Broadcast TV Creation window

21-9

1350 OMS SDH Path Id ..................................................................................................................................... 21-31

................................................................................................................ 21-7

......................................................................................................................................... 21-21

21-10 Create Ethernet Service

.................................................................................................... 21-27
.................................................................................... 21-30

...................................................................................................................................... 21-36
21-36

21-11 EVC Any to any Creation window ................................................................................................................. 21-38


22-1

Alarm status management

................................................................................................................................. 22-10

22-2

Alarm correlation

25-1

Mobile back-hauling scenario

25-2

Network layers in case of unterminated CE service ................................................................................... 25-5

.................................................................................................................................................. 22-11
22-11
............................................................................................................................ 25-4

....................................................................................................................................................................................................................................
1350 OMS
lxiv
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

25-3

Transport Layer representation

.......................................................................................................................... 25-6

25-4

CES 9500 MPR Protection schemes

25-5

CES Relation between CAC tolerance and modulation mode

25-6

Horizontal and vertical alarm correlation in Packet Radio domain

25-7

Horizontal and vertical alarm correlation in T-MPLS domain ............................................................. 25-22

25-8

CES after join ......................................................................................................................................................... 25-28


25-28

25-9

CES after stich

............................................................................................................. 25-10
............................................................. 25-11
................................................... 25-17

....................................................................................................................................................... 25-28
25-28

25-10 CES routing display

............................................................................................................................................ 25-31

25-11 Tunnel routing display

........................................................................................................................................ 25-32

25-12 SNMP MIB relationships between E1 and PW tables

............................................................................ 25-36

26-1

Reference Network

................................................................................................................................................. 26-2
26-2

26-2

Actions>Packet>T-MPLS>Create T-MPLS tunnel

26-3

Create T-MPLS tunnel ........................................................................................................................................... 26-4


26-4

26-4

Point to point Packet Ring bidir protected T-MPLS tunnel

26-5

Selection of the port

26-6

Select the second extremity (node) ................................................................................................................... 26-7

26-7

P2P bid prot T-MPLS tunnel: selected extremities

26-8

P2P: constraint

26-9

P2P bid prot T-MPLS tunnel: selected extremities and constraint

..................................................................... 26-5

............................................................................................................................................... 26-6
26-6

..................................................................................... 26-8

......................................................................................................................................................... 26-9
26-9

26-10 Search>Packet>T-MPLS>T-MPLS Tunnels


26-11 Tunnel list

.................................................................................... 26-3

..................................................... 26-10

............................................................................................... 26-11

................................................................................................................................................................ 26-12
26-12

26-12 Actions>Implement T-MPLS Tunnel


26-13 The tunnel is implemented

............................................................................................................ 26-12

................................................................................................................................ 26-13

26-14 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire


26-15 Create T-MPLS Pseudo Wire

..................................................................... 26-14

........................................................................................................................... 26-15

26-16 Point to Point Bidirectional T-MPLS PW .................................................................................................... 26-17


26-17 Search>Packet>T-MPLS>T-MPLS Pseudo Wire

..................................................................................... 26-18

26-18 T-MPLS Pseudo Wires ........................................................................................................................................ 26-18


26-19 PW Implementation

............................................................................................................................................. 26-19
26-19

....................................................................................................................................................................................................................................
1350 OMS
lxv
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

26-20 T-MPLS Pseudo wire implemented


26-21 Reference Network

............................................................................................................... 26-19

.............................................................................................................................................. 26-21
26-21

26-22 Actions>Packet>T-MPLS>Create T-MPLS tunnel


26-23 Create T-MPLS tunnel

.................................................................................. 26-22

........................................................................................................................................ 26-23

26-24 Point to point Packet Ring bidir protected T-MPLS tunnel open sink

.............................................. 26-24

26-25 Selection of the port ............................................................................................................................................. 26-25


26-25
26-26 Select the second extremity (node)

................................................................................................................ 26-26

26-27 P2P bid prot T-MPLS tunnel open sink: selected extremities

.............................................................. 26-27

26-28 P2P open sink: constraint ................................................................................................................................... 26-28


26-29 P2P bid prot T-MPLS tunnel open sink: selected extremities and constraint

................................. 26-29

26-30 Search>Packet>T-MPLS>T-MPLS Tunnels ............................................................................................... 26-30


26-31 Tunnel list

................................................................................................................................................................ 26-31
26-31

26-32 Actions>Implement T-MPLS Tunnel


26-33 The tunnel is implemented

............................................................................................................ 26-31

................................................................................................................................ 26-32

26-34 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire


26-35 Create T-MPLS Pseudo Wire

..................................................................... 26-33

........................................................................................................................... 26-34

26-36 Dual Point to Point Bidirectional T-MPLS PW ......................................................................................... 26-36


26-37 Search>Packet>T-MPLS>T-MPLS Pseudo Wire

..................................................................................... 26-37

26-38 T-MPLS Pseudo Wires ........................................................................................................................................ 26-37


26-39 PW Implementation

............................................................................................................................................. 26-38
26-38

26-40 T-MPLS Pseudo wire implemented

............................................................................................................... 26-38

26-41 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC

................................................................. 26-40

26-42 Create T-MPLS EVC: Specific ........................................................................................................................ 26-42


26-43 Create T-MPLS EVC: Terminations Selection
26-44 Terminations Selection

.......................................................................................... 26-43

....................................................................................................................................... 26-44
26-44

26-45 Termination Settings ............................................................................................................................................ 26-46


26-46
26-46 Ingress flow create

............................................................................................................................................... 26-48
26-48

26-47 Ingress Flow: create monitoring ...................................................................................................................... 26-49


26-48 Egress Flow: Push

................................................................................................................................................ 26-51
26-51

....................................................................................................................................................................................................................................
1350 OMS
lxvi
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

26-49 Create Egress monitoring

.................................................................................................................................. 26-52

26-50 Spoke Transport Link selection

....................................................................................................................... 26-53

26-51 Create Ingress node A

......................................................................................................................................... 26-54

26-52 Create Egress node A

.......................................................................................................................................... 26-55

26-53 Select the transport link

...................................................................................................................................... 26-56

26-54 T-MPLS EVC Allocate and Implement

........................................................................................................ 26-57

26-55 Search>Packet>Services>T-MPLS>T-MPLS EVCs

............................................................................... 26-58

26-56 T-MPLS EVCs ....................................................................................................................................................... 26-59


26-59
26-57 Allocate the EVC

.................................................................................................................................................. 26-59
26-59

26-58 EVC implemented

................................................................................................................................................ 26-59
26-59

27-1

EVC definition: PM folder

.................................................................................................................................. 27-3

27-2

EVC definition: PM policy .................................................................................................................................. 27-4

27-3

Create Measure

27-4

Measure: Actions menu options ......................................................................................................................... 27-7

27-5

Search>PM>PM domains

27-6

Ethernet domain: Search menu

27-7

Ethernet domain: Actions menu ......................................................................................................................... 27-9

27-8

PM transport: Actions menu

27-9

PM TP list

........................................................................................................................................................ 27-5
27-5

.................................................................................................................................... 27-8
.......................................................................................................................... 27-8

............................................................................................................................... 27-9

................................................................................................................................................................ 27-10
27-10

27-10 Start TP dialog box ............................................................................................................................................... 27-10


27-11 Stop TP dialog box

............................................................................................................................................... 27-11

27-12 Measure consistency ............................................................................................................................................ 27-13


27-13
27-13 NE: Actions>Generate Audit ............................................................................................................................ 27-13
27-14 Generate Audit

....................................................................................................................................................... 27-14
27-14

27-15 Create Report Profile ........................................................................................................................................... 27-16


27-16
27-16 Correlation Measure with Report Profile ..................................................................................................... 27-17
27-17 Uncorrelation Measure with Report Profile ................................................................................................ 27-18
27-18 PM TP Actions menu

.......................................................................................................................................... 27-19

27-19 Export TPs to CSV file

....................................................................................................................................... 27-20

....................................................................................................................................................................................................................................
1350 OMS
lxvii
8DG42227DAAA 9.6
Issue 3 December 2012

List of figures
....................................................................................................................................................................................................................................

27-20 Generate Measure PM Report to CSV file

.................................................................................................. 27-21

27-21 Generate PM tabular report ............................................................................................................................... 27-22


28-1

TSS-5 interworking with TSS160/320

............................................................................................................ 28-8

28-2

Create Domain

28-3

Define NE ................................................................................................................................................................ 28-14


28-14

....................................................................................................................................................... 28-13
28-13

....................................................................................................................................................................................................................................
1350 OMS
lxviii
8DG42227DAAA 9.6
Issue 3 December 2012

About this document


About this document

Purpose

This preface provides information about how to use this document, which is the 1350
OMS PKT Guide.
The purpose of the 1350 OMS PKT Guide is to explain the administration and
provisioning features of the 1350 OMS PKT application for the 1350 OMS 9.6 release.
This document describes how to use, administer, and maintain the 1350 OMS PKT
application for configuring and for monitoring Ethernet or MPLS networks.
Reason for reissue

This document has been reissued to support the 1350 OMS 9.6.
The revision history of this document is shown in the following table:
Location

Revision

Issue

1350 OMS PKT Guide

Document reflects the changes made to the


1350 OMS release 9.6.

Issue 2, May
2012

1350 OMS PKT Guide

Document changes reflect the new 9.6 release


of the 1350 OMS.

Issue 1, March
2012

Safety information

This document does not contain any safety information (cautions or warnings) because
the 1350 OMS is a software product.
Important! When working with any hardware that is associated with any piece of
software, always refer to the safety information that the hardware manufacturer
provides for that particular piece of hardware. For example, when working with an
HP server, refer to safety information that is provided in the HP documentation for
that server. When working with any Alcatel-Lucent network element, refer to safety
information that is provided in the Alcatel-Lucent documentation for that particular
NE.

...................................................................................................................................................................................................................................
1350 OMS
lxix
8DG42227DAAA 9.6
Issue 3 December 2012

About this document


....................................................................................................................................................................................................................................

Intended audience

The 1350 OMS PKT Guide is written primarily for the advanced users of the 1350 OMS,
who typically are systems engineers, programmers, and system administrators who must
configure and monitor Ethernet or MPLS networks. This document can be used by
anyone who needs specific administration or provisioning information about the features,
applications, and operations of the 1350 OMS PKT component of the 1350 OMS. These
people are you, its users.
The 1350 OMS PKT Guide assumes that the user is familiar with the function of
telecommunication networks and has had some exposure to the X.org Foundation
X-Window and Microsoft Windows environments.
How to use this information product
Conceptual and task content

In the broadest sense, this document contains the following types of content:

Conceptual content, which is background information, is given so users can better


understand the tasks that must be performed. The presentation of conceptual
information varies according to the topic being explainedsections, subsections,
tables, figures, and screen captures can be commonly found.
Task content, which includes step-by-step instructions, is provided so users can
administer, provision, and maintain the system. The task information is typically
presented as series of tasks that follows the conceptual information.

The conceptual information complements and enhances the step-by-step instructions that
are found in each task. To optimize the use of the conceptual and task content, users
should consider the following:

The conceptual information should be used to broaden your general knowledge of the
network management system. It is best if you read all conceptual information and
have a good understanding of the concepts being presented before undertaking the
step-by-step instructions given in any task.
The conceptual and task portions of the document have extensive hyperlinks. Use
these links to toggle between the two types of information presented so you can
access all pertinent information related to particular concepts and tasks.
The task information is based on a user needs analysis that has been performed for
each management system user job; therefore, use the task information to get the job at
hand done quickly and with minimal system impact.

Format of task content

Each task consists of sections that are called When to use, Related information, Before
you begin, and Task. The intent of these sections is self-explanatorythey explain when
you should use the task, any related information that you would need to know while doing
the task, and what you need to consider or do before you start the task.
When a task does not have any related information that must be considered before it is
started, the Related information section for that task states the following:
This task does not have any related information.
....................................................................................................................................................................................................................................
1350 OMS
lxx
8DG42227DAAA 9.6
Issue 3 December 2012

About this document


....................................................................................................................................................................................................................................

When a task does not have any conditions that must be considered before it is started, the
Before you begin section for that task states the following:
This task does not have any preconditions.
Each Task section consists of steps. The completion of all steps, which are sequentially
numbered, is required for the entire task to be completed successfully. In some instances,
a step might be prefaced with the wording Optional, which indicates that the step can be
skipped and the task can still be completed successfully. A task is considered to be
completed when all of its steps are completed and when the wording End of Steps
appears.
Many times, the management system affords users with multiple ways to accomplish the
same task. In these instances, this type of task gives the user several Methods of how to
accomplish the same set of steps successfully.
Typographical conventions used for content

This document uses the following typographical conventions:

User input or path navigation on the administration and application GUIs is


identified with this type.

User input in the UNIX environment is identified with this


type.

System output in the UNIX environment is identified with


this type..

GUI fields/parameters and their options are identified with this type.
Document titles or words that are being defined or emphasized are identified with this
type.

Marking conventions used for content

The following convention is used to indicate a path, which is a flow of buttons and/or
menu items that you must navigated through to arrive at a destination on the GUI:
Search > EML > Network Elements

This same convention is also used to show a path through a series of menu items, for
example:
Click the filtering tool and select Node > Node Type.
All mouse selections are presumed to be left clicks. Right click mouse selections are
indicated as the following:
Right click the highlighted item and follow the path: Search > Clients.
Or, if brevity is needed, the same path could be documented as:
RClick item > Search > Clients.

Occasionally, a set of 1350 OMS features is not supported for all NEs or for all operating
components and/or environments. This set of features is clearly marked to show these
exceptions.

....................................................................................................................................................................................................................................
1350 OMS
lxxi
8DG42227DAAA 9.6
Issue 3 December 2012

About this document


....................................................................................................................................................................................................................................

Technical content

In general, the technical content in this document is augmented by technical content that
is provided in other documents in this documentation set and/or in the document set of the
particular network element (NE ) or piece of hardware in the network configuration. It is
the user's responsibility to read all pertinent material in all documentation sets in order to
understand a particular concept or procedure and/or to implement the procedure in his or
her working environment.
This document contains information on the complete line of NEs that the 1350 OMS
supports. Each release of the 1350 OMS and its applications supports certain NEs within
the Alcatel-Lucent family of optical NEs. Mention of NEs or specific NE features in the
text of this document, or any document in the 1350 OMS documentation set, that are not
supported in this particular product release can apply to prior or future product releases.
Such material may not be currently visible or operable on the GUI and/or the server and
has been added only as a convenience for our customers. This material is subject to
change. For a list of NEs that are supported in the 1350 OMS 9.6, contact your
Alcatel-Lucent local customer service support team.
This document, or any document in the 1350 OMS documentation set, may contain
information that is related to features, service packs (SPs), maintenance releases, or other
updates that our product and its applications supported in prior releases or is to support in
the near future. This material may not be visible or operable on the supported servers
and/or GUI, and has been added only as a convenience for our customers. This material is
subject to change. For a list of all supported features for a particular release, contact your
Alcatel-Lucent local customer service support team.
Treatment of terms

A term that is presented in the text of this document, along with any used abbreviation for
the term, is typically defined where the term is initially introduced.
Many of the more generic terms that are defined in this document, along with the terms
that are defined in other documents in this documentation set, are also defined in the
Glossary, which is part of the 1350 OMS Getting Started Guide. We encourage our users
to rely on the Glossary for a comprehensive set of terms and any abbreviations of the
terms.
Document formats

This document is available for use in HTML format and PDF.


The on-line HTML version of the document has a search capability, a table of contents in
the front matter of the document, a partial table of contents in each chapter, and an index.
The PDF version can be viewed on-line; or it, or portions of it, can be printed locally at
the user's discretion.
On-line help

The 1350 OMS help systems are designed to consider the task that the user is performing
and to help the user complete the task.

....................................................................................................................................................................................................................................
1350 OMS
lxxii
8DG42227DAAA 9.6
Issue 3 December 2012

About this document


....................................................................................................................................................................................................................................

Contact sensitive help, which defines many GUI fields, is available; and other types of
help can be accessed from the GUI menu.
Related documentation

The following documents are related to the 1350 OMS PKT Guide:
1. The 1350 OMS Getting Started Guide (8DG42227AAAA) explains the look-and-feel
of the user and administration GUIs to new users. This document contains a complete
explanation of the 1350 OMS information product set and a glossary of terms that is
applicable to the entire documentation set.
2. The 1350 OMS Administration Guide explains how to use the tools and the
administration GUIs to administer and maintain the element management layer,
network management layer, and service management layer of the 1350 OMS.
This document consists of the following volumes:
The 1350 OMS Administration Guide, Vol 1: Common Tools and Processes
(8DG42227LAAA-Vol1) explains how to administer and maintain the common
tools and processes that are associated with the 1350 OMS.

The 1350 OMS Administration Guide, Vol 2: Common GUI Functions


(8DG42227LAAA-Vol2) explains how to administer and maintain the common
administration GUIs that are associated with the 1350 OMS.
3. The 1350 OMS EML Guide (8DG42227BAAA) explains how to administer and
provision the 1350 OMS EML application of the 1350 OMS, which is the element
management layer of the 1350 OMS.
4. The1350 OMS SDH Guide (8DG42227CAAA) explains how to administer and
provision the Synchronous Digital Hierarchy (SDH) network management layer of the
1350 OMS.
5. The 1350 OMS WDM Guide (8DG42227QAAA) explains how to administer and
provision the 1350 OMS WDM, which provides the Wavelength Division
Multiplexing (WDM) and Dense Wavelength Division Multiplexing (DWDM)
network management layer for the 1350 OMS.
6. The 1350 OMS Service Assurance Guide (8DG42227FAAA) explains how to
maintain the 1350 OMS in terms of activities such as alarm clearing and performance
monitoring.
7. The 1350 OMS CLI Reference (8DG42227KAAA) provides detailed reference
material on the Command Line Interface for the advanced user of the 1350 OMS.
The 1350 OMS 9.6 also supports modules for system resiliency and northbound
communication. These modules are explained in the following documents:

1350 OMS HA Guide (8DG42227GAAA) explains how to install, administer, and use
the High Availability feature.
1350 OMS OI Guide (8DG42227HAAA) explains how to install, administer, and use
the Open Interfaces that are supported for the 1350 OMS.

Ordering information

The ordering number for this particular document is 8DG42227DAAA. Contact your
local Alcatel-Lucent local customer service support team for details.
....................................................................................................................................................................................................................................
1350 OMS
lxxiii
8DG42227DAAA 9.6
Issue 3 December 2012

About this document


....................................................................................................................................................................................................................................

In addition, to order the 1350 OMS and/or any of its applications, add-on features or
upgrades, contact your local Alcatel-Lucent local customer service support team.
How to comment

To comment on this document, go to the Online Comment Form (http://infodoc.alcatellucent.com/comments/) or e-mail your comments to the Comments Hotline
(comments@alcatel-lucent.com).

....................................................................................................................................................................................................................................
1350 OMS
lxxiv
8DG42227DAAA 9.6
Issue 3 December 2012

Part I: Introduction

Overview
Purpose

This part contains a general description about the 1350 OMS product and introduce the
user to the activity of administration and maintenance of the 1350 OMS PKT application.
Contents
Chapter 1, Product Overview

1-1

Chapter 2, Introduction to Administration

2-1

...................................................................................................................................................................................................................................
1350 OMS
I-1
8DG42227DAAA 9.6
Issue 3 December 2012

Introduction

Overview

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
I-2
8DG42227DAAA 9.6
Issue 3 December 2012

Product Overview
1

Overview
Purpose

This chapter provides an overview of the 1350 OMS PKT and the user functions that are
required to provision the application.
Contents
1350 OMS Overview

1-2

1350 OMS Modules for System Resiliency and Northbound Communication

1-5

...................................................................................................................................................................................................................................
1350 OMS
1-1
8DG42227DAAA 9.6
Issue 3 December 2012

Product Overview

1350 OMS Overview

....................................................................................................................................................................................................................................

1350 OMS Overview


1350 OMS and its supported management layers

The 1350 OMS is a network management system that supports three layers of
management to accommodate and grow with the optical network of the Customers.
The Element Management Layer, or EML, provides the functionality that is needed to
access any Alcatel-Lucent supported network elements (NEs) that are deployed in a
customer network. The EML provides a single access point for communication with an
NE.
The Network Management Layer, or NML, provides the functionality that is needed to
commission, provision, and supervise the network that is deployed in a customer premise.
The Service Management Layer, or SML, provides the functionality that is needed to
commission, provision, and supervise a Virtual Private Network (VPN) that an
Alcatel-Lucent customer deploys to its end users or to its customers.
1350 OMS and its applications

The 1350 OMS is the Alcatel-Lucent converged and unified network management
system. It manages the complete portfolio of Alcatel-Lucent active network elements
(NEs) and it maintains the complete portfolio of Alcatel-Lucent legacy NEs.
The 1350 OMS consists of the following set of integrated, licensed applications:

1350 OMS EML (p. 1-2).

1350 OMS PKT (p. 1-3).

1350 OMS SDH (p. 1-3).

1350 OMS WDM (p. 1-3).

Refer to the 1350 OMS Getting Started Guide for a more detailed system description.
1350 OMS EML

The 1350 OMS EML application provides element level management (EML) capabilities
for both Alcatel-Lucent ANSI and ETSI NEs. Its set of protocol adapters supports basic
NE functions such as NE MIB backup/restore and software downloads. Because the 1350
OMS provides all of the element layer functions that are required to manage the deployed
network, it requires to deploy also the 1350 OMS EML application.
Refer to the following documents and contact your Alcatel-Lucent local customer service
support team for additional details:

1350 OMS EML Guide.


1350 OMS Service Assurance Guide.

....................................................................................................................................................................................................................................
1350 OMS
1-2
8DG42227DAAA 9.6
Issue 3 December 2012

Product Overview

1350 OMS Overview

....................................................................................................................................................................................................................................

1350 OMS PKT

The 1350 OMS PKT application provides Ethernet network management layer support
along with provisioning, alarm correlation, and historical PM data services. Ethernet
services include Multi-Protocol Label Switching (MPLS), Transport-Multi-Protocol Label
Switching (T-MPLS), bridging, Connection Oriented traffic, and packet rings.
Refer to the following documents and contact your Alcatel-Lucent local customer service
support team for additional details:

1350 OMS PKT Guide.


1350 OMS Service Assurance Guide.

1350 OMS SDH

The 1350 OMS SDH application provides the Synchronous Digital Hierarchy (SDH)
network management layer along with provisioning, alarm correlation, and PM
correlation capabilities. The 1350 OMS SDH functions as a client for the 1350 OMS
WDM application and as a server for the 1350 OMS PKT application.
Refer to the following documents and contact your Alcatel-Lucent local customer service
support team for additional details:

1350 OMS CLI Reference.

1350 OMS Service Assurance Guide.

1350 OMS WDM

The 1350 OMS WDM application provides Wavelength Division Multiplexing (WDM)
and Dense Wavelength Division Multiplexing (DWDM) support along with provisioning,
alarm correlation, and historical PM correlation capabilities.
Refer to the following documents and contact your Alcatel-Lucent local customer service
support team for additional details:

1350 OMS WDM Guide.

1350 OMS Service Assurance Guide.

1350 OMS software and the Web

1350 OMS is run through an Internet browser-based Graphical User Interface (GUI). It
supports the standard web features that a browser offers, such as bookmarks, back,
forward, reload, and print.
The Web Desktop is the available mechanism that both system administrators and users
can use to access the 1350 OMS GUI. It provides a central access point from which both
system administrators and users are authenticated and from which they can navigate to
the Web Portal to access the 1350 OMS applications.

....................................................................................................................................................................................................................................
1350 OMS
1-3
8DG42227DAAA 9.6
Issue 3 December 2012

Product Overview

1350 OMS Overview

....................................................................................................................................................................................................................................

The Web Portal is a Java application that is started when the administrator or user logs in
from the Web Desktop. The Web Portal provides the administrator with a view of all 1350
OMS applications and manages GUI navigation between the subsystem components. The
Web Portal also provides various methods of navigationsuch as menus, icons, and a left
tree navigation areabetween applications and tools.
From the 1350 OMS Web Portal, administrators can set up each application and its users,
and users can access the network and element level applications that enable the family of
Alcatel-Lucent NEs to be provisioned.
Refer to the 1350 OMS Getting Started Guide for a more detailed description of the look
and feel of the software and for a glossary of terms and acronym list.
1350 OMS supported NEs

The 1350 OMS supports the Alcatel-Lucent family of optical network elements (NEs). To
accommodate the world of optical transmission standards, these NEs operate using
different transport structures and they support different native command languages.
Contact your local customer support team for a list of NEs that are supported by the 1350
OMS and its particular applications.

....................................................................................................................................................................................................................................
1350 OMS
1-4
8DG42227DAAA 9.6
Issue 3 December 2012

Product Overview

1350 OMS Modules for System Resiliency and Northbound


Communication

....................................................................................................................................................................................................................................

1350 OMS Modules for System Resiliency and Northbound


Communication
1350 OMS HA

The 1350 OMS supports High Availability (HA) as an added value module, which is
referred to as the 1350 OMS HA. The 1350 OMS HA software package is installed on top
of an already installed and configured NML and EML platform and independently of any
other application such as the 1350 OMS SDH, 1350 OMS PKT, or 1350 OMS WDM, or
any element manager such as the 1350 OMS EML or 1350 OMS eOMS.
As its name suggests, the 1350 OMS HA provides high availability to these applications
whose main task is to manage transport networks. It protects the 1350 OMS applications
and its HP server platform against hardware and software failures that could be caused
by system failures (such as the failure of the system power supply or a system
component), a site failure (such as a natural disaster or fire), a backplane failure, a
processor failure, or any unplanned outage.
The 1350 OMS HA is explained in detail in the 1350 OMS HA Guide
(8DG42227GAAA). This document includes installation, administration, and user
information for the 1350 OMS High Availability (HA) feature.
Contact your Alcatel-Lucent local customer service support team for additional details.
1350 OMS OI

The 1350 OMS OI software package is installed on top of an already installed and
configured MW-INT platform and independently of any other application such as the
1350 OMS SDH, 1350 OMS PKT, 1350 OMS WDM, or any element manager such as
the 1350 OMS EML or 1350 OMS eOMS.
The 1350 OMS OI enables the 1350 OMS applications to export or import data to
multiple external operation systems (OSs). The 1350 OMS OI is a flexible, powerful, and
effective set of generic OS-to-OS interfaces (GENOS) that allow an external OS to
synchronize alarms, performance monitoring, network inventory, and remote inventory
data with any of the 1350 OMS applications.
The 1350 OMS OI is explained in detail in the 1350 OMS OI Guide (8DG42227HAAA).
This document includes installation, administration, and user information for the Open
Interfaces (OIs) that are supported for the 1350 OMS.
Contact your Alcatel-Lucent local customer service support team for additional details.

....................................................................................................................................................................................................................................
1350 OMS
1-5
8DG42227DAAA 9.6
Issue 3 December 2012

Product Overview

1350 OMS Modules for System Resiliency and Northbound


Communication

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
1-6
8DG42227DAAA 9.6
Issue 3 December 2012

I2ntroduction to
Administration

Application Administration
MW-INT as the building block

The MW-INT, which is the middleware interface, is the building block of the 1350 OMS
architecture; and as such, it is the platform for all 1350 OMS components and its features.
The MW-INT enables the administrator to install a single product or several different
products, as well as different instances of the same product on one hardware platform.
The 1350OMS applications are installed and configured on top of the MW-INT platform.
The MW-INT provides the following functionality:

Process management

Subsystem configuration
Installation/integration and customization
System management

Application instances

The 1350 OMS supports the 1350 OMS PKT application, and each occurrence of this
application in the management system is referred to as an instance. Each application
instance is managed by the MW-INT. Refer to the 1350 OMS Administration Guide, Vol
1: Common Tools and Processes for details.
Process Monitoring

Process Monitoring is the graphical representation of the system processes and their
actual status.
The Process Monitoring Control application is the graphic interface of the MW-INT
application that allows the user to have an overall control of the IM subsystem of the
selected System Instance. The PMC graphic interface is composed of a common window
dedicated to display information and to execute commands for the management of all the
processes (agents) of the selected System Instance. The processes are collected in groups
(for example Database processes, Alarms processes,...) and each group is represented in
the PMC window through an icon which color informs the user of the group functional
state. Exactly the group icon gives the summarized information about the functional state
of all the processes and their children included in the group itself.
...................................................................................................................................................................................................................................
1350 OMS
2-1
8DG42227DAAA 9.6
Issue 3 December 2012

Introduction to Administration

Application Administration

....................................................................................................................................................................................................................................

Refer to the 1350 OMS Administration Guide, Vol 2: Common GUI Functions for details.
The Web Desktop

Much of the administration of the 1350 OMS PKT application occurs through the Web
Desktop of the 1350 OMS. The Web Desktop provides a central access point from which
both system administrators and users are authenticated and from which they can navigate
to the Web Portal to access the 1350OMS applications. Refer to the 1350 OMS
Administration Guide, Vol 2: Common GUI Functions for details.
SEC User Administration and SEC User Authentication

The 1350 OMS uses its two SEC (Security) GUIs to administer and maintain security:

The 1350 OMS enables administrators to create and maintain user accounts through
its SEC User Administration GUI.
Functional area domains (FADs), object access domains (OADs), and combinations of
these domains along with user profiles and the declaration and discarding of user
accounts are administered through its SEC Authentication GUI.

Both the SEC User Administration GUI and the SEC User Authentication GUI are
explained in the 1350 OMS Administration Guide, Vol 2: Common GUI Functions.
Full system backups

The 1350 OMS enables administrators to perform a full system backup and recovery. For
details, refer to the 1350 OMS Administration Guide, Vol 1: Common Tools and
Processes, which details full system backups and recoveries, single volume backups, and
mirror configurations. Troubleshooting information is also included.
Application backup and restore

The 1350 OMS enables administrators to backup and restore a particular 1350 OMS
application and to schedule a backup of a particular 1350 OMS application. For details,
refer to the 1350 OMS Administration Guide, Vol 2: Common GUI Functions, which
details how use the SMF Scheduler to schedule a full backup or a backup of just the
network data, the alarm data, the performance monitoring data, the log data, user data, or
the system configuration.
PM Administration

Through its Data Management facilities, the 1350 OMS enables administrators to view
the performance monitoring statistics of a particular PM database. For details, refer to the
1350 OMS Administration Guide, Vol 2: Common GUI Functions.

....................................................................................................................................................................................................................................
1350 OMS
2-2
8DG42227DAAA 9.6
Issue 3 December 2012

Introduction to Administration

Application Administration

....................................................................................................................................................................................................................................

Logs, Command Log, and Command Log Administration

Log files are files that consist of records that are created by the various tools (scripts) and
processes. Administrators use log files to track any and/or all meaningful operations that
occur within the application or when a tool is executed. The 1350 OMS supports security
logs, command logs, and system logs. These logs are explained in detail in the 1350 OMS
Administration Guide, Vol 2: Common GUI Functions.
The Command Log enables administrators to parse a command log or a set of command
logs from a list of command logs. Once that list of command logs has been parsed, the
Command Log enables administrators to extract log records from target command log
files by using filters and to output that extracted list to a browser or to a table, called the
Command Result List, which is a tabular display that can be printed. For details, refer to
the 1350 OMS Administration Guide, Vol 2: Common GUI Functions.
Command Log Administration enables the administrator to edit the command output
template. In addition, the Command Log Administration function then allows the
administrator to view, parse, and filter the Command Log. For details, refer to the 1350
OMS Administration Guide, Vol 2: Common GUI Functions.

....................................................................................................................................................................................................................................
1350 OMS
2-3
8DG42227DAAA 9.6
Issue 3 December 2012

Introduction to Administration

View Application Release Information

....................................................................................................................................................................................................................................

View Application Release Information


When to use

Use this task to view release information about an application.


Related information

See the following topic in this document:

Application Administration (p. 2-1)

Before you begin

Open a Terminal session on the server machine.


Task

Complete the following steps to view release information about an application.


...................................................................................................................................................................................................

Type the following command after the command prompt :

/alu/Kernel/bin/Info.pl -sys PKT -inst <ID> -9.1.0


Result: The System Information window is displayed.
...................................................................................................................................................................................................

The release information for the application is similar to the following

General Information on System: <system name>


System
Version
Instance
Role

: <system name>
: <system version number>
: <number of the OS customized instance>
: <Role assigned to the OS customized
instance: master/client>
Master Ws
: <Name of the master workstation>
LOCAL OSK -ENGINE: <Version of the component
OSK-ENGINE on the local machine>
Master Kernal Type: <Kernel type of the master machine>
Master OSK-ENGINE Interface Version: <version of the component
OSK-ENGINE on the master
machine interface>
Info
...

: *

<application and release>

Last Configuration Update:


Local Time: <Day, Date, Month, Year, Time>
Local Customization Update:
Local Time: <Day, Date, Month, Year, Time>
....................................................................................................................................................................................................................................
1350 OMS
2-4
8DG42227DAAA 9.6
Issue 3 December 2012

Introduction to Administration

View Application Release Information

....................................................................................................................................................................................................................................

Composition
<A list of components and applications that belong
to the subsystem along with their corresponding versions>
...................................................................................................................................................................................................

Press the Dismiss button to close the window.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
2-5
8DG42227DAAA 9.6
Issue 3 December 2012

Introduction to Administration

View Application Release Information

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
2-6
8DG42227DAAA 9.6
Issue 3 December 2012

Part II: Administration

Overview
Purpose

This document part provides to system and network administrators information and
procedures to administer and to maintain the 1350 OMS PKT.
Contents
Chapter 3, 1350 OMS PKT Configuration

3-1

Chapter 4, 1350 OMS PKT Process Monitoring

4-1

Chapter 5, 1350 OMS PKT User Management

5-1

Chapter 6, 1350 OMS PKT System Log Management

6-1

Chapter 7, 1350 OMS PKT Parameters

7-1

Chapter 8, 1350 OMS PKT Ethernet Multi-Manager Management


Configurations

8-1

Chapter 9, 1350 OMS PKT MIB Realignment and the ISA Board

9-1

Chapter 10, 1350 OMS PKT AlignDBSDHPathID Tool

10-1

...................................................................................................................................................................................................................................
1350 OMS
II-1
8DG42227DAAA 9.6
Issue 3 December 2012

Administration

Overview

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
II-2
8DG42227DAAA 9.6
Issue 3 December 2012

3350 OMS PKT


1
Configuration

Overview
Purpose

This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the configuration of the overall 1350 OMS PKT
application.
Contents
1350 OMS PKT Configuration

3-2

Access the System Configuration Window and Configure 1350 OMS PKT

3-3

Integrate the 1350 OMS PKT with Other NMSs

3-8

Integrate 1350 OMS PKT Client Workstations with the Master Workstation

3-9

...................................................................................................................................................................................................................................
1350 OMS
3-1
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Configuration

1350 OMS PKT Configuration

....................................................................................................................................................................................................................................

1350 OMS PKT Configuration


Administrator log in

The administrator must log into the 1350 OMS PKT configuration from the log in mask
as alcatel.
Important! We strongly recommend that you do not log in as bmml to start the 1350
OMS PKT session. The default administrator log in is alcatel, which is available
since the first customization. If needed, you can create additional administrator log
using SMF.
Any security warnings that appear should be ignored.
Application Configuration through SystemConfig

Open a Unix Terminal window starting from the Unix Server machine to activate the
System Configuration Window:
The System Configuration window is divided into the following two panes:

The Instantiable Subsystems pane is on the left.


This pane contains a list of system processes, which are listed as proxies, that can
have multiple instances.
The administrator can use the arrow to move one or more system processes, which in
this scenario are proxies, from the Instantiable Subsystems list to the Subsystems
List, which moves the particular process or processes over to the static list and adds
an instance number to the process.

The Subsystems List pane is on the right.


This pane contains a static list of processes that cannot have multiple instances. In
addition, this pane can contain one or more system processes from the Instantiable
Subsystems pane on the left. The list of processes in the Subsystems List will be
system instance processes.

System Configuration is used to configure processes in a system instance. The processes


are configured into groups. A group of processes is called entity, which is used to
configure, in a single step, processes that have the same configuration properties. The
group definition is a System (NMS) configuration property. Each NMA has a specific
configuration file that is used to configure its processes; this configuration file contains
specific data and parameters.
Process configuration enables processes to be configured in the following ways:

A static list of processes can be defined that can belong to the System Instance.

A variable list of processes can be defined that can have multiple instances within the
System Instance.

A configuration file can define the ID category of the multiple instances off-line.

....................................................................................................................................................................................................................................
1350 OMS
3-2
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Configuration

Access the System Configuration Window and Configure


1350 OMS PKT

....................................................................................................................................................................................................................................

Access the System Configuration Window and Configure 1350


OMS PKT
When to use

Use this task to access the system configuration window and to configure the 1350 OMS
PKT.
Related information

See the following topic in this document:

Access the System Configuration Window and Configure 1350 OMS PKT (p. 3-3)

Before you begin

You cannot add a proxy to the system configuration while the system is running. When
configuring proxies, the system must be down.
Task

Complete the following steps to configure a 1350 OMS application, such as the 1350
OMS PKT.
...................................................................................................................................................................................................

The system must be brought down.


...................................................................................................................................................................................................

On the CDE front panel, press the terminal icon to start a Unix terminal application.
Result: The terminal window is displayed.
...................................................................................................................................................................................................

Login as root user.


...................................................................................................................................................................................................

Open a telnet session on the server machine.


...................................................................................................................................................................................................

Set the export the of the display:


export DISPLAY=<hostname>:<session number>
...................................................................................................................................................................................................

Insert following command after the prompt :


/alu/Install_Wizard/Install.sh config

and select PKT as the system to configure.

....................................................................................................................................................................................................................................
1350 OMS
3-3
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Configuration

Access the System Configuration Window and Configure


1350 OMS PKT

....................................................................................................................................................................................................................................

Result: The System Configuration window is displayed. The left pane of the window
displays Instantiable Subsystems. The right pane of the window displays a
Subsystems List.
...................................................................................................................................................................................................

To configure the EMLIM_PROXY, do the following:


In the Instantiable Subsystems list, click on EMLIM_PROXY.
If you want to add one EMLIM_PROXY, enter a 1 in the next ID field.
Click the right arrow to move the EMLIM_PROXY from the Instantiable Subsystems list
to the Subsystems List.
Result:

EMLIM_PROXY_1 now appears on the Subsystems List.

In the Subsystem List, click on EMLIM_PROXY_1 to configure it.


Result: The tool displays the Parameters Definition pop-up window.

In the Parameters Definition window, select the following to configure each of the
parameters:
For USE_CDN, select False, which is the default, if the proxy is to be an SNMP-type. If
the proxy is not to be an SNMP-type, select True.
For EML_NAME, enter a name given to the EML proxy. The name can be 1 to 10
characters in length. It cannot contain spaces (blanks). In addition, do not use any
characters that will conflict with the UNIX ps command.
For NM_INSTANCE_NAME_TO_USE, enter the complete EML system instance name. For
example: 1353NM_1-7.4 where the EML is configured. If USE_CDN is true, this value
must be the value of the SDH.
...................................................................................................................................................................................................

To configure the proxy for the NML, do the following:


In the Instantiable Subsystems list, click on NMLIM_PROXY.
If you want to add one NMLIM_PROXY, enter a 1 in the next ID field.
Remember! Only one 1350 OMS PKT can manage one NML proxy.

Click the right arrow to move the NMLIM_PROXY from the Instantiable Subsystems list
to the Subsystems List.
Result:

NMLIM_PROXY_1 now appears on the Subsystems List.

In the Subsystem List, click on NMLIM_PROXY_1 to configure it.


Result: The tool displays the Parameters Definition pop-up window.

In the Parameters Definition window, select the following to configure each of the
parameters:
For NML_NAME, enter a name given to the NML proxy. The name can be 1 to 10
characters in length. It cannot contain spaces (blanks). In addition, do not use any
characters that conflict with the UNIX ps command.
....................................................................................................................................................................................................................................
1350 OMS
3-4
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Configuration

Access the System Configuration Window and Configure


1350 OMS PKT

....................................................................................................................................................................................................................................

For RM_INSTANCE_NAME_TO_USE, enter the complete 1350OMS-RM system instance


name. For example: 1350OMSRM_1-7.4.5.
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

To configure the SNA_EMLIM_PROXY, do the following:


In the Instantiable Subsystems list, click on SNA_EMLIM_PROXY.
The value to enter in the ID field is the ID value assigned to the adapter TL1 configured
on EML application.
Click the right arrow to move the SNA_EMLIM_PROXY from the Instantiable
Subsystems list to the Subsystems List.
Result:

SNA_EMLIM_PROXY_x now appears on the Subsystems List.

In the Subsystem List, click on SNA_EMLIM_PROXY_x to configure it.


Result: The tool displays the Parameters Definition pop-up window.

In the Parameters Definition window, select the following to configure each of the
parameters:
For EML_NAME, enter a name given to the EML proxy. The name can be 1 to 10
characters in length. It cannot contain spaces (blanks). In addition, do not use any
characters that will conflict with the UNIX ps command.
For NM_INSTANCE_NAME_TO_USE, enter the complete EML system instance name. For
example: EML_2-9.1.0 where the adapter TL1 is configured.
...................................................................................................................................................................................................

10

To configure the NMA for the CORE_IM, do the following:


In the Subsystem List, look for and click on <System>_CORE_IM.
Under TMP_REMOTENAMINGFILE in the Actions pane of the Parameters Definition
window, specify the name of the 1350OMS-EML naming file.
Example: /tmp/naming.ref
Under TMP_NE_UNDER_1354RM Management, indicate by specify 1 for yes or 0 for
no if all NEs that are managed by the 1350 OMS PKT are also under 1350 OMS SDH
management.
For migrations, if NEs are already defined in the 1350 OMS PKT database and if these
NEs were under 1350OMS-RM mangement, you cannot specify a 0 for no. If you do, the
1350 OMS SDH cannot be started.
For the remaining fields, select all default values.
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

11

To configure the NMA for the CORE_UM, do the following:

....................................................................................................................................................................................................................................
1350 OMS
3-5
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Configuration

Access the System Configuration Window and Configure


1350 OMS PKT

....................................................................................................................................................................................................................................

In the Subsystem List, look for and click on <System>_CORE_USM.


Under UI_LANGUAGE in the Actions pane of the Parameters Definition window,
specify the user interface language to be English.
Under PRINTER, specify the name of the default system printer even if the system
printer is not yet installed. This field is mandatory..
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

12

To configure NMC system tuning, do the following:


In the Subsystem List, look for and click on System_Tuning.
Result: The Parameters Definition window is displayed.

Leave the default values, which are 100 for SYSTEM_TUNING_VAL and 30 for
SYS_START_WAIT_VAL.
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

13

To configure the NMC Oracle database, do the following:


In the Subsystem List, look for and click on ORACLE-DB.
Result: The Parameters Definition window is displayed.

Under MIB in the Actions pane of the Parameters Definition window, specify NEW to
create a new database.
Under DB_SIZE in the Actions pane of the Parameters Definition window, specify the size
of the new database to be one of the following. (The DB_SIZE is linked to the kind of
instance that you selected at OS_CONF predisposition time.)

small

If you selected IM_Small instance, you must select small as the DB_SIZE.

medium (the default)

If you selected IM_Medium instance, you must select small or medium as the
DB_SIZE.

large

If you selected IM_Large instance, you can select small, medium, or large as the
DB_SIZE.
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

14

To configure NMC TAO_Interface Repository, do the following:


In the Subsystem List, look for and click on TAO_InterfaceRepository.
Result: The Parameters Definition window is displayed.

....................................................................................................................................................................................................................................
1350 OMS
3-6
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Configuration

Access the System Configuration Window and Configure


1350 OMS PKT

....................................................................................................................................................................................................................................

Under IFRREP in the Actions pane of the Parameters Definition window, specify NEW, the
default, to create a new persistent file.
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

15

To execute the configuration, do the following:


In the System Configuration window, follow this path:
Main > UpdateConfig
Result: The Parameters Definition window is displayed. If the parameter New was

selected to create a new database, the database creation takes about 20 minutes. When the
configuration is finished, the System Configuration Log is output. Ignore the warning
messages.
Click the Dismiss button to close the window.
Follow this path to exit from the System Configuration window: Main > Quit.
Result: The system asks you if you really want to quit.

Select Yes to quit.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
3-7
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Configuration

Integrate the 1350 OMS PKT with Other NMSs

....................................................................................................................................................................................................................................

Integrate the 1350 OMS PKT with Other NMSs


When to use

Use this task to integrate an instance of the 1350 OMS PKT with other network
management systems (NMSs), such as the 1350 OMS SONET, 1350 OMS SDH, or 1350
OMS WDM.
Related information

See the following topic in this document:

Access the System Configuration Window and Configure 1350 OMS PKT (p. 3-3)

Before you begin

This task is to be used if an instance (master or client) of the 1350 OMS PKT is
co-located with other NMSs, such as the 1350 OMS SONET, 1350 OMS SDH, or 1350
OMS WDM. This task validates inter-system navigation; that is, navigation from one
NMS to another NMS. It also enables CORBA communication between NMSs.
Task

Complete the following steps to integrate an instance of the 1350 OMS PKT with other
network management systems (NMSs), such as the the 1350 OMS SONET, 1350 OMS
SDH, or 1350 OMS WDM.
...................................................................................................................................................................................................

Log in as root.
...................................................................................................................................................................................................

Enter the following command to start the global integration tool:


...,sys,root # /alcatel/Kernel/script/UpdateNeworkConnection.pl
[Enter]
Result: This tool validates the inter-system navigation and enables CORBA

communications between NMS.


...................................................................................................................................................................................................

Choose yes when integrating PKT with EML/SDH/NPR for both PLT and NAV
integration and yes when integrating eOMS only for PLT part.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
3-8
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Configuration

Integrate 1350 OMS PKT Client Workstations with the Master


Workstation

....................................................................................................................................................................................................................................

Integrate 1350 OMS PKT Client Workstations with the Master


Workstation
When to use

Use this task to integrate each the 1350 OMS PKT client workstation with its 1350 OMS
PKT master workstation.
Related information

See the following topic in this document:

Access the System Configuration Window and Configure 1350 OMS PKT (p. 3-3)

Before you begin

Execute this task for each 1350 OMS PKT client workstation that must be integrated with
its 1350 OMS PKT master workstation.
Task

Complete the following steps to integrate each the 1350 OMS PKT client workstation
with its 1350 OMS PKT master workstation.
...................................................................................................................................................................................................

Log in as root.
...................................................................................................................................................................................................

Enter the following command to start the global integration tool:


...,sys,root # /alcatel/Kernel/script/UpdateNeworkConnection.pl
[Enter]
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
3-9
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Configuration

Integrate 1350 OMS PKT Client Workstations with the Master


Workstation

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
3-10
8DG42227DAAA 9.6
Issue 3 December 2012

4350 OMS PKT Process


1
Monitoring

Overview
Purpose

This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the process monitoring of the overall 1350 OMS PKT
application.
Contents
Process Monitoring Overview

4-2

Run Levels

4-5

...................................................................................................................................................................................................................................
1350 OMS
4-1
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Process Monitoring

Process Monitoring Overview

....................................................................................................................................................................................................................................

Process Monitoring Overview


Groups

Processes are collected in groups, such as the database group, alarms group, or adapters
group.
Figure 4-1 Process Monitoring Window

....................................................................................................................................................................................................................................
1350 OMS
4-2
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Process Monitoring

Process Monitoring Overview

....................................................................................................................................................................................................................................

The follow table lists the groups of the processes.


Process Groups
Group name

Process Name

Function

Database

oracle_monitor_process

Manages the ORACLE processes.

Alarms

AS_Current_IM

Manages the AS current alarms.

AS_Historic_IM

Manages the AS historical alarms.

AlmAdapter

Manages the communication with EML/SDH


for the alarms.

EmlAdapter

Manages the communication with EML


(through Proxy processes).

NmlAdapter

Manages the communication with SDH


(through Proxy processes).

c_FaultManagement

Manages the alarms for the CORE entities.

c_DataManagement

Manages the access to the database for the


CORE entities.

c_TopologyManagement

Manages the topology of the network.

c_EquipmentTopology

Manages the equipment defined in EMLs/IM.

c_AuditAlignRecovery

Manages Audit/Alignment/Recovery utilities

c_Scheduler

Manages scheduled reports generation

m_FaultManagement

Manages the alarms for the MPLS entities.

m_NetworkManagement

Manages the network entities.

m_
TrafficProfileManagement

Manages the traffic profiles.

m_DataManagement

Manages the access to the database for the


MPLS entities.

m_AuditAlignRecovery

Manages Audit/Alignment/Recovery utilities


(MPLS entities)

Adapters

Core

Mpls

....................................................................................................................................................................................................................................
1350 OMS
4-3
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Process Monitoring

Process Monitoring Overview

....................................................................................................................................................................................................................................

Process Groups
Group name
Eot

Process Name

Function

e_DataManagement

Manages the access to the database for the


MPLS entities.

e_FaultManagement

Manages the alarms for the MPLS entities.

e_ProfileManagement

Manages the profiles.

e_ServiceManagement

Manages the services.

e_TrafficManagement

Manages the traffic profiles.

e_AuditAlignRecovery

Manages Audit/Alignment/Recovery utilities


(EOT entities)

e_Facility

Add on for VPWS Ethernet Service Creation.

e_Bridge

Manages the Bridge.

e_PM

Manages Performance Monitoring on Ethernet


services

Session

SessionManagement

Manages the interface of all IM processes of


the 1350 OMS PKT and the GUI(s) or CLI(s).

Nbi

NbiManagement

Manages the Northbound Interface.

EML_Proxies

Proxy_E_EML_NAME

Manages each configured Eml Proxy with


EML_NAME

Proxy_E_SNA_NAME

Manages each configured SNA Eml Proxy


with SNA_EML_NAME

NML_Proxies

Proxy_N_NML_NAME

Manages configured Nml Proxy (one and only


one can be configured) with NML_NAME

E2E

e2e_manager

Manages the e2e Ethernet services

e2e_data

Manages the access to database for e2e entities

e2e_indirect

Manages indirect eOMS services

tmpls_adaconfig

Manages the Adapter configuration

tmpls_dom

Manages the domains

tmpls_inventory

Inventory management

tmpls_lsp

Lsp Management

EthOperatorLog

Managing the log on operator

Tmpls

OperatorLogger

....................................................................................................................................................................................................................................
1350 OMS
4-4
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Process Monitoring

Run Levels

....................................................................................................................................................................................................................................

Run Levels
Run levels 0 through 4

The 1350 OMS PKT has the following run levels:


Run Level

Name

Information

FullFunctionality

Run the entire application.

BackupMode

Subsystem runs to allow a backup job to run without


conflicting problems. Only processes configured for
this run level should be run.

RestoreMode

Subsystem runs to allow a restore job to run without


conflicting problems. Only processes configured for
this run level should be run.

ADAPTERS

Run the ADAPTERS part.

DB_Only

Needed for OS resilience. Run ORACLE Database


processes.

....................................................................................................................................................................................................................................
1350 OMS
4-5
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Process Monitoring

Run Levels

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
4-6
8DG42227DAAA 9.6
Issue 3 December 2012

5350 OMS PKT User


1
Management

Overview
Purpose

This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the user management of the overall 1350 OMS PKT
application.
Contents
User Profiles

5-2

Construction Macro Functions and Default User Profiles

5-3

MPLS Macro Functions and Default User Profiles

5-7

Ethernet Macro Functions and Default User Profiles

5-9

...................................................................................................................................................................................................................................
1350 OMS
5-1
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

User Profiles

....................................................................................................................................................................................................................................

User Profiles
Default operator profiles

The 1350OMS default operator profiles are the following:

An administrator can perform every function on the particular 1350OMS application.

A constructor can manage the topology of the network, which includes subnetworks,
NEs, ENEs, LOS, LOC, and LOM. The constructor can perform every function on
maps and NEs; however, the constructor cannot perform certain administration
functions. For example: a constructor cannot add or remove operators or perform a
backup and restore of the system.
An operator can create local maps, import saved maps, and manage services such as
Ethernet; however, the operator cannot manage NEs (start/stop supervision) or
manage the global inventory. In addition, an operator cannot perform certain
administration functions. For example: an operator cannot add or remove operators or
perform a backup and restore of the system.
A viewer can view lists of data and can view the maps. In general, a viewer can only
look at data; a viewer has limited access and privileges.

When a new operator is created through the Create User function, that operator must be
assigned to one of the default profiles. The default profiles names cannot be changed and
the profiles themselves cannot be reconfigured.

....................................................................................................................................................................................................................................
1350 OMS
5-2
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

Construction Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Construction Macro Functions and Default User Profiles


TMPLS management
TMPLS Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

T-Mpls Domain, Nodes, Sections,


Tunnels, Pseudo Wires list

Services

T-Mpls deletion

T-Mpls modification

T-Mpls properties

Administrator

Constructor

Operator

Viewer

Domain list / search

Domain creation

Domain deletion

Domain modification

Domain properties

Domain inventory

T-Mpls EVC creation

Domain management
Domain Management
is Allowed
Macro Function

Service node management


Service Node Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Service node list / search

Service node properties

Service node inventory

....................................................................................................................................................................................................................................
1350 OMS
5-3
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

Construction Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

NE management
NE Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

NE list / search

NE available list/ search

NE definition

NE deletion

NE modification

NE properties

NE acknowledge

NE configuration

NE assign to domain

NE de-assign from domain

ENE management
ENE Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

ENE list / search

ENE creation

ENE deletion

ENE modification

ENE properties

SDH termination management


SDH Termination Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

SDH termination synchronization

SDH termination audit

SDH termination upload

SDH termination properties

SDH termination list / search

....................................................................................................................................................................................................................................
1350 OMS
5-4
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

Construction Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Ethernet physical port management


Ethernet Physical Port Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Ethernet physical port upload

Ethernet physical port


modification

Ethernet physical port


configuration

Ethernet physical port properties

Ethernet physical port list /


search

Operator

Viewer

External termination management


External Termination Management
is Allowed
Macro Function

Administrator

Constructor

ETP creation

ETP deletion

ETP properties

ETP list/ search

Operator

Viewer

Link over SDH management


Link over SDH Management
is Allowed
Macro Function

Administrator

Constructor

Link over SDH creation

Link over SDH creation (nav on


RM)

Link over SDH deletion

Link over SDH deletion (nav on


RM)

Link over SDH modification

Link over SDH properties

Link over SDH extremities

Link over SDH list / search

....................................................................................................................................................................................................................................
1350 OMS
5-5
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

Construction Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Link over SDH Management


is Allowed
Macro Function

Administrator

Constructor

Operator

Link over SDH configuration

Viewer

Link over MPLS management


Link over MPLS Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Link over MPLS properties

Link over MPLS extremities

Link over MPLS list / search

Operator

Viewer

Link over cable management


Link over Cable Management
is Allowed
Macro Function

Administrator

Constructor

Link over cable creation

Link over cable deletion

Link over cable modification

Link over cable properties

Link over cable extremities

Link over cable list / search

Utilities management
Utilities Management
is Allowed
Utilities Management

Administrator

Start/End Procedure

Audit NE

Display NE Audit

Align NE

Reserve

Constructor

Operator

Viewer

....................................................................................................................................................................................................................................
1350 OMS
5-6
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

MPLS Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

MPLS Macro Functions and Default User Profiles


Transport Link management
Transport Link Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Characteristics definition

Transport Link bandwidth load


indication

Transport Link extremities

Transport Link list / search

Transport link properties

Transport link inventory

Operator

Viewer

Traffic descriptor management


Transport Descriptor Management
is Allowed
Macro Function

Administrator

Constructor

Traffic descriptor creation

Traffic descriptor deletion

Traffic descriptor properties

Traffic descriptor list / search

Traffic descriptor modification

Traffic descriptor inventory

LSP Tunnel management


LSP Tunnel Management
is Allowed
Macro Function

Administrator

Constructor

LSP Tunnel creation

LSP Tunnel deletion

LSP Tunnel allocation

LSP Tunnel de-allocation

LSP Tunnel implementation

LSP Tunnel de-implementation

Operator

Viewer

....................................................................................................................................................................................................................................
1350 OMS
5-7
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

MPLS Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

LSP Tunnel Management


is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

LSP Tunnel constraint adding

LSP Tunnel constraint removing

LSP Tunnel bandwidth load


indication

LSP Tunnel list / search

LSP Tunnel inventory

LSP Tunnel extremities

LSP Tunnel constraint list

LSP tunnel modification

LSP Tunnel route

LSP Tunnel Properties

Clipboard

VC LSP management
VC LSPManagement
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

VC LSP creation

VC LSP deletion

VC LSP implementation

VC LSP de-implementation

VC LSP commission

VC LSP de-commission

VC LSP list /search

VC LSP extremities

VC LSP modification

VC LSP properties

....................................................................................................................................................................................................................................
1350 OMS
5-8
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Ethernet Macro Functions and Default User Profiles


Customer management
Customer Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Customer list / search

Customer create

Customer modify

Customer properties

Customer delete

Inventory of services

Service management
Service Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Service list

Service create

Service modify

Service properties

Service delete

EVC management
EVC Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

EVC list

EVC create

EVC modify

EVC properties

EVC delete

EVC Termination add

EVC Termination delete

....................................................................................................................................................................................................................................
1350 OMS
5-9
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Ethernet Traffic Descriptor management


Ethernet Traffic Descriptor Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Ethernet Traffic Descriptor list

Ethernet Traffic Descriptor


create

Ethernet Traffic Descriptor


modify

Ethernet Traffic Descriptor


properties

Ethernet Traffic Descriptor


delete

Ethernet Traffic Classifier management


Ethernet Traffic Classifier Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Ethernet Traffic Classifier list

Ethernet Traffic Classifier


create

Ethernet Traffic Classifier


modify

Ethernet Traffic Classifier


properties

Ethernet Traffic Classifier


delete

Ethernet Edge Physical Port management


Ethernet Edge Physical Port Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Ethernet Edge Physical Port


properties

Ethernet Edge Physical Port


add to EVC

Ethernet Edge Physical Port


modification VLANs

....................................................................................................................................................................................................................................
1350 OMS
5-10
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Ethernet Edge Physical Port Management


is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Ethernet Edge Physical Ports


list

Ethernet Transport Segment management


Ethernet Transport Segment Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Inventory of Ethernet
Segments

Ethernet Transport segment


bandwidth load

Ethernet Transport Segment


list

Ethernet Transport Segment


properties

Ethernet Segment management


Ethernet Segment Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Ethernet Segment list

Ethernet Segment create

Ethernet Segment modify

Ethernet Segment properties

Ethernet Segment delete

Ethernet Segment configure

Ethernet Constraint add

Ethernet Constraint list

Ethernet Constraint delete

Ethernet VLAN Constraint


add

Ethernet VLAN Constraint


remove

....................................................................................................................................................................................................................................
1350 OMS
5-11
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Ethernet Segment Management


is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Ethernet VLAN Constraint


list

Ethernet Segment allocate

Ethernet Segment de-allocate

Ethernet Segment implement

Ethernet Segment
de-implement

Ethernet Segment show EVC

Ethernet Segment extremities

Ethernet Segment alarm


history

Ethernet Segment failure


localization

Color Profile Management


Color Profile Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Color Profile list

Color Profile create

Color Profile modify

Color Profile properties

Color Profile delete

Transport Link Management


Transport Link Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Transport Link list

Transport Link properties

Transport Link extremities

Transport Link bandwidth


load

....................................................................................................................................................................................................................................
1350 OMS
5-12
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Transport Link Management


is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Transport Link list


supported Ethernet
segments

Transport Link configure

VLAN Type Management


VLAN Type Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

VLAN type list

VLAN type creation

VLAN type deletion

VLAN type modification

VLAN type properties

Provider Network Management


Provider Network Management
is Allowed
Macro Function

Administrator

Constructor

Operator

Viewer

Ethernet Traffic Classifier


list

Ethernet Traffic Classifier


modify

....................................................................................................................................................................................................................................
1350 OMS
5-13
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT User Management

Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
5-14
8DG42227DAAA 9.6
Issue 3 December 2012

6350 OMS PKT System Log


1
Management

Overview
Purpose

This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the system log management of the overall 1350 OMS PKT
application.
Contents
SMF/Commands/Event Log File Overview

6-2

Failure Management Log File Overview

6-5

Trace Management Overview

6-6

...................................................................................................................................................................................................................................
1350 OMS
6-1
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT System Log Management

SMF/Commands/Event Log File Overview

....................................................................................................................................................................................................................................

SMF/Commands/Event Log File Overview


SMF/Commands/Event log file locations

The log files for SMF, commands, and/or events are stored in the following locations:

/usr/Systems/<application>_<instance>/maintenance/log

/usr/Systems/<application>_<instance>/SMF/tools/log/data

/usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/create

/usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/logbook

/usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/bdump

/usr/Systems/<application>_<instance>/ORACLE/databases/network

/usr/Systems/<application>_<instance>/TAO/maintenance/trace

/usr/Systems/<application>_<instance>/databases/dbbmml/data

Log file suffixes

The system log files have the following suffixes:

.log

.data

.dataflow

maintenance/log files

The following table lists all files that are in the


/usr/Systems/<application>_<instance>/maintenance/log directory.
Log files in /usr/Systems/<application>_<instance>/maintenance/log
Filename

Contents

smf.log

Main source of SMF information.

pmc2.log

Main source of PMC information.

JacORB.log

Main source of JABORB information.

PMCStart.log

Information about the startup of the processes


managed in PMC.

1354BM.log

Main information source for all IMs processes of the


1350OMS PKT.

EMLStart.log

Information source for the startup of the EML adapter


and its proxies.

NMLStart.log

Information source for the startup of the NML adapter


and its proxies.

*_dbi.log

Log files for the 1350 OMS PKT for the processes
that used the DBI.

....................................................................................................................................................................................................................................
1350 OMS
6-2
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT System Log Management

SMF/Commands/Event Log File Overview

....................................................................................................................................................................................................................................

Log files in /usr/Systems/<application>_<instance>/maintenance/log


Filename

Contents

*Gui.log

Main information source for all USMs processes of


the 1350 OMS PKT.

ascurusm.log

Information source for the AS USM.

BmAdaptationModifyTrace.log

File logging adaptation information for the dynamic


trace level changing tool.

BmCoreModifyTrace.log

File logging bmcore information for the dynamic


trace level changing tool.

BmMplsModifyTrace.log

File logging mpls information for the dynamic trace


level changing tool.

EotModifyTrace.log

File logging eot information for dynamic trace level


changing tool.

allTracesModify.log

File logging information for the dynamic trace level


changing tool invoked from the Set BM Parameter
GUI.

SMF/tools/log/data file

The /usr/Systems/<application>_<instance>/SMF/tools/log/data directory contains the


traceDebug.log, which is the log file for debugging.
ORACLE/databases/dbnml/admin/create file

The /usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/create
directory contains the crdb_phase<X>.log, which is the log file that is created during the
creation of the database.
ORACLE/databases/dbnml/admin/logbook file

The
/usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/logbook
directory contains the start_db.log and stop_db.log files, which is the log files that log

the start and the stopping of the database.


ORACLE/admin/dbump file

The
/usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/bdump
directory contains the alert_dbbmml1.log file, which is the log file that contains

information on the ORACLE errors.

....................................................................................................................................................................................................................................
1350 OMS
6-3
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT System Log Management

SMF/Commands/Event Log File Overview

....................................................................................................................................................................................................................................

ORACLE/databases/network file

The /usr/Systems/<application>_<instance>/ORACLE/databases/network directory


contains the dbbmml1listener.log file, which is the log file that contains information on
the listener process of ORACLE.
TAO/maintenance/trace file

The /usr/Systems/<application>_<instance>/TAO/maintenance/trace directory


contains the ORBStart.log file, which is the log file that contains information on the ORB
TAP startup.
databases/dbbmml/data

The /usr/Systems/<application>_<instance>/databases/dbbmml/data directory


contains the redo<xx>.log file, which is the log file that contains information on the
ORACLE redo log files.

....................................................................................................................................................................................................................................
1350 OMS
6-4
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT System Log Management

Failure Management Log File Overview

....................................................................................................................................................................................................................................

Failure Management Log File Overview


Failure management log file location

The failure management log files are in the


/usr/Systems/<application>_<instance>/maintenance/trace directory.
Failure management log file suffixes

The failure management log files have the following suffixes:

.err

.outerr

....................................................................................................................................................................................................................................
1350 OMS
6-5
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT System Log Management

Trace Management Overview

....................................................................................................................................................................................................................................

Trace Management Overview


Trace management log file location

The failure management log files are in the following directories:

/usr/Systems/<application>_<instance>/maintenance/trace

/usr/Systems/<application>_<instance>/PMC2/trace

Trace management log file suffixes

The failure management log files have the following suffixes:

.data

.data.lck

.dataflow

.dataflow.lck

.trc

trc.old

.trace

.out

....................................................................................................................................................................................................................................
1350 OMS
6-6
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters


7

Overview
Purpose

This chapter provides the administrator with the conceptual information that pertains to
the parameters for the 1350 OMS PKT application.
Contents
Parameter Overview

7-2

1350 OMS PKT Parameters for Core NMA

7-3

1350 OMS PKT Parameters for GUI NMA

7-4

1350 OMS PKT Parameters for MW-INT

7-5

1350 OMS PKT Parameters for Oracle Management

7-6

Set PKT Parameters

7-7

1350 OMS PKT Parameter List

7-9

...................................................................................................................................................................................................................................
1350 OMS
7-1
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

Parameter Overview

....................................................................................................................................................................................................................................

Parameter Overview
Parameter functional definition

The parameters can be defined for the 1350 OMS PKT application during the initial
installation of the application or after the installation of the application through the SMF
interface.

....................................................................................................................................................................................................................................
1350 OMS
7-2
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

1350 OMS PKT Parameters for Core NMA

....................................................................................................................................................................................................................................

1350 OMS PKT Parameters for Core NMA


TMP_NE_UNDER_<application_MANAGEMENT

The TMP_NE_UNDER_<application>_ MANAGEMENT parameter specifies whether


all of the NEs that are managed by the 1350 OMS PKT application are also managed by
the 1350 OMS SDH application.
The allowed values are 0 and 1. A value of 0 specifies that the NE is not managed by the
1350 OMS SDH . A value of 1 specifies that the NE is managed by the 1350 OMS SDH.
The default is 1.
This parameter is a Core NMA parameter. This parameter must be defined during
instantiation.

....................................................................................................................................................................................................................................
1350 OMS
7-3
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

1350 OMS PKT Parameters for GUI NMA

....................................................................................................................................................................................................................................

1350 OMS PKT Parameters for GUI NMA


PRINTER

The PRINTER parameter specifies the default system printer.


This parameter is a mandatory GUI NMA parameter. This parameter must be defined
during instantiation.
UI_LANGUAGE

The UI_LANGUAGE parameter specifies the language to be used by the User Service
Manager (USM).
The allowed value is English. The default is English.
This parameter is a GUI NMA parameter. This parameter must be defined during
instantiation.

....................................................................................................................................................................................................................................
1350 OMS
7-4
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

1350 OMS PKT Parameters for MW-INT

....................................................................................................................................................................................................................................

1350 OMS PKT Parameters for MW-INT


SYS_START_WAIT_VAL

The SYS_START_WAIT_VAL parameter specifies the value, that is expressed in the


number of seconds, for the additional system start up wait time to ensure that the system
is stable.
The default is 30 seconds.
This parameter is an OSK parameter. This parameter must be defined during instantiation.
SYSTEM_TUNING_VAL

The SYSTEM_TUNING_VAL parameter specifies the value, that is expressed as a


percentage, of the agents start up waiting time.
The default is 100%, which is what this parameter must be specified as.
This parameter is an OSK parameter. This parameter must be defined during instantiation.

....................................................................................................................................................................................................................................
1350 OMS
7-5
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

1350 OMS PKT Parameters for Oracle Management

....................................................................................................................................................................................................................................

1350 OMS PKT Parameters for Oracle Management


DB_SIZE

The DB_SIZE parameter specifies size of the Oracle database for the application.
The allowed values are the following:

small is specified to create a database that is 0.5 Gb, which is the default size.
medium is specified to create a database that is 2.0 Gb.
large is specified to create a database that is 4.0 Gb.

This parameter is an Oracle parameter. This parameter must be defined during


instantiation. This parameter is only applicable for Information Manager (IM)
configurations.
MIB

The MIB parameter specifies whether the old application database should be saved.
The allowed values are the following:

NEW is specified so the customization process creates a new, empty database. This
value must be specified during the first installation of the application.
OLD is specified to save the current database or to recover the old database from an
old installation directory.
REC is specified to recover the database from a backup. This value should be
specified after a disk failure causes the reinstallation of the application. The
customization process does not create a new database to save the mirrored database
information so a database recovery from an incremental backup can be performed.

This parameter is an Oracle parameter. This parameter must be defined during


instantiation. This parameter is only applicable for Information Manager (IM)
configurations.
NEW

This value have to be used during the first installation of 1350 OMS PKT application.
Using this value the customize procedure will create a new empty DB.
REC

This value should be used after a disk failure that causes the re-installation of 1350 OMS
PKT application. The customize procedure will not create a new DB in order to save the
mirrored DB information to permit the recover of DB from an incremental backup.

....................................................................................................................................................................................................................................
1350 OMS
7-6
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

Set PKT Parameters

....................................................................................................................................................................................................................................

Set PKT Parameters


When to use

This task is used to modify PKT configuration parameters.


Related Information

Information related to this topic

Chapter 7, 1350 OMS PKT Parameters

Before you begin

Make a check for the consistency of the parameter you will set.
How to set the parameters
...................................................................................................................................................................................................

Login as user on a server station and activate a terminal session.


...................................................................................................................................................................................................

Export the DISPLAY


export DISPLAY=<hostname>:<session number>
...................................................................................................................................................................................................

Execute as NMS user the following command:


/usr/Systems/PKT_<ID>-9.1.0/BM_ETH_CORE_UI/script/emlmngt_gui/
RmtConfUpdate.sh

....................................................................................................................................................................................................................................
1350 OMS
7-7
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

Set PKT Parameters

....................................................................................................................................................................................................................................

Result: The Set Parameter window is displayed.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
7-8
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

1350 OMS PKT Parameter List

....................................................................................................................................................................................................................................

1350 OMS PKT Parameter List


TMP_ALM_BUFFERSIZE

The TMP_ALM_BUFFERSIZE parameter specifies the size of the alarm buffer that the
ALM adapter uses.
The allowed values are 50 to 1000. The default is 250.
This parameter can be modified by SMF.
TMP_ALM_PADDINGRATE

The TMP_ALM_PADDINGRATE parameter specifies the padding rate of the alarm


buffer that the ALM adapter uses.
The allowed values are 50 to 100. The default is 70.
This parameter can be modified by SMF.
TMP_ALM_TEMPOASYNC

The TMP_ALM_TEMPOASYNC parameter specifies the time-out, in seconds, before


the exit for alarm requests.
The allowed values are 10 to 120 seconds. The default is 120 seconds.
This parameter can be modified by SMF.
TMP_ALM_TEMPOPOLLING

The TMP_ALM_TEMPOPOLLING parameter specifies the time, in seconds, between


two pollings of the ALM adapter.
The allowed values are 10 to 300 seconds. The default is 300 seconds.
This parameter can be modified by SMF.
TMP_ALM_TEMPOTIMER

The TMP_ALM_TEMPOTIMER parameter specifies the time-out, in seconds, that is to


be used for sending alarms from the buffer.
The allowed values are 1 to 10 seconds. The default is 2 seconds.
This parameter can be modified by SMF.
TMP_CDNDATABLOCKSIZE

The TMP_CDNDATABLOCKSIZE parameter specifies the number of data blocks


received from CDN.
The allowed values are 10 to 100. The default is 100.
This parameter can be modified by SMF.

....................................................................................................................................................................................................................................
1350 OMS
7-9
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

1350 OMS PKT Parameter List

....................................................................................................................................................................................................................................

TMP_EML_TEMPOPOLLING

The TMP_EML_TEMPOPOLLING parameter specifies the time, in seconds, between


two pollings of the 1350OMS-EML adapter.
The allowed values are 10 to 300 seconds. The default is 300 seconds.
This parameter can be modified by SMF.
TMP_FORBIDDEN_COMMENT_CHAR

The TMP_FORBIDDEN_COMMENT_CHAR parameter specifies the characters that are


forbidden to be used within a comment.
The default forbidden characters are the following:
* % ' { } / / [ ] | = and a blank space

This parameter can be modified by SMF.


TMP_FORBIDDEN_LABEL_CHAR

The TMP_FORBIDDEN_LABEL_CHAR parameter specifies the characters that are


forbidden to be used in the user label.
The default forbidden characters are the following:
* % ' { } / / [ ] | = and a blank space

This parameter can be modified by SMF.


TMP_LINK_OVER_SDH_SYNCHRONIZATION_AT_STARTUP

The TMP_LINK_OVER_SDH_SYNCHRONIZATION_AT_STARTUP parameter


specifies whether synchronization with the 1350 OMS PKT for links over SDH should be
activated.
The allowed values are 0 and 1. A value of 0 is no, which does not activate
synchronization with the 1350 OMS PKT for links over SDH. A value of 1 is yes, which
activates synchronization with the 1350 OMS PKT for links over SDH. The default is 0.
This parameter can be modified by SMF.
TMP_LOG_BASED_SYNCHRONIZATION_AT_STARTUP

The TMP_LOG_BASED_SYNCHRONIZATION_AT_STARTUP parameter specifies


whether synchronization with the 1350 OMS PKT log for links over SDH and SDH
terminations should be activated.
The allowed values are 0 and 1. A value of 0 is no, which does not activate
synchronization with the 1350 OMS PKT log for links over SDH and SDH terminations.
A value of 1 is yes, which activates synchronization with the 1350 OMS PKT log for
links over SDH and SDH terminations. The default is 0.
This parameter can be modified by SMF.
....................................................................................................................................................................................................................................
1350 OMS
7-10
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

1350 OMS PKT Parameter List

....................................................................................................................................................................................................................................

TMP_NE_UNDER_<application>_MANAGEMENT

The TMP_NE_UNDER_<application>_ MANAGEMENT parameter specifies whether


all of the NEs that are managed by the 1350 OMS PKT application are also managed by
the 1350 OMS SDH application.
The allowed values are 0 and 1. A value of 0 specifies that the NE is not managed by the
1350 OMS SDH . A value of 1 specifies that the NE is managed by the 1350 OMS SDH.
The default is 1.
This parameter is a Core NMA parameter. This parameter must be defined during
instantiation.
TMP_NML_TEMPOPOLLING

The TMP_NML_TEMPOPOLLING parameter specifies the time, in seconds, between


two pollings of the NML adapter.
The allowed values are 10 to 300 seconds. The default is 300 seconds.
This parameter can be modified by SMF.
TMP_REMOTENAMINGEMLFILE

The TMP_REMOTENAMINGEMLFILE parameter specifies the name of the file that


contains the IOR of the 1350OMS-EML IM naming service. This file is retrieved from
the 1350OMS-EML IM machine using ftp.
The default is /tmp/naming.ref
This parameter can be modified by SMF.
TMP_SDH_TERM_SYNCHRONIZATION_AT_STARTUP

The TMP_SDH_TERM_SYNCHRONIZATION_AT_STARTUP parameter specifies


whether synchronization with the 1350 OMS PKT for SDH termination should be
activated.
The allowed values are 0 and 1. A value of 0 is no, which does not activate
synchronization with the 1350 OMS PKT for SDH termination. A value of 1 is yes, which
activates synchronization with the 1350 OMS PKT for SDH termination. The default is 0.
This parameter can be modified by SMF.
TMP_SE_ACCESSCT

The TMP_SE_ACCESSCT parameter specifies whether the session access control should
be activated.
The allowed values are 0 and 1. A value of 0 is false, which does not activate the session
access control. A value of 1 is true, which activates session access control. The default is
1.
This parameter can be modified by SMF.
....................................................................................................................................................................................................................................
1350 OMS
7-11
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Parameters

1350 OMS PKT Parameter List

....................................................................................................................................................................................................................................

TMP_TRACELEVEL

The TMP_TRACELEVEL parameter specifies the trace level for the 1350 OMS PKT
trace.
The allowed values are 1 to 8. The default is 1.
This parameter can be modified by SMF.
TMP_TRACEMAXLINECOUNT

The TMP_TRACEMAXLINECOUNT parameter specifies the line number for the 1350
OMS PKT trace file.
The allowed values are 1000 to 10000. The default is 10000.
This parameter can be modified by SMF.
TMP_WAIT_EOT_SYNCHRO_STARTUP

The TMP_WAIT_EOT_SYNCHRO_STARTUP parameter specifies whether core


technology should wait for the EOT manager prior to synchronizing NAPS and links.
The allowed values are 0 and 1. A value of 0 is no, which does not allow core technology
to wait for the EOT manager prior to synchronizing NAPS and links. A value of 1 is yes,
which does allow core technology to wait for the EOT manager prior to synchronizing
NAPS and links. The default is 0.
This parameter can be modified by SMF.
TMP_WAIT_MPLS_SYNCHRO_STARTUP

The TMP_WAIT_MPLS_SYNCHRO_STARTUP parameter specifies whether core


technology should wait for the MPLS manager prior to synchronizing at start up.
The allowed values are 0 and 1. A value of 0 is no, which does not allow core technology
to wait for the MPLS manager prior to synchronizing at start up. A value of 1 is yes,
which does allow core technology to wait for the MPLS manager prior to synchronizing
at start up. The default is 0.
This parameter can be modified by SMF.
TMP_OPERATOR_LOGGER_ENABLED

The TMP_OPERATOR_LOGGER_ENABLED parameter allows to manage the Operator


Logger application in 1350 OMS PKT.
It can assume two values :

0 : disabled
1 : enabled

The default value at installation time is disabled.

....................................................................................................................................................................................................................................
1350 OMS
7-12
8DG42227DAAA 9.6
Issue 3 December 2012

8350 OMS PKT Ethernet


1
Multi-Manager
Management
Configurations

Overview
Purpose

This chapter provides the administrator with the conceptual information for
Multi-Manager configurations for the 1350 OMS PKT application.
Contents
Multi-Manager Management Overview

8-2

Operational Guidelines

8-3

...................................................................................................................................................................................................................................
1350 OMS
8-1
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Ethernet Multi-Manager Management


Configurations

Multi-Manager Management Overview

....................................................................................................................................................................................................................................

Multi-Manager Management Overview


Multi-Manager Management definition

Multi-Manager Management is a state of network management in which an application,


such as the 1350 OMS PKT, manages part of the overall network (features, services) and
using another application, operating at EML layer, the user manages another part of the
overall network (features, services).
Mulit-Manager Management scenarios

The following Multi-Manager Management scenarios explain the most general operation
scenarios. These scenarios depict a Mutli-Manager environment in which operations
occur over the same Ethernet link, over Alcatel-Lucent Ethernet enabled NEs, and/or
along with the entities of Alcatel-Lucent NEs:

In the first scenario, the management of services is performed through the 1350 OMS
PKT application. The management of some specific tuning operation is performed
through the EML/CT GUI.
In the second scenario, the management of some features, such as the ETS
Transparent technology management, is performed through the 1350 OMS PKT
application. The management of other features, such as the ETB Bridging technology
management, is performed through the EML/CT GUI.
In the third scenario, the management is performed through the 1350 OMS PKT
application; however, the completion and/or recovery of some actions is performed
through the EML/CT GUI in an emergency situation.
Note: When resource isolation occurs, the 1350 OMS PKT deduces that either the NE
or the network manager is unreachable. The 1350 OMS PKT application might not be
able to complete any future user request; therefore, the application informs the user
that the action is partially completed with a message such as the following:
Partially Implemented Service Creation.

....................................................................................................................................................................................................................................
1350 OMS
8-2
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Ethernet Multi-Manager Management


Configurations

Operational Guidelines

....................................................................................................................................................................................................................................

Operational Guidelines
Operational guidelines

The administrator must adhere to the following operational guidelines when working in
an Multi-Manager Management configuration:

Any other operations that are performed through the EML/CT must be the customer's
responsibility and they must be agreed to by the Alcatel-Lucent local customer service
support team.
The administrator must be aware of and manage the existing Ethernet traffic, the
Ethernet-enabled NEs, and the managed NE entities on the 1350 OMS PKT
application.
The administrator must never change, and/or configure, and/or delete any entities that
are managed from the 1350 OMS PKT application by using the EML/CT. These
entities can be easily recognized. See Identifying Ethernet-defined entities
(p. 8-3) for details.
If 1350 OMS PKT application could not complete any administrator request (for
example, it is in Partially Implemented/Deimplemented state), the administrator must
retry the request or return to the previous state (for example: go from Partially
Deimplemented to Defined state).
If all of the operational rules have been followed and the administrator still does not
succeed with the request, the administrator must notify and work with the
Alcatel-Lucent local customer service support team.

In Multi-Manager Management environment, refer to the 1350 OMS PKT Guide for a
detailed explanation of the allowed and recommended operations for the 1350 OMS PKT
application and the EML/CT to ensure the proper operation of the Alcatel-Lucent
Ethernet-enabled NEs.
Identifying Ethernet-defined entities

Administrators who work on the EML/CT can recognize the Ethernet entities that the
1350 OMS PKT application defines and manages:

Traffic Descriptor (ETS)


The names of the traffic descriptors that begin with 1350 OMS PKT or another
identifier that readily advertises that it is the 1350 OMS PKT application, such as
PKT, are those entities that the 1350 OMS PKT application creates.
For example: 1350OMSPKT #<number>
Where: 1350OMSPKT is the application and #<number> is the instance number of
the application that the NE defines.
The names of the Traffic Descriptors that do not resemble 1350 OMS PKT, such as
2xVC3 are those traffic descriptors that are created by the NM/CT.

....................................................................................................................................................................................................................................
1350 OMS
8-3
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT Ethernet Multi-Manager Management


Configurations

Operational Guidelines

....................................................................................................................................................................................................................................

Important! The administrator must never change, and/or configure, and/or delete

any readily identifiable 1350 OMS PKT created entities because the 1350 OMS PKT
application will not be aligned to the NE.

Color Profiles

InFlows
When the user labels and traffic descriptors for the ETS InFlows begin with
1350OMSPKT #<number> or another identifier that readily identifies that it is the
1350 OMS PKT application, such as PKT, and the ETSinflow is of the format
ETSInFlow#<number>, the Inflow is created by the 1350 OMS PKT application.
Where: 1350OMSPKT is the application and #<number> is the instance number of
the application that the NE defines.
When the user labels or traffic descriptors for the ETS InFlows are blank or do not
resemble 1350 OMS PKT and the ETSinflow is of the format ETSInFlow#<number>,
the Inflow is created by the EML/CT.
Important! The administrator must not delete or modify through the EML/CT any

cross-connection entities that are associated to inflows and/or outflows that are
labeled 1350OMS-PKT #<instance number>.

OutFlows
When the user labels and traffic descriptors for the ETS OutFlows begin with 1350
OMS PKT #<number> or another identifier that readily advertises that it is the 1350
OMS PKT application, such as PKT, and the ETSOutFlow is of the format
ETSOutFlow#<number>, the OutFlow is created by the 1350 OMS PKT application.
Where: 1350OMSPKT is the application and # is the instance number of the
application that the NE defines.
When the user labels or traffic descriptors for the ETS OutFlows are blank or do not
resemble 1350 OMS PKT and the OutFlow is of the format ETSOutFlow#<number>,
the OutFlow is created by the NM/CT.
Important! The administrator must not delete or modify through the EML/CT any

cross-connection entities that are associated to inflows and/or outflows that are
labeled 1350OMS-PKT #<instance number>.

VlanTypeTable
Traffic Descriptor (MPLS)

TunnelName
The VC-LST and LSP_Tunnel are named something similar to the following:
135OMSPKT Tunnel #<number of TunneIIndex>

....................................................................................................................................................................................................................................
1350 OMS
8-4
8DG42227DAAA 9.6
Issue 3 December 2012

9350 OMS PKT MIB


1
Realignment and the ISA
Board

Overview
Purpose

This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the ISA Board for the 1350 OMS PKT application.
Contents
MIB Alignment and ISA Board Overview

9-2

Realign an ISA Board MIB

9-4

...................................................................................................................................................................................................................................
1350 OMS
9-1
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT MIB Realignment and the ISA Board

MIB Alignment and ISA Board Overview

....................................................................................................................................................................................................................................

MIB Alignment and ISA Board Overview


MIB definition

A MIB is a Management Information Base, which is type of database that is used to


manage the devices in a communications network. It comprises a collection of objects in
a (virtual) database used to manage entities (such as routers and switches) in a network.
MIB realignment for a new ISA board

MIB realignment for a new ISA board that is under the management of the 1350 OMS
EML and the 1350 OMS PKT applications follows the same principals and procedures
that apply to any SNMP NE that is under 1350OMS-EML and 1350 OMS PKT control.
In addition, the same principals and procedures apply to any SNMP NE that the 1350
OMS EML and the 1350 OMS PKT applications control and to all instances when the
MIB of an SNMP NE under 1350 OMS EML and the 1350 OMS PKT application control
needs a full realignment after a MIB re-initialization.
The presence or the lack of the 1350 OMS PKT application is not relevant.
Operating principals

In general, several layers of management systems manage a network, the protection


mechanisms of the network reflect the same layering.
When a network is managed by the 1350 OMS EML for the element management layer
and by the 1350 OMS PKT for the Ethernet data networking management layer, both
layers supply the network protection mechanism:

The first and main level of network protection, that is of the ISA boards, is through
the 1350 OMS EML.
The automatic and periodical MIB backup procedures of the 1350 OMS EML that are
available for both Q3 and SNMP NEs enables a periodic MIB backup. It also enables
the backup to be split into different sessions that are activated sequentially and to
define, for each session, the list of NEs whose MIBs are to be uploaded (backup)
periodically into the 1350 OMS EML MIB repository.
Splitting into different sessions can be used to organize the protection of the network
in different partitions and to perform the upload of the MIBs sequentially
partition-by-partition, to avoid a concentrated overload of the systems and of the
DCN. At any scheduled time, the MIB of all the SNMP NEs defined in the job are
always uploaded to the 1350 OMS EML, whether they are misaligned.

The second level of network protection is through the 1350 OMS PKT application
and its Audit/Alignment/Reserve (AAR) feature.
Since the 1350OMS-EML MIB backup periodic procedure cannot protect the last
modifications in the MIB that were applied after the last periodic MIB backup, the
1350 OMS PKT application provides a way to audit the NE MIBs against their
internal database representations and to realign the detected differences.

....................................................................................................................................................................................................................................
1350 OMS
9-2
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT MIB Realignment and the ISA Board

MIB Alignment and ISA Board Overview

....................................................................................................................................................................................................................................

It further protects the NEs that are under its control, but only for misalignments due to
1350 OMS PKT operations. Important! Other than through the 1350 OMS PKT
application, no means exists to protect the last modifications that were applied after
the last MIB backup that occurred in the NE.
Categories of misalignment

The NE MIB audit for the 1350 OMS PKT application can detect the following categories
of misalignments:

The D+ misalignment occurs when a resource exists in the 1350 OMS PKT database,
but not in the NE MIB. This misalignment typically occurs when the 1350 OMS PKT
has implemented some Ethernet service after the MIB backup and the MIB file is
restored in the NE or whenever services or generic resources are manually removed
by the 1350OMS-EML or the CT without involving the 1350 OMS PKT.
The 1350 OMS PKT application can realign a D + misalignment can be realigned by
activating a simple Align down procedure.

The D- misalignment occurs when a resource exists in the NE MIB but not in the
1350 OMS PKT database. This misalignment typically occurs when the 1350 OMS
PKT application has de-implemented some Ethernet service after the MIB backup and
the MIB file is restored in the NE or whenever services or generic resources are
created in the NE MIB by 1350OMS-EML or CT without involving the 1350 OMS
PKT.
The 1350 OMS PKT can reserve these resources in its internal database to avoid using
them for to implement its services.

The D misalignment occurs hen a resource exists in both the NE MIB and in the 1350
OMS PKT database, but it differs. This misalignment typically occurs whenever
services or generic resources are modified in the NE MIB by the 1350OMS-EML or
the CT without involving the 1350 OMS PKT.
The realignments for a D misalignment are best done from the same system that
originated the misalignment, which is the 1350OMS-EML or the CT.

....................................................................................................................................................................................................................................
1350 OMS
9-3
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT MIB Realignment and the ISA Board

Realign an ISA Board MIB

....................................................................................................................................................................................................................................

Realign an ISA Board MIB


When to use

Use this task to realign an ISA board MIB that is under the control of the 1350OMS-EML
and 1350 OMS PKT applications.
Related information

See the following topic in this document:

MIB Alignment and ISA Board Overview (p. 9-2)

For details about how to operate the AAR capabilities in the 1350 OMS PKT, as well as
activate a periodic MIB backup and MIB restore in the 1350 OMS EML, refer to the 1350
OMS EML Guide and 1350 OMS PKT Guide.
Before you begin

This task assumes the following in regard to the initial state of the ISA board and the
MIB:

The ISA board has already been replaced or its MIB has already been reinitialized.
A periodic MIB backup of the ISA board has been activated in the 1350 OMS EML
and the relevant MIB file is stored in the 1350 OMS EML MIB repository.

Task

Complete the following steps to realign the ISA board MIB:


...................................................................................................................................................................................................

From the 1350 OMS EML application and the relevant NE EMLUSM, launch the NE MIB
Restore.
...................................................................................................................................................................................................

From the 1350 OMS PKT application, perform an Audit of the relevant ISA NE.
Result: If the Audit does not detect any differences, this task is completed.

If the Audit does detect differences, go to Step 3.


...................................................................................................................................................................................................

For each D- misalignment that the Audit detects, do one of the following:
1. Reserve the resource from the 1350 OMS PKT application.
2. Remove the resource from the NE MIB by using the 1350 OMS EML application and
the relevant NE EMLUSM.

....................................................................................................................................................................................................................................
1350 OMS
9-4
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT MIB Realignment and the ISA Board

Realign an ISA Board MIB

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

For each D misalignment that the Audit detects, use the 11350 OMS EML application and
the relevant NE EMLUSM to do one of the following:
1. Realign the difference to the 1350 OMS PKT.
2. Remove the difference from the NE MIB. (The D misalignment is changed into a D+
misalignment.)
...................................................................................................................................................................................................

For the whole set of D+ misalignments that the Audit detects, perform an Align down
procedure.
...................................................................................................................................................................................................

Perform a final audit for a further alignment check.


If differences are not noted, this task is completed.
If any difference (D+ misalignments or D- misalignment) is found again, repeat Step 3 to
Step 6 until a full alignment occurs.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
9-5
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT MIB Realignment and the ISA Board

Realign an ISA Board MIB

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
9-6
8DG42227DAAA 9.6
Issue 3 December 2012

10

10 OMS PKT
1350
AlignDBSDHPathID Tool

Overview
Purpose

This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the AlignDBSDHPathID tool for the 1350 OMS PKT
application.
Contents
AlignDBSDHPathID Overview

10-2

Run AlignDBSDHPathID Tool

10-3

...................................................................................................................................................................................................................................
1350 OMS
10-1
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT AlignDBSDHPathID Tool

AlignDBSDHPathID Overview

....................................................................................................................................................................................................................................

AlignDBSDHPathID Overview
AlignDBSDHPathID tool definition

The AlignDBSDHPathID tool is a shell script that the administrator can use to align the
1350 OMS PKT application database to the 1350 OMS SDH database.
AlignDBSDHPathID tool operating principals

The AlignDBSDHPathID tool is run off line.


The AlignDBSDHPathID can be run following conditions occur:

An SDH Path that is under 1350 OMS PKT control (and known as Link Over SDH)
has been deleted and re-created from the 1350 OMS SDH.
The SDH path that is deleted and has been recreated from 1350 OMS SDH must have
the same characteristics.
Example: the SDH path must have the same User Label, the same end points, the
same rate.

The Link Over SDH in the 1350 OMS PKT is visible to both the Core USM and to
the Eot USM.
The Link Over SDH in the Core USM is marked as not Consistent.

AlignDBSDHPathID tool location and execution

The AlignDBSDHPathID resides in the following directory:


/usr/Systems/<NMS_INSTANCE>/script/common

The tool is executed by way of the following command line:


./AlignDBSDHPathId.sh <SDH Path User Label> <New SDH Path Id>
<New SDH Path FDN>

....................................................................................................................................................................................................................................
1350 OMS
10-2
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT AlignDBSDHPathID Tool

Run AlignDBSDHPathID Tool

....................................................................................................................................................................................................................................

Run AlignDBSDHPathID Tool


When to use

Use this task to align the 1350 OMS PKT application database to the 1350 OMS SDH
database..
Related information

See the following topic in this document:

AlignDBSDHPathID Overview (p. 10-2)

Before you begin

This task assumes the following in regard to the initial state of the ISA board and the
MIB:

The ISA board has already been replaced or its MIB has already been reinitialized.
A periodic MIB backup of the ISA board has been activated in the 1350 OMS EML
and the relevant MIB file is stored in the 1350 OMS EML MIB repository.

Task

Complete the following steps to align the 1350 OMS PKT application database to the
1350 OMS SDH database.
...................................................................................................................................................................................................

Verify that an SDH path has been deleted from the 1350 OMS SDH.
...................................................................................................................................................................................................

Verify that the corresponding Link Over SDH does not disappear from the 1350 OMS
PKT and that it becomes notConsistent.
...................................................................................................................................................................................................

Create a new SDH path in the 1350 OMS SDH that has exactly the same characteristics
as the SDH path that was previously deleted.
Note: The SDH Path creation can be performed when 1350 OMS PKT application is up
or down. In either case, the 1350 OMS PKT application is not aware of the newly
recreated path.
...................................................................................................................................................................................................

Retrieve from the 1350 OMS SDH the SDHPathUserLabel, theSDHPathId, and the
SDHPathFDN.
To retrieve the SDH Path User Label on the 1350 OMS SDH, select the created path and
select the SHOW/SET ATTRIBUTES window. Select the Specific panel. The User Label at
the end of the list is the value to insert as the parameter when running the script.

....................................................................................................................................................................................................................................
1350 OMS
10-3
8DG42227DAAA 9.6
Issue 3 December 2012

1350 OMS PKT AlignDBSDHPathID Tool

Run AlignDBSDHPathID Tool

....................................................................................................................................................................................................................................

To retrieve the SDH Path ID on the 1350 OMS SDH, select the created path and select the
SHOW/SET ATTRIBUTES window. Select the Miscellaneous panel. The Path ID at the end
of the list is the value to insert as the parameter when running the script.
To retrieve the SDH Path FDN on the 1350 OMS SDH, select the created path and select
the View* *Report* *full on selected* window. The Path FDN is the value to insert
as the parameter when running the script.
...................................................................................................................................................................................................

Put the 1350 OMS PKT application in DB_ONLY mode


Start the Process Monitoring Control application.
Follow this path:
Action Set Run Level <application_instance> 4 DB-Only

Confirm the selection on the message box.


...................................................................................................................................................................................................

Enter the following command lines to change directories and execute the tool:
cd /usr/Systems/<NMS_INSTANCE>/script/common
./AlignDBSDHPathId.sh <SDH Path User Label> <New SDH Path Id>
<New SDH Path FDN>
...................................................................................................................................................................................................

Restart the 1350 OMS PKT application


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
10-4
8DG42227DAAA 9.6
Issue 3 December 2012

Part III: Basic Functions

Overview
Purpose

This document part provides a detailed description about the basic functions of the 1350
OMS PKT application.
Contents
Chapter 11, Generalities

11-1

Chapter 12, Managing your Network

12-1

Chapter 13, Network Organization Management

13-1

Chapter 14, Transport Link Management

14-1

Chapter 15, MPLS Provisioning Management

15-1

Chapter 16, T-MPLS Provisioning Management

16-1

Chapter 17, EVC over T-MPLS

17-1

Chapter 18, End to End Ethernet Provisioning Management

18-1

Chapter 19, Bridge Network Management

19-1

Chapter 20, Provider Backbone Bridge Network Management

20-1

Chapter 21, Broadcast TV Service Management

21-1

Chapter 22, Network Supervision

22-1

Chapter 23, Network Utilities

23-1

Chapter 24, Operation, Administration, and Maintenance (OAM) Management

24-1

Chapter 25, Circuit Emulation Service Management

25-1

...................................................................................................................................................................................................................................
1350 OMS
III-1
8DG42227DAAA 9.6
Issue 3 December 2012

Basic Functions

Overview

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
III-2
8DG42227DAAA 9.6
Issue 3 December 2012

11

Generalities
11

Overview
Purpose

This chapter gives general information about 1350 OMS PKT application.
This chapter presents the application product, provides basic concepts, and introduces the
functional domain.
Contents
About 1350 OMS PKT application

11-3

Main features

11-3

Management Layers

11-5

Main concepts

11-6

Network architecture overview

11-7

Ethernet Services Attributes

11-12

Classification of Ethernet Services

11-15

Definition of Ethernet Services by MEF

11-27

Network Topology Description

11-30

How to access the application

11-38

Web access

11-38

The graphical interface (MS-GUI)

11-39

Confirm the action

11-40

The application interfaces

11-42

Software interfaces

11-42

Multi-Manager environment

11-44

Functional Domain

11-45

Overview about functional domains

11-45

Network Topology Construction

11-47

...................................................................................................................................................................................................................................
1350 OMS
11-1
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities

Overview

....................................................................................................................................................................................................................................

Traffic Management

11-53

MPLS Management

11-65

Maintenance Management

11-69

User Profile Management

11-71

....................................................................................................................................................................................................................................
1350 OMS
11-2
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Main features

....................................................................................................................................................................................................................................

About 1350 OMS PKT application


Main features
General information

This chapter gives general information about the 1350 OMS PKT.
1350 OMS PKT application is a Network Management system belonging to
Alcatel-Lucent 1350 OMS product family.
1350 OMS PKT software is optionally installed as an add-on to the 1350 OMS overall
product.
Main network operations

1350 OMS PKT manages Ethernet Networks in a metro area network (MAN)
environment.
1350 OMS PKT is designed to establish Ethernet end-to-end connections based on
Connection Oriented and Connection Less technologies.).
1350 OMS PKT manages Ethernet Networks functionalities in term of service
provisioning, maintenance, and performance monitoring:

Network discovery and synchronization.


Connectivity routing and provisioning.
Fault management and performance monitoring.

Network audit, alignment, and recovery.

Supported technologies

Connections can be carried over different transport technologies:

SDH.
SONET.

Ethernet Cables.
WDM.
MPLS.
T-MPLS.
VPLS.

RPR-like.

Supported equipments

The 1350 OMS PKT manages Alcatel-Lucent equipments and SNMP devices coming
from different vendors.

....................................................................................................................................................................................................................................
1350 OMS
11-3
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Main features

....................................................................................................................................................................................................................................

1350 OMS PKT manages the complete family of Ethernet ISA boards (that include
different types).
1350 OMS PKT supports overall fault, performance, and security management.
The MPLS, T-MPLS, and RPR-like transport layers are managed by 1350 OMS PKT as a
server application for the Ethernet client layer.
Open architecture

The 1350 OMS PKT can act as agent for service applications like 1355VPN (Virtual
Private Network).
In a large network architecture, 1350 OMS PKT can also be accessed by external OSs.
by North Bound Interface (NBI).
The 1350 OMS PKT adheres to standards and recommendations of CCITT, ETSI, IEEE,
MEF.

....................................................................................................................................................................................................................................
1350 OMS
11-4
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Management Layers

....................................................................................................................................................................................................................................

Management Layers
Management Layer description

The network management is split into four layers.


Physical Layer

It concerns the physical equipment.


Element Management Layer (EML)

The EML manages each Network Element (NE) on an individual basis. The EML
supports an abstraction of the functions provided by the Physical Layer.
On a devolved basis from the management layer, the EML has a set of element managers
that are individually responsible for a subset of NEs.
Network Management Layer (NML)

NML has the responsibility for the management of a set of NEs. As presented by the
EML, the management is accomplished both on a single NEs or a set of NEs. NML is not
concerned with how a particular element provides services internally.
Functions addressing the management on a wide geographical area are located at this
layer. Complete visibility of the whole network is typical and a vendor independent view
is maintained.
Service Management Layer (SML)

SML offers services such as network analysis or Virtual Private Network (VPN)
management.

....................................................................................................................................................................................................................................
1350 OMS
11-5
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Main concepts

....................................................................................................................................................................................................................................

Main concepts
Ethernet Services:

An Ethernet Service is an end-to-end that involves two or more end points. The Ethernet
Service is characterized by an established topology, a quality of service (QoS) and an
internal defined Ethernet packet forwarding rule.
The Ethernet Services are implemented: directly over SDH network layer (GFP or
LAPS), over an intermediate MPLS network layer, over an intermediate RPR-like ring or
directly over a cable. An Ethernet Service can use every type of combination of these
network support layers.
A fundamental aspect of Ethernet Services is the Ethernet Virtual Connection (EVC).
Ethernet Virtual Connections

An Ethernet Virtual Connection (EVC) is an Ethernet end-to-end connection. An EVC has


a specified topology (Point to point, Routed multipoint and Any to any) and a packet
forwarding rule (unicast, multicast, broadcast).
An EVC is an association of two or more UNIs. Associated UNIs are said to be in the
EVC.
Connectivity between UNIs is specified by the Ethernet Virtual Connection (EVC). An
EVC can have a number of EVC types and a number of service attributes.
One or more Ethernet Virtual Connection (EVC) form an Ethernet Service.
Each unidirectional end-to-end connection belonging to an EVC is called Ethernet
Segments: a Point to point EVC is formed by two unidirectional Ethernet Segments.
Ethernet Segments

An Ethernet Segment has associated the quality of service (QoS) value, the bandwidth,
and the forwarding rules. The QoS value can be: Guaranteed, Best Effort, Regulated. The
forwarding rule is based on VLAN classification.
The quality of service information is collected in a Traffic Descriptor entity. The
forwarding rule (or segregation rules) are collected in a Traffic Classifier entity.
The Ethernet Segment is the elementary connection managed by 1350 OMS PKT.

....................................................................................................................................................................................................................................
1350 OMS
11-6
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network architecture overview

....................................................................................................................................................................................................................................

Network architecture overview


Expand the capabilities

Network users are searching ways to expand the capability in offering transport services
to Service and Application Providers: in such way they try to generate new revenues.
To expand the capabilities means to offer new advanced communication services at a
lower price than the analogous service offered before (that is leased lines). To reach the
goal of cost reduction, the transport network resources have to be used in more efficient
way.
The management has to be able to reduce the cost in defining and maintaining the new
services. In the majority of cases, a network provider use a mix of technologies to provide
the best solution: ATM, Ethernet, MPLS,.
SDH or SONET-based networks are used in majority of the Metro Access.
The Ethernet networks used at transport layer imply a lower cost of physical interface in
terms of single interface cost and number of interfaces. Deliver must have high capacity,
scalable bandwidth with low latency and jitter.
The user requests for the support of Ethernet interface as well as the transport of Ethernet
frames.
Dynamic provisioning

The static provisioning of bandwidth (in SDH) has the following shortcomings:

No burst capability.
Unused bandwidth is wasted.
No networking, that is the transport network provides pipes.
As the number of Ethernet ports grows, the number of pipes increases too (no
scaling).

Example of network architecture

The following figure summarizes the network architecture supporting Ethernet Services:

....................................................................................................................................................................................................................................
1350 OMS
11-7
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network architecture overview

....................................................................................................................................................................................................................................

Figure 11-1 Global Network view

Legacy network

O-MSN / Isa Fast / Gigabit Ethernet


O-MSN/Isa PREA/ISA ES 16
1660SM/ISA_PR
ISAPR ring

Customer Equip. (CE)

Bridge network

O-MSN/ISA ES 1-4-16

Two level back-hauling


Simple back-hauling

MPLSnetwork

Topologies and services

Here are reported definition and classification of topologies and services in use:

(*) EPL or EVPL can be managed using port forwarding or port + VLAN
forwarding: in this case more than one Service or EVC can be defined on a single
Ethernet port.
(**) In 1350 OMS PKT is not distinguished when the back-hauling service is related
to a single customer EVP Hub or more than one customer (BA).
(***) Both Connection Oriented and Connection-less Networks; MAC Bridging
(802.1D based) is considered a Private Service.

(****) In 1350 OMS PKT the VPHS sends each Ethernet frame to all other port
belonging to VPHS service. In ISA PR R1.0, in R1.1 the selective forwarding is
implemented.

(*****) Both Connection Oriented and Connection-less Networks; Two types of


Bridging are considered Virtual: Virtual Bridging (802.1Q based) and Provider
Bridging (802.1ad based).

Transport layer

The transport of Ethernet frames can be supported:

Mapping directly on SDH layer (GFP mapping on SDH paths),.

Implementing an MPLS layer (MPLS layer based on SDH paths),.

....................................................................................................................................................................................................................................
1350 OMS
11-8
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network architecture overview

....................................................................................................................................................................................................................................

Using the proprietary Resilient Packet Ring (RPR-like based on SDH paths).
Whatever combination of them.

Each layer type supports specific characteristics.


SDH layer

Using directly SDH:

In Connection Oriented approach:


There is no directionality differentiation (both directions have the same
bandwidth).
The granularity is reduced to 2 Mbit/s (VC12 when Lower Order packet or virtual
concatenation is used.

In Connection-less approach (Ethernet bridge mode):


A different network approach is followed: only the best effort traffic can be
supplied.
The SDH path is used as a trunk where all the Ethernet frames coming for the
different ports are inserted. In case of 802.1D or 802.1Q, only frames belonging to
a single customer are inserted. In case of usage of 802.1ad (Stacked VLAN),
frames belonging to more customers are inserted.

MPLS/T-MPLS layer

Using MPLS, the user can:

have directionality differentiation (the opposite direction can have different


bandwidth).

improve the granularity until 64Kbit/s level.

Transport Multi Protocol Label Switching (T-MPLS) is a packet transport network


technology. T-MPLS consists in tagging the carried packets with a label and switching
those packets according to the label information. The T-MPLS packets are based on
MPLS frame formats: for example, the information cells can be Ethernet frames with
Martini encapsulation or can be ATM cells with an additional MPLS header.
MPLS/T-MPLS comparison

With respect to MPLS, the T-MPLS solution adds carrier-class OAM and survivability
management.
The OAM capabilities enable status and performance reports. The OAM capabilities are
confined within the T-MPLS layer and do not require deeper packet inspection. The OAM
capabilities enable also Fault Localization.
The survivability capabilities enable both protection switching and restoration. The
T-MPLS data plane can be operated statically through network management or
dynamically through GMPLS control plane. The granularity of the separation between the
T-MPLS static and dynamic networks is on port basis. The operator configures which
ports are reserved for dynamic LSP setup through GMPLS and which ports are reserved
for static LSP setup through management system.
....................................................................................................................................................................................................................................
1350 OMS
11-9
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network architecture overview

....................................................................................................................................................................................................................................

The network vision

The network vision is based on the multi-service node concept. The T-MPLS is the
converged packet network technology.
The T-MPLS is able to support any service type

Ethernet
IP/MPLS

FR
ATM
TDM via CES

T-MPLS nodes can be located either at the edge or in the middle of the T-MPLS network.
They are:

Label Edge Router (LER) at the edge of the network.


Label Switch Router (LSR) in the middle of the network.

T-MPLS sections between nodes can be physical or supported by a server layer (TDM,
WDM).
T-MPLS networking layers

T-MPLS defines at two networking layers:

the PseudoWire (PW) layer, also called channel layer.


the Tunnel layer, also called path layer.

Tunnels are point-to-point logical connections between NNI ports. The route of the
tunnels spans one or more T-MPLS sections.
PseudoWires are point-to-point logical connections between NNI ports, usable by only
one service. The route of PseudoWires spans one or more T-MPLS sections and/or
tunnels.
The same tunnel can carry one or more PseudoWires.
The Tunnel purpose is to enhance scalability of T-MPLS logical connections.
The PseudoWire purpose is to carry one service across the T-MPLS network.
Both PseudoWires and Tunnels are Label Switched Paths (LSP).
The PseudoWire and the Tunnel terminations correspond to:

A label Push at the ingress LER.


A label Pop at the egress LER.

The cross connections (XC) correspond to a label swap at the LSR.

....................................................................................................................................................................................................................................
1350 OMS
11-10
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network architecture overview

....................................................................................................................................................................................................................................

RPR ring

Proprietary RPR ring (RPRring is a technology mixed between RPR and MPLS
implemented by ISA PR), makes possible:

To have low level of granularity.


To have directionality differentiation (the opposite direction can have different
bandwidth).

End to End services

The classification features is the management of traffic type. the of traffic type can be
guaranteed, regulated, and best effort. The classification features depend on the board
type. The classification features do not depend on the used transport layer.
An Ethernet End to End service can use all the defined transport server layers: transparent
SDH, then cross the proprietary RPR or MPLS ring and then use an LSP (MPLS network)
to reach the final destination port.
Introducing the ISA ES support and management also a connection-less subnetwork
can be crossed by an end-to-end service.
The 1350 OMS PKT supplies an integrated view allowing in a simple way:

To create Ethernet connectivity (EVC).


To define new services associating EVC.

To maintain the services.

Furthermore, must be managed the MPLS transport layer and the proprietary RPR ring.

....................................................................................................................................................................................................................................
1350 OMS
11-11
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Ethernet Services Attributes

....................................................................................................................................................................................................................................

Ethernet Services Attributes


Bundling Service Attribute

The Bundling attribute makes configurable a UNI. The Bundling allow the mapping of
more than one CE-VLAN Id to a particular EVC at the UNI.
The Bundling service attribute is independent of the EVCs at the UNI.
An EVC with more than one CE-VLAN Id mapping to it has the CE-VLAN Id
Preservation Service Attribute. The list of CE-VLAN IDs mapped to the EVC is the same
at each UNI in the EVC.
The Figure 11-2, Example of Bundling (p. 11-12) shows an example of Bundling. In
this example, UNI A and UNI B have the bundling attribute as seen from the mapping for
EVC1. EVC1 has the CE-VLAN Id Preservation attribute.
Figure 11-2 Example of Bundling

All to One Bundling Service Attribute

All to One Bundling is a special case of Bundling. All to One Bundling is sufficiently
important to be called out as a separate attribute.
....................................................................................................................................................................................................................................
1350 OMS
11-12
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Ethernet Services Attributes

....................................................................................................................................................................................................................................

When a UNI has the All to One Bundling attribute set to TRUE the following conditions
must be verified:

All CE-VLAN IDs must map to a single EVC at the UNI.


The All to One Bundling service attribute is independent of the EVCs at the UNI.

The EVC at the UNI must have the CE-VLAN Id Preservation Service Attribute (see
Section Modify an edge port (p. 18-170)).
The list of CE-VLAN IDs mapped to the EVC must include all CE-VLAN IDs and be
the same at each UNI in the EVC.

The UNIcannot have Service Multiplexing.


All UNIs in the EVC must have the All to One Bundling Service Attribute.

Multiplexing Service Attribute

A UNI with the Service Multiplexing attribute must be configurable to support multiple
EVCs. Point to point EVCs and Multipoint EVCs can be multiplexed in any combination
at a UNI. Figure 11-3, Example of Service Multiplexing on UNI A (p. 11-14) shows an
example of Service Multiplexing. In this example, CE A is attached to the MEN through a
Gigabit Ethernet UNI. The CEs B, C, and D are attached through 100 Mbit/s Ethernet
UNIs.
Using Service Multiplexing, Point to point EVCs to each of B, C, and D can be
implemented with a single physical port on the CEA.

....................................................................................................................................................................................................................................
1350 OMS
11-13
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Ethernet Services Attributes

....................................................................................................................................................................................................................................

Figure 11-3 Example of Service Multiplexing on UNI A

....................................................................................................................................................................................................................................
1350 OMS
11-14
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

Classification of Ethernet Services


Definition of Service

The Ethernet Services are based on EVC. The service is a container of one or more EVCs.
The combining of more than one EVC defines a high number of possible services.
A specific type of service introduces restriction on the EVC types to be used for that
service.
If a different classification is required, the user can adapt these definitions and then the
related implementation in a simple way.
Each service requires the 1350 OMS EML capacity to collect Performance data to verify
the defined QoS level. Furthermore 1350 OMS EML has to be clearly shown in case of
network failure the affected services: both alarms and specific performance data are used
to guarantee the maintenance features.
Supported EVC

The main items managed by 1350 OMS PKT are the EVC. The following types of EVC
are managed:

Point to point.
Routed multi-point: an EVC termination has the role of root and the other the role
of leaf.

Any to any is a bus like topology: each EVC termination can communicate with the
others.

The service classification that follows is one of the possible service classification used as
a basis.
Each Service is shortly described together with its topological characteristics, technology
dependencies and MEF attribute mapping for UNI and for EVC.

....................................................................................................................................................................................................................................
1350 OMS
11-15
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

EVPL service type


Table 11-1

EVPL /ETS and ETB Provider Bridge

Service type:

EVPL (Ethernet Virtual Private Line).

Technology:

ETS and ETB Provider Bridge.


Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

UNI to UNI with one or more TL


(SDH, ETH, MPLS).

At least one UNI with Service


Multiplexing = Y.

EVCType = Point to point.

Classification = Y/N.

CE-VlanPreservation = Y/N.

Bundling = Y/N.

CE-VlanCosPreservation = Y/N.

QoS = all types.

AllToOneBundling = N.

N.EVC = one or more.

UnicastDelivery = MAC ACL


dependent.

BwdPerUNI or BwdPerEvc or
BwdPerCoS.

MulticastDelivery = MAC ACL


Dependent.

CIR and PIR = All admitted


combination.

BroadcastDelivery = MAC ACL


dependent.

L2ControlProtocol = (See expected


checks column).

L2ControlProtocol = (See expected


checks column).

Table 11-2

EVPL /ETB Virtual Bridge

Service type:

EVPL (Ethernet Virtual Private Line).

Technology:

ETB Virtual Bridge.


Main characteristics:

Not allowed.

Table 11-3

EVPL /ETB MAC Bridge

Service type:

EVPL (Ethernet Virtual Private Line).

Technology:

ETB MAC Bridge.


Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS
11-16
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

EPTL service type


Table 11-4

EPTL /ETS

Service type:

EPTL (Ethernet Private Transparent Line).

Technology:

ETS.
Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

UNI to UNI with one TL (SDH).

two UNIs.

EVCType = Point to point.

Classification = DontCare.

Service Multiplexing = N.

CE-VlanPreservation = Y.

QoS = All Traffic is Guaranteed.

Bundling = N.

CE-VlanCosPreservation = Y.

Private Transport Link.

AllToOneBundling = Y.

UnicastDelivery = DeliverUncond.

N.EVC = 1.

MulticastDelivery = DeliverUncond.

BwdPerUNI = FullTLBwd.

BroadcastDelivery = DeliverUncond.

CIR = PIR = FullTLBwd.

L2ControlProtocol =
equalOnBothUNI.

L2ControlProtocol =
equalOnAllInflows.

(Tunnel all protocols).

Table 11-5

(PassToEvc for all protocols).

EPTL /ETB Provider Bridge

Service type:

EPTL (Ethernet Private Transparent Line).

Technology:

ETB Provider Bridge.


Main characteristics:

Not allowed.

Table 11-6

EPTL /ETB Virtual Bridge

Service type:

EPTL (Ethernet Private Transparent Line).

Technology:

ETB Virtual Bridge.


Main characteristics:

Not allowed.

Table 11-7

EPTL /ETB MAC Bridge

Service type:

EPTL (Ethernet Private Transparent Line).

Technology:

ETB MAC Bridge.


Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS
11-17
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

EPL service type


Table 11-8

EPL /ETS and ETB Provider Bridge

Service type:

EPL (Ethernet Private Line).

Technology:

ETS and ETB Provider Bridge.


Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

UNI to UNI with one or more TL


(SDH, ETH, MPLS).

two UNIs.

EVCType = Point to point.

Service Multiplexing = N.

CE-VlanPreservation = Y/N.

Classification = Y/N.

Bundling = Y/N.

CE-VlanCosPreservation = Y/N.

QoS = all types.

AllToOneBundling = Y/N.

N. EVC = 1,BwdPerUNI or
BwdPerEvc or BwdPerCoS.

UnicastDelivery = MAC ACL


dependent.

CIR and PIR = All admitted


combination.

MulticastDelivery = MAC ACL


Dependent.

L2ControlProtocol = (See expected


checks column).

BroadcastDelivery = MAC ACL


dependent.

L2ControlProtocol = (See expected


checks column).

Table 11-9

EPL /ETB Virtual Bridge

Service type:

EPL (Ethernet Private Line).

Technology:

ETB Virtual Bridge.


Main characteristics:

Not allowed.

Table 11-10

EPL /ETB MAC Bridge

Service type:

EPL (Ethernet Private Line).

Technology:

ETB MAC Bridge.


Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS
11-18
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

EVPLAN service type


Table 11-11

EVPLAN /ETS and ETB Provider Bridge

Service type:

EVPLAN (Ethernet Virtual Private LAN).

Technology:

ETS and ETB Provider Bridge.


Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

More than two UNIs with one or


more TL (SDH, ETH, MPLS).

Service Multiplexing = Y.

EVCType = Multipoint to multipoint.

Bundling = Y/N.

CE-VlanPreservation = Y/N.

Classification = Y/N.

AllToOneBundling = Y/N.

CE-VlanCosPreservation = Y/N.

QoS = all types.

N.EVC = one or more.

BwdPerUNI or BwdPerEvc or
BwdPerCoS.

UnicastDelivery = MAC ACL


dependent.

CIR and PIR = All admitted


combinations.

MulticastDelivery = MAC ACL


Dependent.

L2ControlProtocol = (See comment


in Notes column).

BroadcastDelivery = MAC ACL


dependent.

L2ControlProtocol = (See comment


in Notes column).

In case of BwdProfilePerCos, inside


the same EVC, the same priority bit
configuration must not map different
QoS on a given UNI.

Table 11-12

EVPLAN /ETB Virtual Bridge

Service type:

EVPLAN (Ethernet Virtual Private LAN).

Technology:

ETB Virtual Bridge.


Main characteristics:

Not allowed.

Table 11-13

EVPLAN /ETB MAC Bridge

Service type:

EVPLAN (Ethernet Virtual Private LAN).

Technology:

ETB MAC Bridge.


Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS
11-19
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

Extended EVPL
Table 11-14

Extended EVPL /ETS and ETB Provider Bridge

Service type:

Extended EVPL (Extended Ethernet Virtual Private Line).

Technology:

ETS and ETB Provider Bridge.


Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

UNI to UNI with one or more TL


(SDH, ETH, MPLS).

At least one UNI with Service


Multiplexing = Y/N.

EVCType = Point to point.

Classification = Yes.

CE-VlanPreservation = Y/N.

Bundling = Y/N.

CE-VlanCosPreservation = Y/N.

QoS = all types.

AllToOneBundling = Y/N.

N.EVC = one or more.

UnicastDelivery = MAC ACL


dependent.

BwdPerUNI or BwdPerEvc or
BwdPerCoS.

MulticastDelivery = MAC ACL


Dependent.

CIR and PIR = All admitted


combination.

BroadcastDelivery = MAC ACL


dependent.

In case of BwdProfilePerCos, the


mapping of PrioBits to Qos is fully
free.
PolicyMode can be also =
IETFColorAware + ColorProfile.

Table 11-15

Extended EVPL /ETB Virtual Bridge

Service type:

Extended EVPL (Extended Ethernet Virtual Private Line).

Technology:

ETB Virtual Bridge.


Main characteristics:

Not yet supported.

Table 11-16

Extended EVPL /ETB MAC Bridge

Service type:

Extended EVPL (Extended Ethernet Virtual Private Line).

Technology:

ETB MAC Bridge.


Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS
11-20
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

Extended EVPLAN service type


Table 11-17

Extended EVPLAN /ETS and ETB Provider Bridge

Service type:

Extended EVPLAN (Extended Ethernet Virtual Private LAN).

Technology:

ETS and ETB Provider Bridge.


Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

More than two UNIs with one or


more TL (SDH, ETH, MPLS).

Service Multiplexing = Y/N.

EVCType = Multipoint to multipoint.

Bundling = Y/N.

CE-VlanPreservation = Y/N.

Classification = Y/N.

AllToOneBundling = Y/N.

CE-VlanCosPreservation = Y/N.

QoS = all types.

N.EVC = one or more.

BwdPerUNI or BwdPerEvc or
BwdPerCoS.

UnicastDelivery = MAC ACL


dependent.

CIR and PIR = All admitted


combinations.

MulticastDelivery = MAC ACL


dependent.

BroadcastDelivery = MAC ACL


dependent.

In case of BwdProfilePerCos, the


mapping of PrioBits to Qos is fully
FreePolicyMode = IETFColorAware
+ ColorProfile.

Table 11-18

Extended EVPLAN /ETB Virtual Bridge

Service type:

Extended EVPLAN (Extended Ethernet Virtual Private LAN).

Technology:

ETB Virtual Bridge.


Main characteristics:

Not yet supported.

Table 11-19

Extended EVPLAN /ETB MAC Bridge

Service type:

Extended EVPLAN (Extended Ethernet Virtual Private LAN).

Technology:

ETB MAC Bridge.


Main characteristics:

Not yet supported.

....................................................................................................................................................................................................................................
1350 OMS
11-21
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

HSI service type


Table 11-20

HSI /ETS and ETB Provider Bridge

Service type:

HSI (High Speed Internet).

Technology:

ETS and ETB Provider Bridge.


Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

1 UNI root and more UNI leaves over


moreTL (SDH, ETH, MPLS).

EVCType = Point to multipoint.

Service Multiplexing = Y.

CE-VlanPreservation = Y/N.

Classification = Y/N.

Bundling = Y/N.

CE-VlanCosPreservation = Y/N.

QoS = all types.

AllToOneBundling = Y/N.

UnicastDelivery = DeliverUncond.

N.EVC = one or more.

MulticastDelivery = DeliverUncond.

BroadcastDelivery = DeliverUncond.

L2ControlProtocol = (See comment


in Expected Checks column).

In case of BwdProfilePerCos, the


mapping of PrioBits to Qos is free.

PolicyMode = IETFColorAware +
ColorProfile.

Root UNI with:

Leaf UNI with:

Service Multiplexing = Y/N.

Bundling = Y/N.

AllToOneBundling = Y/N.

N.EVC = one or more.

BwdPerUNI or BwdPerEvc
or BwdPerCoS.

CIR and PIR = All admitted


combination.

L2ControlProtocol = (See
comment in Expected Checks
column).

....................................................................................................................................................................................................................................
1350 OMS
11-22
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

Table 11-21

HSI /ETS Multicast

Service type:

HSI (High Speed Internet).

Technology:

ETS Multicast.
Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

Multicast ETS only.

EVCType = Point to multipoint.

1 UNI root and more UNI leaves over


more TL (SDH, ETH, MPLS).

Service Multiplexing = Y.

CE-VlanPreservation = Y/N.

Bundling = Y/N.

CE-VlanCosPreservation = Y/N.

Classification = Y.

AllToOneBundling = Y/N.

QoS = AllTypes.

N.EVC = one or more.

UnicastDelivery = DeliverUnconditionally.

MulticastDelivery =
DeliverUnconditionally.

BroadcastDelivery =
DeliverUnconditionally.

L2ControlProtocol = (See comment


in Notes column).

Table 11-22

Root UNI with:

Leaf UNI:

No information as they are


Egress points for this Service.

BwdPerCoS only (defined


contextually to EVC
definition).

CIR and PIR = All admitted


combinations.

L2ControlProtocol = (See
comment in Notes column).

HSI /ETB Virtual Bridge

Service type:

HSI (High Speed Internet).

Technology:

ETB Virtual Bridge.


Main characteristics:

Not yet supported.

Table 11-23

HSI /ETB MAC Bridge

Service type:

HSI (High Speed Internet).

Technology:

ETB MAC Bridge.


Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS
11-23
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

BTV service type


Table 11-24

BTV /ETS Multicast

Service type:

BTV (Broadcast Tele Vision).

Technology:

ETS Multicast.
Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

Multicast ETS only.

Root UNI with:

EVCType = Point to multipoint.

1 UNI root.

Service Multiplexing = Y.

CE-VlanPreservation = Y/N.

more than one UNI leaves over more


TL (SDH, ETH, MPLS).

Bundling = Y/N.

CE-VlanCosPreservation = Y/N.

AllToOneBundling = Y/N.

Classification = Y.

N.EVC = one or more.

UnicastDelivery = DeliverUnconditionally.

QoS = AllTypes.

Leaf UNI:

No information as they are Egress


points for this Service.

MulticastDelivery =
DeliverUnconditionally.

BwdPerCoS only (defined


contextually to EVC definition).

BroadcastDelivery =
DeliverUnconditionally.

CIR and PIR = All admitted


combinations.

L2ControlProtocol = (See comment


in Notes column).

L2ControlProtocol = (See comment


in Notes column).

Table 11-25

BTV /ETB Provider Bridge

Service type:

BTV (Broadcast Tele Vision).

Technology:

ETB Provider Bridge.


Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

One or Two UNI Roots.

EVCType = Point to multipoint.

Many UNI as Leaves.

Service Multiplexing = Y.

CE-VlanPreservation = Y/N.

In the scope of Provider Bridge, the


service emulates an Extended
EVPLAN.

Bundling = Y.

CE-VlanCosPreservation = Y/N.

AllToOneBundling = N.

N.EVC = one or more.

UnicastDelivery = MAC ACL


dependent.

MulticastDelivery = MAC ACL


dependent.

BroadcastDelivery = MAC ACL


dependent.

The addition of IGMP Snooping can


optimize the network usage.

Root UNI with:

Leaf UNI with:

Service Multiplexing = Y.

Bundling = Y.

AllToOneBundling = N.

N.EVC = one or more.

BwdProfile = All.

....................................................................................................................................................................................................................................
1350 OMS
11-24
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

Table 11-26

BTV /ETB Virtual Bridge

Service type:

BTV (Broadcast Tele Vision).

Technology:

ETB Virtual Bridge.


Main characteristics:

Not allowed.

Table 11-27

BTV /ETB MAC Bridge

Service type:

BTV (Broadcast Tele Vision).

Technology:

ETB MAC Bridge.


Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS
11-25
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Classification of Ethernet Services

....................................................................................................................................................................................................................................

Broadcast service type


Table 11-28

Broadcast /ETS

Service type:

Broadcast.

Technology:

ETS.
Main characteristics:

Service characteristics:

UNI characteristics:

EVC characteristics:

One or Two UNI Roots.

EVCType = Point to multipoint.

Many UNI as Leaves.

Table 11-29

Root UNI with:

Service Multiplexing = Y/N.

CE-VlanPreservation = Y/N.

Bundling = Y/N.

CE-VlanCosPreservation = Y/N.

AllToOneBundling = Y/N.

N.EVC = one or more.

UnicastDelivery = DeliverUnconditionally.

MulticastDelivery =
DeliverUnconditionally.

BroadcastDelivery =
DeliverUnconditionally.

L2ControlProtocol = (See comment


in Expected Checks column).

Leaf UNI:

No information as they are


Egress points for this Service.

BwdPerCoS only (defined


contextually to EVC
definition).

CIR and PIR = All admitted


combinations.

L2ControlProtocol = (See
comment in Notes column).

Broadcast /ETB Provider Bridge

Service type:

Broadcast.

Technology:

ETB Provider Bridge.


Main characteristics:

Not allowed.

Table 11-30

Broadcast /ETB Virtual Bridge

Service type:

Broadcast.

Technology:

ETB Virtual Bridge.


Main characteristics:

Not allowed.

Table 11-31

Broadcast /ETB MAC Bridge

Service type:

Broadcast.

Technology:

ETB MAC Bridge.


Main characteristics:

Not allowed.
....................................................................................................................................................................................................................................
1350 OMS
11-26
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Definition of Ethernet Services by MEF

....................................................................................................................................................................................................................................

Definition of Ethernet Services by MEF


Main characteristics

The Services definitions are inspired by Service names provided in MEF standard
documentation. Such MEF Services are completed with the addition of Alcatel-Lucent
proprietary extensions to provide a large set of Services.
All the previous Service definitions become obsolete. This chapter, further than providing
the new Services meaning, also provides the way to migrate older definitions into new
ones.
The following table summarizes the main characteristics of the new services definition.
M. Old
E. Service
F. Type.

New
Service
Type.

Service
Frame
Delivery.

Privacy.

Bandwidth
Profile.

Main characteristics.

Service pattern.

All-to-One-Bundling: YES.
ELINE.

E.
P.

NA.

L.

(Point
to
point).

Deliver
conditionally
or
unconditionally (unicast,
multicast,
broadcast).

Multiplexing: NO.
Bundling: NO.
UNI.

UNI.

L2CP: Tunneling except


PAUSE.
Preservation (VLAN or
CoS): YES.

1
A

PRIVATE

PRIVATE

PolicyMode: ColorBlind.
All-to-One-Bundling: NO.
ELINE.

E.
V.
P.

NA.

L.

E.
P.
T.
L.

(Point
to
point).

EPTLINE.

ELINE.

(Wizard
or manual
link).

(Point
to
point).

Deliver
conditionally
or
unconditionally (unicast,
multicast,
broadcast).

Deliver
unconditionally (unicast,
multicast,
broadcast).

Multiplexing: YES.

None.

UNI.

Bundling: YES or NO.

EVC.

L2CP.: Discard or Peer.

CoS.

Preservation (VLAN or
CoS): YES or NO.

M
N

M
A

Z
N

PolicyMode: Disabled or
ColorBlind.
Dedicated
UNI and
Links.
Single
SDH
based
infrastructure.

All-to-One-Bundling: YES.
Multiplexing: NO.
Bundling: NO.
None.

L2CP: Tunneling except


PAUSE.
Preservation (VLAN. or
CoS.): YES.

1
1

1
1
PRIVATE
PRIVATE
PRIVATE
A

PolicyMode: Disabled.

....................................................................................................................................................................................................................................
1350 OMS
11-27
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Definition of Ethernet Services by MEF

....................................................................................................................................................................................................................................
M. Old
E. Service
F. Type.

New
Service
Type.

Service
Frame
Delivery.

Privacy.

Bandwidth
Profile.

Main characteristics.

Service pattern.

All-to-One-Bundling: NO.
Multiplexing: YES.
Bundling: YES or NO.

E.

ELAN.

V.
P.
L.

NA.

A.
N.

(Multi
point to
multi
point).

UNI.
Any values.

None.

EVC.
CoS.

Same L2CP on all


extremities (PAUSE Peer,
discard, other any value).
Preservation (VLAN or
CoS): YES or NO.
PolicyMode: Disabled or
ColorBlind.

M
Z N
M
N Z
M
N Z

M
Z N
M
Z N

MAC forwarding: YES or


NO.
E.
x.
t.
e.
n.
d.
e.
d.
E.
V.

All-to-One-Bundling: YES
or NO.

EPTLINE.
(more
than one
manual
links)
EPLINE
EVPLINE.

Multiplexing: YES or NO.


ELINE.
(Point
to
point).

Any values.

Optional
UNI and
Links.

UNI.

Bundling: YES or NO.

EVC.

Free L2CP on extremities.

M
N A

CoS.

Preservation (VLAN or
CoS): YES or NO.

PRIVATE OR SHARED

M
N

PolicyMode: Disabled,
ColorBlind, ColorAware +
profile.

P.
L.
E.
x.
t.

All-to-One-Bundling: YES
or NO.

e.
n.
d.
e.
d.
E.
V.
P.
L.

EPLANE
VPLAN
unknown.

Multiplexing: YES or NO.

ELAN.
(Multi
point to
multi
point).

Any values.

Optional
UNI and
Links.

UNI.

Bundling: YES or NO.

EVC.

Free L2CP on extremities.

CoS.

Preservation (VLAN or
CoS): YES or NO.
PolicyMode: Disabled,
ColorBlind, ColorAware +
profile.

M
N Z
M
N Z

M
Z N
M
Z N
M
Z N

PRIVATE OR SHARED

A.
N.

....................................................................................................................................................................................................................................
1350 OMS
11-28
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Definition of Ethernet Services by MEF

....................................................................................................................................................................................................................................
M. Old
E. Service
F. Type.

New
Service
Type.

Service
Frame
Delivery.

Privacy.

Bandwidth
Profile.

Main characteristics.

Service pattern.

All-to-One-Bundling: NO.
Multiplexing: YES.

H.
S.
I.

EVP hub.
BA.

ETREE.
(Rooted
multi
point).

Deliver
conditionally
(MAC based)
or
unconditionally (VLAN
Based).

Bundling: YES.
UNI.
None.

EVC.
CoS.

Same L2CP on both


extremities.
Preservation (VLAN or
CoS): YES.

MxS
NxSH

PolicyMode: Disabled or
ColorBlind.

M
N

M
N

M
N

MAC forwarding: YES


(special).
All-to-One-Bundling: NO.
Multiplexing: YES.

B.

BTV.

T.

(Bridge or
ETS
based).

V.

Bundling: YES.

ETREE.
(Rooted
multi
point).

UNI.
Any values.

None.

EVC.
CoS.

Same L2CP on both


extremities.

Mx
SN

M
N

M
N

Preservation (VLAN or
CoS): YES or NO.

M
S

PolicyMode: Disabled or
ColorBlind.

MAC forwarding: NO.


UniDirectional: YES.
B.
r.

All-to-One-Bundling: YES
or NO.

o.

Multiplexing: YES or NO.

a.
d.
c.
a.
s.
t.

BTV.
(SDH
broadcast
based).

ETREE.
(Rooted
multi
point).

UNI.
Any values.

None.

EVC.
CoS.

Bundling: YES or NO.


Same L2CP on both
extremities.
Preservation (VLAN or
CoS): YES or NO.

S
N

PolicyMode: Disabled or
ColorBlind.
MAC forwarding: NO.

....................................................................................................................................................................................................................................
1350 OMS
11-29
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network Topology Description

....................................................................................................................................................................................................................................

Network Topology Description


Overview

Based on the number of terminations, the service is implemented with one or more EVCs.
The topology can be Point to point or Multipoint to multipoint.
The following main topologies used by Ethernet Services are defined:

Point to Point Ethernet Topology (p. 11-30).

Hub & spoke Ethernet Topology (p. 11-31).

Full Meshed Topology (p. 11-33).

Boards involved in Ring topology (p. 11-35).

Point to Point Ethernet Topology

Point to Point Ethernet Topology is defined as a bidirectional flow exchanged between


two ports of different provider edges located at different sites.
Figure 11-4 Point to Point Topology

The Point to point topology can be built directly on an SDH layer.


In the direct mapping, the Ethernet port maps an SDH VC (GFP mapping) or a group of
SDH VCs called packet concatenation.
Packet concatenation uses a group of SDH VCs by the LO packet concatenation on ISA
PR EA or by Virtual concatenation..
....................................................................................................................................................................................................................................
1350 OMS
11-30
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network Topology Description

....................................................................................................................................................................................................................................

The boards can additionally implement a transparent or a compressed transmission.


Boards involved in Point to Point topology

The following boards can be involved in the Point to point topology:

ISA E/FE/GE.

ISA PR EA.
ISA PR.
ISA ES1.

ISA ES4.
ISA ES16.
TSS.

The transport of Ethernet frames is possible by one or more LSP. As LSP, the usage of
ISA PR EA,ISA PR or ISA ES16 is mandatory.
Mixed configuration

Is possible to have also mixed configurations:

ISA E/FE/GE ISA PR EA.


ISA PR EA or ISA ES16 ISA PR.

ISA E/FE/GE ISA PR EA or ISA ES16 ISA PR.


ISA ES ISA ES.
ISA E/FE/GE ISA PR EA ISA PR ISA PR EA.
ISA E/FE/GE ISA PR EA ISA PR ISA PR EA ISA E/FE/GE.
Note: The configuration ISA E/FE/GE ISA PR can be obtained only connecting a
physical cable between two Ethernet physical ports belonging to the two cards. The
inter-working is at Ethernet layer.
Note: The configuration ISA PR EA ISA PR supports the inter-working at MPLS
layer using the Martini encapsulation on a physical GE interface. This topology is
always managed with a Point to point EVC having associated two unidirectional
Ethernet Segments. Each of Ethernet Segment has specific Traffic Descriptor
(bandwidth and traffic type) and Traffic Classifier (VLAN).

Hub & spoke Ethernet Topology

A Hub & spoke topology for Ethernet Services connects one PE to more than one PE.
The typical use of Hub & spoke topology is the traffic diffusion from a central CE, trough
connected PE, toward the remote CEs or the grooming feature. The grooming feature is
the access of remote sites to the main site.

....................................................................................................................................................................................................................................
1350 OMS
11-31
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network Topology Description

....................................................................................................................................................................................................................................

Figure 11-5 Hub & spoke Topology

The Hub & spoke topology can be built directly on an SDH layer.
In the direct mapping the Ethernet port maps an SDH VC (GFP mapping) or a group of
SDH VCs (packet concatenation).
Packet concatenation uses a group of SDH VCs by the LO packet concatenation on ISA
PR EA or by Virtual concatenation..
The boards can additionally implement a transparent or a compressed transmission.
Boards involved in the Hub & spoke topology

The following boards can be involved in the Hub & spoke topology: ISA E/FE/GE, ISA
PR EA, ISA PR, ISA ES16 at spoke parts; only ISA PR EA, ISA PR,ISA ES16 in the Hub
side.
The mixed configuration is also possible (the configuration are reported per branch or
leg).

ISA E/FE/GE ISA PR EA or ISA ES16.

ISA PR EA or ISA ES16 ISA PR.


ISA E/FE/GE ISA PR EA or ISA ES16 ISA PR.
ISA E/FE/GE ISA PR EA or ISA ES16 ISA PR ISA PR EA or ISA ES16.

....................................................................................................................................................................................................................................
1350 OMS
11-32
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network Topology Description

....................................................................................................................................................................................................................................

Note: The configuration ISA E/FE/GE ISA PR can be obtained only connecting a
physical cable between two Ethernet physical ports belonging to the two cards. The
inter-working is at Ethernet layer.
Note: The configuration ISA PR EA ISA PR supports the inter-working at MPLS
layer using the Martini encapsulation on a physical GE interface.
Partial Ethernet traffic aggregation

It is possible to have partial Ethernet traffic aggregation (that is more than one level of
hub).
Figure 11-6 Hub & spoke with multi level aggregation topology

This topology is typically managed using a Point to multipoint EVC having associated a
set of unidirectional Ethernet Segments. Each Ethernet Segment with specific Traffic
Descriptor (bandwidth and traffic type) and Traffic Classifier (VLAN). The cardinality of
this set is the number of the leaf nodes.
Full Meshed Topology

A Full Meshed topology connects one PE to all PEs belonging to the same Ethernet
Service. Alternatively can connect a subset of PE. This topology is like a distributed
LAN.
The typical use of full meshed topology is in the implementation of a Virtual Private Hub
Service (VPHS).
....................................................................................................................................................................................................................................
1350 OMS
11-33
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network Topology Description

....................................................................................................................................................................................................................................

In a Virtual Private Hub Service, a customer (typically an enterprise) requires that all its
own sites connect to each other. Each connectivity between a couple of sites can have
different characteristics, even though probably in the normal case all the sites share the
same connection characteristics).
The topology can be shown this way:
Figure 11-7 Full meshed topology

The full meshed topology can be built directly on an SDH layer.


In the direct mapping the Ethernet port maps an SDH VC (GFP mapping) or a group of
SDH VCs (packet concatenation).
Packet concatenation uses a group of SDH VCs by the LO packet concatenation on ISA
PR EA and ISA ES16..
The boards can additionally implement a transparent or a compressed transmission.
The full meshed topology can also use the MPLS network capability to have better
capacity in grooming and in differentiate service definition.
By using the MPLS approach, a Connection Oriented network is implemented.
Alternatively, by the bridge approach, a connection-less network is implemented.
....................................................................................................................................................................................................................................
1350 OMS
11-34
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network Topology Description

....................................................................................................................................................................................................................................

Full meshed topology is managed using a Multipoint to multipoint EVC having


associated a set of couple unidirectional Ethernet Segments. Each Ethernet Segment with
specific Traffic Descriptor (bandwidth and traffic type) and Traffic Classifier (VLAN).
The cardinality of this set, if n is the number of nodes, is n (n-1)/2 .
Boards involved in full meshed topology

Using ISA ES family in bridge mode, the SDH VC acts as a common Transport Link to
distribute Ethernet frames. The involved ports must belong to the same service. The
service must be based on MAC address or S-VLAN routing capability.
To implement full meshed topology can be used only: ISA PR EA, ISA ESfamily, or ISA
PR. The ISA E/FE/GE can be used but only to control remotely the Ethernet port, without
having any feature related the switching capability.
The mixed configuration is also possible:

ISA PR EA or ISA ES16 ISA PR.

ISA PR EA or ISA ES16 ISA PR ISA PR EA or ISA ES16.


ISA ES ISA PR EA or ISA ES16.
ISA ES ISA PR.
Note: The configuration ISA PR EA ISA PR supports the inter-working at MPLS
layer using the Martini encapsulation on a physical GE interface.

Boards involved in Ring topology

The Ring topology can be show this way:

....................................................................................................................................................................................................................................
1350 OMS
11-35
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network Topology Description

....................................................................................................................................................................................................................................

Figure 11-8 Ring Topology

The ring topology is built directly on SDH layer implementing an RPR like protocol. The
protocol is managed, in the first step, by a specific Network Management system.
The Ethernet frames are mapped on this ring protocol.
Boards involved in Ring topology

When ISA PR EA or ISA ES16 is deployed in ring topology, it still works as an MPLS
board. The mesh topology is taken into account to define LSP. Specific behavior must be
implemented to guarantee the same access capabilities (fairness behavior) to all best
effort traffics coming from all nodes in the ring.
This topology is not directly related the Ethernet connections. This topology is specific of
SDH or RPR technology. This topology is no mapped with a specific EVC.
Any EVC type (Point to point, Point to multipoint, Multipoint to multipoint) can be used
to describe the Ethernet connection on ISA PR ring. When the service crosses the ISA PR
ring, part of an EVC is implemented on the ISA PR ring itself.
....................................................................................................................................................................................................................................
1350 OMS
11-36
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
About 1350 OMS PKT application

Network Topology Description

....................................................................................................................................................................................................................................

The ring topology for Ethernet Services is a specific configuration that is possible to
build:

using ISA PR (the board supplied by Native Network).


using ISA PR EA or ISA PR ES16.

The main differences is that ISA PR bases its behavior on the ring topology itself (have to
be deployed in this topology) while ISA PR EA or ISA ES16 being an MPLS board can
be also deployed in a ring topology and in this case it uses the fairness feature to
manage the best effort traffic (up to now this capability, that is the ring fairness, is not
managed by ISA PR EA and by ISA ES16 and then this topology is managed only for ISA
PR).
The ISA PR boards require to be connected in a ring topology way. The ISA PR boards
implement an RPR like ring.
Inter-working with the ISA PR EA or ISA ES16 is possible trough a GE physical
interface, using the MPLS labels (Martini encapsulation).
The label passed by ISA PR EA or ISA ES16 is swapped at ingressing by ISA PR and
substituted with an internal ISA PR label.
Internal label is maintained trough all crossed ISA PR.
If the ISA PR is a connection with another ISA PR EA, at egressing the ISA PR, the label
is swapped again with another label. Otherwise, if the service is terminated, the label is
popped out.
The inter-working with ISA E/FE/GE is not possible. To connect the ISA PR boards an
external Ethernet cable is needed.

....................................................................................................................................................................................................................................
1350 OMS
11-37
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
How to access the application

Web access

....................................................................................................................................................................................................................................

How to access the application


Web access
Navigate the application by a Web browser

The Web portal provides the user with a view of all the 1350 OMS applications and
allows the user to navigate the application subsystems and components.
To access and navigate the application, the user needs:

A PC installed with a web browser.


A network connection.
The authorization to access the web portal.

The IP address of the web portal.


The login name.
The password.

For a quick reference about the web access and MS-GUI, refer to document [1] 1350
OMS Getting Started Guide.
For a complete description about the web access and MS-GUI, refer to document [2]
1350 OMS Administration Guide, Vol 2: Common GUI Functions.

....................................................................................................................................................................................................................................
1350 OMS
11-38
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
How to access the application

The graphical interface (MS-GUI)

....................................................................................................................................................................................................................................

The graphical interface (MS-GUI)


The MS-GUI

The 1350 OMS PKT Multi-Service GUI is the specialization of the MS-GUI for the 1350
OMS PKT application. The MS-GUI framework is the reference graphic environment for
the 1350OMS. The MS-GUI can be accessed by any web browser.
The 1350 OMS PKT MS-GUI main window includes the menu bar, the toolbar and is
split in more section views as shown in the figure. The main view area is managed as set
of tabbed panels, defined by the operator. By default, the main view area shows the
Inventory list panel and the Log panel. According with the MS-GUI common behavior
the main view area supplies filtering and searching facility and table management.
The user accesses the system functions both from the main menu and from the pop-up
menu available from the list, for single or multiple selected items. Functions are grouped
under the main menu and, for the more complex ones, the menu items give access to
specific submenus, organized in a hierarchical tree.
For a quick reference about the web access and MS-GUI, refer to document [1] 1350
OMS Getting Started Guide.
For a complete description about the web access and MS-GUI, refer to the document [2]
1350 OMS Administration Guide, Vol 2: Common GUI Functions.

....................................................................................................................................................................................................................................
1350 OMS
11-39
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
How to access the application

Confirm the action

....................................................................................................................................................................................................................................

Confirm the action


When to use

This function requests the user to confirm or cancel the execution of an action.
Related information

The actions that affect heavily the managed network request a confirmation before the
execution of the ongoing operation.
The confirmation acts as a reminder for the user and gives the user the chance to renounce
the action.
The execution is suspended until the user confirms or cancels the requested action.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
An ongoing action needs a confirmation from the user.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

The user requests an action on one or more objects.


Result: A confirmation box is displayed.

The confirmation box content depends on the number of items selected:


For a single object selection:
If only one item is involved, confirmation box contains the following options:
Yes.

No.

For a multiple object selection:


If more than one items are involved, confirmation box contains the following
options:

Yes.

No.

Cancel.

All.

....................................................................................................................................................................................................................................
1350 OMS
11-40
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
How to access the application

Confirm the action

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select one of the available options:


if.

then.

Click Yes.

The command is executed on the current item.

Click No.

The command is not executed on the current


item.

Click All.

The command is executed on all the selected


items.

Click Cancel.

The command is not executed on the


remaining items.

Result: The action is executed according to the chosen option.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
11-41
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
The application interfaces

Software interfaces

....................................................................................................................................................................................................................................

The application interfaces


Software interfaces
Software interface description

The following figure shows the interfaces used by 1350 OMS PKT software.
Figure 11-9 Interface description

Interface features

This CORBA-based interface is used for:

NE discovery and any configuration change in the NE.


Provisioning of Ethernet Services.
Activation or deactivation of the Performance Monitoring counters.

Ethernet resources upload.


Alarm notification.

....................................................................................................................................................................................................................................
1350 OMS
11-42
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
The application interfaces

Software interfaces

....................................................................................................................................................................................................................................

Note: For a description about integration with other Network Management Systems
(NMS), refer to : Integrate the 1350 OMS PKT with Other NMSs (p. 3-8).
Application configuration

The administration functions consist in:

List the NML-IMs and EML-IMs.

Add one NML-IM and/or EML-IM.


Remove one NML-IM and/or EML-IM.
Setting the 1350 OMS PKT parameters.
Note: For a detailed description about application configuration, refer to: Access the
System Configuration Window and Configure 1350 OMS PKT (p. 3-3).

EML and NML Proxies

EML and NML proxies are configured in a way:

To avoid redundancy of data repository.


To integrate the 1350 OMS PKT into OSK architecture.
To manage the proxy stop or start directly from the PMC GUI.

The following proxy entities are available:

EMLIM_PROXY.
NMLIM_PROXY.
Note: For a detailed description about proxy configuration, refer to: Access the
System Configuration Window and Configure 1350 OMS PKT (p. 3-3), step Step 7
and step Step 8.

....................................................................................................................................................................................................................................
1350 OMS
11-43
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
The application interfaces

Multi-Manager environment

....................................................................................................................................................................................................................................

Multi-Manager environment
Multi-manager environment description

Multi-Manager Management occurs when the user manages part of the network by an
application and the rest of the network using another application.
Multi-Manager Management is a state of network management. A typical example is the
management by the 1350 OMS PKT and along with another application at EML layer.
Note: For a description, refer to: Multi-Manager Management Overview (p. 8-2).
For best practice and suggestions, refer to: Operational Guidelines (p. 8-3)

....................................................................................................................................................................................................................................
1350 OMS
11-44
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Overview

....................................................................................................................................................................................................................................

Functional Domain
Overview about functional domains
The Ethernet connectivity

The Ethernet traffic is carried by different technologies:

SDH.
OTH.
MPLS.
RPR-like rings.

The different technologies are structured on a dedicated domain.


Figure 11-10 Ethernet Service delivered using different technologies

Management areas

For Ethernet services, the main management areas are:

Network Topology Construction (p. 11-47)

NE or ENE management.

Subnetwork management.
Domain management.
Ethernet Physical port management.

Transport link management.

Traffic Management (p. 11-53)


Customer or Ethernet Service management.

EVC or Ethernet Segment management.


VLAN management.
Policy control.

....................................................................................................................................................................................................................................
1350 OMS
11-45
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Overview about functional domains

....................................................................................................................................................................................................................................

MPLS Management (p. 11-65)

Maintenance Management (p. 11-69)

Alarms management.
Fault Localization.
Performance Monitoring management (measurements).

Chapter 23, Network Utilities

Transport link management.


Traffic Descriptor management.
LSP management.

Audit.
Alignment and Force alignment.
Reserve and Recovery.

System management.

....................................................................................................................................................................................................................................
1350 OMS
11-46
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Network Topology Construction

....................................................................................................................................................................................................................................

Network Topology Construction


Overview

The Network Construction can be divided in Subnetwork management, NE management,


ENE management, Transport Link management, and Ethernet Segments port
management.
Subnetwork management

The subnetwork management allows to organize the network in a set of subnetwork and
build a hierarchical view of the network.
A configurable number of levels (up to 4 by default) is possible.
The network hierarchical view allows having different synthesis of the network structure.
Domain management

The domain management allows to partition a large network according to a common


criteria.
NE management

The NE management is the NE assignment to 1350 OMS PKT application, the NE


discovery, and the communication link management.
When needed, the differences in the 1350 OMS PKT management approaches, for those
two classes of board, are detailed in each related section of this documentation.
1350 OMS PKT is able to run under two independent modes. The two modes are related
to the fact that it manages the NE synchronously along with the SDH NML. The NML
application is 1350 OMS SDH. This mode, which is called 1350 OMS PKT - 1350 OMS
SDH independence mode, is global for all the managed NEs.
The SDH path management is linked to the 1350 OMS PKT - 1350 OMS SDH
independence mode.
The Q3 boards cannot be managed by the 1350 OMS PKT with 1350 OMS PKT - 1350
OMS SDH independence mode. The Q3 boards are managed through the 1350 OMS
SDH.
NE resources

In the scope of the construction domain, NEs are characterized by a set of the following
resources

Ethernet physical ports (local ports).


TDM terminations (remote ports).
Note: To avoid confusion between local ports and remote ports, the word port is
reserved for the denomination of the Ethernet physical ports. The remote ports are
named TDM terminations.

....................................................................................................................................................................................................................................
1350 OMS
11-47
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Network Topology Construction

....................................................................................................................................................................................................................................

NE boards

A NE corresponds physically to an ISA Ethernet board in OMSN: ISA E/FE/GE, ISA PR


EA, ISA ES1/4, ISA ES16 respectively named E/FE/GE NE, PR EA NE, ES1/4 NE, ES16
NE.
The NE are divided in two main classes, following the way they are administrated. They
are referred as:

Q3 boards (ISA E/FE and GE).


SNMP boards (ISA PR EA and ES).
Note: The ES1/4 NE introduces the bridging capability in the network
(Connection-less). However, in ETS mode, it provides only Point to point connection
between two interfaces, without traffic classification.
Note: ES16 board is managed with the same level of functionality as PR EA
augmented with the bridging capability of the ES1/4.

ENE management

The ENE management allows the user to define NEs, networks, Customer Edges. The
ENE give the user a complete view of the network.
Inner equipment or Provider equipment

In a topology, some ENEs can be added to represent a NE or a set of NEs.


Added ENEs are internal to the managed network but not directly administrated by the
1350 OMS PKT.
Internal ENEs have the role Inner, and are connected to one or more NEs through IWI or
NNI interfaces.
The interface type of the Transport Link depends on the role of the ENE:

If the ENE role is Inner Equipment, then the interface type is NNI.
If the ENE role is Inner Provider, then the interface type is IWI.

The NEs next to the ENE and part of the 1350 OMS PKT managed network, are known
as the Customer Premise Equipment (CPE).

....................................................................................................................................................................................................................................
1350 OMS
11-48
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Network Topology Construction

....................................................................................................................................................................................................................................

Figure 11-11 Inner ENE

Transport links between NE and inner ENE can be either Link Over Cable or Link Over
TDM. Inter-working with SDH always involves an inner ENE.
An RPR ring is viewed like an inner ENE by the 1350 OMS PKT.
Customer Edge

An ENE can be used also to represent Customer Edge (CE) devices.


This object is defined to improve the GUI representation.
The CE is connected to a CPE through an UNI interface. By convention in the 1350 OMS
PKT, an UNI is always related to an Ethernet physical port.
The following figure shows that concepts:

....................................................................................................................................................................................................................................
1350 OMS
11-49
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Network Topology Construction

....................................................................................................................................................................................................................................

Figure 11-12 Customer Edge

Transport link management

To provide the infrastructure of the Ethernet, the Ethernet application uses the Transport
Links. uses means that it asks for creation or it uploads the needed Transport Links.
The topology of Transport links can be Point to point, or Point-to-multi-point, or
multi-point-to-multi-point.
Transport links for Ethernet Services can be:

Link Over TDM.


Details over TDM Transport link for Ethernet Services:
Link Over TDM uses SDH or SONET technologies.

Path directly supports Ethernet frames. (Paths supporting the LSP tunnels are
managed by MPLS management layer).
Paths directly supporting Ethernet frames can have fixed or variable rate. If the
path is a Virtual Concatenated or a Packet Concatenated path, the rate is variable.
Paths can be defined and configured to be assigned to Connection Oriented
management (configured in ETS mode) or to Connection-less management
(configured in ETB mode).

Link Over Cables.

....................................................................................................................................................................................................................................
1350 OMS
11-50
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Network Topology Construction

....................................................................................................................................................................................................................................

Details about Link Over Cable Transport link for Ethernet Services:
The Ethernet cable is the connection between an ISA E/FE/GE (Q3 board) or ISA
ES1/4 (SNMP board) and an ISA PR.

Link Over Cable is different from Martini cable. Martini cable is a connection
from ISA PR EA or ISA ES16 and ISA PR. The inter-working is at MPLS level
and uses just one label (VC-LSP level).
Ethernet cables can be defined and configured to be assigned to Connection
Oriented management (configured in ETS mode) or to Connection-less
management (configured in ETB mode).

.
Link Over WDM.
Details about Link Over WDM Transport link for Ethernet Services:
They are managed by external applications.
Refer to the document: [5] 1350 OMS WDM Guide

.
Link Over MPLS.
Details over MPLS Transport link for Ethernet Services:
VC-LSP is the connection individuated by the VC label (inner label): this
connection is associated just to a single transport and then to an Ethernet link.
LSP tunnel is the infrastructure that carries more than one VC connection. LSP
tunnel is managed by MPLS manager.
Alcatel-Lucent MPLS implementation foresees the usage of two labels differently
by Native implementation that uses only one label.
Link Over RPR.
Details over RPR Transport link for Ethernet Services:

To manage ISA PR, in the ring implemented with ISA PR (Native ring), the
connectivity links need further definition after consolidation of the interface.
Links Over WDM are managed by external applications.
Refer to the document: [5] 1350 OMS WDM Guide

Ethernet Edge Port management

Ethernet ports are managed to give a customer the possibility to connect the Ethernet
Services.
Ethernet port can be defined and configured in:

ETS mode to be assigned to Connection Oriented management.

ETB mode to be assigned to connection-less management.

When Ethernet connectivity is based on SDH technology and is not terminated in the
scope of 1350 OMS PKT, Ethernet ports are considered Edge ports. It depends on the
particular characteristics of the specific Ethernet connection.

....................................................................................................................................................................................................................................
1350 OMS
11-51
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Network Topology Construction

....................................................................................................................................................................................................................................

Autonegotiation

Autonegotiation is used to check the consistency of the Ethernet interfaces. The check is
done between CPE and CE Ethernet ports. The following characteristics are exchanged
between peers:

Duplex mode (half or full duplex).


Interface speed (10Base-TX, 100Base-T).

Symmetric or asymmetric Flow control Pause function capability.


Note: Autonegotiation is not available on GE interfaces.

Autonegotiation is used to warn the user when the two peers are not aligned regarding
duplex mode and interface speed. The autonegotiation process must not mandatory
choose between interface speeds or duplex modes. For this reason, 1350 OMS PKT
always chooses, for E/FE port, an interface speed between 10 Mbit/s and 100 Mbit/s.
In case of detected misalignment, the NE raises a LOS alarm.
Autonegotiation is triggered when the interface is activated. During the autonegotiation,
traffic is interrupted.
It exists a relation between autonegotiation and flow control configuration:

If autonegotiation is activated on an Ethernet Port, then the user simply configures a


preferred configuration for flow control activation. Then autonegotiation decides for
the final state of flow control (Depending on the CE capability).

If autonegotiation is not activated on the Ethernet Port, then the user explicitly enables
or disables the flow control.

On port basis, the user can enable or disable the Auto-negotiation mode. In case of
enabling the user optionally set the advertised characteristics, to allow connecting a CE
with characteristics different from the default ones. The user provides:

Exclusive 10Base-TX or 100Base-T for an E/FE port.


Duplex mode (Half or Full).

After port activation and autonegotiation completed, 1350 OMS PKT uploads the
negotiation result. If Flow Control is enabled or disabled, the user is warned.

....................................................................................................................................................................................................................................
1350 OMS
11-52
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

Traffic Management
Overview

The traffic management is related to the Ethernet Service, EVC management, VLAN
management, Policy control, and SLA management.
Note: SLA management function must be confirmed and then detailed: for this reason
no further information is reported in this version, only a simple label reference is
managed, without any elaboration or control.
Ethernet Service Management

A service belongs to a given customer.


Note: In the broadband access service, more end-user customers use the same
service: in this case the customer is the ISP for which telecommunications user has
created the service.
A service can connect two or more PEs, each associated to a CE.
A service is composed of one or more EVC.
An Ethernet Service is described in term of customer, associated EVC and referred SLA.
An EVC is described in term of its end points and associated Ethernet Segments.
An Ethernet Segment is described in term of its end points (two), directionality and QoS
(Traffic Descriptor and Traffic Classifier).
The Ethernet Service is a simple and flexible EVC collector.
EVC Management

The EVC management provides the following main operations:

Creation of the EVC: type, access points, unicast, or multicast.


Creation of the Ethernet Segments: the number of unidirectional End-to-End Ethernet
Segments that must be defined depends on the EVC topology. Definition requires
Traffic Descriptor, Color Profile, policy mode, and Traffic Classifier. The route of
each Ethernet Segment is manually defined by the user. No complete automatic
routing at Ethernet layer is foreseen: it can be semi-automatic that is supplying one or
more constraints.
Creation of Transport Link: for each Ethernet Segment one or more Transport Links
are associated. The 1350 OMS PKT uses Transport links created by specific
manager. If Transport links are not available, 1350 OMS PKT requires the
implementation of the needed Transport Link to the specific manager.
Supervision: the 1350 OMS PKT provides the complete control of an EVC and
associated Ethernet Segments status management, connectivity end-to-end test, alarm
management, and PM. (The supervision operation is listed here but it belongs to
Ethernet Maintenance management area)..

....................................................................................................................................................................................................................................
1350 OMS
11-53
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

VLAN management

One important feature of the Alcatel-Lucent ISA boards is the support and the
management of the VLAN tag (often called simply VLAN ).
Note: Only Edge VLAN is supported for ISA PR EA 1.1.
Only Stacked VLAN is supported for ISA PR EA 1.2 and ISA ES family.
The VLAN tag on Ethernet frames is a way to segregate Ethernet traffic.
The VLAN tag is composed of 4 bytes:

the first two are the VLAN Tag Protocol Type (802.1Q Tag Type), whose standard
value is 0x8100 .

the second 2 bits are the Tag Control Information (TCI). TCI is split into VLAN Id
(12 bits) and Priority Id (3 bits).

The following Figure represents the formats of the Ethernet Frame.


Figure 11-13 Ethernet Frame Format

Preamble

7 octects

Preamble

7 octects

Preamble

Start Frame Delimiter

Start Frame Delimiter


Destination Address

1 octects
6 octects

Start Frame Delimiter

Destination Address

1 octects
6 octects

Source Address

6 octects

Source Address

6 octects

Source Address

2 octects

Q-Tag Protocol Type

2 octects
2 octects
2 octects

P-Tag Protocol Type

Length/Type

Q-Tag Control Information

Length/Type
Data

Destination Address

P-Tag Control Information


Q-Tag Protocol Type
Q-Tag Control Information

46 .. 1500
octects

Length/Type
Data

Padding

MAC Frame

Padding
Frame Check Sequence
Tagged MAC Frame

1 octects
6 octects
6 octects
2 octects
2 octects
2 octects
2 octects
2 octects

46 .. 1500
octects
Data

Frame Check Sequence 4 octects

7 octects

4 octects

46 .. 1500
octects

Padding
Frame Check Sequence

4 octects

Stacked Vlan Frame

....................................................................................................................................................................................................................................
1350 OMS
11-54
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

Figure 11-14 Q-Tag Prefix Format

Ethernet Frame Hierarchy

The ISA PR EA boards and ISA ES16 boards handle all the frame types of the Ethernet
Frame hierarchy: untagged, Q-tagged, and P-tagged frames.
The following figure shows the place of those objects in the topology:

....................................................................................................................................................................................................................................
1350 OMS
11-55
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

Figure 11-15 Ethernet Frame Hierarchy

VLAN Tag, VLAN Id, Priority Id

The management of the VLAN Tag Protocol Type (Standard Q-TAG or proprietary Tag)
is logically separated from the management of the VLAN Id and Priority Id.
The VLAN Tag Protocol Type is managed on Ethernet Interface basis.
The VLAN Id and Priority Id are managed on Ethernet Flow (Ethernet Segment) basis.
The VLAN Id is used to direct Ethernet traffic to those Ethernet ports (UNI) that are
members of a given VLAN tag.
VLAN Tag and VLAN Id ensure that tagged frames are accessible only by the proper end
user, they implement traffic segregation.

....................................................................................................................................................................................................................................
1350 OMS
11-56
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

The 12 bits of the VLAN Id permit a maximum of 4096 different VLAN in a single
Ethernet Segment.
The VLAN Tag Protocol Type associated to an Ethernet interface is used to determine
whether a frame is tagged or untagged:

If the protocol type matches the one provisioned on the interface, such a frame is
considered tagged.
If the protocol type does not match the one provisioned on the interface, such a frame
is considered untagged.
If the protocol type is missing as in the case of untagged frames, such a frame is
considered untagged.

Then the frame is subjected to the classification using the Traffic Classifiers.
The VLAN tag has a major problem when used for implementing Ethernet Services on a
transport network: it does not allow designing a global and scalable solution for switching
Ethernet frames on a transport network.
Alcatel-Lucent solution

Alcatel-Lucent solution allows the use of VLAN tag in different ways:

Transparently. The VLAN tag is passed from the ingress to the egress port without
any elaboration. The VLAN is not used by Alcatel-Lucent network but only by the
customer.
To switch the Ethernet frames. In the VPAS service, the customer must use different
VLANs for different ports (at least one VLAN for each port). The Ethernet frames are
sent from hub only to the selected spoke site.
To swap a received VLAN tag (provider VLAN) with another one.
To pop the internally used VLAN tag before to egress the frame.
To swap the used VLAN tag with another one.

The use of VLAN tag

The VLAN tag is introduced for splitting the network into different broadcast (or
multicast) domains. The VLAN tag solve security, privacy, bandwidth management, and
increase the performance.
The VLAN tag can be used to switch traffic in different contexts:

To define Ethernet VPNs (VPHS service).


To optimize the implementation of the VPAS service (avoiding to send frame
broadcast when direction is from hub to spoke port).
To switch broadband access traffic to the selected ISP. For instance, the use of
customer-based VLAN for routing purposes in the network couples the operational
aspects of the customer and network domain.

....................................................................................................................................................................................................................................
1350 OMS
11-57
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

To allows inter-working with external equipment. It uses non standard VLAN tag of
other suppliers. The network inter-working can be chosen using a transit mode
(tunneling) or using a peer-to-peer model (mapping mode). Operations are: VLAN
push, pop, and swap.

To segregate, in a bridge network, different customer traffic on the same Transport


Link by using the VLAN stacking mechanism.

VLAN tag degrees of implementation

The VLAN tag management has various degrees of implementation:


1. Traffic classification and policy management. Tagged and untagged frames are
handled and the VLAN tag, when present, is used for classification (Traffic
Classifiers) and policy management (Policy Mode and Color Profile).
2. Full support of C-VLAN (Customer VLAN) and P-VLAN (Provider VLAN) frames
at UNI and IWI. In addition to traffic classification and policy management, push
(insertion) and pop (extraction) of VLAN tag are allowed on the Ethernet frames. The
VLAN tag management is supported to guarantee a correct inter-working with
customer equipment (UNI) or with external provider equipment (IWI).
3. Traffic engineering through C-VLAN and P-VLAN. In addition to full support of
C-VLAN and P-VLAN frames at UNI and IWI. The VLAN management is supported
also in the internal interfaces of the ETS network, not only at UNI and IWI.
Note: In terms of VLAN management, the 1350 OMS PKT scope is the full support
of C-VLAN and P-VLAN frames at UNI and IWI. See the description at point 2.
The description at point 3 is out of the scope of the current release. No manipulation
(push, pop, swap, and so forth) of the VLAN tag is allowed in internal interfaces. (that
is non-UNI and non-IWI) or for purposes different from the inter-working with
external equipment (customer or provider).
Tagged frame management

VLAN tag management feature has two aspects:

The management of a pop or push of a VLAN tag.

The configuration of the VLAN Tag Protocol Type at the interfaces (Ethernet ports or
TDM terminations).

The interface of the NE must be provisioned with a value of VLAN tag protocol type to
recognize the frames and classifies them. By default, the interfaces support the standard
VLAN tag protocol type (Q-tag: 8100).
For an incoming VLAN tagged frame, the NE processing has the following sequence:

The arrival of the frame on the interface.

The comparison of the VLAN tag protocol type of the frame with the one configured
on the interface. If they match, the frame is handled as a VLAN tagged frame. If
protocol types are different or the incoming frame is untagged, the frame is
considered untagged.
The classification of the frame according to the P-VLAN Id, C-VLAN Id, or
untagged. If no classifier matches then the frame is discarded.

....................................................................................................................................................................................................................................
1350 OMS
11-58
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

The pop or push operation.


When a pop is performed, the topmost VLAN tag is removed from the frame.

When a push is performed, a new VLAN tag is inserted in the outgoing frame. The
VLAN protocol type value is taken from the egress interface and a given VLAN Id.
The transmission of the frame.

Tagged frame transmission models

Two VLAN models of VLAN tagged frame transmission are identified:

Mapping Model:
Mapping Model implements the inter-working with the customer edge equipment or
the provider networks, at edge or crossed equipment. The VLAN tag of the frame
must be removed (pop) or added (push) at UNIs or IWIs. The following basic cases of
VLAN tag management are described. Any combination of these cases can occur in
the network.
Customer VLAN mapping (p. 11-59).
Provider VLAN mapping (p. 11-60).
Tunneling Model:
In Tunneling Model, the VLAN tag is preserved across the network. The two cases of
tunneling are:
Customer VLAN tunneling (p. 11-61).

Provider VLAN tunneling (p. 11-61).

Customer VLAN mapping

For the inter-working with the customer edge equipment, the VLAN tag of the frame
must be removed (pop) at UNIs.
C-VLAN tag removal.
Figure 11-16 Customer VLAN Removal

Note: To avoid a discarding of the C-VLAN tagged frame, the NE contains a


classifier with VLAN Id equal to C-VLAN Id.
....................................................................................................................................................................................................................................
1350 OMS
11-59
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

Provider VLAN mapping

Provider VLAN mapping manages the inter-working with external networks. An external
network belongs to an external provider. An external network can be edge or crossed. The
VLAN tag of the frame must be removed (pop) or added (push) at IWIs.
P-VLAN tag removal.
Figure 11-17 Provider VLAN Removal

Note: The interface of the NE must be configured with P-VLAN protocol type. To
avoid a discarding of the frame, the NE contains a classifier with VLAN Id equal to
P-VLAN Id.
P-VLAN tag addition
Figure 11-18 Provider VLAN Addition

Note: The interface of the NE must be configured with the P-VLAN protocol type.

....................................................................................................................................................................................................................................
1350 OMS
11-60
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

P-VLAN tag addition + removal


Figure 11-19 Provider VLAN Addition and Removal

Note: The interfaces of the NEs connected to the provider network must be
configured with the P-VLAN protocol type. To avoid a discarding of the frame, the
NE of the pop operation contains a classifier with VLAN Id equal to P-VLAN Id.
Provider VLAN tunneling

It provides a tunneling capability called P-VLAN Tag preservation.


Provider VLAN tunneling does not allow any push or pop of the VLAN Tag between the
two NEs within the route of the Ethernet Service.
Figure 11-20 Provider Tunneling Mode

Customer VLAN tunneling

It provides a tunneling capability called C-VLAN Tag preservation.


The following Ethernet Service can use a provider network as a transport. In a provider
network, a push and a pop of the P-VLAN Tag can occur at any point in the route. Refer
to the basic case of mapping model in P-VLAN tag addition + removal (p. 11-61).

....................................................................................................................................................................................................................................
1350 OMS
11-61
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

Figure 11-21 Customer Tunneling Mode

VLAN Tag Protocol Type configuration

The VLAN Tag Protocol Type configuration is needed for the mapping mode and the
tunneling mode. See also Configure a transport Link (p. 19-30).
In Ethernet port or TDM termination, theVLAN tag protocol type of crossing interface is
compared with of the VLAN tag protocol type of the frame. If they do not match, the
frame is considered as an untagged frame. If the interface is not associated to an untagged
classifier, the frame is discarded.
Untagged classifier has VLAN Id equal to 4096.
VLAN Tag Protocol Type configuration:

In the case of mapping mode, the add or remove of the P-VLAN tag is supported.
Only the interfaces connected to the provider network must be configured.

In the case of tunneling mode, P-VLAN tag preservation is accomplished.


In tunneling mode, two kinds of connections exist:

The tagged frames can have different destinations.


For example: the provider network A sends toward Z only the P-VLAN frames
with a VLAN Id equal to 2. The other P-VLAN tagged frames are sent toward
another destination. See Figure 11-22, Protocol Type configuration for multiple
destinations (p. 11-63).
To avoid this operation, a low cost solution is to encapsulate the frame in a
VC-LSP, to cross the network. In this case, only the interfaces connected to the
provider networks are configured. See Figure 11-23, Low Cost solution
(p. 11-63).

The P-VLAN tagged frames have only one destination.


For example, the provider network A sends all the P-VLAN tagged frames only
toward Z. See Figure 11-24, Protocol Type configuration for single destination
(p. 11-64).

....................................................................................................................................................................................................................................
1350 OMS
11-62
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

Figure 11-22 Protocol Type configuration for multiple destinations

Note: For Ethernet Service with multiple destinations, the associated classifier
contains a VLAN Id equal to 2 and the P-VLAN tag protocol type is configured in
each crossed interface.
Figure 11-23 Low Cost solution

....................................................................................................................................................................................................................................
1350 OMS
11-63
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Traffic Management

....................................................................................................................................................................................................................................

Figure 11-24 Protocol Type configuration for single destination

Note: For Ethernet Service single destination, the associated classifier contains a
VLAN Id equal to 4096 (untagged value). All the frames from the provider network A
are sent to the Z. No VLAN tag protocol type configuration is required at the
interfaces.
Policy Control

The policy control is an application to configure the edge nodes with QoS parameters,
IEEE 802.1p defines 8 priority levels and how Ethernet Service utilizes these priorities.
At the edge of the network, frames (identified by port and VLAN) are classified in a set
of priority levels and tagged according to classification criteria. In the core of the
network, frames are switched using different queues, based on their priority tag.
The Ethernet frame priority bits are used together the VLAN Id. They form just a single
value. Priority bits individuate an Ethernet traffic flow. To the traffic flow is associated a
traffic type (Guaranteed, Regulated or Best Effort) and bandwidth. When ISA PR EA is
an Edge node, traffic type and bandwidth are mapped on PIR, CIR, and CBS and PBS.
The priority permits to classify the frame in term of green, yellow, or red frames. Frames
are then mapped on MPLS layer or on SDH VC. In case of ISA E/FE/GE board (Q3
board) these bits are transparently transported.
The ingress of Ethernet frames can be managed by a policy color blind (the incoming
classification is not used) or color aware. In color aware, the priority bits are
considered by ISA board family.

....................................................................................................................................................................................................................................
1350 OMS
11-64
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

MPLS Management

....................................................................................................................................................................................................................................

MPLS Management
Overview

The MPLS management is linked to the following entities:

MPLS/T-MPLS Transport link (p. 11-65).

Traffic Descriptor (p. 11-66).

LSP Tunnel (p. 11-66).

VC-LSP (p. 11-67).

T-MPLS Transport link

See MPLS/T-MPLS Transport link (p. 11-65).


MPLS/T-MPLS Transport link

For general information about Transport Links, see: Transport link management
(p. 11-50).
A Transport Link is the image, in the MPLS Management Domain, of a Link Over TDM
or a Link Over Cable. Its end points are Transport Link End Points.
A Transport Link (MPLS) is always Point to point:

If based on a Link Over TDM, it provides the transport of LSP tunnel between two
NEs or between a NE and an ENE.

If based on a Link Over Cable, a VC-LSP between a NE and an ENE carries it.

Only the PR EA NE and ES16 NE provide the MPLS features.


Transport links, displayed in the maps, allow to rationalize and to determine easily the
route of LSP Tunnel.
The MPLS Label range is attached to the Transport link. The MPLS labels are distributed
between LSP tunnel and VC-LSP.
The operation provided for a Transport link is:

Characteristic definition.
Get bandwidth indication.

Get properties, extremities, inventory.

Characteristic definition consists of the configuration of the MPLS label range. This
operation is automatic after the creation of the Transport Link. However, the user could
modify this parameter.
A Transport Link can be a Unidirectional or a Bi-directional Entity.

....................................................................................................................................................................................................................................
1350 OMS
11-65
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

MPLS Management

....................................................................................................................................................................................................................................

Traffic Descriptor

Each LSP is characterized by a Traffic Descriptor. It indicates the QoS and the traffic
parameters according to these rules:

BE: related to the best effort. No bandwidth is reserved but a maximum number of
VC-LSP by transmission path is checked. The system also checked that PIR is greater
than 0, CIR is equal to 0, PBS is greater than 0, and CBS is equal to 0.
EF: related to the guaranteed traffic. The reserved bandwidth is equal to CIR and PIR
equal to CIR, CBS equal to PBS and CBS greater than 0.
AF: related to regulated traffic. The reserved bandwidth is equal to CIR and PIR
greater than CIR, PBS greater than 0 and CBS greater than or equal to 0.

Actions on a Traffic Descriptor

The possible actions that involve a Traffic Descriptor are:

Creation, deletion, modification.


Get properties, inventory.

Main attributes of a Traffic Descriptor

The Traffic Descriptors are composed by the following information:

Traffic Descriptor User label.


Comment.
QoS: BE, AF, EF.
PIR, CIR, PBS, and CBS values.

LSP Tunnel

An LSP tunnel is a Point to point unidirectional connection, carried by Transmission


paths with a Transport type sets to the SDH value.
To route an LSP tunnel, the user gives the full path of the LSP Tunnel as a list of
constraints. Constraints are Transmission paths and, optionally, MPLS labels.
To allocate, the user defines a list of constraints corresponding to the list of the Transport
Links.
To provision the LSP tunnel, the system configures each involved NE to implement the
related Traffic Descriptor and to implement theLSR or LER cross connections. This
infrastructure can carry one or more VC-LSP with the same QoS.
Actions on a LSP tunnel

The possible actions that involve a LSP tunnel are:

Creation, deletion, modification.


Get properties, extremities, route, inventory.
Allocation or de-allocation of LSP tunnel.

Implementation or de-implementation of LSP tunnel.


Indication of bandwidth loading.

....................................................................................................................................................................................................................................
1350 OMS
11-66
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

MPLS Management

....................................................................................................................................................................................................................................

State management.
Fault Localization.

The LSP tunnel states

The LSP tunnel states are:

Provisioning state:
Defined, Allocated, Partially Implemented, Implemented.
The provisioning state indicates the result of each operation used to implement an
LSP tunnel in a network.
If the implementation does not completes, then the provisioning state changes to
Partially Implemented. The same rule is applied to the de-implementation.
Usage state:
Idle, Busy, Reserved.
If the LSP Tunnel supports at least one VC-LSP, it changes to busy. In addition, at
each changing, the available bandwidth must be computed.
.
Availability status:
Normal, Degraded, In failure.
The availability status is related to the presence or not of alarms.
.
Working state:
Normal, Removing, Allocating, De-Allocating, Implementing, De-Implementing.

The Working state is related to the action on going on the object.

VC-LSP

A VC-LSP is provisioned only at its extremities. No cross connection is allowed on


intermediate NE.
A VC-LSP is carried by one LSP tunnel or by one Transmission path and the Type set to
Ethernet value. This infrastructure can carry one Ethernet Service.
Actions on a VC-LSP

The possible actions that involve a VC-LSP are:

Creation, deletion, modification.


Get properties, extremities.

Implementation, de-implementation.
Commission, de-commission.
State management.

The VC-LSP states

The VC-LSP states are:

Provisioning state:

....................................................................................................................................................................................................................................
1350 OMS
11-67
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

MPLS Management

....................................................................................................................................................................................................................................

Defined, Partially Implemented, Implemented, Commissioned.

Availability status:
Normal, Degraded, In failure.
The availability status is related to the presence or not of alarms.

Working state:
Normal, Removing, Implementing, De-Implementing, Commissioning,
De-Commissioning.

....................................................................................................................................................................................................................................
1350 OMS
11-68
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Maintenance Management

....................................................................................................................................................................................................................................

Maintenance Management
Overview

The maintenance management is related to Alarms, Fault Localization, PM management,


and Inventory.
Alarms

The only available alarms are the equipment alarms: no specific Ethernet transmission
alarm is available; only an alarm related the link between CE and PE are available at
Ethernet port level. The alarm coming from SDH failure is signaled and associated to the
Ethernet link termination supported by the alarmed SDH path.
The application evaluates the service status on Ethernet Services starting from EVC and
Ethernet Segments. On Ethernet Segments, the availability status is calculated based on:

Alarms on the server Transport Links: SDH alarms, MPLS VC-LSP alarms.
Alarms on Ethernet ports.
Note: For SDH paths, the alarm working state is available..

The alarms received are used to calculate the availability status of each affected objects.
The alarm received is elaborate and a new specific alarm is generated. These alarms with
a specific Network Management Level probable causes are sent to Fault Management.
Affected objects are the different type of Transport Link (called Link Over
technology specific), the MPLS LSP tunnel and the Ethernet Segment.
Fault Localization

The Fault Localization allows a user to determine the list of elementary alarms affecting a
managed resource. Examples of managed resource are Ethernet Segments, Transport
Links, and LSP tunnels.
The Fault Localization distinguishes problems related to the Ethernet Service from
problems in the underlying transport network. Fault Localization helps the user in
verifying where the fault is located, which board, which connection. The methods used
are the loop back operation and selective PM counters collection.
Fault Localization is called by choosing an alarm on AS: the overall elementary alarms
affect the objects are visualized.
The Fault Localization List window can be invoked either from Fault Management GUI
or from Construction, Ethernet Management, or MPLS GUI.
Quality of service: PM management

The PM management allows the collecting of detailed performance measurements on user


Ethernet traffic. Statistics are computed on a per service, per EVC, per Ethernet Segment.
These data can be used as base for QoS data or for maintenance reason (Fault
Localization, preventive maintenance, and so forth). The use depending on the counter
type (aggregation counters or flow counters) and on the frequency of the collection.
....................................................................................................................................................................................................................................
1350 OMS
11-69
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

Maintenance Management

....................................................................................................................................................................................................................................

Inventory

The inventory requires information about the resources used by a service: from Ethernet
Service until the transmission resources.

....................................................................................................................................................................................................................................
1350 OMS
11-70
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

User Profile Management

....................................................................................................................................................................................................................................

User Profile Management


System Management

The main system management offered functions concern the User Profile management.
The System management is taken in charge by the System Management Function (SMF)
external application of ALMAP.
For more information about SMF, refer to the document: [2] 1350 OMS Administration
Guide, Vol 2: Common GUI Functions.
User Profile concepts

User Profile is a set of services based on the following concepts:

FAD: Set of functional access domains, for example a set of management functions.

NAD: Set of network access domains.


Functional resources.
A set of functional resources can be:
An External Termination Point (ETP).
Indirect Transport link for which NAD is inherited from terminations.
an Ethernet Segment.

Initiator: Gives the access rights on the NAD. By default, they are seven initiators:
Administrator, Free Pool, NAD1, , NAD5.
User Profile: Set of FADs that a user is allowed to access.

User: The user is identified by a login and a password and associated to one User
Profile and one initiator. A user is only allowed to access the management functions
and the management entities included in profile and initiator the user is assigned to.

Access control database: The database which contains all the information relative to
the access control management (for example users, user profiles, User Profile
assignments, and so on).

The actors

The actors who interact with this set of services are the following:

The Administrator is a user allowed to administer the 1350 OMS PKT application
and to operating system.
The Constructor has the rights to manage only the subnetworks, NEs, ENEs, Links
Over TDM, cable, MPLS.
The Operator has the rights to configure and get information about the network.
The Viewer has the rights only to get information about the network.
The north interface manager has the rights to configure and get information about
the network.
The north interface viewer has the rights only to get information about the network.

....................................................................................................................................................................................................................................
1350 OMS
11-71
8DG42227DAAA 9.6
Issue 3 December 2012

Generalities
Functional Domain

User Profile Management

....................................................................................................................................................................................................................................

For a detailed description on available operations for each actor, refer to: Chapter 5,
1350 OMS PKT User Management.
Relationship between resource and initiator

The Free Pool NAD is a set of resources available to all 1350 OMS PKT users. The
1350 OMS PKT Administrator NAD groups resources available to users with the 1350
OMS PKT Administrator initiator.
NAD of the resource.

Required initiator to modify the NAD of the


resource.

1350 OMS PKT Administrator.

1350 OMS PKT Administrator.

Free Pool.

1350 OMS PKT Administrator; Free Pool.

Other.

1350 OMS PKT Administrator; Other.

The NAD values

The NAD value is a numerical value between 0 and 99999. The following NAD values
have specific meaning:

NAD=0 identifies a free pool object. The free pool object is not assigned to any
specific Network Partition. The free pool objects are visible and accessible by each

user and by external applications. (External access is not checked by 1350 OMS
PKT).
NAD=999 identifies a dedicated free pool object. The dedicated free pool is a
second set of FREE POOL objects. The dedicated free pool objects are not assigned
to any specific Network Partition neither to the Free Pool set. The dedicated free
pool objects are visible and accessible by each user and by external applications.
(External access is not checked by 1350 OMS PKT).
NAD value in the range from 1 to 998 and from 1000 to the unsigned integer limit
identifies a Network Partition. The Network Partition objects are visible only to users
having the privileges on that Network partitions. (In the scope of 1350 OMS PKT, no
user access right are connected to NAD values, so that the external applications
supply the appropriate filtering criteria to access and operate on the right set of
objects).

....................................................................................................................................................................................................................................
1350 OMS
11-72
8DG42227DAAA 9.6
Issue 3 December 2012

12

Managing your Network


12

Overview
Purpose

This chapter gives operational guidelines for managing the network, it provides the
conceptual information and the associated tasks for the Network configuration of the1350
OMS PKT application. The network construction consists in representing the managed
network with the necessary submaps and creating all the required objects in the data
bases.
Contents
Network configuration

12-3

Create the network objects

12-3

External Network Reference

12-14

Create Physical Connection

12-20

Create LAG

12-24

Create Domain

12-27

Create Domain

12-27

Assign resource to Domain

12-31

Define NE

12-35

Traffic categories

12-39

Create Traffic Descriptor

12-39

Create Traffic Classifier

12-43

L2 Encapsulation

12-46

NML-EML synchronization

12-60

1350 OMS PKT resynchronization

12-60

Alignment after deletion and recreation of SDH Path

12-61

VPWS Ethernet PM management procedure


PM feature for the ISA ES1 1.0 board

12-62
12-62

...................................................................................................................................................................................................................................
1350 OMS
12-1
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network

Overview

....................................................................................................................................................................................................................................

Provider network operating as a distributed MAC Bridge

12-67

Single-Customer, No-VLAN, RSTP provisioning

12-69

Provisioning procedure (MAC-SC-NV-RSTP)

12-70

VLAN configuration scenario


VLAN configuration
MAC Bridge Network Configuration
MAC Bridge Basics

12-75
12-75
12-77
12-77

....................................................................................................................................................................................................................................
1350 OMS
12-2
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................

Network configuration
Create the network objects
When to use

Use this task to create new network objects.


General

During this activity, the operator has to create all the submaps according to the network
partitioning levels and insert inside them all the objects (network, subnetworks, 2nd level
subnetworks, nodes, ports and connections).
Before you begin

Open a Web Portal application.

....................................................................................................................................................................................................................................
1350 OMS
12-3
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................

Create Subnetwork
...................................................................................................................................................................................................

Point to the parent object where you wish to create the subnetwork and issue Actions >
Create Subnetwork
Figure 12-1 Actions>Create Subnetwork

...................................................................................................................................................................................................

The Create Subnetwork box is displayed. Enter name. The starting object, i.e. the parent
one, is already selected. In case you want to modify the choice, select the Starting Object
(left click) field. This will retrieve a list of potential parent objects, where to select the
starting object,

....................................................................................................................................................................................................................................
1350 OMS
12-4
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................

Click on OK to confirm the creation.


Figure 12-2 Create Subnetwork box

....................................................................................................................................................................................................................................
1350 OMS
12-5
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the node to assign and click on V to confirm.


Figure 12-3 Create Subnetwork: Assign Children Nodes

....................................................................................................................................................................................................................................
1350 OMS
12-6
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the node to assign to the subnetwork being created and click on OK.
Figure 12-4 Node to assign to subnetwork

....................................................................................................................................................................................................................................
1350 OMS
12-7
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The node is now assigned. Click on OK to confirm the subnetwork creation.


Figure 12-5 Confirm subnetwork creation

....................................................................................................................................................................................................................................
1350 OMS
12-8
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The new subnetwork is now present in the map


Figure 12-6 Subnetwork present in the map

E...................................................................................................................................................................................................
N D O F S T E P S

Creating Nodes

Note: Nodes to add have been previously created.


The following steps must be executed

From the main menu bar select


Action > EML > Create > NE to declare the NE

Search > EML > NE to verify that the NE has been created

Select the NE in the list and then with the right mouse button select from the
popup menu Actions > NE Address

....................................................................................................................................................................................................................................
1350 OMS
12-9
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................

All NEs of the managed EML layer are automatically created and present in the database.
They can be inserted by the user in the target topology.
...................................................................................................................................................................................................

Select the subnetwork where you want to create the node and issue Actions>Modify
subnetwork
Figure 12-7 Actions>Modify subnetwork

....................................................................................................................................................................................................................................
1350 OMS
12-10
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Modify Subnetwork dialog box is displayed.


Figure 12-8 Modify subnetwork

....................................................................................................................................................................................................................................
1350 OMS
12-11
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Modify Subnetwork dialog box is displayed. Click on button Contained Nodes and
Subnetworks. The relevant list is opened as a subwindow. see following figure. Select the
node (TSS-A in this case) to add and click on V to confirm.
Figure 12-9 Select the node to add

....................................................................................................................................................................................................................................
1350 OMS
12-12
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create the network objects

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click on OK to confirm.
Figure 12-10 Modify subn: adding a node

...................................................................................................................................................................................................

The new node is created and its relevant icon is displayed in the relevant map.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-13
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

External Network Reference

....................................................................................................................................................................................................................................

External Network Reference


When to use

Use this task to create an external network reference.


Description

External Networks are used to describe a connection between various SDHs or to create a
path terminated on a node non controlled by SDH. A path is defined as non terminated if
either one of the NAPs or both are not in the SDH domain. A non-terminated path
describes a path between a Trail Termination Point (TTP) associated to a PDH port and a
Connection Termination Point (CTP).
Before you begin

Open a Web Portal application.


Create the External Network Reference

Task
...................................................................................................................................................................................................

Select from the main menu bar Actions > Physical > Create External Network
Figure 12-11 Actions>Physical>Create External Network

....................................................................................................................................................................................................................................
1350 OMS
12-14
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

External Network Reference

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Create External Network. dialog box is presented. Enter userlabel, sitename and click
on OK
Figure 12-12 Create Ext Netw. dialog box

....................................................................................................................................................................................................................................
1350 OMS
12-15
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

External Network Reference

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the destination topology and issue Actions > Modify subnetwork
Figure 12-13 Actions>Modify subnetwork

....................................................................................................................................................................................................................................
1350 OMS
12-16
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

External Network Reference

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Modify Subnetwork dialog box is displayed. Click on button Contained Nodes and
Subnetworks. The relevant list is opened as a subwindow. see following figure. Select the
node (virtual in this case) to add and click on V to confirm.
Figure 12-14 Modify subnetwork

....................................................................................................................................................................................................................................
1350 OMS
12-17
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

External Network Reference

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Modify Subnetwork dialog box now contains the new added node in its node list
Figure 12-15 Modify Subn box: new added node

....................................................................................................................................................................................................................................
1350 OMS
12-18
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

External Network Reference

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The icon of the new added node is present in the target subnetwork.
Figure 12-16 New added node in the target map

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-19
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create Physical Connection

....................................................................................................................................................................................................................................

Create Physical Connection


When to use

This procedure is used to create the Physical Connection


Related Information

This task does not have any related information.


Before you begin

Display the map on the Network Management GUI.


Task
...................................................................................................................................................................................................

From the main menu bar issue Actions > Physical > Create Physical Connection
Figure 12-17 Create>Physical Connection

....................................................................................................................................................................................................................................
1350 OMS
12-20
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create Physical Connection

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Create Physical connection box is presented. Enter userlabel, select Connection
type= Ethernet. Click on Next button
Figure 12-18 Physcon create

...................................................................................................................................................................................................

Select the starting node, if not already selected, clicking on A-node empty box.. From the
node list select the relevant node and click on V. Select the port. Click on A Port. The list
of selectable ports is displayed in the left-lower area of the window. Select the port and
confirm by clicking on Exec (green V) button.

....................................................................................................................................................................................................................................
1350 OMS
12-21
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create Physical Connection

....................................................................................................................................................................................................................................

The A port icon is now present in the selection area. With the same modality, perform the
selection of Z Port
Figure 12-19 Physcon create: port selection

...................................................................................................................................................................................................

From the Physical Connection list, displayed via Search > Physical > Physical
Connections, you can see that the Ethernet physical connection has been created as
defined.

....................................................................................................................................................................................................................................
1350 OMS
12-22
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create Physical Connection

....................................................................................................................................................................................................................................

Note: the Ethernet physical connection status will remain defined since the HO
payload is not applicable to an Ethernet physical connection
Figure 12-20 Physcon list: Eth physcon defined

...................................................................................................................................................................................................

The notification mechanism allows to see the just created Eth Physical connection in the
list of Link over Cable.
Figure 12-21 Link over Cable list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-23
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create LAG

....................................................................................................................................................................................................................................

Create LAG
When to use

The scope of this procedure is Create a LAG (Link Aggregation Group).


Related Information

This task does not have any related information.


Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Construction > Create LAG Port
Figure 12-22 Actions>Packet>Construction>Create LAG Port

...................................................................................................................................................................................................

In the Create LAG Port subwindow select:


LAG size. As an example, set size=2. and assign to the LAG 3 ports. The first 2 ports
assigned will be the working ports of the LAG, while the 3rd will act as protecting.
Client Type=ETS or PB (provider bridge)
LACP = TRUE. Means Link Aggregation Control Protocol=True.

....................................................................................................................................................................................................................................
1350 OMS
12-24
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create LAG

....................................................................................................................................................................................................................................

Hash Key.= not meaningful.


Select node and ports via the usual selection mechanism.
Click on Apply to confirm.
Figure 12-23 Create LAG Port

...................................................................................................................................................................................................

The LAG port is now displayed in the Port list.

....................................................................................................................................................................................................................................
1350 OMS
12-25
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Network configuration

Create LAG

....................................................................................................................................................................................................................................

Click twice on LAG port row; a +(expand ) mark will appear on the left area in
correspondence to the LAG port. Select +(expand ); you will get the LAG port detail.
Figure 12-24 LAG port and LAG port detail

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-26
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Create Domain

....................................................................................................................................................................................................................................

Create Domain
Create Domain
When to use

The scope of this procedure is Create a Domain.


Related Information

This task does not have any related information.


Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Construction > Create Domain
Figure 12-25 Actions>Packet>Construction>Create Domain

....................................................................................................................................................................................................................................
1350 OMS
12-27
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Create Domain

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

For Domain type=Bridge you further select bridge type. In particular, selecting
MAC-802-1D you will select the STP (spanning tree protocol) type.
Figure 12-26 Create Domain MAC-802.1D

...................................................................................................................................................................................................

No particular setting for create Domain T-MPLS or ETS (over SDH)

....................................................................................................................................................................................................................................
1350 OMS
12-28
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Create Domain

....................................................................................................................................................................................................................................

Click on OK.
Figure 12-27 Create Domain

...................................................................................................................................................................................................

To check the created domain select Search > Packet > Construction > Domains
Figure 12-28 Search>Packet>Construction>Domains

....................................................................................................................................................................................................................................
1350 OMS
12-29
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Create Domain

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Domain list is shown below.


Figure 12-29 Domain list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-30
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Assign resource to Domain

....................................................................................................................................................................................................................................

Assign resource to Domain


When to use

The scope of this procedure is Assign resource to Domain


Related Information

This task does not have any related information.


Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main menu bar issue Search > Packet > Construction > Network Elements >
Defined NEs
Figure 12-30 Search>Packet>Construction>Network Elements>Defined NEs

....................................................................................................................................................................................................................................
1350 OMS
12-31
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Assign resource to Domain

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The list of the Defined NEs is displayed. Select the NE to assign and issue
Figure 12-31 NE: Search>Ethernet Physical Ports

...................................................................................................................................................................................................

From the Ethernet Ports list you can see that the involved ports are now busy
Figure 12-32 Eth Ports: the port is now busy

....................................................................................................................................................................................................................................
1350 OMS
12-32
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Assign resource to Domain

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the LoC and issue Actions > Assign Resources to Domain
Figure 12-33 LoC: Actions>Assign Resources to Domain

...................................................................................................................................................................................................

The Assign Resources to Domain box is displayed.


Click on icon Domains. The Selectable Domain list is displayed. Select Domain T-MPLS
and click on V to confirm.

....................................................................................................................................................................................................................................
1350 OMS
12-33
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Assign resource to Domain

....................................................................................................................................................................................................................................

In the main Assign Resources to Domain box click on OK to confirm.


Figure 12-34 Assign Resources to Domain

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-34
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Define NE

....................................................................................................................................................................................................................................

Define NE
When to use

The scope of this procedure is to make known (define) an NE to PKT.


Related Information

This task does not have any related information.


Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > Construction > Defined NEs
Figure 12-35 Defined NEs list

...................................................................................................................................................................................................

Navigate to the involved port via the NE Show Equipment.

....................................................................................................................................................................................................................................
1350 OMS
12-35
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Define NE

....................................................................................................................................................................................................................................

The Port Administrative state=DOWN


Figure 12-36 Port Administrative state=DOWN

....................................................................................................................................................................................................................................
1350 OMS
12-36
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Define NE

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Construction > Define Network
Element.
Figure 12-37 Actions>Packet>Construction>Define Network Element

...................................................................................................................................................................................................

The Define Network Element box is displayed.


Select the NE thorough the usual selection mechanism.

....................................................................................................................................................................................................................................
1350 OMS
12-37
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Create Domain

Define NE

....................................................................................................................................................................................................................................

Click on OK.
Figure 12-38 Define Network Element

...................................................................................................................................................................................................

The NE which has been defined is now present in the list of defined NEs and the ports
involved in the LoC have Administative status = UP.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-38
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

Create Traffic Descriptor

....................................................................................................................................................................................................................................

Traffic categories
Create Traffic Descriptor
When to use

The scope of this procedure is to create a Traffic Descriptor.


The Traffic Descriptor describes the band and the COS -class of service (Guaranteed/Best
Effort/Regulated)
Related Information

This task does not have any related information.


Before you begin

All needed conditions are detailed along the procedure.

....................................................................................................................................................................................................................................
1350 OMS
12-39
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

Create Traffic Descriptor

....................................................................................................................................................................................................................................

Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Services > Create Traffic
Descriptor.
Figure 12-39 Actions>Packet>Services>Create Traffic Descriptor

...................................................................................................................................................................................................

In the Create Traffic Descriptor box you may select COS=Guaranteed.

....................................................................................................................................................................................................................................
1350 OMS
12-40
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

Create Traffic Descriptor

....................................................................................................................................................................................................................................

The following is an example of Traffic Descriptor: COS = Regulated. It means a mix of


Guaranteed+Best Effort.
Figure 12-40 Create Traffic Descriptor:Regulated

....................................................................................................................................................................................................................................
1350 OMS
12-41
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

Create Traffic Descriptor

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The following is an example of COS=Best Effort


Figure 12-41 Create Traffic Descriptor: Best Effort

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-42
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

Create Traffic Classifier

....................................................................................................................................................................................................................................

Create Traffic Classifier


When to use

The scope of this procedure is to create a Traffic Classifier.


The Traffic Classifier is the Customer VLAN ID.
Related Information

This task does not have any related information.


Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Services > Create Traffic Classifier
Figure 12-42 Actions>Packet>Services>Create Traffic Classifier

....................................................................................................................................................................................................................................
1350 OMS
12-43
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

Create Traffic Classifier

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In the Create Traffic Classifier box enter name, VLAN ID


Figure 12-43 Create Traffic Classifier

....................................................................................................................................................................................................................................
1350 OMS
12-44
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

Create Traffic Classifier

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Traffic Classifier list is shown below.


Figure 12-44 Traffic Classifier list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-45
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................

L2 Encapsulation
When to use

The scope of this procedure is to create a L2 Encapsulation profile.


The L2 Encapsulation profile is used in VLAN.
Related Information

This task does not have any related information.


Before you begin

All needed conditions are detailed along the procedure.


Display default L2 encapsulation for tunnel
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > T-MPLS > Create T-MPLS Tunnel

....................................................................................................................................................................................................................................
1350 OMS
12-46
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In the Create T-MPLS Tunnel box, enter Tunnel name, main attributes and QoS attributes.
For detail see sect. 3.2 T-MPLS Tunnel create.
Figure 12-45 Create T-MPLS Tunnel step1

....................................................................................................................................................................................................................................
1350 OMS
12-47
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select destinations and constraint.


Figure 12-46 Create T-MPLS Tunnel step2

...................................................................................................................................................................................................

Allocate the tunnel.

....................................................................................................................................................................................................................................
1350 OMS
12-48
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Issue the display of the tunnel list via command Search>Packet>T-MPLS>T-MPLS


Tunnels. The list is displayed.
Figure 12-47 Tunnel list

...................................................................................................................................................................................................

Implement the tunnel.


...................................................................................................................................................................................................

Display the segments of the T-MPLS tunnel via Search>T-MPLS Segments pop-up menu.
Figure 12-48 Tunnel:Search>T-MPLS Segments

....................................................................................................................................................................................................................................
1350 OMS
12-49
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the segment (in this case you can manage only the real segment) and issue
Search>T-MPLS L2 Encapsulation Profiles
Figure 12-49 T-MPLS segment:Search>T-MPLS L2 Encapsulation Profiles

...................................................................................................................................................................................................

The default L2 Encapsulation profile is assigned to the segment.


Figure 12-50 Default L2 Encapsulation profile

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-50
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................

Create T-MPLS L2 Encapsulation Profile


...................................................................................................................................................................................................

From the main menu bar select Actions>Packet>T-MPLS>Create T-MPLS L2


Encapsulation Profile
Figure 12-51 Actions>Packet>T-MPLS>Create T-MPLS L2 Encapsulation Profile

...................................................................................................................................................................................................

In the Create T-MPLS L2 Encapsulation Profile dialog box enter:


name
mac address
tag=yes
vlan ID
priority
drop eligibility

....................................................................................................................................................................................................................................
1350 OMS
12-51
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................

Click on OK to confirm the creation.


Figure 12-52 Create T-MPLS L2 Encapsulation Profile

...................................................................................................................................................................................................

Display the list of the L2 Encapsulation Profiles via Search>Packet>T-MPLS>QOS>TMPLS L2 Encapsulation Profiles

....................................................................................................................................................................................................................................
1350 OMS
12-52
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The profile which has been just created is included in the list.
Figure 12-53 L2 Encapsulation Profiles list

E...................................................................................................................................................................................................
N D O F S T E P S

L2E-Configure tunnel segment


...................................................................................................................................................................................................

Select the segment and issue Actions>Configure


Figure 12-54 T-MPLS Segment: Actions>Configure

...................................................................................................................................................................................................

The T-MPLS Segment configuration box is displayed.


the T-MPLS segment is already selected
select the T-MPLS PHB profile

....................................................................................................................................................................................................................................
1350 OMS
12-53
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................

select the T-MPLS L2 Encapsulation profile


select the virtual transport
select the PM granularity (if any)
Click on Apply.
Figure 12-55 T-MPLS Segment configuration

....................................................................................................................................................................................................................................
1350 OMS
12-54
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the segment (in this case you can manage only the real segment) and issue
Search>T-MPLS L2 Encapsulation Profiles
Figure 12-56 Segment:Search>T-MPLS L2 Encapsulation Profiles

...................................................................................................................................................................................................

The L2 Encapsulation Profile has been associated.


Figure 12-57 L2 Encapsulation Profiles list

E...................................................................................................................................................................................................
N D O F S T E P S

L2 Encapsulation on Pseudo Wires


...................................................................................................................................................................................................

Create a Pseudo Wires. Select Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire


...................................................................................................................................................................................................

In the Pseudo Wires create dialog step1


Enter Pseudo Wires name, main attributes and QoS attributes. For detail see sect. 3.3
T-MPLS PW create.

....................................................................................................................................................................................................................................
1350 OMS
12-55
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................

Click on Next.
Figure 12-58 Create T-MPLS Pseudo Wire

...................................................................................................................................................................................................

In Create T-MPLS PW step2 select the destinations.


Click on the left button on the right-hand side of the Constraints subwindow Select

a section as constraint.
In addition, set PW on section attribute to True. See below figure.
....................................................................................................................................................................................................................................
1350 OMS
12-56
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................

Click on Apply/OK to confirm the creation.


Figure 12-59 Create T-MPLS PW step2

...................................................................................................................................................................................................

To verify the successful creation, issue Search>Packet>T-MPLS>T-MPLS Pseudo Wires


...................................................................................................................................................................................................

The PW list is displayed. See below figure.


Figure 12-60 PW list

....................................................................................................................................................................................................................................
1350 OMS
12-57
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the PW just created and issue Search>T-MPLS Segments.


Figure 12-61 PW: Search>T-MPLS Segments

...................................................................................................................................................................................................

Select the segment and issue Actions>Configure


Figure 12-62 PW segment: Actions>Configur

...................................................................................................................................................................................................

The T-MPLS Segment configuration box is displayed.


the T-MPLS segment is already selected
select the T-MPLS PHB profile
select the T-MPLS L2 Encapsulation profile

....................................................................................................................................................................................................................................
1350 OMS
12-58
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


Traffic categories

L2 Encapsulation

....................................................................................................................................................................................................................................

Click on Apply/OK to confirm the creation.


Figure 12-63 T-MPLS Segment configuration box for PW

...................................................................................................................................................................................................

Select the segment (in this case you can manage only the real segment) and issue
Search>T-MPLS L2 Encapsulation Profiles
Figure 12-64 T-MPLS L2 Encapsulation Profiles for PW

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-59
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network

1350 OMS PKT resynchronization

....................................................................................................................................................................................................................................

NML-EML synchronization
1350 OMS PKT resynchronization
Overview

At startup, the 1350 OMS PKT synchronizes the TDM terminations and Links Over TDM
tables with 1350 OMS SDH NAPS and SDH paths.
In case the 1350 OMS PKT has detected a de-synchronization with the 1350 OMS SDH,
at the GUI start up, the user receives a message indicating the loss of synchronization.
To start a manual synchronization, click the menu: Action > Construction >
Synchronization > Manual synchronization.
A confirmation message is displayed.
After confirmation, the synchronization is performed on TDM terminations and Links
Over TDM entities.
The 1350 OMS PKT and 1350 OMS SDH synchronization is fulfilled in the following
cases:

At the 1350 OMS PKT startup.


During the lifetime of the two managers (1350 OMS PKT and 1350 OMS SDH).
After the end of 1350 OMS SDH isolation.

The synchronization status can be checked at any time, by Action > Construction >
Synchronization > Check synchronization status command.

....................................................................................................................................................................................................................................
1350 OMS
12-60
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


NML-EML synchronization

Alignment after deletion and recreation of SDH Path

....................................................................................................................................................................................................................................

Alignment after deletion and recreation of SDH Path


AlignDBSDHPathID offline procedure

The procedure aligns 1350 OMS PKT data base after the deletion and subsequent
recreation of the same SDH Path in 1350 OMS SDH.
The Tool AlignDBSDHPathId.sh is applicable when following conditions occurs:

An SDH Path under 1350 OMS PKT control (and known as Link Over TDM) has
been deleted and recreated from 1350 OMS SDH.
The SDH path deleted and recreated from 1350 OMS SDH must have the same
characteristics. They must have the same User Label, the same end points, rate, and so
forth.
The Link Over TDM inside 1350 OMS PKT is visible both to MS-GUI.
The Link Over TDM inside Core GUI is marked as not Consistent.
Note: This procedure is a shell script that runs offline.

For a description of the alignment tool, refer to: Chapter 10, 1350 OMS PKT
AlignDBSDHPathID Tool.

....................................................................................................................................................................................................................................
1350 OMS
12-61
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

PM feature for the ISA ES1 1.0 board

....................................................................................................................................................................................................................................

VPWS Ethernet PM management procedure


PM feature for the ISA ES1 1.0 board
When to use

The procedure describes the use the Performance Monitoring on an ISA ES1 1.0 board
and of a port-to-port connection.
Additional information

This case is supplied in the scope of one VPWS (Virtual Private Wire Service). The
established connectivity is bidirectional between two Ethernet ports fully dedicated to this
service.
The procedure is based on the service definition and management from the 1350 OMS
PKT. The PM operations are done through Navigation in the scope of the 1350 OMS
EML.
The goal of this procedure is to activate the Performance measurement on each extremity
of the service to analyze the rendering of the connection.
The following figure aims to describe the application case of the procedure:

The procedure aims to describe the different steps the user must do. Procedure starts from
a VPWS Service between two extremities: ISA #A Port N and ISA #Z port M. The user
aims to observe the corresponding Performances.
Before you begin

The system is running.


The system is properly configured.
....................................................................................................................................................................................................................................
1350 OMS
12-62
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

PM feature for the ISA ES1 1.0 board

....................................................................................................................................................................................................................................

The system is connected by MS-GUI.


Pre-requisite

This chapter aims to list the necessary steps requested to go on with the following
procedure:

All NEs are under the 1350 OMS PKT management, the required resources in term of
port and Link Over TDM have already been built.
The Ethernet Service of type VPWS has been created.
The contained EVC and Ethernet Segment have been allocated and implemented.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

List of the Ethernet Services:


The Ethernet Service List window presents all the Ethernet Services and their attributes.
Select the menu: Search > Packet > Services > Services.
Result: The Ethernet Service List window presents all the Ethernet Services and their

attributes.
Following window is displayed:

...................................................................................................................................................................................................

From the Ethernet Service List, select one VPWS service.


Select the desired VPWS service and require the list of EVC termination:
...................................................................................................................................................................................................

Select the menu: Search > Inventory from Service > List EVC Terminations.
Result: The EVC Termination List window presents all the terminations of the

selected EVC and their attributes.


...................................................................................................................................................................................................

Open the list of the NE:

....................................................................................................................................................................................................................................
1350 OMS
12-63
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

PM feature for the ISA ES1 1.0 board

....................................................................................................................................................................................................................................

Select the menu: Search > Packet > Construction > Network Elements > Defined NE.
Result: NE list presents all the NEs managed (that is already defined) by the 1350

OMS PKT, and their attributes.


Following window is displayed:

...................................................................................................................................................................................................

Navigate toward the NEs:


For each EVC termination, the user must note the reference of the NE and also the user
label of the port.
Starting from the MS-GUI, the user can open the NE list and Navigate for each of them
toward the 1350 OMS EML GUI:
select one NE in the list.
...................................................................................................................................................................................................

Select: Search > Inventory from Network Elements > Zoom-in.

....................................................................................................................................................................................................................................
1350 OMS
12-64
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

PM feature for the ISA ES1 1.0 board

....................................................................................................................................................................................................................................

Result: The equipment view of the selected NE is opened (like on the 1350 OMS
EML or 1320CT).
...................................................................................................................................................................................................

Activate the Performance points:


For each EVC termination (that is each local interface termination of the EVC in the
context of the 1350 OMS PKT), the user activates the performance point:
From the 1350 OMS EML View, select the Performance tab == > Select the desired Local
interface into the resource tree area.
...................................................................................................................................................................................................

From the 1350 OMS EML View, on the top right-hand side of the menu bar, select the
menu Performance == > Ethernet Port Management == > Configure Eth Aggr..
Result: The following window is displayed:

Note: Some small differences appear between the 1320CT GUI and the 1350 OMS
EML GUI. This procedure has been built from the 1320CT GUI.
...................................................................................................................................................................................................

For each area in the window (Incoming, Outgoing), activate the Performance activity:
Select the Data collection tic == > close.
...................................................................................................................................................................................................

10

Display the results of the Performance points through PM.


For each local interface termination of the EVC, the user displays the results of the
performance point:
From the 1350 OMS EML View, select the menu diagnosis > Performance Data > 1
Hour.

....................................................................................................................................................................................................................................
1350 OMS
12-65
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

PM feature for the ISA ES1 1.0 board

....................................................................................................................................................................................................................................

Result: The PM windows (graphical display, reports) are opened with the list of active
Performance points on the NE.

Note: The Navigation toward PM is, at the moment, only based on NE, not on
termination granularity.
The first results are available about 3 h after the start of the PM activity. In the mean
while, the display of PM result is empty of any data.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-66
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

Provider network operating as a distributed MAC Bridge

....................................................................................................................................................................................................................................

Provider network operating as a distributed MAC Bridge


When to use

This procedure explains how Provider network operates as a distributed MAC Bridge.
Related information
Figure 12-65 Provider network operating as a distributed MAC Bridge

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.

....................................................................................................................................................................................................................................
1350 OMS
12-67
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

Provider network operating as a distributed MAC Bridge

....................................................................................................................................................................................................................................

Scheme
Figure 12-66 Provider network operating as a distributed MAC Bridge

Description

When a new Ethernet Service has to be realized for a new customer, the user must be
aware of the following information:

All ISA switches and all switching ports must be used by the same customer.
All infrastructure links connecting switching ports must be used by the same
customer.
Traffic engineering is conditioned by the spanning tree protocol.

Tagged and untagged frames are carried in the same way across the network.

....................................................................................................................................................................................................................................
1350 OMS
12-68
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

Single-Customer, No-VLAN, RSTP provisioning

....................................................................................................................................................................................................................................

Single-Customer, No-VLAN, RSTP provisioning


Network scenario

This network scenario is characterized as follows:

Single customer.

No VLAN management in the provider network.


Spanning tree protocol: RSTP.

All traffic is routed on the active topology. Links not belonging to the current active
topology are unused by data traffic. Traffic classification do not apply: even if different
classes of traffic exist for the same user, they are not managed inside the provider
network.
Figure 12-67 Single-Customer, No-VLAN, RSTP-enabled

....................................................................................................................................................................................................................................
1350 OMS
12-69
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

Provisioning procedure (MAC-SC-NV-RSTP)

....................................................................................................................................................................................................................................

Provisioning procedure (MAC-SC-NV-RSTP)


When to use

This procedure permits to provision MAC-SC-NV-RSTP .


Related information

For a description of the function, refer to the topic Single-Customer, No-VLAN, RSTP
provisioning (p. 12-69).
For a description of VLAN, refer to the topic VLAN management (p. 11-54).
For a description of MAC Bridge and Spanning Tree, refer to the topic MAC Bridge
Basics (p. 12-77).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
Restrictions

The current procedure does not address the following items:

Filtering database management.


RSTP tuning.
ASAP configuration.
Flow control.

Auto-negotiation.
Rate limiting management.

Task
...................................................................................................................................................................................................

For each ISA board to be configured as a switching NE:


For each local or remote Interface Port belonging to the switching NE, in case the port
must be configured as a switching port:
Execute the procedure.
...................................................................................................................................................................................................

For each local or remote Interface Port belonging to the switching NE and to be
configured as a switching port (either UNI, IWI or NNI):
Execute the procedure: Configure UNI, IWI, or NNI switching ports (p. 12-72).

....................................................................................................................................................................................................................................
1350 OMS
12-70
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

Provisioning procedure (MAC-SC-NV-RSTP)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

For each local or remote Interface Port belonging to a switching NE and to be configured
as an internal (that is NNI) switching port:
Execute the procedure: Configure internal switching port (p. 12-72).
...................................................................................................................................................................................................

For each local or remote Interface Port belonging to a switching NE and to be configured
as an edge (that is UNI or IWI) switching port:
Execute the procedure: Configure edge switching port (p. 12-73).
E...................................................................................................................................................................................................
N D O F S T E P S

Configure switching port

For each local or remote Interface Port belonging to the switching NE:
...................................................................................................................................................................................................

If the port is active, then deactivate the port, by means of conditioning port administrative
status to down. Operation is performed through navigation to 1350 OMS EML:
Note: Search > Packet > Construction > Network Elements > Available NEs >
Navigate to EML.
Transmission View > Select Local/Remote Interface > Configure Ethernet Port >
Admin Status > down.
...................................................................................................................................................................................................

Set the ISA NE as a member of connection-less 802.1D network, by means of


conditioning bridge type to MAC (IEEE 802.1D). This operation is performed directly by
1350 OMS PKT:
Search > Packet > Construction > Network Elements > Defined NEs.

Select NE then click Configure > Bridge Type > MAC.


...................................................................................................................................................................................................

Set the type of spanning tree protocol to be used in the connection-less network, by means
of conditioning protocol type to RSTP. Operation is performed through navigation to
1350 OMS EML:
Select Transmission View.
Select the Bridge then click Configure (R) STP Bridge > Protocol Type > RSTP.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-71
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

Provisioning procedure (MAC-SC-NV-RSTP)

....................................................................................................................................................................................................................................

Configure UNI, IWI, or NNI switching ports

For each local or remote Interface Port belonging to the switching NE that must be
configured as a switching port (either UNI, IWI or NNI):
...................................................................................................................................................................................................

Check that the interface type attribute is ethernetCsmaCd. Operation is performed


through navigation to 1350 OMS EML:
Select Transmission View.
Select Local/Remote Interface then click Ethernet Port Properties > Type >
ethernetCsmaCd.
This item is not configurable in all the NE types and releases.
Note: This operation is not supported by all the NE types and releases.
Check that port promiscuous mode is enabled. Operation is performed through navigation
to 1350 OMS EML:
Select Transmission View.
Select Local/Remote Interface then click Ethernet Port Properties > Promiscuous
Mode > enabled.
Note: This item is not configurable in all the NE types and releases.
Note: Promiscuous mode management is supported by ISA ES1/4 1.2, ISA ES16 2.0.
...................................................................................................................................................................................................

Set the port as a bridging port, by means of conditioning port client type to ETB.
Operation is performed directly by 1350 OMS PKT.
if.

then.

For local Interface Ports:

Select Search > Packet > Construction > Network Elements >
Defined NEs.
Select NE and click physical Port list.
Select Port and click Configure > Client Type > ETB.

For remote Interface


Ports:

SelectSearch > Packet > Services > Connection Oriented (ETS) >
ETS Transport Links.
Select Transport Link and click Configure > Client Type > ETB.

E...................................................................................................................................................................................................
N D O F S T E P S

Configure internal switching port


...................................................................................................................................................................................................

For each local or remote Interface Port belonging to a switching NE that must be
configured as an internal (that is NNI) switching port:

....................................................................................................................................................................................................................................
1350 OMS
12-72
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

Provisioning procedure (MAC-SC-NV-RSTP)

....................................................................................................................................................................................................................................

Force control plane port state to dynamic. Operation is performed through 1350 OMS
EML:
Select Transmission View.
Select Bridge Port and click RSTP Per-Port Management > Force Port State > dynamic.
Note: This operation is not supported by all the NE types and releases.
The forced state is dynamic by default. Forcing control plane port state is supported
by ISA ES1/4 1.2, ISA ES16 2.0.
...................................................................................................................................................................................................

Activate the port, by means of conditioning port administrative status to up. Operation is
performed through navigation to 1350 OMS EML:
Select Transmission View.
Select Local/Remote Interface and click Configure Ethernet Port > Admin. Status > up.
Result: After this step, control frames travel inside the provider network and the
spanning tree is stabilized. If the customer network has no back-door links giving rise
to loops, the provider active topology remain stable.

Note: If none of the following conditions occur: Fault on a local or remote


interface, NE isolation, Local access control granted, Topology modification.
E...................................................................................................................................................................................................
N D O F S T E P S

Configure edge switching port


...................................................................................................................................................................................................

For each local or remote Interface Port belonging to a switching NE that must be
configured as an edge switching port (that is UNI or IWI):
Force control plane port state to forwarding. Operation is performed through 1350 OMS
EML:
Select Transmission View.
Select Bridge Port and click RSTP Per-Port Management > Force Port State >
forwarding.
Note: This operation is not supported by all the NE types and releases.
When not supported, you have the same spanning tree instance running across the
customer networks and the provider networks. Forcing control plane port state is
supported by ISA ES1/4 1.2, ISA ES16 2.1.
...................................................................................................................................................................................................

Activate the port, by means of conditioning port administrative status to up. Operation is
performed through navigation to 1350 OMS EML:
Select Transmission View.

....................................................................................................................................................................................................................................
1350 OMS
12-73
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VPWS Ethernet PM management procedure

Provisioning procedure (MAC-SC-NV-RSTP)

....................................................................................................................................................................................................................................

Select Local/Remote Interface and click Configure Ethernet Port > Admin. Status > up.
Result: After this step, user data frames are allowed to flow inside the provider

network. No flooding occurs since the active topology is stable at this stage.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-74
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VLAN configuration scenario

VLAN configuration

....................................................................................................................................................................................................................................

VLAN configuration scenario


VLAN configuration
When to use

The procedure permits to configure VLAN.


Related information

For a description of VLAN, refer to the topic VLAN management (p. 11-54).
Before you begin

The system is running and configured.


Task

The VLAN configuration scenario could have the following steps:


...................................................................................................................................................................................................

Create the VLAN Types with all their characteristics (User label and VLAN Tag Protocol
type value).
...................................................................................................................................................................................................

Associate the Edge ports to the VLAN Type (if its usage state is idle).
...................................................................................................................................................................................................

Associate the Provider Networks to the VLAN Type. Operation induces association
between Transport Link Terminations and VLAN Type.
...................................................................................................................................................................................................

Create an Ethernet Service VPAS or VPHS.


...................................................................................................................................................................................................

Create an EVC between Edge ports.


...................................................................................................................................................................................................

Create an Ethernet Segment with a VLAN model (Tunneling or Mapping) and associate a
Traffic Descriptor, a Color Profile, and a Traffic Classifier. For a Tunneling VLAN
model, give a VLAN Type associated to an Ethernet Segment.
Result: This action induces associations between the Ethernet Edge ports and the
given VLAN Type.
...................................................................................................................................................................................................

Select the route constraints. If the Ethernet Segment has the Tunneling VLAN model,
for a low cost solution, force the route to use one VC-LSP.

....................................................................................................................................................................................................................................
1350 OMS
12-75
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


VLAN configuration scenario

VLAN configuration

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Allocate the Ethernet Segment.


Result: For a mapping VLAN model, the system computes where the pop and push

operations have to be done. .


...................................................................................................................................................................................................

Create the corresponding VLAN constraints with default values.


...................................................................................................................................................................................................

10

Configure the VLAN Constraint classes. For push, give the VLAN Id to push, the color
policy, and the Traffic Classifier. For pop operation, give the associated Traffic Classifier.
...................................................................................................................................................................................................

11

Implement the Ethernet Segment. Configure automatically the edge ports (download the
P-VLAN protocol type). Provision the pop or push operations.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
12-76
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network


MAC Bridge Network Configuration

Overview

....................................................................................................................................................................................................................................

MAC Bridge Network Configuration


MAC Bridge Basics
Overview

The bridge network management provide support for emerging Ethernet-based


connection-less services. Connection-less services connect in a transparent way various
customer sites across a metropolitan network (Metro-Ethernet). Example of services are
the virtual private LAN services (VPLS).
An Ethernet switch learns the MAC addresses of end-hosts and associates them with
appropriate ports on which the end-host frames arrive. In case of meshed networks,
loop-free connectivity is assured by a distributed computation carried through control
frames and resulting in a spanning tree.
In the context of Metro-Ethernet, a customer network is a collection of multiple networks
(LANs). LANs are physically connected by means of a service provider network. They
operate as if all those multiple networks are connected (virtually) as a single LAN. MAC
learning and packet forwarding is standardized by IEEE 802.1D.
Each ISA board operates as a Layer-two switch inside the provider network, performing
MAC learning, and packet forwarding.
From the customer point of view, MAC learning and packet forwarding is transparent.
The global operation of the ISA switches of the provider network are emulated. Network
operates as a single distributed MAC bridge equipped with all the Ethernet local ports that
face equipment at the CE.

....................................................................................................................................................................................................................................
1350 OMS
12-77
8DG42227DAAA 9.6
Issue 3 December 2012

Managing your Network

MAC Bridge Basics

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
12-78
8DG42227DAAA 9.6
Issue 3 December 2012

13

13
Network
Organization
Management

Overview
Purpose

This chapter describes how to define subnetworks, domains, NEs, ENEs, and Services
Nodes, ports.
Contents
Managing Subnetworks

13-5

Overview about Subnetworks

13-5

View the list of subnetworks

13-7

Create a Subnetwork

13-8

Modify a Subnetwork

13-10

Delete a Subnetwork

13-13

View the details of the subnetworks

13-14

Managing Domains

13-15

Overview about Domains

13-15

View the list of Domains

13-17

Description of the list of Domains

13-18

Create a Domain

13-20

Modify a Domain

13-22

Delete a Domain

13-24

View the details of the domain

13-25

Details of a Domain

13-26

Assign resources to a Domain

13-27

Assign a NE to a Domain

13-29

Deassign a NE from a Domain

13-30

View the inventory of NE in a Domain

13-31

View the inventory of Transport Links in a Domain

13-32

...................................................................................................................................................................................................................................
1350 OMS
13-1
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management

Overview

....................................................................................................................................................................................................................................

View the inventory of VT Queue Profiles in a Domain

13-33

Create Topological View in a Domain

13-34

Assign an Ethernet Physical Port to a Domain

13-35

Deassign an Ethernet Physical Port from a Domain

13-36

Managing service nodes

13-37

Overview about service nodes

13-37

View the inventory of NE in a Service Node

13-38

View the list of service nodes

13-39

Managing Network Elements

13-40

Overview about Network Elements

13-40

View the list of Network Elements

13-42

Define a NE

13-43

Add a NE to a Subnetwork

13-46

Modify a NE

13-49

View the details of the NEs

13-52

View the list of available Network Elements

13-53

Upload the Ethernet physical ports

13-54

Upload the TDM terminations

13-57

Upload the Links Over TDM

13-59

Audit the TDM terminations

13-62

Synchronize the TDM terminations

13-64

View the list of TDM terminations

13-66

View the details of the TDM terminations

13-67

Acknowledge the NE LAC state

13-68

Show the equipment view

13-70

View the inventory of VT Queue Profiles in a NE

13-73

Upload the Links Over Cable

13-74

Upload the Radio Ports

13-75

Create VT Queue Profile

13-76

Create Topological View from NE or ENE

13-77

Managing External Network Elements

13-78

Overview about External Network Elements

13-78

View the list of External Network Elements

13-80

Description of the list of ENE

13-81

Create an ENE

13-82

....................................................................................................................................................................................................................................
1350 OMS
13-2
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management

Overview

....................................................................................................................................................................................................................................

Modify an ENE

13-85

Delete an ENE

13-87

View the details of the ENEs

13-88

Details of an ENE

13-89

View the list of ETPs

13-90

Description of the list of ETPs

13-91

Create an ETP

13-92

Delete an ETP

13-94

Managing Ethernet Physical ports

13-96

View the list of Ethernet Physical ports

13-96

Description of the list of Ethernet physical ports

13-97

Configure an Ethernet physical port

13-99

Modify an Ethernet Physical Port

13-104

Assign a Port to Network Access Domain

13-106

View the details of the Ethernet physical ports

13-108

Details of an Ethernet Physical Port

13-109

View the list of Equipment ports

13-111

Description of the list of Equipment ports

13-112

Managing Link Aggregation (LAG) ports

13-113

Description of Link Aggregation (LAG) function

13-113

View the list of LAG ports

13-116

Description of the list of LAG ports

13-117

Create a LAG port

13-118

Modify a LAG port

13-120

Assign LAG port to Network Access Domain

13-125

View the details of the LAG ports

13-126

Details of a LAG port

13-127

View the ports member of a LAG

13-128

Description of the list of LAG ports

13-129

Network Access Domain (NAD) Management

13-130

View the list of NADs

13-130

Description of the list of NADs

13-131

Create a NAD

13-132

Modify a NAD

13-133

Delete a NAD

13-134

....................................................................................................................................................................................................................................
1350 OMS
13-3
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management

Overview

....................................................................................................................................................................................................................................

Managing Jumbo Frames (through NAV)

13-135

Overview about Jumbo Frames

13-135

Workflow to configure Interfaces for Jumbo Traffic

13-137

Particular configuration procedures

13-140

Managing ports on 1678MCC Network Elements

13-140

ISA BCE Ethernet Board

13-146

....................................................................................................................................................................................................................................
1350 OMS
13-4
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Subnetworks

Overview about Subnetworks

....................................................................................................................................................................................................................................

Managing Subnetworks
Overview about Subnetworks
Subnetwork description

To be managed more easily the network is structured into subnetworks.


Each subnetwork is linked up with a subnetwork or the main network. According to its
level, a subnetwork can contain other subnetworks, NEs or ENEs.
Figure 13-1 Subnetwork levels

The subnetwork management, part of the network construction, consists in:

Performing actions such as creating, modifying, deleting subnetworks.


Displaying subnetwork information such as subnetwork list or properties.

....................................................................................................................................................................................................................................
1350 OMS
13-5
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Subnetworks

Overview about Subnetworks

....................................................................................................................................................................................................................................

Several rules must be respected:

The main network called MEN (Metro Ethernet Network) is created by the 1350
OMS PKT.
The main network could be composed of subnetworks, NEs, and ENEs.

....................................................................................................................................................................................................................................
1350 OMS
13-6
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Subnetworks

View the list of subnetworks

....................................................................................................................................................................................................................................

View the list of subnetworks


When to use

The Subnetwork List window presents all the subnetworks and their attributes.
Related information

For information about subnetwork, see: Overview about Subnetworks (p. 13-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select the network or the subnetwork in the tree area.


...................................................................................................................................................................................................

Select Search > Inventory from Subnetwork > Expand subnetwork.


Result: The list of subnetwork is displayed.

The attributes displayed for each subnetwork are:


User Label.
Parent Subnetwork.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-7
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Subnetworks

Create a Subnetwork

....................................................................................................................................................................................................................................

Create a Subnetwork
When to use

This function adds a subnetwork to the main network. A subnetwork can be created also
inside another one.
Related information

For information about subnetwork, see: Overview about Subnetworks (p. 13-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Condition

To get a positive result:

The parent subnetwork must be created previously.


The maximum number of subnetwork levels must not be reached.

The maximum number of subnetworks must not be reached.

The User Label must be different as one which is already used by another subnetwork
or one which is reserved for the main network.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select the network or the subnetwork in the tree.


...................................................................................................................................................................................................

Select Action > from (Sub) network > Create.

....................................................................................................................................................................................................................................
1350 OMS
13-8
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Subnetworks

Create a Subnetwork

....................................................................................................................................................................................................................................

Result:
Figure 13-2 Subnetwork Creation window

...................................................................................................................................................................................................

Enter the following attributes:

Enter the User Label.

Choose the Parent Subnetwork by using the sensitive help. If a subnetwork has been
previously selected from the list, or from graphical view or from the tree, this field is
automatically filled.
Enter a Comment (optional).

...................................................................................................................................................................................................

Click Ok.
Result: The subnetwork is created.

The tree area, the subnetwork list and the opened graphical views are updated.
The user can define NEs, ENEs, or create a subnetwork in this subnetwork.
Note: In graphical views, subnetwork list or in the tree, this command creates the
subnetwork inside the previously selected subnetwork.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-9
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Subnetworks

Modify a Subnetwork

....................................................................................................................................................................................................................................

Modify a Subnetwork
When to use

The function modifies subnetwork characteristics.


Related information

The subnetwork modification gives the possibility to modify:

Subnetwork User Label.

Comment.

For information about subnetwork, see: Overview about Subnetworks (p. 13-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must not be used by another
subnetwork or reserved by the main network.

Restrictions

The MEN subnetwork cannot be modified.


Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select the network or the subnetwork in the tree.


...................................................................................................................................................................................................

Select Action > from (Sub) network > Modify or right-click the mouse and Select
Modify.

....................................................................................................................................................................................................................................
1350 OMS
13-10
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Subnetworks

Modify a Subnetwork

....................................................................................................................................................................................................................................

Result:
Figure 13-3 Subnetwork Modification window

...................................................................................................................................................................................................

Enter the following attributes:

Enter a New User Label (optional).

Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
13-11
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Subnetworks

Modify a Subnetwork

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok.
Result: The subnetwork is modified.

The tree area, the subnetwork list and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-12
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Subnetworks

Delete a Subnetwork

....................................................................................................................................................................................................................................

Delete a Subnetwork
When to use

This function deletes a subnetwork from the 1350 OMS PKT supervision.
Related information

For information about subnetwork, see: Overview about Subnetworks (p. 13-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The subnetwork must be empty. It must not contain: subnetwork, NE, ENE.

Restrictions

The MEN subnetwork cannot be deleted.


Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select the network or the subnetwork in the tree.


Note: You can select one or more items at once.
...................................................................................................................................................................................................

Select Action > from (Sub) network > Delete or right-click the mouse and Select
Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: If one or more subnetworks are removed, the subnetwork list, the tree area,

and the opened graphical views are updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-13
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Subnetworks

View the details of the subnetworks

....................................................................................................................................................................................................................................

View the details of the subnetworks


When to use

This function gets information about a subnetwork.


Related information

For information about subnetwork, see: Overview about Subnetworks (p. 13-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select the network or the subnetwork in the tree.


...................................................................................................................................................................................................

Select Search > (Sub) network > Properties or right-click the mouse and Select
Properties.
Result: The Property window is displayed

The following attributes are shown:


User Label.
Parent Subnetwork.
Comment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-14
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Overview about Domains

....................................................................................................................................................................................................................................

Managing Domains
Overview about Domains
Domain management description

The domain management, part of the network construction, consists in:

performing actions such as creating, modifying, deleting domains.


displaying domain information such as domain list or properties.

The following domains are created by default and cannot be deleted nor modified:

ETS.

T-MPLS.

Indirect (eOMS).

Note: The domains created by default cannot be deleted nor modified.


The domain management chain gives the order in which the available actions can be
performed.

....................................................................................................................................................................................................................................
1350 OMS
13-15
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Overview about Domains

....................................................................................................................................................................................................................................

Figure 13-4 Domain management chain

....................................................................................................................................................................................................................................
1350 OMS
13-16
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

View the list of Domains

....................................................................................................................................................................................................................................

View the list of Domains


When to use

The function shows all the domains and their attributes.


Related information

For a detailed description, refer to the topic Overview about Domains (p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

Select Domains.
Result: The list window is shown.

See the following topic in this document: Description of the list of Domains
(p. 13-18)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-17
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Description of the list of Domains

....................................................................................................................................................................................................................................

Description of the list of Domains


Domain management description

The domain management, part of the network construction, consists in:

performing actions such as creating, modifying, deleting domains.

displaying domain information such as domain list or properties.

The following domains are created by default and cannot be deleted nor modified:

ETS.

T-MPLS.

Indirect (eOMS).

Note: The domains created by default cannot be deleted nor modified.


The domain management chain gives the order in which the available actions can be
performed.
Figure 13-5 Domain management chain

....................................................................................................................................................................................................................................
1350 OMS
13-18
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Description of the list of Domains

....................................................................................................................................................................................................................................

Attributes of a Domain

Each domain has the following attributes:

User Label.

Domain Type (ETS, Bridge, T-MPLS, Indirect).

Bridge Type (No Bridge, MAC-802.1D, Virtual-802.1Q, Provider-802.1AD).

STP Type (None, STP, RSTP, PVSTP, MSTP, Disabled).

Comment.

....................................................................................................................................................................................................................................
1350 OMS
13-19
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Create a Domain

....................................................................................................................................................................................................................................

Create a Domain
When to use

This function adds a domain to the network.


Related information

For a detailed description, refer to the topic Overview about Domains (p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Condition

To get a positive result:

The maximum number of domains must not be reached.

The User Label must be not in use used by another domain.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create Domain.


Result: The Domain Creation window is displayed.
...................................................................................................................................................................................................

To create a domain:

Enter a User Label.

Enter a Comment (Optional).

Choose the Domain Type (ETS, Bridge, T-MPLS).

Choose the Bridge Type (No Bridge, MAC-802.1D, Virtual-802.1Q,


Provider-802.1AD).
Choose the STP Type (None, STP, RSTP, PVSTP, MSTP, Disabled).

...................................................................................................................................................................................................

Click one of the following options:

Ok to execute the request and close the window.

Apply to execute the request and keep the window open.

Cancel to quit the request.

....................................................................................................................................................................................................................................
1350 OMS
13-20
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Create a Domain

....................................................................................................................................................................................................................................

Result: After the domain creation, the domain list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-21
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Modify a Domain

....................................................................................................................................................................................................................................

Modify a Domain
When to use

The function modifies domain characteristics.


Related information

The domain modification gives the possibility to modify:

User Label.

Comment.

For a detailed description, refer to the topic Overview about Domains (p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The domain must not be created by default.


The new User Label must be not in use used by another domain.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Domains.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


User can select more items in the list at once.
...................................................................................................................................................................................................

Select Action > Domain > Modify or right-click the mouse and select Modify.
Result: The Domain modification window is displayed.

Modify one or more of the following attribute:


User Label (optional).
Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
13-22
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Modify a Domain

....................................................................................................................................................................................................................................

If user selected more items in the list, the action opens a window for each selected
item.
...................................................................................................................................................................................................

Click Ok.
Result: The domain is modified.

The domain list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-23
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Delete a Domain

....................................................................................................................................................................................................................................

Delete a Domain
When to use

This function deletes a domain from the 1350 OMS PKT supervision.
Related information

For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The domain must not be created by default.


The domain must be empty. It must not contain: NE, ENE.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Domains.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Domain > Delete or right-click the mouse and select Actions > Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: If the command is confirmed, one or more domains are removed.

The domain list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-24
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

View the details of the domain

....................................................................................................................................................................................................................................

View the details of the domain


When to use

This function gets information about a domain.


Related information

For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Domains.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Properties or right-click the mouse and select Properties.
Result: The Domain window is displayed.

See the following topic in this document: Details of a Domain (p. 13-26)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-25
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Details of a Domain

....................................................................................................................................................................................................................................

Details of a Domain
Attributes of a Domain

The following attributes are shown:

User Label.

Domain Type.

Bridge Type.

STP Type.

Comment.

Id.

....................................................................................................................................................................................................................................
1350 OMS
13-26
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Assign resources to a Domain

....................................................................................................................................................................................................................................

Assign resources to a Domain


When to use

This function assign resources to a domain.


Related information

The user can start the procedure from:


The user can start the procedure from:

A selected domain
A selected resource

For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Domains.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Domain > Assign Resources to Domain or right-click the mouse and
select Actions > Assign Resources to Domain.
Result: The Assign Resources to Domain window is displayed.

The Assign Resources to Domain window shows:


the list of the Target domains.
the list of the Resources.
The icons to add objects in the list.
The icons to remove objects from the list.
...................................................................................................................................................................................................

Add and remove items from the lists.

....................................................................................................................................................................................................................................
1350 OMS
13-27
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Assign resources to a Domain

....................................................................................................................................................................................................................................

Result: The window Assign Resources to Domain shows all the objects to assign.
...................................................................................................................................................................................................

Click one of the following options:

Ok to execute the request and close the window.

Apply to execute the request and keep the window open.

Cancel to quit the request.


Result: The Resources are assigned to the Domains.

E...................................................................................................................................................................................................
N D O F S T E P S

Task from resource

From MS-GUI main window:


...................................................................................................................................................................................................

List a resources. Refer to list procedure of the specific resource.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Right-click the mouse and select Actions > Assign Resources to Domain.
Result: The Assign Resources to Domain window is displayed.

The Assign Resources to Domain window shows:


the list of the Target domains.
the list of the Resources.
The icons to add objects in the list.

The icons to remove objects from the list.

...................................................................................................................................................................................................

Add a domain from the lists.


Result: The window Assign Resources to Domain shows all the objects to assign.
...................................................................................................................................................................................................

Click one of the following options:

Ok to execute the request and close the window.

Apply to execute the request and keep the window open.

Cancel to quit the request.


Result: The Resources are assigned to the Domains.

E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
13-28
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Assign a NE to a Domain

....................................................................................................................................................................................................................................

Assign a NE to a Domain
When to use

The function assigns a NE to a Domain.


Related information

For a description about Network Elements refer to the topic Overview about Network
Elements (p. 13-40).
For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The Network Element list is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Assign NE to Domain.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-29
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Deassign a NE from a Domain

....................................................................................................................................................................................................................................

Deassign a NE from a Domain


When to use

The function deassigns a NE from a Domain.


Related information

For a description about Network Elements refer to the topic Overview about Network
Elements (p. 13-40).
For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The Network Element list is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Deassign NE from Domain.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-30
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

View the inventory of NE in a Domain

....................................................................................................................................................................................................................................

View the inventory of NE in a Domain


When to use

The inventory presents all the NE belonging to a Domain.


Related information

For a detailed description, refer to the topic Overview about Domains (p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Domains.


Result: The Domain list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Domain > Network Elements.


Result: The Network Element List is shown.

See the following topic in this document: Overview about Network Elements
(p. 13-40)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-31
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

View the inventory of Transport Links in a Domain

....................................................................................................................................................................................................................................

View the inventory of Transport Links in a Domain


When to use

The inventory presents all the Transport Links belonging to a Domain.


Related information

For a detailed description, refer to the topic Overview about Domains (p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Domains.


Result: The Domain list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Domain > Construction Transport Link.


Result: The Network Element List is shown.

The attributes displayed for each Transport Link are:


User Label.
Subnetwork.
Technology (TDM, Cable WDM).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-32
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

View the inventory of VT Queue Profiles in a Domain

....................................................................................................................................................................................................................................

View the inventory of VT Queue Profiles in a Domain


When to use

The inventory presents all the VT Queue Profiles belonging to a Domain.


Related information

For a detailed description, refer to the topic Overview about Domains (p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Domains.


Result: The Domain list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Domain > VT Queue Profiles.


Result: The VT Queue Profile List is shown.

The attributes displayed for each VT Queue Profile are:


User Label.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-33
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Create Topological View in a Domain

....................................................................................................................................................................................................................................

Create Topological View in a Domain


When to use

The function creates Topological View in a Domain.


Related information

For a detailed description, refer to the topic Overview about Domains (p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Domains.


Result: The Domain list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Domain > Create Topological View.


...................................................................................................................................................................................................

Select one of the following options:

Internal NEs and Construction Transport Links

Internal NEs and ETS Transport Links

Internal NEs and Bridge Transport Links

Internal NEs and T-MPLS Transport Links

Connected Domains and Construction Transport Links


Result: The selected objects are shown in the Topological View.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-34
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Assign an Ethernet Physical Port to a Domain

....................................................................................................................................................................................................................................

Assign an Ethernet Physical Port to a Domain


When to use

The function assigns an Ethernet Physical Port to a Domain.


Related information

For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The Network Element list is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Network Element > Ethernet Physical Ports.


...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Ethernet Physical Ports > Assign to Domain.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-35
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Domains

Deassign an Ethernet Physical Port from a Domain

....................................................................................................................................................................................................................................

Deassign an Ethernet Physical Port from a Domain


When to use

The function de-assigns an Ethernet Physical Port from a Domain.


Related information

For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The Network Element list is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Network Element > Ethernet Physical Ports.


...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Ethernet Physical Ports > Deassign from Domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-36
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing service nodes

Overview about service nodes

....................................................................................................................................................................................................................................

Managing service nodes


Overview about service nodes
Service node management description

Service node is a geographic gathering of 1350 OMS PKT defined NEs depending on the
characteristics of the OMSN that carries each NE.
The service node manages a list of defined NEs having the same OMSN User Label and
the same Location Name.
An OMSN User Label, a Location Name, and a list of defined NEs define the Service
node.
The 1350 OMS PKT user does not manage directly the service nodes:

Each service node is implicitly created at the NE definition (if it does not exist in the
1350 OMS PKT).

The service node is implicitly deleted at the deletion of the last NE. The service node
is also deleted when OMSN User Label or Location Name is changed and old service
node has no more NE associated to it. at the NE configuration change notification
reception.

Therefore, if a service node exists is associated at least to one NE.

....................................................................................................................................................................................................................................
1350 OMS
13-37
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing service nodes

View the inventory of NE in a Service Node

....................................................................................................................................................................................................................................

View the inventory of NE in a Service Node


When to use

The inventory presents all the NE belonging to a Service Node.


Related information

For a description about Service nodes, refer to the topic Overview about service nodes
(p. 13-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Nodes.


Result: The Nodes list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Nodes > Network Elements.


Result: The Network Element List is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-38
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing service nodes

View the list of service nodes

....................................................................................................................................................................................................................................

View the list of service nodes


When to use

The function shows all the service nodes and their locations.
Related information

For a description about Service nodes, refer to the topic Overview about service nodes
(p. 13-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is shown.
...................................................................................................................................................................................................

Select the item Nodes.


Result: The list window is shown.

The attributes displayed for each node are:


OMSN User Label.
Location Name.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-39
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Overview about Network Elements

....................................................................................................................................................................................................................................

Managing Network Elements


Overview about Network Elements
NE management description

The NE management, part of the network construction, consists in performing actions


such as:

defining, modifying, deleting NEs.


uploading the TDM terminations.
uploading the Ethernet physical ports.

uploading the Links Over TDM.


audit or synchronize TDM terminations (for NEs not managed by 1350 OMS SDH).
configuring or modifying Ethernet physical ports.
acknowledge the NE LAC state.

The NE management consists in displaying NE information such as:

Defined NE list.
Available NE list.

Properties.
Ethernet physical port list.
TDM termination list.
Equipment view (if the 1350 OMS EML application or 1350 OMS EML presentation
instance are co-hosted with the 1350 OMS PKT).

Alarms (if any).

The NE management chain gives the order in which the available actions can be
performed.

....................................................................................................................................................................................................................................
1350 OMS
13-40
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Overview about Network Elements

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
13-41
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

View the list of Network Elements

....................................................................................................................................................................................................................................

View the list of Network Elements


When to use

The function shows all the NEs managed by the 1350 OMS PKT, and their attributes.
Related information

To manage a NE, the NE must be defined.


For a description about Network Elements refer to the topic Overview about Network
Elements (p. 13-40).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is shown.
...................................................................................................................................................................................................

Select Network Elements > Defined NEs.


Result: The Network Element List is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-42
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Define a NE

....................................................................................................................................................................................................................................

Define a NE
When to use

This function assigns a NE to the 1350 OMS PKT management.


Related information

This function is also called NE discovery.NE characteristics (matrix, capacity, ) are


taken from the Ethernet management part of the 1350 OMS EML and/or the 1350 OMS
SDH.
For a description about Network Elements refer to the topic Overview about Network
Elements (p. 13-40).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To be assigned, the NE must be declared and supervised by the 1350 OMS EML.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Available NEs.
Result: The list presents all the available NEs (that is not yet assigned to the 1350

OMS PKT) and their attributes.


The attributes displayed for each NE are:
Operator Label.
Location Name.
Type.

Version.

IP Address (Not applicable for E/FE/GE boards).

Operational State (Enable, Disable).

LAC State (Granted, Denied, Post-granted).

...................................................................................................................................................................................................

The user has to add the NEs to be managed.


Select one or more items in the list.

....................................................................................................................................................................................................................................
1350 OMS
13-43
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Define a NE

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select Action > from Available NE > Define Network Element or right-click the mouse
and select Define Network Element.
Result: The Define window is displayed.
Figure 13-6 Define a Network Element

...................................................................................................................................................................................................

To define the Network Element, select a Domain from the list displayed and confirm with
OK button.

....................................................................................................................................................................................................................................
1350 OMS
13-44
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Define a NE

....................................................................................................................................................................................................................................

Result: The Network Element is assigned to the domain.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-45
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Add a NE to a Subnetwork

....................................................................................................................................................................................................................................

Add a NE to a Subnetwork
When to use

The function adds the NE to a network or a subnetwork.


Related information

For a description about Network Elements refer to the topic Overview about Network
Elements (p. 13-40).
If the NE supports the bridging, and the user has specified a domain user label, the NE is
attached to the specified domain.
If the NE is managed by the 1350 OMS SDH, all resources of the NE are uploaded from
the 1350 OMS SDH: TDM terminations, Ethernet ports, and Links Over TDM.
If the NE is ISA PR EA, ES1, ES4, or ES16, and the NE is not managed by the 1350
OMS SDH, the TDM terminations are uploaded directly from the NE.
The NE is defined with the following states:

Working status: Normal..

NE Consistency state: Consistent.

All other states (Operational state, LAC state, Inhibited Alarm state) are updated.

If the NE is a PR EA NE or ES1, ES4, ES16 NE, an assignment request is sent to the


1350 OMS EML.
If the NE does not support the bridging, the NE bridge type is set to Not Meaningful.
Otherwise it takes the bridge type value of the selected domain.
If the NE is removed from the Available Networks Element List, the 1350 OMS PKT
synchronizes the list of current alarms.
If the 1350 OMS SDH manages the NE, the TDM terminations and Links Over TDM are
uploaded from the 1350 OMS SDH. If not, the TDM terminations are uploaded from the
NE.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Condition

To get a positive result:

The NE must be defined.


The parent subnetwork and the domain must exist.
The maximum number of NEs must not be reached.

....................................................................................................................................................................................................................................
1350 OMS
13-46
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Add a NE to a Subnetwork

....................................................................................................................................................................................................................................

The maximum number of NEs in the parent subnetwork must not be reached.
The NE User Label must be different as a NE already used.

The Operational state of the selected NE must be Enabled. In case of ISA PR EA,
ES1, ES4, ES16, the NE must not be isolated from the 1350 OMS EML. In case of
E/FE/GE, the NE must not be isolated from the 1350 OMS SDH.
The LAC state of the selected NE must not be Granted.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Right-click the mouse and Select Action > from NE > Add .
Result:
Figure 13-7 NE Adding window

To add one NE:


Enter a User Label (equal to 1350 OMS EML Operator Label by default).
Choose a Parent Subnetwork where you want to define the NE by using the
sensitive help.
If the NE supports bridging configuration, choose a Domain by using the sensitive
help (optional).
Enter a Comment (optional).
....................................................................................................................................................................................................................................
1350 OMS
13-47
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Add a NE to a Subnetwork

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok.
Result: The NE is attached to the Service Node corresponding to the same OMSN

User Label and the same Location Name as the added NE. If the Service Node does
not exists, the application automatically creates a Service Node.
The tree area, the graphical views, and the Network Element List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-48
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Modify a NE

....................................................................................................................................................................................................................................

Modify a NE
When to use

The function modifies NE characteristics.


Related information

The Network Element modification gives the possibility to modify:

Network Element User Label.

Comment.

For a description about Network Elements refer to the topic Overview about Network
Elements (p. 13-40).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Condition

To get a positive result:

The new User Label must be different as one which is already used by another
Network Element.
The NE must not be locked (that is audit, alignment, reserve are not in progress).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Modify.

....................................................................................................................................................................................................................................
1350 OMS
13-49
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Modify a NE

....................................................................................................................................................................................................................................

Result: The NE Modification window is displayed.


Figure 13-8 Network Element Modification window

To modify a NE:
Enter a New User Label (optional).

Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
13-50
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Modify a NE

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok.
Result: Then, the Network Element list, the tree area, and the opened graphical views

are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-51
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

View the details of the NEs

....................................................................................................................................................................................................................................

View the details of the NEs


When to use

This function gets information about a Network Element.


Related information

For a description about Network Elements refer to the topic Overview about Network
Elements (p. 13-40).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Properties.from the popup menu.


Result: The property window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-52
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

View the list of available Network Elements

....................................................................................................................................................................................................................................

View the list of available Network Elements


When to use

This function lists all the NE not assigned to 1350 OMS PKT management.
Related information

For a description about Network Elements refer to the topic Overview about Network
Elements (p. 13-40).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To be listed, the NE must be declared and supervised by the 1350 OMS EML.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is shown.
...................................................................................................................................................................................................

Select Network Elements > Available NEs.


Result: The Available Network Element List is shown.

See the following topic in this document: Overview about Network Elements
(p. 13-40)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-53
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Upload the Ethernet physical ports

....................................................................................................................................................................................................................................

Upload the Ethernet physical ports


When to use

This function gets the Ethernet physical ports of a NE.


Related information

This function consists in uploading the Ethernet physical ports of a previously selected
NE and it is used:

Manually, by the user to solve a misalignment between 1350 OMS PKT and the NE.
In this case, the Client Type value is not aligned and must be configured. See
Configure an Ethernet physical port (p. 13-99).
Automatically, at the NE definition.

For a description about Network Elements, refer to the topic Overview about Network
Elements (p. 13-40).
For a description about physical ports, refer to the topic NE management (p. 11-47).
Retrieved Information

The following attributes are retrieved for each port during the upload:

Port Identifier.

Auto Negotiation State (Enabled, Disabled).

Flow Control (Enabled, Disabled).

Duplex Mode (Half duplex, Full duplex).

Interface Type (10/100BaseT, 1000BaseSX, 1000BaseLX, 100BaseFX).

Interface Rate (10 Mb/s, 100 Mb/s, 1 Gb/s).

Supported Layer (Ethernet, MPLS).

Port Type (Optical, Electrical) (derived from the uploaded Interface Type

characteristics).
Note: When the Interface Type is 10/100BaseT, Interface Rate can be 10 Mb/s or
100 Mb/s.
When the Interface Type is 1000BaseSX, Interface Rate must be 10 Gb/s.
Checks performed on Ethernet ports

Then, for each Ethernet port returned the following checks are performed:

The Ethernet port Client Type is set to ETS by default.

If Ethernet port does not exist in 1350 OMS PKT, the Ethernet port created with
default characteristics. The Manager control is set to Enabled. The port is available
to be an extremity of one or more Ethernet Segments.
If Ethernet port exists in 1350 OMS PKT, the user must consider the following cases:

No change of interface rate and/or supported Layer, its characteristics are updated.
If interface rate has changed:

....................................................................................................................................................................................................................................
1350 OMS
13-54
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Upload the Ethernet physical ports

....................................................................................................................................................................................................................................

Usage State.
Manager
Control.

Idle / Reserved.

Busy.

Not Meaningful.

enabled.

Not applicable.

Not applicable.

If no Ethernet
Segments uses it, the
Port is updated.
Otherwise,
Consistency State is
set to Not Consistent.

disabled.

No Link Over
Cable uses it, then
the Port is
updated.

Port not updated because


used by a Link Over
Cable. Its Consistency
State is set to Not
Consistent.

Not applicable.

If supported layer has changed:


Usage State.
Manager
Control.
ETH >
MPLS.

Idle / Reserved.

Busy.

Not applicable.

Not applicable.

If no Ethernet
Segments uses it,
Manager control is set
to disabled.
Otherwise,
Consistency State is
set to Not Consistent.

No Link Over
Cable uses it, then
the Port Manager
Control is set to
enabled.

Port not updated because


used by a Link Over
Cable. Its Consistency
State is set to Not
Consistent.

Not applicable.

enabled.

MPLS >
ETH.
Disabled.

Not Meaningful.

If an Ethernet port is not found in the list of retrieved Ports, the Usage State is
checked. In case the Usage State is idle or reserved, the Ethernet port is removed from
the NE in the 1350 OMS PKT.
If Ethernet port is busy then its Consistency State is set to Not Consistent.
If the Manager control is disabled, the port usage state is meaningful in the
construction domain. Otherwise, the usage of the port is checked in the Ethernet
traffic management domain.

Before you begin

The system is running.


The system is properly configured.
....................................................................................................................................................................................................................................
1350 OMS
13-55
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Upload the Ethernet physical ports

....................................................................................................................................................................................................................................

The system is connected by MS-GUI.


The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Operational State of the selected NE must be enable.

The NE LAC State must not be granted.


The NE must not be locked (that is audit, alignment, reserve are not in progress).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Upload Ethernet Physical Ports.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading.

The 1350 OMS PKT sends a request to the NE to retrieve the list of its Ethernet ports.
The list of Ethernet ports of the NE in 1350 OMS PKT is aligned with the ISA board.
The new ports are created in 1350 OMS PKT. If the supported layer is Ethernet, the
port Manager Control set to Enabled. In the other cases, the port Manager Controlis
set to Disabled.
The NE Working State is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-56
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Upload the TDM terminations

....................................................................................................................................................................................................................................

Upload the TDM terminations


When to use

This function gets the TDM terminations of a NE.


Related information

This function consists in uploading the TDM terminations of a previously selected NE.
This function is used:

manually, by the user to solve a misalignment between 1350 OMS PKT and the 1350
OMS SDH, concerning a given NE.
automatically, at the NE definition.

For a description about TDM terminations refer to the topic NE management


(p. 11-47).
Retrieved information

For each TDM termination, the following attributes are retrieved during the upload:

TDM termination Identifier.


Bit rate:

for ETH technology (E/FE/GE NE)

Eth 1 Gb/s, Eth 100 Mb/s, Eth 100 Mb/s.

None in the other cases.

Usage State (Idle, Busy, Reserved).

Concatenation level (from 0 to 63).

Transport Rate (VC12, VC3, VC4, VC4-4C).

Supported Layer (None, ETH or MPLS).

Checks performed on TDM terminations

If the TDM termination has the Usage State set to idle, TDM termination characteristics
are updated.
If a TDM termination has the Usage State set to idle or reserved, the list of retrieved
Terminations is checked. If the list of Terminations is not found, the TDM termination is
removed.
Note: For a TDM termination uploaded in the busy Usage State: if no Link Over
TDM is connected to it inside 1350 OMS PKT, the Usage State is set to Reserved.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
....................................................................................................................................................................................................................................
1350 OMS
13-57
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Upload the TDM terminations

....................................................................................................................................................................................................................................

Conditions

To get a positive result:

The NE must be managed by the 1350 OMS SDH.

The 1350 OMS SDH must not be isolated from 1350 OMS PKT point of view.
The Working State of the selected NE must be normal.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Upload TDM Terminations.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading. The 1350 OMS
PKT sends a request to the 1350 OMS SDH to retrieve the list of TDM terminations
of the specified NE.

The list of TDM terminations of the NE in 1350 OMS PKT is aligned with the 1350
OMS SDH.
Then, the NE Working State is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-58
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Upload the Links Over TDM

....................................................................................................................................................................................................................................

Upload the Links Over TDM


When to use

This function gets the Links Over TDM of a NE.


Related information

This function consists in uploading the Links Over TDM (SDH paths from the 1350 OMS
SDH) terminated on a given NE.
This function is used:

Manually, by the user to solve a misalignment between 1350 OMS PKT and the 1350
OMS SDH.
Automatically, at the NE definition.

For a description about Transport Links refer to the topic Transport link management
(p. 11-50) or the topic Transport link definition (p. 14-4).
Retrieved information

For each uploaded Link Over TDM, the following attributes are retrieved during the
upload:

Link Over TDM User Label.

Provisioning state (Defined, Allocated, Implemented, Commissioned).

Reliability Level.

Direction.

Supported Layer (Ethernet, MPLS).

Bit rate (vc12, vc3, vc4, vc4-4c, Eth 10 Mb/s, Eth 100 Mb/s, Eth 1 Gb/s).

Concatenation level (from 0 to 63).

Transport Concatenation Rate (vc4, vc3, vc12).


Extremities.

For both:
NE identifier is retrieved from NE TDM user label and Location name).

TDM termination Identifier.

....................................................................................................................................................................................................................................
1350 OMS
13-59
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Upload the Links Over TDM

....................................................................................................................................................................................................................................

Checks performed on Links Over TDM

For each uploaded Link Over TDM the following checks are performed during the
upload:

If at least one of the specified extremities is in the busy Usage State for another link
or does not exist, the Link Over TDM is rejected, and an error is logged. Also if the
extremity does not exist, the Link Over TDM is rejected, and an error is logged.

If both extremities exist in 1350 OMS PKT:


If Usage State is not busy, the Link Over TDM is created in the 1350 OMS PKT,
and the TDM terminations Usage State is set to busy.
If the SDH path provisioning state is defined, allocated, or implemented, the
Manager Control is set to Disabled and provisioning state to Not
Commissioned.
If the provisioning state is commissioned, the corresponding transport or
transmission path is created according to the supported layer, the Manager
Control is set to Enabled and the provisioning state is set to Commissioned.
The Client Type of the uploaded Link Over TDM is set to ETS by default.

The Protocol Type of the uploaded Link Over TDM protocol is chosen according to
the following rule:
If the supported layer is MPLS, the Protocol Type is equal to HDLC.
If the two boards at the extremities of the link are ES1 or ES4, the Protocol Type
is the value set in the 1350 OMS PKT configuration file. The value can be GFP or
LAPS.
If one of the board is not an ES board, the Protocol Type is GFP.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The NE must be managed by the 1350 OMS SDH.


The 1350 OMS SDH must not be isolated from 1350 OMS PKT point of view.
The Working State of the selected NE must be normal.

The NE must not be locked (that is audit, alignment, reserve are not in progress).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.

....................................................................................................................................................................................................................................
1350 OMS
13-60
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Upload the Links Over TDM

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Upload Links Over TDM.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading. The 1350 OMS

PKT sends a request to the 1350 OMS SDH to retrieve the list of TDM paths
terminated on the specified NE.
The list of Links Over TDM of the NE in 1350 OMS PKT is aligned with the 1350
OMS SDH.
Then, the NE Working State is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-61
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Audit the TDM terminations

....................................................................................................................................................................................................................................

Audit the TDM terminations


When to use

This function audits the TDM terminations of a NE.


Related information

This function consists in auditing the TDM terminations of a NE not managed by the
1350 OMS SDH.
The function is used to compare the TDM terminations information contained in the 1350
OMS PKT database with the ones contained in the NE.
For more information about Audit, refer toChapter 23, Network Utilities.
For a description about TDM terminations, refer to the topic NE management
(p. 11-47).
Retrieved information

For each termination found in the 1350 OMS PKT and/or in the NE, the data displayed
are:

The NE User Label.

The Audit Date and Time of the audit operation.

The 1350 OMS PKT TDM termination User Label.

The PKT Supported Layer.

The NE Supported Layer.

The PKT Concatenation Rate.

The NE Concatenation Rate.

The PKT Concatenation Level.

The NE Concatenation Level.

Checks performed on Links Over TDM

The audit allows detecting de-synchronization between the NE and the 1350 OMS PKT
data. The user can launch the Synchronize TDM termination command, to update the
1350 OMS PKT database with the NE data.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS
13-62
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Audit the TDM terminations

....................................................................................................................................................................................................................................

Conditions

To get a positive result:

The NE must be managed by the 1350 OMS SDH.

The 1350 OMS SDH must not be isolated from 1350 OMS PKT point of view.
The Working State of the selected NE must be normal.

The NEmust not be locked (that is audit, alignment, reserve are not in progress).

The NE LAC State must not be granted.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Audit TDM Terminations.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading.

The 1350 OMS PKT sends a request to the NE to retrieve the list of TDM
terminations of the specified NE.
The information read from the NE and the information read from the 1350 OMS PKT
database, are displayed to the user.
At the end of the audit, the NE working state is set to Normal and the Audit TDM
termination list window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-63
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Synchronize the TDM terminations

....................................................................................................................................................................................................................................

Synchronize the TDM terminations


When to use

This function consists in synchronizing the TDM terminations of a NE not managed by


the 1350 OMS SDH.
Related information

This function is used to check misalignments between NE and 1350 OMS PKT (that is
after an audit TDM termination command).
For a description about Synchronization refer to the topic 1350 OMS PKT
resynchronization (p. 12-60).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The 1350 OMS SDH must not manage the NE.

The NE LAC State must not be granted.

Working State of the selected NE must be normal.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Synchronize TDM Terminations.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS
13-64
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Synchronize the TDM terminations

....................................................................................................................................................................................................................................

Result: After confirmation, the NE working state is set to Uploading.

The 1350 OMS PKT sends a request to the NE to retrieve the list of TDM
terminations of the specified NE.
For a TDM termination found in the NE and not present in the 1350 OMS PKT, the
TDM termination is created in the 1350 OMS PKT database.
For a TDM termination found in the 1350 OMS PKT and not present in the NE, the
TDM termination is deleted from the 1350 OMS PKT database. If the deletion is not
possible, the TDM termination consistency state becomes Not Consistent. The
deletion is possible when the TDM termination is not used by a Link Over TDM.
At the end of the synchronization, the NE working state is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-65
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

View the list of TDM terminations

....................................................................................................................................................................................................................................

View the list of TDM terminations


When to use

The function lists all the TDM terminations of a selected NE.


Related information

For a description about TDM terminations refer to the topic NE management


(p. 11-47)o.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Network Element > TDM Termination List.
Result: The TDM Termination list is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-66
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

View the details of the TDM terminations

....................................................................................................................................................................................................................................

View the details of the TDM terminations


When to use

This function gets information about a TDM termination of a selected NE.


Related information

For a description about TDM terminations refer to the topic NE management


(p. 11-47).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Network Element > TDM Termination List.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Right-click the mouse and Select Properties.


Result: The TDM termination property window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-67
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Acknowledge the NE LAC state

....................................................................................................................................................................................................................................

Acknowledge the NE LAC state


When to use

This function allows the user to acknowledge the Local Access Control state.
Related information

When the LAC state of the NE is equal to Post-granted, this function allows the user to
acknowledge the possible misalignment between the 1350 OMS PKT and the NE due to a
possible modification from the 1320CT.
As the 1350 OMS EML could authorize the local access to a NE from the 1320CT, the
data stored in 1350 OMS PKT could be different.
To check and resolve misalignments, the user perform a NE audit and a NE alignment. At
alignment, the data is downloaded from 1350 OMS PKT to the NE or the data is uploaded
from NE to 1350 OMS PKT. Upload from NE is also called Plug & Play.
For more details about Audit and Alignment, refer to the topic Chapter 23, Network
Utilities.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The NE LAC state must be Post-granted.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Acknowledge.

....................................................................................................................................................................................................................................
1350 OMS
13-68
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Acknowledge the NE LAC state

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the LAC state of the concerned NEs is set to Denied and

the Network Element List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-69
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Show the equipment view

....................................................................................................................................................................................................................................

Show the equipment view


When to use

The function opens the GUI of an equipment.


Related information

The user opens the NE equipment view from:

The Network Element list.


The TDM termination list.
The Ethernet Physical Port list.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The 1350 OMS EML application or a 1350 OMS EML presentation instance must be
installed on the same workstation or server as the 1350 OMS PKT.
The user login must be declared on both 1350 OMS EML and 1350 OMS PKT.
This command is available only for the ES1, ES4, ES16 or PR EA Network Elements.

Task (from NE)

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Right-click the mouse and Select Inventory from TDM Termination > External
Navigation to > USM.

....................................................................................................................................................................................................................................
1350 OMS
13-70
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Show the equipment view

....................................................................................................................................................................................................................................

Result: The equipment view of the selected NE is opened and the selected port
highlighted.
Figure 13-9 Show Equipment View

E...................................................................................................................................................................................................
N D O F S T E P S

Task (from TDM Termination)

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.

....................................................................................................................................................................................................................................
1350 OMS
13-71
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Show the equipment view

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select Search > Inventory from Network Element > TDM Termination List.
.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Right-click the mouse and Select Inventory from TDM Termination > External
Navigation to > USM .
Result: The equipment view of the selected NE is opened and the selected port
highlighted.
E...................................................................................................................................................................................................
N D O F S T E P S

Task (from physical Port)

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Network Element > Ethernet Physical Port List.
...................................................................................................................................................................................................

Select one or more items in the list and Right-click the mouse.
...................................................................................................................................................................................................

Select Inventory from physical Port > External Navigation to > USM.
Result: The equipment view of the selected NE is opened and the selected port
highlighted.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-72
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

View the inventory of VT Queue Profiles in a NE

....................................................................................................................................................................................................................................

View the inventory of VT Queue Profiles in a NE


When to use

The inventory presents all the VT Queue Profiles belonging to a NE.


Related information

For a detailed description, refer to the topic Overview about Domains (p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Network Element> VT Queue Profiles.


Result: The VT Queue Profile List is shown.

See the following topic in this document: View the inventory of VT Queue Profiles
in a Domain (p. 13-33)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-73
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Upload the Links Over Cable

....................................................................................................................................................................................................................................

Upload the Links Over Cable


When to use

This function uploads the Links Over Cable.


Related information

For a description about Transport Links refer to the topic Transport link management
(p. 11-50) or the topic Transport link definition (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Working State of the selected NE must be normal.

The NE must not be locked (that is audit, alignment, reserve are not in progress).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Upload Links Over Cable.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading.

Then, the NE Working State is set to Normal.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-74
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Upload the Radio Ports

....................................................................................................................................................................................................................................

Upload the Radio Ports


When to use

This function uploads the Radio Ports.


Related information

No related information.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Upload Radio Ports.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading.

Then, the NE Working State is set to Normal.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-75
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Create VT Queue Profile

....................................................................................................................................................................................................................................

Create VT Queue Profile


When to use

This function creates a VT Queue Profile.


Related information

No related information.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Create VT Queue Profile.


...................................................................................................................................................................................................

Fill the creation form.


Result: After confirmation, the object is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-76
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Network Elements

Create Topological View from NE or ENE

....................................................................................................................................................................................................................................

Create Topological View from NE or ENE


When to use

The function creates Topological View from a NE or ENE.


Related information

No related information.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements.


...................................................................................................................................................................................................

Select Defined NEs or External NEs.


Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Network Element> Create Topological View or


Action > Network Element> Create Topological View.
...................................................................................................................................................................................................

Select one of the following options:

Link Over WDM

Link Over Cable

Link Over TDM

Link Over MPLS

Link Over T-MPLS

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-77
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management

Overview about External Network Elements

....................................................................................................................................................................................................................................

Managing External Network Elements


Overview about External Network Elements
ENE management description

For more information about ENE, refer to ENE management (p. 11-48).
The ENE management, part of the network construction, consists in performing actions
such as:

creating, modifying, deleting ENEs.


creating, deleting ETPs.

The ENE management consists in displaying ENE information such as:

ENE list.
ETP list.
properties.

The ENE management chain gives the order in which the available actions are performed.

....................................................................................................................................................................................................................................
1350 OMS
13-78
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Overview about External Network Elements

....................................................................................................................................................................................................................................

Figure 13-10 ENE management chain

....................................................................................................................................................................................................................................
1350 OMS
13-79
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

View the list of External Network Elements

....................................................................................................................................................................................................................................

View the list of External Network Elements


When to use

The function shows all the managed ENEs.


Related information

The ENE Role indicates whether ENE represents a customer edge equipment (outer) or
equipment not managed inside the network (inner).
Refer to the topic ENE management (p. 11-48).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The construction menu is displayed.
...................................................................................................................................................................................................

Select Network Elements > External Network Elements.


Result: The list window is shown.

See the following topic in this document: Description of the list of ENE (p. 13-81)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-80
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Description of the list of ENE

....................................................................................................................................................................................................................................

Description of the list of ENE


Attributes of an ENE

The attributes displayed for each ENE are:

User Label.

Parent Subnetwork.

ENE Role (Inner Equipment, Customer Edge, P-VLAN Network).

....................................................................................................................................................................................................................................
1350 OMS
13-81
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Create an ENE

....................................................................................................................................................................................................................................

Create an ENE
When to use

The function creates an External Network Element.


Related information

The ENE makes visible to the 1350 OMS PKT, a NE or a set of NEs not managed by the
1350 OMS PKT, for example a NE contained in an adjacent subnetwork not accessible to
the 1350 OMS PKT.
Refer to the topic ENE management (p. 11-48).
An Inner ENE is a subset of NEs not managed by the 1350 OMS PKT. The connection
between the managed network and the inner ENE is an internal Link Over Cable to a NE.
An Outer ENE is any equipment outside the scope of the network management. An Outer
ENE is located at customer premises. The equipment is connected through an external
Link Over Cable to a NE.
During the creation of an ENE with an Inner Equipment role, the Manager Control of
the five first ETP is set to Enabled. The other five ETPs are created with a Manager
Control set to Disabled. If the Edge Port List (available from the Ethernet Management
GUI) is opened, this list is updated the five first ETPs of the new created ENE.
For an ENE with a Customer Edge ENE role, all ETPs are created with a Manager
Control set to Disabled.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

Note: It is authorized to create an ENE in the main parent subnetwork (called MEN
by default).
To get a positive result:

Before the action, create the parent subnetwork.

In the selected subnetwork, the amount of NE must not exceed the maximum. See
Table B-1, Limits for Subnetworks (p. B-1).

In the selected subnetwork, the amount of ENE must not exceed the maximum. See
Table B-1, Limits for Subnetworks (p. B-1).

The User Label must be different as one which is already used by another ENE.

....................................................................................................................................................................................................................................
1350 OMS
13-82
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Create an ENE

....................................................................................................................................................................................................................................

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create External Network Element.
Result: The ENE Creation window is displayed.
Figure 13-11 External Network Element Creation window

...................................................................................................................................................................................................

To create an ENE:

Enter a ENE User Label.

Choose the Parent Subnetwork by using the sensitive help.

Enter a Domain.

....................................................................................................................................................................................................................................
1350 OMS
13-83
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Create an ENE

....................................................................................................................................................................................................................................

Choose the ENE Role: Inner Equipment ( That is Inner ENE), Customer Edge (That
is Outer ENE) or P-VLAN Network.
Enter a Comment (optional).

...................................................................................................................................................................................................

Click Ok.
Result: The ENE is created.

A group of ETPs are automatically created at the ENE creation.


The tree area, the External Network Element list, and the opened graphical views are
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-84
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Modify an ENE

....................................................................................................................................................................................................................................

Modify an ENE
When to use

The function modifies ENE characteristics.


Related information

The ENE modification gives the possibility to modify:

User Label.
Comment.

Refer to the topic ENE management (p. 11-48).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different as one which is
already used by another ENE.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


Result: The modification window is displayed.
...................................................................................................................................................................................................

To modify an ENE:

Enter a New User Label (optional).

Modify the Comment (optional).

...................................................................................................................................................................................................

Click Ok.

....................................................................................................................................................................................................................................
1350 OMS
13-85
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Modify an ENE

....................................................................................................................................................................................................................................

Result: Then, the External Network Element list, the tree area, and the opened
graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-86
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Delete an ENE

....................................................................................................................................................................................................................................

Delete an ENE
When to use

This function deletes an ENE and its ETPs from supervision.


Related information

Refer to the topic ENE management (p. 11-48).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The usage state of the ETPs belonging to the ENE must be idle.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > from External Network Element > Delete or right-click the mouse and
Select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the ENEs and their ETPs are removed.

The External Network Element list, the tree area, and the opened graphical views are
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-87
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

View the details of the ENEs

....................................................................................................................................................................................................................................

View the details of the ENEs


When to use

This function gets information about an ENE.


Related information

Refer to the topic ENE management (p. 11-48).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

Select the NE in the list.


...................................................................................................................................................................................................

Select Search > Properties.


Result: The property window is displayed.

See the following topic in this document: Details of an ENE (p. 13-89)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-88
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Details of an ENE

....................................................................................................................................................................................................................................

Details of an ENE
Attributes of an ENE

The attributes displayed for each ENE are:

User Label.

Parent Subnetwork.

Domain.

ENE Role (Inner Equipment, Customer Edge, P-VLAN Network).

Comment.

....................................................................................................................................................................................................................................
1350 OMS
13-89
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

View the list of ETPs

....................................................................................................................................................................................................................................

View the list of ETPs


When to use

This function consists in displaying the External Termination Ports of a previously


selected ENE and their attributes.
Related information

Refer to the topic Overview about External Network Elements (p. 13-78).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from External Network Element > ETP List.
Result: The list window is displayed.

See the following topic in this document: Description of the list of ETPs (p. 13-91)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-90
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Description of the list of ETPs

....................................................................................................................................................................................................................................

Description of the list of ETPs


Attributes of an ETP

The attributes displayed for each ETP are:

Identifier.

Transport Link.

Supported Layer (None, Ethernet, MPLS).

Interface Rate.

Usage State (Not meaningful, Idle, Busy).

Manager Control.

....................................................................................................................................................................................................................................
1350 OMS
13-91
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Create an ETP

....................................................................................................................................................................................................................................

Create an ETP
When to use

This function creates ETPs in the selected ENE.


Related information

The ETPs represent Ethernet ports located in the selected ENE.


Refer to the topic: Overview about External Network Elements (p. 13-78).
If the ETPs belong to Inner Equipment, the Manager Control is meaningful. In the case of
a Customer Edge ENE, the ETPs Manager Control is set automatically to Disabled.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

In the ENE, the amount of ETPs must not exceed the maximum. See Table B-6,
Limits for ETPs in an ENE (p. B-2)
Note: When the ENE is created, the ETP is created by default.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from External Network Element > ETP List.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > External TP > Create ETP.

....................................................................................................................................................................................................................................
1350 OMS
13-92
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Create an ETP

....................................................................................................................................................................................................................................

Result: The ETP Creation window is displayed.


Figure 13-12 ETP Creation window

To create ETPs:
Enter the first ETP to create (The numerical value corresponding to the first ETP
number to be used).
Enter the Number of ETP to create. Valid numerical value is between 1 and the
maximum number of ETPs which can be created on a ENE. See Table B-6,
Limits for ETPs in an ENE (p. B-2)
...................................................................................................................................................................................................

Click Ok button.
Result: The ETP (added after the first ones automatically created at the ENE creation)
are always created with Manager Control set to Disabled.

The ETP is automatically generated by the 1350 OMS PKT and the ETP List is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-93
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Delete an ETP

....................................................................................................................................................................................................................................

Delete an ETP
When to use

This function deletes ETPs from ENE.


Related information

The ETPs represent Ethernet ports located in the selected ENE.


Refer to the topic: Overview about External Network Elements (p. 13-78).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The usage state of the ETPs belonging to the ENE must be idle.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The ENE list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from External Network Element > ETP List.
Result: The ETP list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > External TP > Delete or right-click the mouse and Select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS
13-94
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing External Network Elements

Delete an ETP

....................................................................................................................................................................................................................................

Result: After confirmation, the ETPs are removed.

The ETP Inventory list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-95
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

View the list of Ethernet Physical ports

....................................................................................................................................................................................................................................

Managing Ethernet Physical ports


View the list of Ethernet Physical ports
When to use

The Ethernet Physical Port List presents all the ports of the NE and their attributes.
Related information

The number of ports listed depends on the type of the board.


For a description about physical ports refer to the topic NE management (p. 11-47).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The Ethernet Physical Port list window is shown.

See the following topic in this document: Description of the list of Ethernet physical
ports (p. 13-97)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-96
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Description of the list of Ethernet physical ports

....................................................................................................................................................................................................................................

Description of the list of Ethernet physical ports


Attributes of an Ethernet physical port

The attributes displayed for each port are:

Label.

Usage State.(Busy, Idle)

Domain List

Port Type. (Optical, Electrical)

Transport Link.

Actual Interface Rate (10 MBPS, 100 MBPS, 1 GBPS, ).

Egress Shaping Rate (Kbit/s)

Lag Size

Lag User Label

Stand-by Port in Lag

Used Bandwidth

Auto Negotiation State (Enabled, Disabled).

Alarm Status.

Consistency State (Consistent, Not Consistent).

Client Type (ETS, ETB, PNP).

Traffic Type

MAU Type.(1000 Base X, 10 G Base R

Duplex Mode.(None, Full, Half)

Port Number.

NAD.

Channel Type

Channel Lambda

Channel Spacing

Demarcation Role

LACP

Hash Key

Port Priority

Pause Frame. (Disabled, Symmetric, Asymmetric).

Mirror Type

OAM Enabled

Manager Control (Enabled, Disabled).

Working State (Normal, Configuring, Modifying).

Flow Control.

Pause Frame Working Mode

....................................................................................................................................................................................................................................
1350 OMS
13-97
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Description of the list of Ethernet physical ports

....................................................................................................................................................................................................................................

Interface Type

Media Converter Connected

....................................................................................................................................................................................................................................
1350 OMS
13-98
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Configure an Ethernet physical port

....................................................................................................................................................................................................................................

Configure an Ethernet physical port


When to use

This function consists in configuring an Ethernet physical port of a PR EA or ES1, ES4,


ES16 NE.
Related information

For a description about physical ports refer to the topic NE management (p. 11-47).
The following table summarizes the different modifiable parameters and their possible
values. The table is arranged according to the type and release of the NE, and the type of
the port:
PR EA.

ES1.

ES4.

S.

4.

1.

8.

8.

3.

1.

E.

G.

F.

F.

F.

P.

T.

E.

E.

X.

E.

8FE 71GE 1.

ES16.
0.

14FE.

4GE.

port.

H.
Supported
Layer.
Client Type.

n.a. Yes.
No
(ETS
only).

No.

No.

Yes (ETS,
ETS-P, ETB).

Yes (ETS,
ETS-P, or
ETB).

n.a. Yes.
2.0: No (ETS only).
2.1: Yes (ETS, ETS-P, or
ETB).

Auto Neg
State.

Yes.

No.

Interface
Rate.

Yes.

No.

Duplex
Mode.

No.

No.

No.

No.

Notes:

1.

means optical port; 7 means electrical port.

2.

Only if the NE is assigned to a Provider bridge domain, the ETS-P is allowed. ETS-P is a
1350 OMS PKT specific value. ETS-P allows user to assign an ETS port to the Provider
bridge domain.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
....................................................................................................................................................................................................................................
1350 OMS
13-99
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Configure an Ethernet physical port

....................................................................................................................................................................................................................................

Conditions

To get a positive result:

The NE must be a PR EA or an ES1, ES4, ES16 board.

The selected port is not extremity of a Link Over Cable or an Ethernet Segment.
The NE Operational State must be enabled (That is not isolated).

The NE LAC State is not granted.

The NE must not be locked (that is audit, alignment, reserve not in progress).

The configured Interface Rate must be compatible with the port interface type.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The Ethernet Physical Port list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Physical Port > Configure or right-click the mouse and Select
Configure..
Result: Depending on the NE type, a configuration window is displayed. For details,
refer to: Related information (p. 13-99).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-100
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Configure an Ethernet physical port

....................................................................................................................................................................................................................................

Task (for PR EA or ES16)

To configure an Ethernet physical port of a PR EA or ES16 electrical NE:


...................................................................................................................................................................................................

1
Figure 13-13 Ethernet Physical Port Config. window (for PR EA or ES16 electrical
board)

Execute the following steps:

Choose the Supported Layer. (Ethernet or MPLS).

Choose the Interface Rate. (10 MBPS, 100 MBPS).

Choose the Auto Negotiation State. (Enabled, Disabled).

...................................................................................................................................................................................................

Click Ok.
Result: If the supported layer is MPLS, the Manager Control is set to Disabled, the
usage state is set to Idle, and Client Type is set to ETS.

If the NE is a PR EA 1 GB or ES16 4GE, only the Supported Layer can be


configured.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-101
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Configure an Ethernet physical port

....................................................................................................................................................................................................................................

Task (for ES1 or ES4 electrical)

To configure an Ethernet physical port of an ES1 or ES4 electrical NE:


...................................................................................................................................................................................................

1
Figure 13-14 Ethernet Physical Port Config. window (for ES1 or ES4 electrical
board)

Execute the following steps:

Choose the Interface Rate (10 MBPS, 100 MBPS).

Choose the Auto Negotiation State (Enabled, Disabled).

Choose the Client Type (ETS, ETB, ETSP).

...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-102
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Configure an Ethernet physical port

....................................................................................................................................................................................................................................

Task (for ES1 or ES4 optical)

To configure an Ethernet physical port of an ES1 or ES4 optical NE:


...................................................................................................................................................................................................

1
Figure 13-15 Ethernet Physical Port Config. window (for ES1 or ES4 optical board)

Execute the following steps:

Choose the Auto Negotiation State (Enabled, Disabled).

Choose the Client Type (ETS, ETB, ETSP).


Note: If the NE is an ES4 optical, Auto Negotiation State cannot be configured.

...................................................................................................................................................................................................

Click Ok.
Result: The working state is set to Configuring.

A Port configuration request is sent to the NE.


After a positive response, the Ethernet physical port is configured and the working
state is set to Normal.
If the port is configured in ETB mode (Bridge mode), 1350 OMS PKT perform the
following actions:

To upload the ports.

To upload the related SDH connection by 1350 OMS SDH.


To show both ports and SDH connections.

To allow a navigation to 1350 OMS EML. Navigation action permits to configure the
port characteristics linked to the bridge management (like STP parameters, and so on).

E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
13-103
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Modify an Ethernet Physical Port

....................................................................................................................................................................................................................................

Modify an Ethernet Physical Port


When to use

The function modifies the Ethernet Physical Port characteristics.


Related information

The Ethernet physical port modification gives the possibility to modify the Manager
Control value of a port.
For a description about physical ports refer to the topic NE management (p. 11-47).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The supported layer of the port must be Ethernet.

The selected port is not extremity of a Link Over Cable or an Ethernet Segment.

The Working State of the port must be normal.

The port Client Type must be ETS.

The NE must not be locked (that is audit, alignment, reserve not in progress).

The NE must not be locked (that is audit, alignment, reserve are not in progress).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.

....................................................................................................................................................................................................................................
1350 OMS
13-104
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Modify an Ethernet Physical Port

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select Action > Modify or right-click the mouse and Select Modify.
Result: The modification window is displayed.
...................................................................................................................................................................................................

To modify an Ethernet physical port:

Modify the Manager Control (optional).

...................................................................................................................................................................................................

Click Ok.
Result: The working state of the port is set to Modifying.

If Manager Control is set to Disabled, the usage state is set to Idle. If not, the usage
state is set to Not meaningful.
Then, the Ethernet Physical Port list is updated and the working state of the port is
set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-105
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Assign a Port to Network Access Domain

....................................................................................................................................................................................................................................

Assign a Port to Network Access Domain


When to use

The function assigns NAD value to a Port.


Related information

For a description about physical ports refer to the topic NE management (p. 11-47).
For details about Network Access DomainUser Profile Management (p. 11-71).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The Ethernet Physical Port list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Physical Port > Assign NAD or right-click the mouse and Select Assign
NAD.

....................................................................................................................................................................................................................................
1350 OMS
13-106
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Assign a Port to Network Access Domain

....................................................................................................................................................................................................................................

Result: The following window is displayed:


Figure 13-16 Ethernet Physical Port Assign NAD window

...................................................................................................................................................................................................

To assign a NAD value:

Select the desired value in the list on the left of the window.
Type the Nad Value in the NAD column separated by comma.

...................................................................................................................................................................................................

Click Ok.
Result: The NAD value is assigned to the Ethernet Physical port.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-107
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

View the details of the Ethernet physical ports

....................................................................................................................................................................................................................................

View the details of the Ethernet physical ports


When to use

This function gets information about an Ethernet physical port of a NE.


Related information

For a description about physical ports refer to the topic NE management (p. 11-47).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The Ethernet Physical Port list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Properties or right-click the mouse and Select Properties.
Result: The Ethernet Physical Port List window is displayed.

See the following topic in this document: Details of an Ethernet Physical Port
(p. 13-109)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-108
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Details of an Ethernet Physical Port

....................................................................................................................................................................................................................................

Details of an Ethernet Physical Port


Attributes of a Ethernet Physical Port

The attributes displayed for each port are:

User Label.

Transport Link.

Traffic Type

Actual Interface Rate (10 MBPS, 100 MBPS, 1 GBPS, ).

Client Type (ETS, ETB).

MAU Type.(1000 Base X, 10 G Base R

Duplex Mode.(None, Full, Half)

Port Number.

NAD.

Used Bandwidth

Demarcation Role

PTM Name

Domain List

Pause Frame. (Disabled, Symmetric, Asymmetric).

Label

Egress Shaping Rate

Mirror Type

OAM Enabled

Interface Type

Media Converter Connected

Usage State.

Auto Negotiation State (Enabled, Disabled).

Working State (Normal, Configuring, Modifying).

Alarm Status.

Consistency State (Consistent, Not Consistent).

Lag User Label

Lag Size

Stand-by Port in Lag

LACP

Hash Key

Manager Control (Enabled, Disabled).

Flow Control.
Port Type. (Optical, Electrical)

Pause Frame Working Mode

....................................................................................................................................................................................................................................
1350 OMS
13-109
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Details of an Ethernet Physical Port

....................................................................................................................................................................................................................................

Port Priority

Identifier

NE User Label

Mirrored Port ID

Network Element Type

Version

Access Module

NE Identifier

....................................................................................................................................................................................................................................
1350 OMS
13-110
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

View the list of Equipment ports

....................................................................................................................................................................................................................................

View the list of Equipment ports


When to use

This function consists in navigating to the Ethernet physical port view on the NE
Equipment.
Related information

For a description about physical ports refer to the topic NE management (p. 11-47).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or items in the list.


...................................................................................................................................................................................................

Right-click the mouse and Select Search > Inventory from Physical Port > External
Navigation to > USM.
Result: The equipment view of the selected NE is opened and the selected port
highlighted.

See the following topic in this document: Description of the list of Equipment ports
(p. 13-112)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-111
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Ethernet Physical ports

Description of the list of Equipment ports

....................................................................................................................................................................................................................................

Description of the list of Equipment ports


Attributes of an Equipment port

The attributes depend on the equipment type.

....................................................................................................................................................................................................................................
1350 OMS
13-112
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Description of Link Aggregation (LAG) function

....................................................................................................................................................................................................................................

Managing Link Aggregation (LAG) ports


Description of Link Aggregation (LAG) function
LAG definition

The Link Aggregation (LAG) function allows to aggregate a number of parallel instances
into one single logical link. Physical links must be Full Duplex, Point to Point, and
operating at the same rate (Fast or Gigabit Ethernet).
The main targets of LAG are:

Bandwidth Increase respect to available Ethernet Standard Bandwidth (10, 100, 1000
Mbit/s).
Availability (in the sense of Protection) of Ethernet Links: the failure of one
aggregated link is protected with a fast switch time (less than 1 s).

The Link Aggregation can be managed either on UNI/IWI Terminations and on NNI
Terminations (intended as Transport Link "over Cable" Terminations).
The combination of main targets of LAG and its possible deployment, supplies a set of
four functional combinations that can be tested independently:

LAG on UNI (for Bandwidth).

LAG on UNI (for Protection).


LAG on NNI (for Bandwidth).
LAG on NNI (for Protection).

For feature description point of view, all those four possibilities are described in this
chapter, while for feature traceability they are independently reported as single features.
LAG scheme

The following figure reports the generic scheme of a Link Aggregation.

....................................................................................................................................................................................................................................
1350 OMS
13-113
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Description of Link Aggregation (LAG) function

....................................................................................................................................................................................................................................

Figure 13-17 Scheme of a Link Aggregation

As shown in figure, more Physical Interfaces having the same rate are aggregated in a
Logical Interface called Link Aggregation Group (LAG).
The Link Aggregation Group is a Logical concept and can be realized also by non
contiguous Physical Interfaces.
The Client Type of Link Aggregation Group can be ETS or ETB.
In a Link Aggregation Group, the nominal Bandwidth is the Bandwidth of one Physical
Interfaces multiplied by the LAG size. The size of the LAG corresponds to the number of
active aggregated links.
NE supporting LAG

The following table reports the list of Network Elements supporting the Link Aggregation
function.
Table 13-1

Network Elements supporting the Link Aggregation

NE Type /
Ne
Release.

Main Characteristic.

Notes.

1850 TSS
320 R1.4.

Applicable to GE and 10GE interfaces.

Client Type=ETS means


ETS and/or ETS_P.

Max number of LAG=124.


Max Ports per LAG=16.
Client Type: ETS and ETB.
StandBy Aggregated Links supported.

Client Type
modification is allowed
only when LAG is
de-activated.

PortToPort services: NotSupported.


LOS and DEG alarms Supported.

....................................................................................................................................................................................................................................
1350 OMS
13-114
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Description of Link Aggregation (LAG) function

....................................................................................................................................................................................................................................

Table 13-1

Network Elements supporting the Link Aggregation

(continued)

NE Type /
Ne
Release.

Main Characteristic.

Notes.

ISA ES1
R1.5.

Applicable to FE interfaces.
Max number of LAG=1 (ES1-3FE) or 4 (ES1-8FX or
ES4-8FE).

The feature is generic


and is applicable also to
ISA ES1 and ISA ES4.

Max Ports per LAG=2, 4 or 8 depending on HW


availability.

Client Type=ETS means


ETS and/or ETS_P.

Client Type: ETS and ETB.

Client Type
modification is allowed
only when LAG is
de-activated.

ISA ES4
R1.5.

StandBy Aggregated Links supported.


PortToPort services: NotSupported.
LOS and DEG alarms Supported.
ISA ES16
R2.4.

Applicable to FE and GE interfaces.


Max number of LAG=7 (14xFE) or 3 (7xFX) or 2
(4xGE).
Max Ports per LAG limited by HW availability.
Client Type: ETS, MPLS and ETB.
StandBy Aggregated Links supported.
PortToPort services and ETS Virtual Switch:
NotSupported.

The feature is generic


and is applicable also to
ISA ES16.
Client Type=ETS means
ETS and/or ETS_P.
Client Type
modification is allowed
only when LAG is
de-activated.

LOS and DEG alarms Supported.

....................................................................................................................................................................................................................................
1350 OMS
13-115
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

View the list of LAG ports

....................................................................................................................................................................................................................................

View the list of LAG ports


When to use

The list shows all the LAG ports created into a NE.
Related information

For a description about LAG ports refer to the topic Description of Link Aggregation
(LAG) function (p. 13-113).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Network Element > Ethernet Physical Port List.
Set filter to: LAG size different from -1.
Result: The LAG Port list window is shown.

See the following topic in this document: Description of the list of LAG ports
(p. 13-117)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-116
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Description of the list of LAG ports

....................................................................................................................................................................................................................................

Description of the list of LAG ports


About LAG

The Link Aggregation (LAG) function allows to aggregate into one single logical link a
number of parallel instances. The instances member of a LAG must be links of Full
Duplex Point to Point Physical. The links must operate at the same rate (Fast or Gigabit
Ethernet).
The main targets of LAG are:

Bandwidth Increase respect to available Ethernet Standard Bandwidth (10, 100, 1000
Mbit/s).
Availability (in the sense of Protection) of Ethernet Links: the failure of one
aggregated link is protected with a fast switch time (less than one second).

Attributes of a LAG port

The attributes displayed for each port are:

Node User Label.

User Label.

Port Type (None, Electrical, Optical).

Transport Link.

LAG size.

LAG User Label.

Port Protection in LAG.

Auto Negotiation State (Enabled, Disabled).

Usage State.

Working State (Normal, Configuring, Modifying).

Alarm Status (None, Warning, Minor, Major).

Consistency State (Consistent, Not Consistent).

Client Type (LAG).

Supported Layer (Ethernet, MPLS).

Interface Base (None, 1000 Base SX).

Duplex Mode (None, Half, Full).

Flow Control (Enabled, Disabled).

Port Number.

NAD.

Interface Rate (10 MBPS, 100 MBPS, 1 GBPS, ).

Manager Control (Enabled, Disabled).

....................................................................................................................................................................................................................................
1350 OMS
13-117
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Create a LAG port

....................................................................................................................................................................................................................................

Create a LAG port


When to use

This function creates a LAG port.


Related information

For a description about LAG ports refer to the topic Description of Link Aggregation
(LAG) function (p. 13-113).
LAG size and number of ports

It is possible to add a number of ports different from the LAG size:

If number of ports is less than the lag size: the LAG is in a degraded state.

If number of ports is greater than the lag size: the exceeding ports are in a stand-by
status. They provide protection to the working ports according to port priority.

The ports must be in the same NE (the same card) and are subjected to consistency checks
and NE specific restrictions.
The Ports member of a LAG are assigned to domain using normal resource assignment
procedure. In the same context of LAG creation, the user can: assign LAG port to
domain, set port attributes, set domain-specific port attributes.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create LAG Port.
Result: The LAG creation window is displayed.
...................................................................................................................................................................................................

To create a LAG port, provide the following LAG attributes:

Enter the LAG size. The LAG size is the number of physical Ports that belong to the
LAG Port. When LAG size is empty the Port is a physical Port. The value zero is
admitted. LAG size value can be modified even when LAG is active.
Set the LACP (Not Meaningful, True, False). LACP can be set at creation only.
Enter the Hash key (Not Meaningful, MAC, MPLS, VLAN, IP, L4). Frame distribution
can be modified even when LAG is active.

....................................................................................................................................................................................................................................
1350 OMS
13-118
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Create a LAG port

....................................................................................................................................................................................................................................

LAG Id

Select the Network Element the LAG port belong to.


Select the Resorces to assign physical port to the LAG port.
Set the Port Priority. Priority is used to select active/stand-by physical ports.
Physical Ports can be added to or removed from the LAG Port selecting the icon
under Resorces menu.

...................................................................................................................................................................................................

Click Ok.
Result: The LAG Port is created after a consistency check.

PKT provides the following LAG attributes:


Identifier.
LAG Administrative Key.
Administrative status.
The LAG port list and the opened graphical views are updated.
The Ports member of a LAG are removed from manager.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-119
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Modify a LAG port

....................................................................................................................................................................................................................................

Modify a LAG port


When to use

This function configures a LAG port characteristics.


Related information

User can modify:

The LAG size.

The Client Type.

The LACP.

The LAG frame distribution profile (Hash Key).


The number of physical ports members of the LAG port.
The priority of the physical ports members of the LAG port.

For a description about LAG ports refer to the topic Description of Link Aggregation
(LAG) function (p. 13-113).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result, consider that each NE type is subject to specific constraints.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Show the LAG port list. See: View the list of LAG ports (p. 13-116).
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > LAG Port > Modify or right-click the mouse and Select Modify.

....................................................................................................................................................................................................................................
1350 OMS
13-120
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Modify a LAG port

....................................................................................................................................................................................................................................

Result: Depending on the NE type, a configuration window is displayed.


...................................................................................................................................................................................................

User can modify one or more of the following fields in the Modify LAG Port window:

The LAG size. See: Task to change LAG size (p. 13-121).

The Client Type. See: Task to change Client Type (p. 13-122).

The LACP. See: Task to change LACP (p. 13-122).

The LAG frame distribution profile (Hash Key). See: Task to change frame
distribution profile (p. 13-122).
The number of physical ports members of the LAG port. See: Task to add ports
(p. 13-123) or Task to remove ports (p. 13-123).
The priority of the physical ports members of the LAG port. See: Task to change port
priority (p. 13-124).

...................................................................................................................................................................................................

Click Ok.
Result: A check is performed. If the check succeeded, the modification is accepted.
E...................................................................................................................................................................................................
N D O F S T E P S

Task to change LAG size

In the Modify LAG Port window, to configure the size of LAG port:
...................................................................................................................................................................................................

Enter a new LAG sizeor increase/decrease the current value.


...................................................................................................................................................................................................

Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.

When decreasing, the LAG speed must satisfy CAC: (new size) * (BW of member
port) > Allocated BW . If check fails the modification is rejected.
For details about the relation between LAG size and number of Physical Port, refer to:
LAG size and number of ports (p. 13-118).
The LAG size can be changed also when port is active.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-121
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Modify a LAG port

....................................................................................................................................................................................................................................

Task to change Client Type

In the Modify LAG Port window, to change the Client Type of LAG port:
...................................................................................................................................................................................................

Choose a new Client Type.


...................................................................................................................................................................................................

Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.
E...................................................................................................................................................................................................
N D O F S T E P S

Task to change LACP

In the Modify LAG Port window, to change the LACP of LAG port:
...................................................................................................................................................................................................

Choose a new LACP value.


...................................................................................................................................................................................................

Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.
E...................................................................................................................................................................................................
N D O F S T E P S

Task to change frame distribution profile

In the Modify LAG Port window, to configure the distribution profile of LAG port:
...................................................................................................................................................................................................

Choose a new Hash Key.


...................................................................................................................................................................................................

Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.

Can be changed also when port is active.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-122
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Modify a LAG port

....................................................................................................................................................................................................................................

Task to add ports

In the Modify LAG Port window, to increase the number of physical ports members of a
LAG port:
...................................................................................................................................................................................................

Click the icon under Resources menu.


Result: The list of available physical ports is displayed.
...................................................................................................................................................................................................

Select one or more physical ports and click the icon to accept the selection.
Result: The list of available physical ports is closed.

The list of member physical ports is updated.


For details about the relation between LAG size and number of Physical Port, refer to:
LAG size and number of ports (p. 13-118).
The list of available physical ports can be refreshed or quit clicking on the related
icon.
...................................................................................................................................................................................................

Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.
E...................................................................................................................................................................................................
N D O F S T E P S

Task to remove ports

In the Modify LAG Port window, to decrease the number of physical ports member of a
LAG port:
...................................................................................................................................................................................................

Select one or more physical ports.


...................................................................................................................................................................................................

Click the clear icon.


...................................................................................................................................................................................................

Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.

For details about the relation between LAG size and number of Physical Port, refer to:
LAG size and number of ports (p. 13-118).
The list of available physical ports can be refreshed or quit clicking on the related
icon.
E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
13-123
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Modify a LAG port

....................................................................................................................................................................................................................................

Task to change port priority

In the Modify LAG Port window, to the priority of a port member of LAG port:
...................................................................................................................................................................................................

Chose a new priority.


...................................................................................................................................................................................................

Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.

For details about the priority of Physical Port, refer to: LAG size and number of
ports (p. 13-118).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-124
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Assign LAG port to Network Access Domain

....................................................................................................................................................................................................................................

Assign LAG port to Network Access Domain


When to use

To assign a LAG port to Network Access Domain (NAD).


Related information

For a description about LAG ports refer to the topic Description of Link Aggregation
(LAG) function (p. 13-113).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

The procedure used for LAG port is the same procedure used for Physical Port.
...................................................................................................................................................................................................

To assign a LAG port to Network Access Domain, See: Assign a Port to Network Access
Domain (p. 13-106).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-125
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

View the details of the LAG ports

....................................................................................................................................................................................................................................

View the details of the LAG ports


When to use

This function gets information about a LAG port of a NE.


Related information

For a description about LAG ports refer to the topic Description of Link Aggregation
(LAG) function (p. 13-113).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

The procedure used for LAG port is the same procedure used for Physical Port.
...................................................................................................................................................................................................

To view the properties of a LAG port, See: View the details of the Ethernet physical
ports (p. 13-108).
See the following topic in this document: Details of a LAG port (p. 13-127)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-126
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Details of a LAG port

....................................................................................................................................................................................................................................

Details of a LAG port


Attributes of a LAG port

The attributes displayed for each port are:

Node User Label.

User Label.

Port Type (None, Electrical, Optical).

Transport Link.

Interface Rate (10 MBPS, 100 MBPS, 1 GBPS, ).

LAG size.

LAG User Label.

Port Protection in LAG.

Auto Negotiation State (Enabled, Disabled).

Working State (Normal, Configuring, Modifying).

Alarm Status (None, Warning, Minor, Major).

Consistency State (Consistent, Not Consistent).

Client Type (LAG).

Supported Layer (Ethernet, MPLS).

Interface Base (None, 1000 Base SX).

Duplex Mode (None, Half, Full).

Flow Control (Enabled, Disabled).

Port Number.

Manager Control (Enabled, Disabled).

NAD.

Usage State.

....................................................................................................................................................................................................................................
1350 OMS
13-127
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

View the ports member of a LAG

....................................................................................................................................................................................................................................

View the ports member of a LAG


When to use

This function consists in navigating the LAG port to view physical port members.
Related information

For a description about LAG ports, refer to the topic Description of Link Aggregation
(LAG) function (p. 13-113).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Show the LAG port list. See: View the list of LAG ports (p. 13-116).
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Right-click the mouse and Select Search > Inventory from Physical Port .
Result: The Physical Port view is opened.

See the following topic in this document: Description of the list of LAG ports
(p. 13-129)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-128
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Link Aggregation (LAG) ports

Description of the list of LAG ports

....................................................................................................................................................................................................................................

Description of the list of LAG ports


Attributes of a LAG port

To view attributes of a LAG port, See: View the details of the Ethernet physical ports
(p. 13-108).

....................................................................................................................................................................................................................................
1350 OMS
13-129
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Network Access Domain (NAD) Management

View the list of NADs

....................................................................................................................................................................................................................................

Network Access Domain (NAD) Management


View the list of NADs
When to use

The NAD List window presents all the NADs and their attributes.
Related information

For details about Network Access DomainUser Profile Management (p. 11-71).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction is displayed.
...................................................................................................................................................................................................

Select Network Access Domain.


Result: The List window is displayed.

See the following topic in this document: Description of the list of NADs
(p. 13-131)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-130
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Network Access Domain (NAD) Management

Description of the list of NADs

....................................................................................................................................................................................................................................

Description of the list of NADs


Attributes of a NAD

The attributes displayed for each object are:

Value.

Description.

....................................................................................................................................................................................................................................
1350 OMS
13-131
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Network Access Domain (NAD) Management

Create a NAD

....................................................................................................................................................................................................................................

Create a NAD
When to use

This function creates a NAD values.


Related information

The NAD values allow the partitioning of the network resources in set of consistent
resources that can be used by Service Management Layer products (that is 1355VPN).
For details about Network Access DomainUser Profile Management (p. 11-71).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The User Label must be different from any already used by other NADs.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create NAD.


Result: The NAD creation window is displayed.
...................................................................................................................................................................................................

To create a NAD:

Enter the NAD Description.

Enter the NAD Value.


Note: The inserted NAD Value must be different from the existing ones.

...................................................................................................................................................................................................

Click Ok button.
Result: The NAD is automatically generated and the NAD List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-132
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Network Access Domain (NAD) Management

Modify a NAD

....................................................................................................................................................................................................................................

Modify a NAD
When to use

The function modifies NAD characteristics.


Related information

The NAD modification gives the possibility to modify:

Description.

For details about Network Access DomainUser Profile Management (p. 11-71).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > NAD.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Access Domain > Modify.


Result: The NAD modification window is displayed.
...................................................................................................................................................................................................

To modify a NAD:

Enter a New Desciption (optional).

...................................................................................................................................................................................................

Select OK.
Result: Then, the NAD list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-133
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Network Access Domain (NAD) Management

Delete a NAD

....................................................................................................................................................................................................................................

Delete a NAD
When to use

This function deletes NAD from the list.


Related information

For details about Network Access DomainUser Profile Management (p. 11-71).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The usage state of the ETPs belonging to the ENE must be idle.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > NAD.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Access Domain > Delete or right-click the mouse and Select
Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the NAD is removed.

The NAD Inventory list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-134
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management

Overview about Jumbo Frames

....................................................................................................................................................................................................................................

Managing Jumbo Frames (through NAV)


Overview about Jumbo Frames
Frame size management

The size of the frame managed by the Legacy ISA equipment is limited to a maximum
value to optimize the internal resources (for example: internal queues). When traffics
consist in large frames (called Ethernet Jumbo frames) a specific configuration on the
equipment is required. The manager is able to configure the support of Jumbo Frames for
each interface involved in such traffic.
The management of Jumbo Frame through Navigation involves the 1850 TSS 320
releases in the following way:

1850 TSS 320 1.0: Ethernet Port.


1850 TSS 320 1.1: Ethernet Port over GFP.
1850 TSS 320 1.2: Ethernet Port over LAPS.

Jumbo Frames management description

The management of Jumbo frames inside a network, brings to the configuration of all (or
of a subset) infrastructures dedicated to the traffic supporting Jumbo Frames.
The management of Jumbo Frames have to be explicitly configured in End-to-End way
enabling both on Edge Ports and on Crossed Transport Links. The following figure
provides an example.
Figure 13-18 Jumbo frame configuration pattern

....................................................................................................................................................................................................................................
1350 OMS
13-135
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Jumbo Frames (through NAV)

Overview about Jumbo Frames

....................................................................................................................................................................................................................................

For Jumbo Frame capability, the amount of resources to be configured can cover a whole
network, a domain, or it can be done in heterogeneous way acting on a subset of
resources. The condition to fulfill is that the end-to-end configuration is guaranteed
(otherwise the Jumbo frame can be discarded by NE not properly configured).
The management of Jumbo frames has to be explicitly enabled on Ethernet Interfaces
(either UNI, NNI and IWI).
The default behavior is disabled.
In particular, both Local and Remote Ethernet Interfaces can be configured to support
Jumbo frames and allow the Jumbo traffic flowing.
The management of Jumbo frames capability is only possible when the Ethernet Interface
is not Active (that is the Ethernet Interface is not already in use by Ethernet traffic).

....................................................................................................................................................................................................................................
1350 OMS
13-136
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Jumbo Frames (through NAV)

Workflow to configure Interfaces for Jumbo Traffic

....................................................................................................................................................................................................................................

Workflow to configure Interfaces for Jumbo Traffic


When to use

This chapter summarize a workflow allowing the configuration of Jumbo frames on


Ethernet Interfaces of 1850 TSS 320 equipments.
Related information

For details about Jumbo Frames, refer to the topic Overview about Jumbo Frames
(p. 13-135).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task for Configuration on Ethernet Edge Ports

From MS-GUI main window:


...................................................................................................................................................................................................

Start a navigation toward 1350 OMS EML to open on the 1350 OMS EML GUI the
interface view of the 1850 TSS 320.
Select Search > Packet > Services > Connection Oriented (ETS) > Edge Port.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Edge Port > Zoom-in.

....................................................................................................................................................................................................................................
1350 OMS
13-137
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Jumbo Frames (through NAV)

Workflow to configure Interfaces for Jumbo Traffic

....................................................................................................................................................................................................................................

Result:
Figure 13-19 Jumbo frame configuration pattern

...................................................................................................................................................................................................

Configure the Jumbo frame capability acting on the if Mtu attribute of the 1850 TSS
Ethernet Interface. Configuration is accomplished by inserting the value of the largest
frame to be managed on the interface.
E...................................................................................................................................................................................................
N D O F S T E P S

Task for Configuration on Transport Links

From MS-GUI main window:


...................................................................................................................................................................................................

Select one Transport Link ending on at least one 1850 TSS 320.
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport
Links.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Transport Link > Configure.

....................................................................................................................................................................................................................................
1350 OMS
13-138
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Managing Jumbo Frames (through NAV)

Workflow to configure Interfaces for Jumbo Traffic

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Starts a navigation to open on the 1350 OMS EML GUI the right Interface view. If the
Transport Link is joining one 1850 TSS 320 NE and one ENE, open one navigation. If the
transport Link is connecting two 1850 TSS 320 equipments (one navigation for each 1850
TSS 320 equipment), open two navigations.
...................................................................................................................................................................................................

Configure the Jumbo frame capability inserting the value of the largest frame to be
managed on such interface.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-139
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Particular configuration procedures

Overview

....................................................................................................................................................................................................................................

Particular configuration procedures


Managing ports on 1678MCC Network Elements
When to use

This paragraph describes the procedure when a new port is created or deleted on a
1678MCC Network Element.
Related information

The procedure is started on 1350 OMS EML application with the equipment of the port
on the NE.
If the user has configured the automatic upload on the NE, 1350 OMS SDH system
learns the new configured NAPs automatically. Otherwise the new ports are learned
manually.
1350 OMS PKT receives the new NAP notification and asks automatically 1350 OMS
SDH system for the corresponding physical port.
The deleting of a port operation is manually accomplished on 1350 OMS SDH, 1350
OMS EML, and 1350 OMS PKT systems.
The first step is the deleting the NAP on 1350 OMS SDH application. The second step is
the deleting the port on 1350 OMS EML application. Eventually the deleting of the port
on 1350 OMS PKT application.
Refer to the document: [3] 1350 OMS EML Guide.
Refer to the document: [4] 1350 OMS SDH Guide.
For details about equipment view, refer to the topic Navigation to equipment
(p. 18-180).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The node 1678MCC NE is assigned to a subnetwork.

....................................................................................................................................................................................................................................
1350 OMS
13-140
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Particular configuration procedures

Managing ports on 1678MCC Network Elements

....................................................................................................................................................................................................................................

Task to Add a port on 1678MCC NE

From MS-GUI main window:


...................................................................................................................................................................................................

On the tree area, select the subnetwork that contains the equipment. Click the third button
of the mouse then select Search > Map.
...................................................................................................................................................................................................

Select the node on the map and Click third button of the mouse then select Search >
Show > Equipment View.
Result: The navigation process starts and, when completed, the Show Equipment

window is shown.
...................................................................................................................................................................................................

Select the 1678MCC equipment slot in the window and double click the mouse.
Result: The board window is shown.
...................................................................................................................................................................................................

In the board window, select Equipment > Modify.


Note: Depending on the version or the state of the selected slot, the menu can be
Modify, Set.

....................................................................................................................................................................................................................................
1350 OMS
13-141
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Particular configuration procedures

Managing ports on 1678MCC Network Elements

....................................................................................................................................................................................................................................

Result: The modification window is shown.


Figure 13-20 Create a port on 1678MCC NE

...................................................................................................................................................................................................

Select the one of the Allowed Equipment Types and click OK.
Result: The port is added to the NE.

1350 OMS SDH learns automatically the new port and the new NAP.
1350 OMS PKT learns automatically the new port and the new TDM termination and
the new physical port.
To verify the existence of the new TDM terminations, refer to View the list of TDM
terminations (p. 13-66). To verify the existence of the new physical ports, refer to
View the list of Ethernet Physical ports (p. 13-96).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-142
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Particular configuration procedures

Managing ports on 1678MCC Network Elements

....................................................................................................................................................................................................................................

Task to Remove a port on 1678MCC NE

From MS-GUI main window:


...................................................................................................................................................................................................

On 1350 OMS SDH system, remove the NAP port.


The operation of remove NAP port is performed manually as explained in the following:

List the NAPs on 1350 OMS SDH system.


Select the NAP to remove and confirm the operation.

...................................................................................................................................................................................................

On 1350 OMS EML system, remove the NE port.


...................................................................................................................................................................................................

On the tree area, select the subnetwork that contains the equipment. Click third button of
the mouse then select Search > Map.
...................................................................................................................................................................................................

Select the node on the map and Click third button of the mouse then select Search >
Show > Equipment View.
Result: The navigation process starts and, when completed, the Show Equipment

window is shown.
...................................................................................................................................................................................................

Select the 1678MCC equipment slot in the window and double click the mouse.
Result: The board window is shown.
...................................................................................................................................................................................................

In the board window, select Equipment > Modify.


Note: Depending on the version or the state of the selected slot, the menu can be
Modify, Set.

....................................................................................................................................................................................................................................
1350 OMS
13-143
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Particular configuration procedures

Managing ports on 1678MCC Network Elements

....................................................................................................................................................................................................................................

Result:
Figure 13-21 Remove port on 1678MCC NE

...................................................................................................................................................................................................

Select the Empty slot of the Allowed Equipment Types and click OK.
...................................................................................................................................................................................................

On 1350 OMS SDH system, synchronize the node.


...................................................................................................................................................................................................

On 1350 OMS PKT upload the NE physical ports.


Refer to Upload the Ethernet physical ports (p. 13-54).

....................................................................................................................................................................................................................................
1350 OMS
13-144
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Particular configuration procedures

Managing ports on 1678MCC Network Elements

....................................................................................................................................................................................................................................

Result: The objects in the system are updated.

To verify the new conditions referring to View the list of TDM terminations
(p. 13-66) and refer to View the list of Ethernet Physical ports (p. 13-96).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-145
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Particular configuration procedures

ISA BCE Ethernet Board

....................................................................................................................................................................................................................................

ISA BCE Ethernet Board


When to use

This procedure modifies crossover parameters.


Related information

This procedure is used to modify crossover parameters by navigation.


This procedure set the 1350 OMS EML to ignore the assignment flag.
This procedure is used in case 1350 OMS PKT manages ISA BCE-ETH boards. If the
user has to modify the crossover parameters and the crossover parameters are not
managed by 1350 OMS PKT, the modification is accomplished by navigation. On the
related 1350 OMS EML Master instances, the security configuration is modified so that
the NML assignment flag is ignored.
For details about Security Administration, refer to the document [2] 1350 OMS
Administration Guide, Vol 2: Common GUI Functions.
Before you begin

The system is running.


The system is properly configured.
The system is connected by Web Portal.
The view areas in the Web Portal are all active.
Task

From the Web Portal window, in Application List Area, execute the following steps:
...................................................................................................................................................................................................

Select Administration > Security Administration.


Result: The Security Administration icons related to each application are shown.
...................................................................................................................................................................................................

Select the icon for the management of the User profiles related to the EML application
that manages the board.
...................................................................................................................................................................................................

Double click the icon or right click the mouse and select Rise up.

....................................................................................................................................................................................................................................
1350 OMS
13-146
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management


Particular configuration procedures

ISA BCE Ethernet Board

....................................................................................................................................................................................................................................

Result: The ACI management / FAD/Function management window opens.

If necessary, set the View of the Tree Area and set the Tools to Show >
functions/FADs.
...................................................................................................................................................................................................

In the Tree Area, according to User Profile for which you want to apply the security
modification, select:

FAD > DATAPLUG_EMLUSMETHBCE_admin.

FAD > DATAPLUG_EMLUSMETHBCE_constructor.

FAD > DATAPLUG_EMLUSMETHBCE_operator.

FAD > DATAPLUG_EMLUSMETHBCE_viewer.

...................................................................................................................................................................................................

In the Main Area, select the Tab Edit Fad and Menu View.
...................................................................................................................................................................................................

Select Root > Applications > EMLUSMETHBCE > IgnoreNMLAssignment.


...................................................................................................................................................................................................

Click Select and Apply.


Result: The parameter is modified.
...................................................................................................................................................................................................

In the Main Area, select the Tab Edit Fad and List View.
Result: The area Included FADs/Functions lists the parameter IgnoreNMLAssignment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
13-147
8DG42227DAAA 9.6
Issue 3 December 2012

Network Organization Management

ISA BCE Ethernet Board

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
13-148
8DG42227DAAA 9.6
Issue 3 December 2012

14

14
Transport
Link
Management

Overview
Purpose

This chapter describes how to manage the transport infrastructure for Ethernet
connections.
Contents
Overview about Transport links

14-4

Transport link definition

14-4

Transport link classification

14-5

Concatenated VC management

14-11

Setting parameters of Transport Links

14-12

Implicit configuration

14-14

Managing Links Over TDM

14-17

Introduction

14-18

View the list of Links Over TDM

14-19

Create Link Over TDM

14-21

Delete a Link Over TDM

14-24

Configure a Link Over TDM

14-25

Get the Link Over TDM Extremities

14-27

Remove inconsistent TDM paths

14-29

Assign a Link Over TDM to a Domain

14-30

Deassign a Link Over TDM from a Domain

14-31

Assign NAccess Domain

14-32

View the details of the Links Over TDM

14-34

Get the Fault Localization

14-36

Managing Links Over Cable


Overview about Link Over Cables

14-38
14-38

...................................................................................................................................................................................................................................
1350 OMS
14-1
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management

Overview

....................................................................................................................................................................................................................................

View the list of Links Over Cables

14-41

Create a Link Over Cable

14-42

Modify a Link Over Cable

14-44

Delete a Link Over Cable

14-46

Get the Link Over Cable extremities

14-48

View the details of the Link Over Cables

14-50

Link Over Cable Split/Join

14-52

Configure Split/Join

14-54

Configure a Link Over Cable

14-57

Assign NAD

14-58

Get the Fault Localization

14-59

Assign a Link Over Cable to a Domain

14-60

Deassign a Link Over Cable from a Domain

14-61

Managing LAG Links Over Cable

14-62

View the list of LAG Links Over Cables

14-62

Create a LAG Link Over Cable from extremities

14-63

Create a LAG Link Over Cable from Links

14-66

Create a LAG Link VCG from extremities

14-69

Create a LAG Link VCG from Links

14-72

Modify a LAG Link Over Cable

14-75

Delete a LAG Link Over Cable

14-77

Get the LAG Link Over Cable extremities

14-79

View the details of the LAG Link Over Cables

14-80

Details of the list of LAG Link Over Cables

14-81

Managing links over WDM

14-82

Overview about links over WDM

14-82

View the list of links over WDM

14-83

Get the Link Over WDM extremities

14-84

Description of a Link Over WDM Extremities

14-85

View the details of the links over WDM

14-86

Managing links over MPLS

14-88

Overview about links over MPLS

14-88

View the list of links over MPLS

14-89

Get the Link Over MPLS extremities

14-90

View the details of the links over MPLS

14-91

....................................................................................................................................................................................................................................
1350 OMS
14-2
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management

Overview

....................................................................................................................................................................................................................................

Managing Link over Radio

14-93

View the list of links over Radio

14-93

Managing links over T-MPLS

14-94

Overview about links over T-MPLS

14-94

View the list of links over T-MPLS

14-95

Get the Link Over T-MPLS extremities

14-96

View the details of the links over T-MPLS

14-97

Managing MPLS/T-MPLS infrastructure

14-99

Overview about MPLS/T-MPLS infrastructure

14-99

View the list of T-MPLS sections

14-100

Get the T-MPLS section extremities

14-101

View the details of the links over T-MPLS

14-102

Managing Transport Links by Domain

14-104

View the list of Transport Links

14-104

....................................................................................................................................................................................................................................
1350 OMS
14-3
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Transport link definition

....................................................................................................................................................................................................................................

Overview about Transport links


Transport link definition
Description of the infrastructure

This part provides a description of the infrastructure in term of: Link Over TDM, Link
Over Cable, Link Over MPLS. The infrastructure is used for different supported layer
MPLS or Ethernet. The infrastructure is named Transport Link.
The Transport Link can be supported by:

An SDH path. The link is called Link Over TDM. It carries directly Ethernet
Segments or VC-LSPs: The supported layer is Ethernet or MPLS.
A VC-LSP. The link is called Link Over MPLS. A Link Over TDM or a Link Over
Cable (Martini) carries it.
An Ethernet cable or a Martini cable. The link is called Link Over Cable. It connects a
NE with an ENE. If the ENE has a role inner equipment then it carries directly
Ethernet Segments or VC-LSP. The supported layer is Ethernet or MPLS. If the ENE
has a role customer Edge, the ENE is only used for the graphical view.

When the provisioning state of the Link Over TDM becomes commissioned, the
corresponding Transport link is created in the MPLS or Ethernet management domain.
Creation is done according to the supported layer Ethernet or MPLS.

....................................................................................................................................................................................................................................
1350 OMS
14-4
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Transport link classification

....................................................................................................................................................................................................................................

Transport link classification


Overview

In the following, different cases of Transport links are listed.

Link Over TDM between Q3 NEs (p. 14-6).

Link Over TDM between Q3 NE and SNMP NE (p. 14-6).

Link Over TDM between 2 SNMP NEs (p. 14-7).

Link Over Cable between SNMP NE and ENE (p. 14-8).

Link Over MPLS between 2 SNMP NEs (p. 14-9).

Link Over MPLS between SNMP NE and ENE based on VC-LSP (p. 14-10).

The Link Over TDM user label defined in 1350 OMS PKT is the same as the SDH path
user label defined in 1350 OMS SDH.
Legend: in the following figures, the following symbols are used:

....................................................................................................................................................................................................................................
1350 OMS
14-5
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Transport link classification

....................................................................................................................................................................................................................................

Link Over TDM between Q3 NEs


Figure 14-1 Link Over TDM between Q3 NEs

In this case, the effective bandwidth of the Link Over TDM is equal to:

Ethernet port bit rate: 10 Mbit/s, 100 Mbit/s, or 1 Gbit/s.

Link Over TDM between Q3 NE and SNMP NE


Figure 14-2 Link Over TDM between Q3 NE and SNMP NE

The effective bandwidth of the Link Over TDM is equal to the minimum value between:

Ethernet port bit rate: 10 Mbit/s, 100 Mbit/s, or 1 Gbit/s (of the E/FE/GE NE),.
Transport bit rate by concatenation level of SDH path: (vc4, vc3, vc12) (063).

....................................................................................................................................................................................................................................
1350 OMS
14-6
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Transport link classification

....................................................................................................................................................................................................................................

Link Over TDM between 2 SNMP NEs


Figure 14-3 Link Over TDM between 2 SNMP NEs

The effective bandwidth of the Link Over TDM is equal to:

Transport bit rate by concatenation level of SDH path: (vc4, vc3, vc12) (063).

....................................................................................................................................................................................................................................
1350 OMS
14-7
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Transport link classification

....................................................................................................................................................................................................................................

Link Over Cable between SNMP NE and ENE


Figure 14-4 Link Over Cable between SNMP NE and ENE

The effective bandwidth of the Link Over Cable is equal to:

Ethernet port bit rate: 10 Mbit/s, 100 Mbit/s, or 1 Gbit/s.

....................................................................................................................................................................................................................................
1350 OMS
14-8
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Transport link classification

....................................................................................................................................................................................................................................

Link Over MPLS between 2 SNMP NEs


Figure 14-5 Link Over MPLS between 2 SNMP NEs

The effective bandwidth of the Link Over MPLS is defined by the Traffic Descriptor
parameters of the VC-LSP. The effective bandwidth is not explicitly calculated.

....................................................................................................................................................................................................................................
1350 OMS
14-9
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Transport link classification

....................................................................................................................................................................................................................................

Link Over MPLS between SNMP NE and ENE based on VC-LSP


Figure 14-6 Link Over MPLS between SNMP NE and ENE based on VC-LSP

The effective bandwidth of the Link Over MPLS is defined by the Traffic Descriptor
parameters of the VC-LSP. The effective bandwidth is not explicitly calculated.

....................................................................................................................................................................................................................................
1350 OMS
14-10
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Concatenated VC management

....................................................................................................................................................................................................................................

Concatenated VC management
The increment of the effective bandwidth

The following figure depicts the concatenated VC management, with a concatenation


level equal to 4, for an Ethernet bit rate equal to 1 Gbit/s.
Figure 14-7 Network Element Supervision: Concatenated VC management

In this example, the effective bandwidth of the Link Over TDM is: 4 x 155 Mbit/s (vc4) =
620 Mbit/s, less than 1 Gbit/s, the bit rate of the connected port.
The TDM terminations are managed in the 1350 OMS PKT with the following
characteristics:

TDM termination Identifier (That is Ethernet port Identifier).

Technology: ETH.
Bit Rate: Eth 1 Gbit/s.

Supported Layer: Ethernet.


Concatenation level: 4.
Concatenation Rate: vc4.

The management of concatenated SDH path is the same both for virtual and for packet
concatenation, both for transparent and for compressed rates.
For a concatenated path, the concatenation level can increment or reduce the SDH path
bandwidth.
1350 OMS SDH notifies to 1350 OMS PKT1350 OMS PKT every modification on the
concatenation level of an SDH path.
After the notification has been received, it has to calculate the effective bandwidth of the
Link Over TDM. The corresponding SNMP interfaces on ISA PR EA is updated.
....................................................................................................................................................................................................................................
1350 OMS
14-11
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Setting parameters of Transport Links

....................................................................................................................................................................................................................................

Setting parameters of Transport Links


Relation between Transport Link and its extremities

Transport Links and extremities combinations are described in the following table:
NE.

E/FE/GE (Q3
NE).

PR EA, ES1, ES4, ES16


(SNMP NE).

ENE.

E/FE/GE
(Q3 NE).

Link Over TDM


(see Figure 14-1,
Link Over
TDM between
Q3 NEs
(p. 14-6)).

Link Over TDM (see Figure


14-2, Link Over TDM
between Q3 NE and SNMP
NE (p. 14-6)).

Link Over Cable (see


Figure 1 4).

PR EA, ES1,
ES4, ES16
(SNMP NE).

Link Over TDM


(see Figure 14-2,
Link Over
TDM between
Q3 NE and
SNMP NE
(p. 14-6)).

Link Over MPLS 1.

Link Over Cable (see


Figure 14-4, Link Over
Cable between SNMP NE
and ENE (p. 14-8)).

Link Over Cable


(see Figure 1 4).

Link Over Cable (see Figure


14-4, Link Over Cable
between SNMP NE and ENE
(p. 14-8)).

ENE.

(see Figure 14-5, Link Over


MPLS between 2 SNMP NEs
(p. 14-9)).
Link Over TDM (see Figure
14-3, Link Over TDM
between 2 SNMP NEs
(p. 14-7)).

Link Over MPLS 2.


(see Figure 14-6, Link
Over MPLS between
SNMP NE and ENE
based on VC-LSP
(p. 14-10)).
Not Applicable.

Link Over MPLS 3.


(see Figure 14-6, Link Over
MPLS between SNMP NE and
ENE based on VC-LSP
(p. 14-10)).
Notes:

1.

Is possible only between two NEs able to support MPLS (PR EA or ES16).

2.

Is possible only between a NE able to support MPLS (PR EA or ES16) and an ENE.

3.

Is possible only between a NE able to support MPLS (PR EA or ES16) and an ENE.

....................................................................................................................................................................................................................................
1350 OMS
14-12
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Setting parameters of Transport Links

....................................................................................................................................................................................................................................

Relation among Transport Links attributes and board releases

The next table summarizes the combinations between Supported Layer, Client
Type,Protocol Type, and Manager Control :
Client Type.

none.

ETS.

ETB.

Protocol Type.

HDLC.

LAPS or GFP.

LAPS or GFP.

Supported Layer2.

MPLS.

Ethernet.

Ethernet.

Manager Control 3.

Enabled or Disabled 1
.

Enabled or Disabled 1
.

Disabled.

Notes:

1.

If the Link Over TDM is Not Consistent, the disabled value occurs.

2.

The supported layer of the Link Over TDM is deduced from the Protocol Type. The
modification of the Protocol Type involves an implicit modification of the Supported Layer.

3.

The modification of the Client Type can involve a modification of the Manager Control.

The possible modifications depend also on the involved type and release of NEs:
E/FE/GE.PR
EA.

ES1 / ES4.

ES16 R2.0.

ES16 2.1.

Protocol
Type.

LAPS, GFP.

LAPS, GFP, HDLC.

LAPS, GFP,
HDLC.

Client
Type.

ETS, ETB.

ETS, none.

ETS, ETB,
none.

....................................................................................................................................................................................................................................
1350 OMS
14-13
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Implicit configuration

....................................................................................................................................................................................................................................

Implicit configuration
Uploaded parameters

At creation time, for a local (or not) Link Over TDM, an implicit configuration is
performed.
For each SNMP extremity of the Link Over TDM, the following TDM termination
characteristics are uploaded from the NE:

Protocol Type.

Client Type.

Effective Bandwidth.

Activation Status.

According to the uploaded values, the implicit configuration is done.


Non-SNMP NE or not active extremities.

If both extremities are not active or if at least one extremity is not SNMP, the Link Over
TDM is updated as follow:

Client Type is set to ETS.

Manager Control is set to enabled.

Protocol Type.

is set to:
HDLC if Link Over TDM Supported Layer is MPLS.

GFP or LAPS according to 1350 OMS PKT configuration file if both extremities

are ES cards.
GFP in any other case.

Consistency State is set to consistent.

Active extremities and bandwidth compliant.

If extremities are activated with the same characteristics and effective bandwidth matches
the computed one, the Link is updated as follow:

Client Type is the same as TDM terminations Client Type.

Manager Control is set to enabled. If Client Type is ETS. Otherwise, Manager


Control is disabled.

Protocol Type is the same as TDM termination Protocol Type.


Consistency State is set to consistent.

....................................................................................................................................................................................................................................
1350 OMS
14-14
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Implicit configuration

....................................................................................................................................................................................................................................

Any other cases.

In any other cases, the Link Over TDM is updated as follow:

Client Type is set to:

if the problem is linked to the Client Type, Client Type is set to undefined value.

in any other case, Client Type is set as TDM terminations Client Type.

Manager Control is set to disabled.

Protocol Type is set to:

if the problem is linked to the Protocol Type, Protocol Type is set to undefined
value.
in any other case, Protocol Type is set as TDM terminations Protocol Type.

Consistency State is set to not consistent.

SNMP NE and Manager enabled.

If the Link Over TDM has at least one extremity on an SNMP NE and Manager Control
is enabled, the following operations are performed in the management domain:

A configuration, and then an activation request, is sent on each TDM termination, at


extremities.
The configuration request specifies:

Bandwidth (in bit/s).

Technology (SDH, P-CONC, V-CONC).

Supported Layer (Ethernet, MPLS).

Protocol Type (HDLC, GFP or LAPS).

ETB and Manager disabled.

If the Link Over TDM Client Type is ETB and Manager Control is disabled, a
configuration request is sent on each TDM termination, at extremities. No activation is
done in this case.
The configuration request specifies:

Bandwidth (in bit/s).

Technology (SDH, P-CONC, V-CONC).

Supported Layer (Ethernet, MPLS).

Protocol Type (HDLC, GFP or LAPS).

....................................................................................................................................................................................................................................
1350 OMS
14-15
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Overview about Transport links

Implicit configuration

....................................................................................................................................................................................................................................

Configuration phase results.

The implicit configuration ends with the following results:

If the Manager control is enabled and the Link Over TDM is used to carry traffic in
the management domain, the configuration is refused.
If the Manager control is enabled and the Link Over TDM is not used in the
management domain: the related Transport Link in Ethernet or MPLS management
domain is deactivated, a request is sent to NE at extremities to deactivate the related
SNMP interfaces. Then the manager control becomes disabled and the required
modifications are applied.
If the Manager control is disabled the required modifications are applied directly.

When the required modifications have been applied:

If the Client Type is ETB:


the Manager control remains disabled, and a configuration request is sent on each
TDM termination, at extremities. No activation is done.

In the other cases:


the Manager control becomes enabled, and the related Transport link in the Ethernet
or MPLS management domain is configured and activated (a request is sent to NE at
extremities to configure and activate the related SNMP interfaces).

....................................................................................................................................................................................................................................
1350 OMS
14-16
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Overview

....................................................................................................................................................................................................................................

Managing Links Over TDM


Overview
Purpose

This section describes the management of the link over TDM in PKT envirnment.
Contents
Introduction

14-18

View the list of Links Over TDM

14-19

Create Link Over TDM

14-21

Delete a Link Over TDM

14-24

Configure a Link Over TDM

14-25

Get the Link Over TDM Extremities

14-27

Remove inconsistent TDM paths

14-29

Assign a Link Over TDM to a Domain

14-30

Deassign a Link Over TDM from a Domain

14-31

Assign NAccess Domain

14-32

View the details of the Links Over TDM

14-34

Get the Fault Localization

14-36

....................................................................................................................................................................................................................................
1350 OMS
14-17
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Introduction

....................................................................................................................................................................................................................................

Introduction
Description

The Link Over TDM is supported by an SDH path.. It carries directly Ethernet Segments
or VC-LSPs: The supported layer is Ethernet or MPLS.

....................................................................................................................................................................................................................................
1350 OMS
14-18
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

View the list of Links Over TDM

....................................................................................................................................................................................................................................

View the list of Links Over TDM


When to use

The Link Over TDM List presents all Links Over TDM and their attributes.
Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is shown.
...................................................................................................................................................................................................

Select Link Over TDM.


Result: The list window is shown.

The attributes displayed for each Link Over TDM are:


User Label.
Parent Subnetwork.
Bandwidth (in Kbit/s) (value 0 means that the 1350 OMS SDH Transmission path
is not Commissioned).

Supported Layer (Ethernet, MPLS).

Working State (Normal,Modifying).

Availability Status (Normal, In Failure).

Consistency State (Consistent, Not Consistent).

Client Type (ETS, ETB).

Protocol Type (GFP, LAPS, HDLC).

Manager Control (Enabled, Disabled).

....................................................................................................................................................................................................................................
1350 OMS
14-19
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

View the list of Links Over TDM

....................................................................................................................................................................................................................................

Interface Type.
NAD (UNI, NNI).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-20
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Create Link Over TDM

....................................................................................................................................................................................................................................

Create Link Over TDM


When to use

This function defines a Link Over TDM


Related information

This function can be fulfilled in two different ways:

if the NEs are managed by the 1350 OMS SDH.


if the NEs are not managed by the 1350 OMS SDH.

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For information about how to set parameters, see: Relation among Transport Links
attributes and board releases (p. 14-13).
For information about how parameters are set after creation, see: Uploaded parameters
(p. 14-14).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The NEs concerned by the Link Over TDM must be managed by the 1350 OMS SDH.
The NEs concerned by the Link Over TDM must be not locked (that is audit,
alignment, reserve are not in progress).
The LAC state of NEs concerned by the Link Over TDM must not be granted.
The TDM termination of each NE must not be busy.
The Extremity A or Z must not be locked. The audit, alignment, reserve are not in
progress on the NE.
In the creation window, the TDM terminations must be compliant with the Link Over
TDM. Check the following parameters: Supported layer, bit rate, concatenation
rate, and concatenation level.

Task (NE managed by 1350 OMS SDH)

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create Link Over TDM.

....................................................................................................................................................................................................................................
1350 OMS
14-21
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Create Link Over TDM

....................................................................................................................................................................................................................................

Result: The Link Over TDM window is displayed.


Figure 14-8 SDH Path Creation window

....................................................................................................................................................................................................................................
1350 OMS
14-22
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Create Link Over TDM

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

To create a Link Over TDM (between two NEs managed by the 1350 OMS SDH):

Select the Extremity A by using the sensitive help.

Select the Extremity A Termination by using the sensitive help. Only the
terminations with usage state equal to Idle are proposed.
Select the Extremity Z by using the sensitive help.
Select the Extremity Z Termination by using the sensitive help. Only the
terminations with usage state equal to Idle are proposed.
Choose the Supported Layer (Ethernet or MPLS).
Choose the Transport Concatenation Rate (VC_12, VC_3, VC_4).

Enter the Concatenation level (priority which allows to increase the flexibility of
SDH bandwidth management from 0 to 63).
Choose the Bit Rate (1G_Rate_adaptive, 1G_Transparent, 10 MB, 100 MB,
2_MB_LO, 34_MB_LO, 140_MB_HO).

...................................................................................................................................................................................................

Click Ok.
Result: Then, the SDH path creation window is displayed using the required NEs.

The user can execute the required SDH path creation operation.
...................................................................................................................................................................................................

Click Ok.
Result: Then, the 1350 OMS PKT computes the effective bandwidth and creates the
Link Over TDM inside its database.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-23
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Delete a Link Over TDM

....................................................................................................................................................................................................................................

Delete a Link Over TDM


When to use

This function removes a Link Over TDM from the 1350 OMS PKT supervision.
Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
If the Manager Control is Disabled, the deletion is authorized.
If the Manager Control is Enabled, the usage state must be idle.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links > Links Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Links Over TDM > Delete or right-click the mouse and Select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the working state of the concerned Links Over Cable is
set to removing.

The Links Over TDM are removed.


The ports usage state are set to Idle.
The Links Over TDM List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-24
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Configure a Link Over TDM

....................................................................................................................................................................................................................................

Configure a Link Over TDM


When to use

This function consists in configuring a Link Over TDM.


Related information

If both extremities are ES16, supported Layer is configured instead of Client Type.
Configuration is accomplished by setting the Client Type and Protocol Type.
This function is used when the user needs to modify the Client Type (or Supported
Layer), and Protocol Type.
This function is used also when a Link Over TDM has its manager control disabled, to
make it operational.
For information about Transport Link, see: Overview about Transport links (p. 14-4).
For information about how to set parameters, see: Relation among Transport Links
attributes and board releases (p. 14-13).
For information about configuration process, see: Configuration phase results.
(p. 14-16).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Link Over TDM must be between two ES boards.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Link Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Link Over TDM > Configure.

....................................................................................................................................................................................................................................
1350 OMS
14-25
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Configure a Link Over TDM

....................................................................................................................................................................................................................................

Result:
Figure 14-9 Link Over TDM Configuration window

...................................................................................................................................................................................................

To configure a Link Over TDM:

I f both extremities are ES16 boards: choose the Client Type (None, ETS or ETB) or
the Supported Layer (Ethernet, MPLS).
Choose the Protocol Type (GFP (Ethernet), LAPS (Ethernet), HDLC (MPLS)).

...................................................................................................................................................................................................

Click Ok.
Result: The working state is set to configuring.

Then, the Links Over TDM list view is updated with the new Client Type and
Protocol Type values. The working state is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-26
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Get the Link Over TDM Extremities

....................................................................................................................................................................................................................................

Get the Link Over TDM Extremities


When to use

This function gets information about extremities of a Link Over TDM.


Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Link Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over TDM > Extremities.
Result: The list window is displayed.

The attributes displayed for each object are:


Link Over TDM User Label.
Supported Layer.
Effective Bandwidth.

Extremity Z Type.

Extremity A.

Extremity A Termination User Label.

Extremity A Termination ID.

Extremity A Termination ID description.

Extremity Z.

Extremity Z Termination User Label.

....................................................................................................................................................................................................................................
1350 OMS
14-27
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Get the Link Over TDM Extremities

....................................................................................................................................................................................................................................

Extremity Z Termination ID.


Extremity Z Termination ID description.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-28
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Remove inconsistent TDM paths

....................................................................................................................................................................................................................................

Remove inconsistent TDM paths


When to use

This function removes inconsistent TDM Path.


Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links > Links Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Links Over TDM > Remove Inconsistent TDM Path or right-click the
mouse and Select Remove Inconsistent TDM Path.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The Inconsistent TDM Paths are removed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-29
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Assign a Link Over TDM to a Domain

....................................................................................................................................................................................................................................

Assign a Link Over TDM to a Domain


When to use

The function assigns a Links Over TDM to a Domain.


Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links > Links Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Links Over TDM > Assign Resources to Domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-30
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Deassign a Link Over TDM from a Domain

....................................................................................................................................................................................................................................

Deassign a Link Over TDM from a Domain


When to use

The function deassigns a Links Over TDM from a Domain.


Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links > Links Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Links Over TDM > Deassign Resources from Domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-31
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Assign NAccess Domain

....................................................................................................................................................................................................................................

Assign NAccess Domain


When to use

This function allows to assign a specific Network Access Domain (NAD) value to a Link
Over TDM.
Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For details about Network Access DomainUser Profile Management (p. 11-71).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Link Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Link Over TDM > Assign NAD.

....................................................................................................................................................................................................................................
1350 OMS
14-32
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Assign NAccess Domain

....................................................................................................................................................................................................................................

Result:
Figure 14-10 Assign NAD window

...................................................................................................................................................................................................

To assign a NAD value to the selected Link Over TDM:

Choose the NAD Value from the list on the left side of the window.

Type the Nad Value in the NAD column separated by comma.

...................................................................................................................................................................................................

Click Ok.
Result: The NAD value is assigned to the Link Over TDM, more than one value can

be assigned to a link.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-33
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

View the details of the Links Over TDM

....................................................................................................................................................................................................................................

View the details of the Links Over TDM


When to use

This function gets information about a Link Over TDM..


Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Link Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Link Over TDM > Properties or Click the third key of the mouse and
select Properties.
Result: The Link Over TDM properties window is displayed.

The attributes displayed for each Link Over TDM are:


User Label.
Parent Subnetwork.
Parent Domain.

Bandwidth (in Kbit/s) (value 0 means that the 1350 OMS SDH Transmission path
is not Commissioned).

Supported Layer (Ethernet, MPLS).

Directionality.

Concatenation Level.

Transport Concatenation Rate.

Reliability Level.

Working State (Normal, Modifying, ).

....................................................................................................................................................................................................................................
1350 OMS
14-34
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

View the details of the Links Over TDM

....................................................................................................................................................................................................................................

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

Comment.

Last Action Date.

Last Action Type.

Client Type (ETS, ETB).

Protocol Type (GFP, LAPS, HDLC).

Interface Type.

NADs (UNI, NNI).

Consistency State (Consistent, Not Consistent).


Provisioning State.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-35
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Get the Fault Localization

....................................................................................................................................................................................................................................

Get the Fault Localization


When to use

This function gets information about the Fault Localization of a Link Over TDM.
Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For details about Fault Localization, see: Fault Localization (p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Link Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Fault Localization.


Result: The list window of Fault Localization is displayed.

The attributes displayed for each object are:


User Label.
Entity Type.

Alarm Status.

Entity Event Date.

Probable Cause.

Operator

Link User.

Last Refresh.

....................................................................................................................................................................................................................................
1350 OMS
14-36
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over TDM

Get the Fault Localization

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Selecting an entity from the list, the user can navigate to the alarmed equipment port or
the FM list.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-37
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Overview about Link Over Cables

....................................................................................................................................................................................................................................

Managing Links Over Cable


Overview about Link Over Cables
Link Over Cable definition

Is called Link over Cable, the way to connect two Ethernet ports without using the SDH
layer.
Classification of Links Over Cable

The following different cases can be considered:


1. A Link Over Cable between a PR EA NE or ES16 and an ENE with a role set to inner
equipment.
In this case:
The Supported Layer of the Link Over Cable could be MPLS or Ethernet.
The type of the Link Over Cable is called internal.
2. A Link Over Cable between an E/FE/GE NE and an ENE with a role set to inner
equipment.
In this case:
The Supported Layer of the Link Over Cable is always Ethernet.
The type of the Link Over Cable is called internal.
3. A Link Over Cable between any type of NE and an ENE with a role set to customer
edge. The ENE represents a Customer Edge, which is outside the managed domain.
In this case:
The Supported Layer of the Link Over Cable is always Ethernet.
The type of the Link Over Cable is called external.
The creation of an external Link Over Cable is optional because this type of Link
Over Cable is only used by the graphic view.
If the supported layer of the created Link Over Cable is MPLS, it appears also in
Transport Link List of MPLS GUI.
If the supported layer of the created Link Over Cable is Ethernet, it appears also in
Transport Link List of Ethernet Management GUI.
If the ENE has a role Inner Equipment, then the Link Over Cable type is internal, else the
Link Over Cable type is external.
For a not terminated Link Over Cable, if the ENE role is Customer Edge, the Link Over
Cable interface type is UNI (external cable). An external Link Over Cable is always
managed locally by the construction domain. The aim is to present the Customer edge
equipment connected to the managed domain.

....................................................................................................................................................................................................................................
1350 OMS
14-38
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Overview about Link Over Cables

....................................................................................................................................................................................................................................

For both, terminated or not terminated Link Over Cable, the Link Over Cable type is NNI
or IWI. Terminated Link Over Cables are also called internal cable. Not terminated Link
Over Cable has Inner ENE or P-VLAN network.
For a not terminated Link Over Cable, the ETP Interface rate is deduced from the port
characteristics at the other extremity. The ETP Interface rate can be: 10 Mbit/s, 100
Mbit/s, 1 Gbit/s.
Links Over Cable creation details

.
Calculated information

The Link Over Cable is created with its given characteristics and the following
information is calculated:

Type according to the role of ENE at the extremity (external if ENE role is customer
edge or internal if ENE role is inner equipment).
The working state is set to Normal.

Status for Internal Link Over Cable

If Link Over Cable type is internal:

Depending on alarm presence on the port, Availability status is set to Normal, In


Failure, or Degraded.
If Client Type is ETS, Manager Control is set to Enabled.

If Client Type is ETB, Manager Control is set to Disabled.

Ethernet portusage state and ETP usage state are set to Busy.

Status for external Link Over Cable

If Link Over Cable type is external:

Availability status is set to Not Meaningful.

Manager Control is set to Disabled.

ETP Usage States is set to Busy.

When the process fails

The process fails in the following cases:

The Manager Control of port at the extremity of an external Link Over Cable is
disabled.
The Manager Control of port at the extremity of an internal Link Over Cable is
enabled.
The Bit rate of port is not equal to the Bit rate entered for the Link Over Cable.
The Supported Layer of port is not equal to the Supported Layer of the Link Over
Cable.

....................................................................................................................................................................................................................................
1350 OMS
14-39
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Overview about Link Over Cables

....................................................................................................................................................................................................................................

An external Link Over Cable could not have an MPLS Supported Layer (ENE role
not compliant).
A Link Over Cable terminated on E/FE/GE NE could not have an MPLS Supported
Layer.

....................................................................................................................................................................................................................................
1350 OMS
14-40
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

View the list of Links Over Cables

....................................................................................................................................................................................................................................

View the list of Links Over Cables


When to use

The Link Over Cable List window presents all Links Over Cable and their attributes.
Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

Select Link Over Cable.


Result: The Link Over Cable list window is displayed.

The attributes displayed for each Link Over Cable are:


User Label.
Parent Subnetwork.
Bit Rate.

Supported Layer (Ethernet, MPLS).

Working State.

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

Client Type (ETS, ETB).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-41
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Create a Link Over Cable

....................................................................................................................................................................................................................................

Create a Link Over Cable


When to use

This function defines a Link Over Cable.


Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For more information about creation, see: Links Over Cable creation details (p. 14-39).
Important! If the user plans to expand a physical connection by a LAG, not to lose
traffic, the user must create the connection as a LAG with at least one link. Refer to
Create a LAG Link Over Cable from Links (p. 14-66) or refer to Create a LAG
Link Over Cable from extremities (p. 14-63).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The NE must not be isolated, not locked and LAC state must not be granted.

The usage state of the Ethernet physical port of the NE must be idle.

If the supported layer of the port is Ethernet, the Manager Control of the Ethernet
physical port of the NE must be enabled.
If the supported layer of the port is MPLS, the Manager Control of the Ethernet
physical port of the NE must be disabled.
The Usage State of the ETP of the ENE must be idle.

The Manager Control of the selected ETP must be disabled.

The Supported Layer of the Link Over Cable must be compatible with the one of the
chosen physical port and with the role of the chosen ENE.
The User Label must be different as one which is already used by another Link Over
Cable.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create Link Over Cable.

....................................................................................................................................................................................................................................
1350 OMS
14-42
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Create a Link Over Cable

....................................................................................................................................................................................................................................

Result: The Link Over Cable creation window is displayed.


...................................................................................................................................................................................................

To create a Link Over Cable:

Enter a Link User Label.

Enter a Comment (optional).

Select the NE User Label (A) from the available NE list.

Then, select the Port User Label (A) of the NE from the available port list.

Select the Extremity User Label (Z) from the available NE list.
If the selected NE is an External NE then:
Only the ENEs that are compatible with the NE port are displayed: if the NE
extremity has its Manager Control Disabled, only Inner Equipment ENEs are
displayed. If the NE extremity has its Manager Control Enabled, only Customer
Edge ENEs are displayed.
The ETP (Z) (External Termination Point) field is enabled, select the ETP of the
ENE from the available ETP list.
If the selected NE is a defined Network Element
Select the Port User Label (Z) (External Termination Point) of the NE from the
available port list.

...................................................................................................................................................................................................

Click Ok.
Result: At the beginning of the operation, the working state is set to Creating.

The Link Over Cable List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-43
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Modify a Link Over Cable

....................................................................................................................................................................................................................................

Modify a Link Over Cable


When to use

The function modifies Link Over Cable characteristics.


Related information

The Link Over Cable modification gives the possibility to modify:

Link Over Cable User Label.


Comment.

For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different from any other in
use by Link Over Cable.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Links Over Cable > Modify.

....................................................................................................................................................................................................................................
1350 OMS
14-44
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Modify a Link Over Cable

....................................................................................................................................................................................................................................

Result: The Link Over Cable modification window is displayed.


Figure 14-11 Link Over Cable Modification window

...................................................................................................................................................................................................

To modify a Link Over Cable:

Enter a New User Label (optional).

Modify the Comment (optional).

...................................................................................................................................................................................................

Select OK.
Result: At the beginning of the operation, the working state of the concerned Link
Over Cable is set to Modifying.

If the User Label is modified, the corresponding Transport Link in (Ethernet domain
or in MPLS domain) is modified too.
At the end of the operation, the working state is set to Normal.
The Link Over Cable List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-45
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Delete a Link Over Cable

....................................................................................................................................................................................................................................

Delete a Link Over Cable


When to use

This function consists in deleting a Link Over Cable from the 1350 OMS PKT
supervision.
Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The corresponding Ethernet Transport Link or MPLS Transport Link usage state
must be idle.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Links Over Cable > Delete or right-click the mouse and Select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the working state of the concerned Links Over Cable is
set to removing.

If the Manager Control is Disabled, the deletion is authorized.

....................................................................................................................................................................................................................................
1350 OMS
14-46
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Delete a Link Over Cable

....................................................................................................................................................................................................................................

If the Manager Control is Enabled, the usage of the corresponding Transport Link (in
Ethernet Management domain or in MPLS domain) is checked. If Ethernet Segments
or VC-LSP are carried by Transport Link, the deletion is refused. In other case, the
corresponding Ethernet Transport Link or MPLS Transport Link must be deleted
before the Link Over Cable.
Then, the Links Over Cable are removed. If the Link Over Cable is internal then the
port usage state is set to Idle.
The Links Over Cable List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-47
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Get the Link Over Cable extremities

....................................................................................................................................................................................................................................

Get the Link Over Cable extremities


When to use

This function gets information about the extremities of a Link Over Cable.
Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over Cable > Extremities.
Result: The list window is displayed.

The attributes displayed for each object are:


User Label .
Supported Layer.
NE User Label (A).

Port User Label (A).

....................................................................................................................................................................................................................................
1350 OMS
14-48
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Get the Link Over Cable extremities

....................................................................................................................................................................................................................................

ENE User Label (Z).


ETP(Z).

Figure 14-12 Link Over Cable Extremities window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-49
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

View the details of the Link Over Cables

....................................................................................................................................................................................................................................

View the details of the Link Over Cables


When to use

This function gets information about the Link Over Cable.


Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over Cable > Properties or click the third key of
the mouse then select Properties.
Result: The Link Over Cable properties window is displayed.

The attributes displayed for each Link Over Cable are:


User Label.
Parent Subnetwork.
Comment.

Bit Rate.

Client Type (ETS, ETB).

Supported Layer (Ethernet, MPLS).

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

Working State.

....................................................................................................................................................................................................................................
1350 OMS
14-50
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

View the details of the Link Over Cables

....................................................................................................................................................................................................................................

Last Action Date.


Last Action Type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-51
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Link Over Cable Split/Join

....................................................................................................................................................................................................................................

Link Over Cable Split/Join


When to use

This function Joins or Splits Link Over Cable.


Related information

Join operation removes the two specified Links Over Cable and create a new link.
Split operation removes the specified Link Over Cable and creates two new links.
For information about configuration, see: Configure Split/Join (p. 14-54).
For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list and select Action > Split/Join > Start Join.

....................................................................................................................................................................................................................................
1350 OMS
14-52
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Link Over Cable Split/Join

....................................................................................................................................................................................................................................

Result: The Start Join window is displayed.


Figure 14-13 Start Join window

...................................................................................................................................................................................................

To join Link Over Cables:

Select a Network Element to Remove (Optional) from list.

Select the First Link Over Cable from list.

Select the Second Link Over Cable from list.

...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-53
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Configure Split/Join

....................................................................................................................................................................................................................................

Configure Split/Join
When to use

This function configures Split/Join operation for Links Over Cable.


Related information

The configuration supplies information needed to create the new links.


For information about configuration, see: Configure Split/Join (p. 14-54).
For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list and select Action > Split/Join > Configure Split.

....................................................................................................................................................................................................................................
1350 OMS
14-54
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Configure Split/Join

....................................................................................................................................................................................................................................

Result: The Configure Split window is displayed.


Figure 14-14 Configure Split window

...................................................................................................................................................................................................

To Configure Split:

Select the Link Over Cable to Remove from list.

Select the Network Element to Insert from list.

....................................................................................................................................................................................................................................
1350 OMS
14-55
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Configure Split/Join

....................................................................................................................................................................................................................................

For the First Link Over Cable:


Insert the User Label.
Insert the Comment (Optional).
Insert the First Port.

Insert the First Port Role (A Port, Z Port.

Insert the Second Port.

For the Second Link Over Cable:

Insert the User Label.

Insert the Comment (Optional).

Insert the First Port.

Insert the First Port Role (A Port, Z Port.


Insert the Second Port.

...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-56
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Configure a Link Over Cable

....................................................................................................................................................................................................................................

Configure a Link Over Cable


When to use

This function consists in configuring a Link Over Cable.


Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For information about how to set parameters, see: Relation among Transport Links
attributes and board releases (p. 14-13).
For information about configuration process, see: Configuration phase results.
(p. 14-16).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Link Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Link Over Cable > Configure.


Result: The configuration wizard starts.
...................................................................................................................................................................................................

Click Ok.
Result: The working state is set to configuring.

Then, the Links Over Cable list view is updated with the new Client Type and
Protocol Type values. The working state is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-57
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Assign NAD

....................................................................................................................................................................................................................................

Assign NAD
When to use

This function allows to assign a specific Network Access Domain (NAD) value to a Link
Over Cable.
Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For details about Network Access DomainUser Profile Management (p. 11-71).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Link Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Link Over Cable > Assign NAD.


Result: The wizard starts.
...................................................................................................................................................................................................

To assign a NAD value to the selected Link Over TDM:

Choose the NAD Value from the list on the left side of the window.

Type the Nad Value in the NAD column separated by comma.

...................................................................................................................................................................................................

Click Ok.
Result: The NAD value is assigned to the Link Over Cable, more than one value can

be assigned to a link.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-58
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Get the Fault Localization

....................................................................................................................................................................................................................................

Get the Fault Localization


When to use

This function gets information about the Fault Localization of a Link Over Cable.
Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For details about Fault Localization, see: Fault Localization (p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Link >Link Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Fault Localization.


Result: The list window of Fault Localization is displayed.
...................................................................................................................................................................................................

Selecting an entity from the list, the user can navigate to the alarmed equipment port or
the FM list.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-59
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Assign a Link Over Cable to a Domain

....................................................................................................................................................................................................................................

Assign a Link Over Cable to a Domain


When to use

The function assigns a Links Over Cable to a Domain.


Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Links Over Cable > Assign Resources to Domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-60
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Links Over Cable

Deassign a Link Over Cable from a Domain

....................................................................................................................................................................................................................................

Deassign a Link Over Cable from a Domain


When to use

The function deassigns a Links Over Cable from a Domain.


Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For a description about Domains, refer to the topic Overview about Domains
(p. 13-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > Links Over Cable > Deassign Resources from Domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-61
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

View the list of LAG Links Over Cables

....................................................................................................................................................................................................................................

Managing LAG Links Over Cable


View the list of LAG Links Over Cables
When to use

The function presents all LAG Links Over Cable and their attributes.
Related information

LAG Link over Cable is the way to connect two LAG ports.
For information about Transport Link, see: Overview about Transport links (p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

Select LAG Link Over Cable.


Result: The Link Over Cable list window is displayed.

The attributes displayed for each Link Over Cable are:


User Label.
Parent Subnetwork.
Bit Rate.

Supported Layer (Ethernet, MPLS).

Working State.

Availability Status (Normal, In Failure).

Client Type (ETS, ETB).

Manager Control (Enabled, Disabled).

E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
14-62
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link Over Cable from extremities

....................................................................................................................................................................................................................................

Create a LAG Link Over Cable from extremities


When to use

This function create a LAG Link Over Cable from extremities.


Related information

To create LAG Link , see also: Create a LAG Link Over Cable from Links (p. 14-66).
For information, see: Overview about Link Over Cables (p. 14-38).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The NE must not be isolated, not locked and LAC state must not be granted.

The usage state of the Ethernet physical port of the NE must be idle.

If the supported layer of the port is Ethernet, the Manager Control of the Ethernet
physical port of the NE must be enabled.
If the supported layer of the port is MPLS, the Manager Control of the Ethernet
physical port of the NE must be disabled.
The Usage State of the ETP of the ENE must be idle.

The Manager Control of the selected ETP must be disabled.

The Supported Layer of the Link Over Cable must be compatible with the one of the
chosen physical port and with the role of the chosen ENE.
The User Label must be different as one which is already used by another Link Over
Cable.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create LAG Link Over Cable from
extremities.

....................................................................................................................................................................................................................................
1350 OMS
14-63
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link Over Cable from extremities

....................................................................................................................................................................................................................................

Result: The Link Over Cable creation window is displayed.


Figure 14-15 Link Over Cable Creation window

...................................................................................................................................................................................................

To create a Link Over Cable:

Enter a User Label.

Enter a Comment (optional).

Select the Extremity A from the available NE list.

Then, select the LAG Port (A) of the NE from the available port list.

Select the Extremity Z from the available NE list.

Then, select the LAG Port (Z) of the NE from the available port list.

Select the ETP (Z) from the available ETP list.

....................................................................................................................................................................................................................................
1350 OMS
14-64
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link Over Cable from extremities

....................................................................................................................................................................................................................................

Note: If the selected NE is an External NE then:

Only the ENEs that are compatible with the NE port are displayed. If the NE
extremity has its Manager Control Disabled, only Inner Equipment ENEs are
displayed. If the NE extremity has its Manager Control Enabled, only Customer
Edge ENEs are displayed.
The ETP (Z) (External Termination Point) field is enabled, select the ETP of the
ENE from the available ETP list.

If the selected NE is a defined Network Element

Select the Port User Label (Z) (External Termination Point) of the NE from the
available port list.

...................................................................................................................................................................................................

Click Ok.
Result: The LAG Link is created.

At the beginning of the operation, the working state is set to Creating.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-65
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link Over Cable from Links

....................................................................................................................................................................................................................................

Create a LAG Link Over Cable from Links


When to use

This function create a LAG Link Over Cable from Links.


Related information

To create LAG Link , see also: Create a LAG Link Over Cable from extremities
(p. 14-63).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create LAG Link Over Cable from Links.

....................................................................................................................................................................................................................................
1350 OMS
14-66
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link Over Cable from Links

....................................................................................................................................................................................................................................

Result: The Link Over Cable creation window is displayed.


Figure 14-16 Link Over Cable Creation window

....................................................................................................................................................................................................................................
1350 OMS
14-67
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link Over Cable from Links

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

To create a Link Over Cable:

Enter a User Label.

Enter a Comment (optional).

Enter the LAG size.

Enter theLACP.

Select the Extremity A from the available NE list.

Select the Hash Key (A) from the list.

Enter theLAG Id.

Select the Extremity Z from the available NE list.

Select the Hash Key (Z) from the list.


Enter theLAG Id.

Select the Resorces from the list.

...................................................................................................................................................................................................

Click Ok.
Result: The LAG Link is created.

At the beginning of the operation, the working state is set to Creating.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-68
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link VCG from extremities

....................................................................................................................................................................................................................................

Create a LAG Link VCG from extremities


When to use

This function create a LAG Link VCG from extremities.


Related information

To create LAG Link , see also: Create a LAG Link VCG from Links (p. 14-72).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create LAG Link VCG from extremities.

....................................................................................................................................................................................................................................
1350 OMS
14-69
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link VCG from extremities

....................................................................................................................................................................................................................................

Result: The Link VCG creation window is displayed.


Figure 14-17 Link VCG Creation window

...................................................................................................................................................................................................

To create a Link VCG:

Enter a User Label.

Enter a Comment (optional).

Select the Extremity A from the available NE list.

Then, select the VCG Termination (A) of the NE from the list.

Select the Extremity Z from the available NE list.

Then, select the VCG Termination (Z) of the NE from the list.

Select the ETP (Z) from the list.

....................................................................................................................................................................................................................................
1350 OMS
14-70
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link VCG from extremities

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok.
Result: The LAG Link VCG is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-71
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link VCG from Links

....................................................................................................................................................................................................................................

Create a LAG Link VCG from Links


When to use

This function create a LAG Link VCG from Links.


Related information

This task does not have any related information.


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create LAG Link VCG from Links.

....................................................................................................................................................................................................................................
1350 OMS
14-72
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link VCG from Links

....................................................................................................................................................................................................................................

Result: The Link VCG creation window is displayed.


Figure 14-18 LAG Link VCG Creation window

....................................................................................................................................................................................................................................
1350 OMS
14-73
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Create a LAG Link VCG from Links

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

To create a LAG Link VCG:

Enter a User Label.

Enter a Comment (optional).

Enter the LAG size.

Select theLACP from the list.

Select the Hash Key from the list.

Select the Extremity A from the available NE list.

Select the Extremity Z from the available NE list.

Select the Resorces from the list.

...................................................................................................................................................................................................

Click Ok.
Result: The LAG Link VCG is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-74
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Modify a LAG Link Over Cable

....................................................................................................................................................................................................................................

Modify a LAG Link Over Cable


When to use

The function modifies LAG Link Over Cable characteristics.


Related information

The function gives the possibility to modify:

LAG Link Over Cable User Label.


Comment.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different from any other in
use by Link Over Cable.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > LAG Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > LAG Links Over Cable > Modify.


Result: The Link Over Cable modification window is displayed.
...................................................................................................................................................................................................

To modify a Link Over Cable:

Enter a New User Label (optional).

Modify the Comment (optional).

...................................................................................................................................................................................................

Select OK.

....................................................................................................................................................................................................................................
1350 OMS
14-75
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Modify a LAG Link Over Cable

....................................................................................................................................................................................................................................

Result: At the beginning of the operation, the working state of the concerned Link
Over Cable is set to Modifying.

If the User Label is modified, the corresponding Transport Link in (Ethernet domain
or in MPLS domain) is modified too.
At the end of the operation, the working state is set to Normal.
The Link Over Cable List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-76
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Delete a LAG Link Over Cable

....................................................................................................................................................................................................................................

Delete a LAG Link Over Cable


When to use

This function consists in deleting a LAG Link Over Cable.


Related information

If the Manager Control is Disabled, the deletion is authorized.


If the Manager Control is Enabled, the usage of the corresponding Transport Link (in
Ethernet Management domain or in MPLS domain) is checked. If Ethernet Segments or
VC-LSP are carried by Transport Link, the deletion is refused. In other case, the
corresponding Ethernet Transport Link or MPLS Transport Link must be deleted before
the Link Over Cable.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The corresponding Ethernet Transport Link or MPLS Transport Link usage state
must be idle.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > LAG Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > LAG Links Over Cable > Delete or right-click the mouse and Select
Delete.
...................................................................................................................................................................................................

Select OK in the confirmation box to confirm the deletion..

....................................................................................................................................................................................................................................
1350 OMS
14-77
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Delete a LAG Link Over Cable

....................................................................................................................................................................................................................................

Result: After confirmation, the working state of the concerned LAG Links Over
Cable is set to removing.

Then, the LAG Links Over Cable are removed. If the Link Over Cable is internal then
the port usage state is set to Idle.
The LAG Links Over Cable List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-78
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Get the LAG Link Over Cable extremities

....................................................................................................................................................................................................................................

Get the LAG Link Over Cable extremities


When to use

This function gets information about the extremities of a LAG Link Over Cable.
Related information

This task does not have any related information.


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > LAG Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over Cable > Extremities.
Result: The Link over Cable extremities window is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-79
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

View the details of the LAG Link Over Cables

....................................................................................................................................................................................................................................

View the details of the LAG Link Over Cables


When to use

This function gets information about the Link Over Cable.


Related information

This task does not have any related information.


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > LAG Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over Cable > Properties or click the third key of
the mouse then select Properties.
Result: The Link Over Cable properties window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-80
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing LAG Links Over Cable

Details of the list of LAG Link Over Cables

....................................................................................................................................................................................................................................

Details of the list of LAG Link Over Cables


Attributes of a LAG Link Over Cables

The attributes displayed for each LAG Link Over Cable are:

User Label.

Parent Subnetwork.

Comment.

Bit Rate.

Client Type (ETS, ETB).

Supported Layer (Ethernet, MPLS).

Working State.

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

Last Action Type.

Last Action Date.

....................................................................................................................................................................................................................................
1350 OMS
14-81
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over WDM

Overview about links over WDM

....................................................................................................................................................................................................................................

Managing links over WDM


Overview about links over WDM
Link Over WDM description

A Link Over WDM is the image in 1350 OMS PKT Construction domain of Transport
Links managed by the WDM manager.
Links Over WDM are managed by external applications.
Refer to the document: [5] 1350 OMS WDM Guide

....................................................................................................................................................................................................................................
1350 OMS
14-82
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over WDM

View the list of links over WDM

....................................................................................................................................................................................................................................

View the list of links over WDM


When to use

The Link Over WDM List window presents all links over WDM and their attributes.
Related information

For information about Transport Link, see: MPLS/T-MPLS Transport link (p. 11-65).
For information about links over WDM, see: Overview about links over WDM
(p. 14-82).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

Select Transport Links > Links Over WDM.


Result: The Link Over WDM list window is displayed.

The attributes displayed for each Link Over WDM are:


User Label.
Parent Subnetwork.
Working State.

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-83
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over WDM

Get the Link Over WDM extremities

....................................................................................................................................................................................................................................

Get the Link Over WDM extremities


When to use

This function gets information about the extremities (origin and destination) of a Link
Over WDM.
Related information

For information about Transport Link, see: MPLS/T-MPLS Transport link (p. 11-65).
For information about links over WDM, see: Overview about links over WDM
(p. 14-82).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links > Links Over WDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over WDM > Extremities or click the third key of
the mouse then select Extremities.
Result: The Link Over WDM Extremities window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-84
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over WDM

Description of a Link Over WDM Extremities

....................................................................................................................................................................................................................................

Description of a Link Over WDM Extremities


Attributes of a Link Over WDM Extremity

The attributes displayed are:

User Label.

NE User Label (A).

Termination User Label (A).

NE User Label (Z).

Termination User Label (Z).

....................................................................................................................................................................................................................................
1350 OMS
14-85
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over WDM

View the details of the links over WDM

....................................................................................................................................................................................................................................

View the details of the links over WDM


When to use

This function gets information about a Link Over WDM.


Related information

For information about Transport Link, see: MPLS/T-MPLS Transport link (p. 11-65).
For information about links over WDM, see: Overview about links over WDM
(p. 14-82).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links > Links Over WDM.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over WDM > Properties or click the third key of
the mouse then select Properties.
Result: The Link Over WDM properties window is displayed.

The attributes displayed for each Link Over WDM are:


User Label.
Parent Subnetwork.

Working State.

Availability Status (Normal, In Failure).

Last Action Date.

Last Action Type.

Traffic Contract.

CIR.

Manager Control (Enabled, Disabled).

....................................................................................................................................................................................................................................
1350 OMS
14-86
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over WDM

View the details of the links over WDM

....................................................................................................................................................................................................................................

PIR.

PBS.

CBS.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-87
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over MPLS

Overview about links over MPLS

....................................................................................................................................................................................................................................

Managing links over MPLS


Overview about links over MPLS
Link Over MPLS description

A Link Over MPLS is the image in 1350 OMS PKT Construction domain of a VC-LSP
managed by the MPLS manager.
A Link Over MPLS is automatically created or deleted inside the construction domain at
the implementation or de-implementation of the corresponding VC-LSP.
A Link Over MPLS is automatically modified when the corresponding VC-LSP is
modified.

....................................................................................................................................................................................................................................
1350 OMS
14-88
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over MPLS

View the list of links over MPLS

....................................................................................................................................................................................................................................

View the list of links over MPLS


When to use

The Link Over MPLS List window presents all links over MPLS and their attributes.
Related information

For details about Transport Links, see: MPLS/T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Note: A Link Over MPLS appears automatically in this list when a VC-LSP is
implemented.
A Link Over MPLS disappears automatically from this list when a VC-LSP is
de-implemented.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links.


Result: The Transport Links menu is displayed.
...................................................................................................................................................................................................

Select Links Over MPLS.


Result: The Link Over MPLS list window is displayed.

The attributes displayed for each Link Over MPLS are:


User Label.
Parent Subnetwork.

Working State.

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-89
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over MPLS

Get the Link Over MPLS extremities

....................................................................................................................................................................................................................................

Get the Link Over MPLS extremities


When to use

This function gets information about the extremities (origin and destination) of a Link
Over MPLS.
Related information

For information about Transport Link, see: MPLS/T-MPLS Transport link (p. 11-65).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over MPLS > Extremities or click the third key of
the mouse then select Extremities.
Result: The Link Over MPLS Extremities window is displayed.

The attributes displayed are:


User Label.
NE User Label (A).

Termination User Label (A).

NE User Label (Z).


Termination User Label (Z).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-90
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over MPLS

View the details of the links over MPLS

....................................................................................................................................................................................................................................

View the details of the links over MPLS


When to use

This function gets information about a Link Over MPLS.


Related information

For information about Transport Link, see: .


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over MPLS > Properties or click the third key of
the mouse then select Properties.
Result: The Link Over MPLS properties window is displayed.

The attributes displayed for each Link Over MPLS are:


User Label.
Parent Subnetwork.
Working State.

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

Last Action Date.

Traffic Contract.

CIR.

PIR.

Last Action Type.

....................................................................................................................................................................................................................................
1350 OMS
14-91
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over MPLS

View the details of the links over MPLS

....................................................................................................................................................................................................................................

CBS.
PBS.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-92
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Link over Radio

View the list of links over Radio

....................................................................................................................................................................................................................................

Managing Link over Radio


View the list of links over Radio
When to use

The function lists presents all links over Radio and their attributes.
Related information

For information about Transport Link, see: MPLS/T-MPLS Transport link (p. 11-65).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

Select Transport Links > Links Over Radio.


Result: The Link Over Radio list window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-93
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over T-MPLS

Overview about links over T-MPLS

....................................................................................................................................................................................................................................

Managing links over T-MPLS


Overview about links over T-MPLS
Link Over T-MPLS description

A Link Over T-MPLS is the image in 1350 OMS PKT Construction domain of a VC-LSP
managed by the T-MPLS manager.
A Link Over MPLS is automatically created or deleted inside the construction domain at
the implementation or de-implementation of the corresponding VC-LSP.
A Link Over MPLS is automatically modified when the corresponding VC-LSP is
modified.

....................................................................................................................................................................................................................................
1350 OMS
14-94
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over T-MPLS

View the list of links over T-MPLS

....................................................................................................................................................................................................................................

View the list of links over T-MPLS


When to use

The Link Over T-MPLS List window presents all links over T-MPLS and their attributes.
Related information

For details about Transport Links, see: MPLS/T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Note: A Link Over T-MPLS appears automatically in this list when a VC-LSP is
implemented.
A Link Over T-MPLS disappears automatically from this list when a VC-LSP is
de-implemented.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

Select Transport Links > Link Over T-MPLS.


Result: The Link Over T-MPLS list window is displayed.

The attributes displayed for each Link Over T-MPLS are:


User Label.
Parent Subnetwork.

Working State.

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-95
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over T-MPLS

Get the Link Over T-MPLS extremities

....................................................................................................................................................................................................................................

Get the Link Over T-MPLS extremities


When to use

This function gets information about the extremities (origin and destination) of a Link
Over T-MPLS.
Related information

For information about Transport Link, see: MPLS/T-MPLS Transport link (p. 11-65).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over T-MPLS > Extremities or click the third key
of the mouse then select Extremities.
Result: The Link Over T-MPLS Extremities window is displayed.

The attributes displayed are:


User Label.
NE User Label (A).

Termination User Label (A).

NE User Label (Z).


Termination User Label (Z).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-96
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over T-MPLS

View the details of the links over T-MPLS

....................................................................................................................................................................................................................................

View the details of the links over T-MPLS


When to use

This function gets information about a Link Over T-MPLS.


Related information

For information about Transport Link, see: MPLS/T-MPLS Transport link (p. 11-65).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Link Over T-MPLS > Properties or click the third key of
the mouse then select Properties.
Result: The Link Over T-MPLS properties window is displayed.

The attributes displayed for each Link Over T-MPLS are:


User Label.
Parent Subnetwork.
Working State.

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

Last Action Date.

Traffic Contract.

CIR.

PIR.

Last Action Type.

....................................................................................................................................................................................................................................
1350 OMS
14-97
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing links over T-MPLS

View the details of the links over T-MPLS

....................................................................................................................................................................................................................................

CBS.
PBS.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-98
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing MPLS/T-MPLS infrastructure

Overview about MPLS/T-MPLS infrastructure

....................................................................................................................................................................................................................................

Managing MPLS/T-MPLS infrastructure


Overview about MPLS/T-MPLS infrastructure
MPLS/T-MPLS infrastructure description

The section represents the transport connection between two T-MPLS ports, whatever the
underlying transport technology (for example, cable, TDM, WDM).

....................................................................................................................................................................................................................................
1350 OMS
14-99
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing MPLS/T-MPLS infrastructure

View the list of T-MPLS sections

....................................................................................................................................................................................................................................

View the list of T-MPLS sections


When to use

The list presents all the T-MPLS sections and their attributes.
Related information

Note: A Link Over T-MPLS appears automatically in this list when a VC-LSP is
implemented.
A Link Over T-MPLS disappears automatically from this list when a VC-LSP is
de-implemented.
For details about Transport Links, see: MPLS/T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

Select T-MPLS > T-MPLS sections.


Result: The T-MPLS section list window is displayed.

The attributes displayed for each Link Over T-MPLS are:


User Label.
Parent Subnetwork.
Working State.

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
14-100
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing MPLS/T-MPLS infrastructure

Get the T-MPLS section extremities

....................................................................................................................................................................................................................................

Get the T-MPLS section extremities


When to use

This function gets information about the extremities (origin and destination) of a T-MPLS
section.
Related information

For information about T-MPLS section, see:


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction >T-MPLS > T-MPLS sections.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > T-MPLS section > Extremities or click the third key of the mouse then
select Extremities.
Result: The T-MPLS section Extremities window is displayed.

The attributes displayed are:


User Label.
NE User Label (A).

Termination User Label (A).

NE User Label (Z).


Termination User Label (Z).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-101
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing MPLS/T-MPLS infrastructure

View the details of the links over T-MPLS

....................................................................................................................................................................................................................................

View the details of the links over T-MPLS


When to use

This function gets information about a T-MPLS section.


Related information

For information about T-MPLS section, see:


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction >T-MPLS > T-MPLS sections.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Inventory from T-MPLS section > Properties or click the third key of
the mouse then select Properties.
Result: The T-MPLS section properties window is displayed.

The attributes displayed for each Link Over T-MPLS are:


User Label.
Parent Subnetwork.
Working State.

Availability Status (Normal, In Failure).

Manager Control (Enabled, Disabled).

Last Action Date.

Traffic Contract.

CIR.

PIR.

Last Action Type.

....................................................................................................................................................................................................................................
1350 OMS
14-102
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing MPLS/T-MPLS infrastructure

View the details of the links over T-MPLS

....................................................................................................................................................................................................................................

CBS.
PBS.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-103
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management


Managing Transport Links by Domain

Overview

....................................................................................................................................................................................................................................

Managing Transport Links by Domain


View the list of Transport Links
When to use

The Transport Link List window presents all Transport Links belonging to the same
domain.
Related information

For information about Transport Link, see: Overview about Transport links (p. 14-4).
For Connection Oriented management, see also: Display the Ethernet ETS Transport
Link list (p. 18-186).
For Connection Less management, see also: Display the Ethernet Bridge Transport Link
list (p. 19-27).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

Select one of the proposed types:

Connection Oriented (ETS) > ETS Transport Links.

Connection Less (Bridge) > Bridge Transport Links.


Result: The list of the requested Transport Links is shown.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
14-104
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management

View the list of Transport Links

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
14-105
8DG42227DAAA 9.6
Issue 3 December 2012

Transport Link Management

View the list of Transport Links

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
14-106
8DG42227DAAA 9.6
Issue 3 December 2012

15

15
MPLS
Provisioning
Management

Overview
Purpose

This chapterdescribes how to provision and monitor the MPLS data.


Contents
Managing Traffic Descriptors (MPLS)

15-4

Overview about Traffic Descriptors (MPLS)

15-5

View the list of Traffic Descriptors (MPLS)

15-6

Description of the list of Traffic Descriptors

15-7

Create a Traffic Descriptor (MPLS)

15-8

Modify a Traffic Descriptor (MPLS)

15-12

Delete a Traffic Descriptor (MPLS)

15-15

View the details of the Traffic Descriptors (MPLS)

15-16

Details of a Traffic Descriptor

15-17

Get the Traffic Descriptor inventory list (MPLS)

15-18

Description of the Traffic Descriptor inventory

15-19

Managing Transport Links (MPLS)

15-20

Overview about Transport Links

15-21

View the list of Transport Links

15-23

Define the Transport Link characteristics

15-25

Get the Transport Link extremities

15-28

Description of the list of Transport Link Extremities

15-30

View the details of the Transport Links

15-31

Details of a Transport Link

15-32

View the bandwidth load of Transport Links

15-33

View the inventory of Transport Links

15-36

...................................................................................................................................................................................................................................
1350 OMS
15-1
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management

Overview

....................................................................................................................................................................................................................................

Description of the Transport Link Inventory


Managing LSP Tunnels (MPLS)

15-38
15-39

Overview about LSP Tunnels

15-40

View the list of LSP tunnels

15-41

Description of the list of LSP Tunnels

15-42

Create an LSP tunnel

15-43

Modify an LSP tunnel

15-45

Delete an LSP tunnel

15-47

Allocate LSP tunnel

15-48

Deallocate LSP tunnel

15-51

List the constraints of an LSP tunnel

15-53

Description of constraints of LSP tunnel

15-55

Add a constraint to an LSP tunnel

15-56

Delete a constraint from an LSP tunnel

15-58

View the details of the LSP tunnel constraints

15-60

Details of a LSP Tunnel Constraint

15-62

View the list of cross connections

15-63

Description of the list of LSP cross connections

15-64

Implement an LSP tunnel

15-65

Get the LSP tunnel extremities

15-67

Description of the list of LSP Tunnel Extremities

15-69

View the details of the LSP tunnels

15-70

Details of a LSP Tunnel

15-71

View the inventory of VC-LSPs

15-72

Description of the LSP Tunnel Inventory

15-73

View the bandwidth load of LSPs

15-74

View the route of LSP Tunnels

15-77

View the list of the Transport Links related to an LSP Tunnel

15-79

Description of the LSP Tunnel inventory

15-80

Managing VC-LSP (MPLS)

15-81

Overview about VC-LSP

15-82

View the list of VC-LSPs

15-83

Description of the list of VC-LSPs

15-84

Create a VC-LSP

15-85

Modify a VC-LSP

15-89

....................................................................................................................................................................................................................................
1350 OMS
15-2
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management

Overview

....................................................................................................................................................................................................................................

Delete a VC-LSP

15-91

Implement a VC-LSP

15-92

De-implement a VC-LSP

15-94

Commission a VC-LSP

15-96

De-commission a VC-LSP

15-98

Get the VC-LSP extremities

15-99

Description of the list of VC-LSP Extremities

15-101

View the details of the VC-LSPs

15-102

Details of a VC-LSP

15-103

....................................................................................................................................................................................................................................
1350 OMS
15-3
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

Managing Traffic Descriptors (MPLS)


Purpose

This section provides information about the Managing Traffic Descriptors (MPLS).
Contents
Overview about Traffic Descriptors (MPLS)

15-5

View the list of Traffic Descriptors (MPLS)

15-6

Description of the list of Traffic Descriptors

15-7

Create a Traffic Descriptor (MPLS)

15-8

Modify a Traffic Descriptor (MPLS)

15-12

Delete a Traffic Descriptor (MPLS)

15-15

View the details of the Traffic Descriptors (MPLS)

15-16

Details of a Traffic Descriptor

15-17

Get the Traffic Descriptor inventory list (MPLS)

15-18

Description of the Traffic Descriptor inventory

15-19

....................................................................................................................................................................................................................................
1350 OMS
15-4
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Overview about Traffic Descriptors (MPLS)

....................................................................................................................................................................................................................................

Overview about Traffic Descriptors (MPLS)


Tool chain description

Each LSP is characterized by a Traffic Descriptor. It indicates the QoS and the traffic
parameters.
The Traffic Descriptor management tool chain gives the order in which the available
actions can be performed.
Figure 15-1 Traffic Descriptor management chain

....................................................................................................................................................................................................................................
1350 OMS
15-5
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

View the list of Traffic Descriptors (MPLS)

....................................................................................................................................................................................................................................

View the list of Traffic Descriptors (MPLS)


When to use

The Traffic Descriptor List window presents all the MPLS Traffic Descriptors and their
attributes.
Related information

For information about Traffic Descriptors, see: Overview about Traffic Descriptors
(MPLS) (p. 15-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > MPLS.


Result: The MPLS menu is displayed.
...................................................................................................................................................................................................

Select Descriptor.
Result: The MPLS Traffic Descriptor list is displayed.

See the following topic in this document: Description of the list of Traffic
Descriptors (p. 15-7)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-6
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Description of the list of Traffic Descriptors

....................................................................................................................................................................................................................................

Description of the list of Traffic Descriptors


Attributes of a Traffic Descriptor

The attributes displayed for each Traffic Descriptor are:

User Label.

Traffic Contract (Assured Forwarding, Expedited Forwarding Best Effort).

CIR (Committed Information Rate).

PIR (Peak Information Rate).

CBS (Committed Burst Size).

PBS (Peak Burst Size).

....................................................................................................................................................................................................................................
1350 OMS
15-7
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Create a Traffic Descriptor (MPLS)

....................................................................................................................................................................................................................................

Create a Traffic Descriptor (MPLS)


When to use

This function defines a Traffic Descriptor.


Related information

This function consists in defining a Traffic Descriptor (MPLS) that can be used by LSP
tunnels and VC LSPs.
For information about Traffic Descriptors, see: Overview about Traffic Descriptors
(MPLS) (p. 15-5).
MPLS traffic contract and traffic parameters dependencies
Table 15-1

MPLS traffic contract and traffic parameter dependencies


Traffic Contract.

Traffic
Descriptor
parameter.

BE.
0 1.

CIR.

EF.

AF.

(CIR = PIR).

(CIR <= PIR) & (CIR > = 0).

&.

if (CIR > 0), (CBS > 0).

(CIR > 0).

if (CIR = 0), (CBS = 0).

PIR.

> 0.

(PIR=CIR) & (PIR


>0)1.

(PIR > = CIR) & (PIR > 0).

CBS.

0 1.

(CBS = PBS) &


(CBS > 0).

(CBS > = 0) & (CBS <= PBS).


if (CBS > 0), (CIR > 0).
if (CBS = 0), (CIR = 0).

PBS.

> 0.

(PBS= CBS) &


(PBS >0)1.

(PBS > 0) & (PBS > = CBS).

Notes:

1.

Value set by default and not modifiable by the user.

ISA boards and MPLS traffic parameter dependencies


Table 15-2

ISA boards and MPLS traffic parameter dependencies


ISA PR EA or ISA ES16.
Minimum.

Maximum.

CIR.

0 or 64.

Up to PIR.

PIR.

64.

Up to ELR.

CBS.

0.

Min (16384, 500/3CIR ).

PBS.

> 0.

Min (65335, 500/3PIR ).

....................................................................................................................................................................................................................................
1350 OMS
15-8
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Create a Traffic Descriptor (MPLS)

....................................................................................................................................................................................................................................

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Table B-20, Limits for MPLS Traffic Descriptors (p. B-4) must not be reached.

The traffic parameters of the Traffic Descriptor must be different from parameters
used by an existing Traffic Descriptor.
The User Label must be different as one which is already used by another Traffic
Descriptor.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > MPLS > Create Traffic Descriptors.

....................................................................................................................................................................................................................................
1350 OMS
15-9
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Create a Traffic Descriptor (MPLS)

....................................................................................................................................................................................................................................

Result:
Figure 15-2 Traffic Descriptor Creation window

...................................................................................................................................................................................................

To create a Traffic Descriptor:

Enter a User Label.

Choose a Class of Service.


By using the option button you can choose among the following values:
Assured Forwarding: A minimum of bandwidth (That is CIR) is reserved.

Expedited Forwarding: The bandwidth requested by the user (PIR equal to CIR)

is reserved.

Best Effort: No bandwidth is reserved.


Enter a Comment (optional).

Enter the traffic parameters.

....................................................................................................................................................................................................................................
1350 OMS
15-10
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Create a Traffic Descriptor (MPLS)

....................................................................................................................................................................................................................................

In the traffic parameters area, enter the required parameters. The number of
parameters to enter depends on the traffic contract previously chosen. The field to be
filled are in white:
CIR: in Kbit/s.
PIR: in Kbit/s.

CBS: in bytes.

PBS: in bytes.

...................................................................................................................................................................................................

Click Ok button.
Result: After checking the coherence of the traffic parameters values and the selected
traffic contract, the Traffic Descriptor is created.

The Traffic Descriptor (MPLS) list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-11
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Modify a Traffic Descriptor (MPLS)

....................................................................................................................................................................................................................................

Modify a Traffic Descriptor (MPLS)


When to use

The Link Over Cable modification gives the possibility to modify Traffic Descriptor
characteristics.
Related information

For information about Traffic Descriptors, see: Overview about Traffic Descriptors
(MPLS) (p. 15-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different as one which is
already used by another Traffic Descriptor.
If the selected Traffic Descriptor is busy, Traffic Contract and Traffic Parameters
cannot be modified.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > MPLS > Descriptors.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > MPLS > Descriptor > Modify or Click the third key of the
mouse and select Modify.

....................................................................................................................................................................................................................................
1350 OMS
15-12
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Modify a Traffic Descriptor (MPLS)

....................................................................................................................................................................................................................................

Result: The TD modification window is displayed.


Figure 15-3 Traffic Descriptor Modification window

If the Traffic Descriptor is associated to an LSP tunnel or VC-LSP, only the Traffic
User Label and Comment can be modified.
...................................................................................................................................................................................................

To modify a Traffic Descriptor:

Enter a new User Label (optional).

Select a new Class of Service (optional).

....................................................................................................................................................................................................................................
1350 OMS
15-13
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Modify a Traffic Descriptor (MPLS)

....................................................................................................................................................................................................................................

Modify the Comment (optional).


Modify the ClR (optional).
Modify the PIR (optional).
Modify the CBS (optional).

Modify the PBS (optional).

...................................................................................................................................................................................................

Select OK.
Result: After confirmation of the modification: the Traffic Descriptor list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-14
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Delete a Traffic Descriptor (MPLS)

....................................................................................................................................................................................................................................

Delete a Traffic Descriptor (MPLS)


When to use

This function consists in deleting a Traffic Descriptor (MPLS) from the 1350 OMS PKT
supervision.
Related information

For information about Traffic Descriptors, see: Overview about Traffic Descriptors
(MPLS) (p. 15-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

No more LSP Tunnel or VC-LSP are using this Traffic Descriptor.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > MPLS > Descriptors.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > MPLS > Descriptor > Delete or Click the third key of the
mouse and select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the Traffic Descriptors are removed.

The Traffic Descriptor (MPLS) list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-15
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

View the details of the Traffic Descriptors (MPLS)

....................................................................................................................................................................................................................................

View the details of the Traffic Descriptors (MPLS)


When to use

This function gets information about the Traffic Descriptors (MPLS).


Related information

For information about Traffic Descriptors, see: Overview about Traffic Descriptors
(MPLS) (p. 15-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > MPLS > Descriptors.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > MPLS > Descriptor > Properties or Click the third key of the
mouse and select Properties.
Result: The Traffic Descriptor properties window is displayed.

See the following topic in this document: Details of a Traffic Descriptor (p. 15-17)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-16
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Details of a Traffic Descriptor

....................................................................................................................................................................................................................................

Details of a Traffic Descriptor


Attributes of a Traffic Descriptor

The attributes displayed for each Traffic Descriptor are:

User Label.

Traffic Contract (Assured Forwarding, Expedited Forwarding, Best Effort).

Comment.

CIR (Committed Information Rate).

PIR (Peak Information Rate).

CBS (Committed Burst Size).

PBS (Peak Burst Size).

....................................................................................................................................................................................................................................
1350 OMS
15-17
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Get the Traffic Descriptor inventory list (MPLS)

....................................................................................................................................................................................................................................

Get the Traffic Descriptor inventory list (MPLS)


When to use

This function gets information about each LSP tunnel and VC-LSP (and their states) using
the previously selected Traffic Descriptor.
Related information

For information about Traffic Descriptors, see: Overview about Traffic Descriptors
(MPLS) (p. 15-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > MPLS > Descriptors.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > MPLS > Descriptor > Get Inventory or Click the third key of
the mouse and Get Inventory.
Result: The inventory list is displayed.

If you select an entity (LSP Tunnel or VC-LSP) in the inventory list and click the right
button, you see a list of commands. The listed commands depend on the provisioning
state and availability status of the selected entity.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-18
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Traffic Descriptors (MPLS)

Description of the Traffic Descriptor inventory

....................................................................................................................................................................................................................................

Description of the Traffic Descriptor inventory


Attributes of the inventory

The attributes displayed for each LSP tunnel or VC-LSP are:

LSP Type (LSP Tunnel or VC-LSP).

LSP Tunnel or VC-LSP User Label.

Provisioning State (Defined, Allocated, Partially Implemented, Implemented,


Commissioned).

Availability Status.

....................................................................................................................................................................................................................................
1350 OMS
15-19
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Overview

....................................................................................................................................................................................................................................

Managing Transport Links (MPLS)


Overview
Purpose

This section provides information about the Managing Transport Links (MPLS).
Contents
Overview about Transport Links

15-21

View the list of Transport Links

15-23

Define the Transport Link characteristics

15-25

Get the Transport Link extremities

15-28

Description of the list of Transport Link Extremities

15-30

View the details of the Transport Links

15-31

Details of a Transport Link

15-32

View the bandwidth load of Transport Links

15-33

View the inventory of Transport Links

15-36

Description of the Transport Link Inventory

15-38

....................................................................................................................................................................................................................................
1350 OMS
15-20
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Overview about Transport Links

....................................................................................................................................................................................................................................

Overview about Transport Links


Transport Link description

For details about Transport Links, see: MPLS/T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Two kinds of Transport Link can be used as infrastructure:

based on Link Over TDM, in this case, they can be used to carry LSP Tunnel. In that
case, the extremities of the Transport Link are TDM termination and its transport type
is Link Over TDM.
based on Link Over Cable, in this case, they can be used to carry VC-LSP. In that
case, the extremities of the Transport Link are one Physical Port and one ETP and its
transport type is Link Over Cable.

The different steps to provide a Transport Link are the following:

Create Transport link (in the scope of network construction).


The Transport Link is created automatically after the creation or the upload of Links
Over TDM and Links Over Cable dedicated to MPLS.

Characteristic definition.
For each extremity of the Transport Link, to provision the characteristics (MPLS
Label range) and to activate them. The MPLS Label range is stored.

The Transport Link management tool chain gives the order in which the available actions
can be performed.

....................................................................................................................................................................................................................................
1350 OMS
15-21
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Overview about Transport Links

....................................................................................................................................................................................................................................

Figure 15-4 MPLS Transport Link management chain

....................................................................................................................................................................................................................................
1350 OMS
15-22
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

View the list of Transport Links

....................................................................................................................................................................................................................................

View the list of Transport Links


When to use

The Transport Link list window presents all the MPLS Transport Links and their
attributes.
Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 15-21).
For details about Transport Links, see: MPLS/T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Transport Links.


.
Result: The Transport Links Menu is displayed.
...................................................................................................................................................................................................

Select: Links Over MPLS.


Result: The MPLS Transport Link list is displayed.

The attributes displayed for each Transport Link are:


User Label.
Parent Subnetwork.

Transport Type (Link Over Cable, Link Over TDM).

Bandwidth (In Kbit/s).

Usage State (Idle, Busy, Reserved, Not meaningful).

....................................................................................................................................................................................................................................
1350 OMS
15-23
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

View the list of Transport Links

....................................................................................................................................................................................................................................

Working State (Normal, Configuring, Removing).


Provisioning State (Defined, Partially Configured, Configured).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-24
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Define the Transport Link characteristics

....................................................................................................................................................................................................................................

Define the Transport Link characteristics


When to use

This function consists in defining the characteristics of a Transport Link.


Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 15-21).
For details about Transport Links, see: MPLS/T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
definition by involved boards

Characteristic definition of a Transport Link is made by setting MPLS label range and by
activation of the interface.
The proposed Static Range Min and Max depend on the type of the boards at the
extremities of the Transport Link:

for two ISA boards (PR EA or ES16), the Min Range is equal to 1024 and the Max
range is equal to 5119.
for one ENE (ISA PR) and one ISA PR EA, the Min Range is equal to 1024 and the
Max range is equal to 5119.
for one ENE (not an ISA PR) and one ISA ES16 board, the label range is set to
1024-5119, by automatic configuration. The user can change it by configuration of the
Transport Link manually. In this case, the Min Range is 16 and the Max range is
5119.

definition by user

The user has the possibility to change these values inside the range.
At the end, on each NE involved in the Transport Link, the physical port, or the logical
port is configured. The MPLS label range is stored in 1350 OMS PKT database, and the
1350 OMS PKT interface is activated.
If the selected Transport Link is based on Link Over Cable, the user can open the
VC-LSP creation window by ticking the Proceed with VC-LSP creation box.
If the selected Transport Link is based on Link Over TDM, the user can open the LSP
tunnel creation window by ticking the Proceed with LSP Tunnel creation box.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
....................................................................................................................................................................................................................................
1350 OMS
15-25
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Define the Transport Link characteristics

....................................................................................................................................................................................................................................

Conditions

To get a positive result:

The Transport Link does not carry any LSP tunnel (if based on Link Over TDM) or
any VC-LSP (if based on Link Over Cable).
The NE (extremities of the Transport Link) must not be locked (that is audit,
alignment, reserve are not in progress on the NEs).
The NE (extremities of the Transport Link) LAC state must not be granted.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > MPLS > Transport Link.


Select: Search > Packet > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > MPLS > Transport Link > Define Characteristics or Click the
third key of the mouse and select Define Characteristics.
Result:
Figure 15-5 TL Characteristic Definition window (based on Link Over Cable)

....................................................................................................................................................................................................................................
1350 OMS
15-26
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Define the Transport Link characteristics

....................................................................................................................................................................................................................................

Figure 15-6 TL Characteristic Definition window (based on Link Over TDM)

...................................................................................................................................................................................................

Select OK.
Result: After click Ok button, the Transport Link is updated with the following

states:

Provisioning State: Configured.

Working State: Normal.

After the characteristic definition, the Transport Link List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-27
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Get the Transport Link extremities

....................................................................................................................................................................................................................................

Get the Transport Link extremities


When to use

This function gets information about extremities of a Transport Link.


Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 15-21).
For details about Transport Links, see: MPLS/T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > MPLS > Transport Link > Extremities or Click the third key of
the mouse and Extremities.

....................................................................................................................................................................................................................................
1350 OMS
15-28
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Get the Transport Link extremities

....................................................................................................................................................................................................................................

Result: The list window is displayed.

See the following topic in this document: Description of the list of Transport Link
Extremities (p. 15-30)
Figure 15-7 Transport Link Extremities window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-29
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Description of the list of Transport Link Extremities

....................................................................................................................................................................................................................................

Description of the list of Transport Link Extremities


Attributes of a Transport Link Extremity

The following attributes are shown:

User Label.

Origin (A): NE User Label

Origin (A): Termination Identifier.

Destination (Z): NE User Label

Destination (Z): Termination Identifier.

Origin (A): Activation Status.

Destination (Z): Activation Status.

....................................................................................................................................................................................................................................
1350 OMS
15-30
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

View the details of the Transport Links

....................................................................................................................................................................................................................................

View the details of the Transport Links


When to use

This function gets information about a Transport Link.


Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 15-21).
For details about Transport Links, see: MPLS/T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > MPLS > Transport Link > Properties or Click the third key of
the mouse and Properties.
Result: The TL properties window is displayed.

See the following topic in this document: Details of a Transport Link (p. 15-32)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-31
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Details of a Transport Link

....................................................................................................................................................................................................................................

Details of a Transport Link


Attributes of a Transport Link

The attributes displayed for each Transport Link are:

User Label.

Parent Subnetwork.

Transport Type (Link Over Cable, Link Over TDM).

Bandwidth (In Kbit/s).

Usage State (Idle, Busy, Reserved, Not meaningful).

Working State (Normal, Configuring, Removing).

Provisioning State (Defined, Partially Configured, Configured).

Routing Service Type.

Directionality.

Label Range Max.

Last Action Type.

Last Action Date.

Label Range Min.

....................................................................................................................................................................................................................................
1350 OMS
15-32
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

View the bandwidth load of Transport Links

....................................................................................................................................................................................................................................

View the bandwidth load of Transport Links


When to use

This function gets information about the bandwidth load of a Transport Link.
Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 15-21).
For details about Transport Links, see: MPLS/T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > Bandwidth Load or Click the third key of the mouse and select
Bandwidth Load.

....................................................................................................................................................................................................................................
1350 OMS
15-33
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

View the bandwidth load of Transport Links

....................................................................................................................................................................................................................................

Result:
Figure 15-8 Transport Link Over TDM Bandwidth Load window

....................................................................................................................................................................................................................................
1350 OMS
15-34
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

View the bandwidth load of Transport Links

....................................................................................................................................................................................................................................

Figure 15-9 Transport Link Over Cable Bandwidth Load window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-35
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

View the inventory of Transport Links

....................................................................................................................................................................................................................................

View the inventory of Transport Links


When to use

This function lists LSP tunnel and VC-LSP contained in a Transport Link.
Related information

This function gets information about each LSP tunnel and VC-LSP (and their states)
contained in the previously selected Transport Link.
For information about Transport Link management, see: Overview about Transport
Links (p. 15-21).
For details about Transport Links, see: MPLS/T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > MPLS > Transport Link > Get Inventory or Click the third key
of the mouse and select Get Inventory.

....................................................................................................................................................................................................................................
1350 OMS
15-36
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

View the inventory of Transport Links

....................................................................................................................................................................................................................................

Result: The Transport Link Inventory list is displayed.


Figure 15-10 Transport Link Inventory List window

If you select an entity (LSP Tunnel or VC-LSP) in the inventory list and click the right
button, you see a list of commands. The listed commands depend on the provisioning
state and availability status of the selected entity.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-37
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing Transport Links (MPLS)

Description of the Transport Link Inventory

....................................................................................................................................................................................................................................

Description of the Transport Link Inventory


Attributes of Transport Link Inventory

The attributes displayed for each LSP tunnel or VC-LSP are:

MPLS Label.

LSP Type(LSP Tunnel or VC-LSP).

LSP tunnel or VC-LSP User Label.

Provisioning State (Defined, Allocated, Partially Implemented, Implemented,


Commissioned, Partially Configured, Configured).

Availability Status.

....................................................................................................................................................................................................................................
1350 OMS
15-38
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Overview

....................................................................................................................................................................................................................................

Managing LSP Tunnels (MPLS)


Overview
Purpose

This section provides information about the LSP Tunnels management.


Contents
Overview about LSP Tunnels

15-40

View the list of LSP tunnels

15-41

Description of the list of LSP Tunnels

15-42

Create an LSP tunnel

15-43

Modify an LSP tunnel

15-45

Delete an LSP tunnel

15-47

Allocate LSP tunnel

15-48

Deallocate LSP tunnel

15-51

List the constraints of an LSP tunnel

15-53

Description of constraints of LSP tunnel

15-55

Add a constraint to an LSP tunnel

15-56

Delete a constraint from an LSP tunnel

15-58

View the details of the LSP tunnel constraints

15-60

Details of a LSP Tunnel Constraint

15-62

View the list of cross connections

15-63

Description of the list of LSP cross connections

15-64

Implement an LSP tunnel

15-65

Get the LSP tunnel extremities

15-67

Description of the list of LSP Tunnel Extremities

15-69

View the details of the LSP tunnels

15-70

Details of a LSP Tunnel

15-71

View the inventory of VC-LSPs

15-72

Description of the LSP Tunnel Inventory

15-73

View the bandwidth load of LSPs

15-74

View the route of LSP Tunnels

15-77

View the list of the Transport Links related to an LSP Tunnel

15-79

Description of the LSP Tunnel inventory

15-80

....................................................................................................................................................................................................................................
1350 OMS
15-39
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Overview about LSP Tunnels

....................................................................................................................................................................................................................................

Overview about LSP Tunnels


LSP Tunnel description

An LSP tunnel:

is an MPLS Point to point unidirectional connection.

ends on ISA PR EA and/or ES16 boards.


is based on Transport Link (Link Over TDM).
can carry one or moreVC-LSPs.

An LSP tunnel can be carried by a Transport Link not terminated. In this case one of its
extremities is an ENE.
The LSP tunnel management tool chain gives the order in which the available actions can
be performed.
Figure 15-11 27 LSP Tunnel management chain

....................................................................................................................................................................................................................................
1350 OMS
15-40
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the list of LSP tunnels

....................................................................................................................................................................................................................................

View the list of LSP tunnels


When to use

The LSP Tunnel List window presents all the LSP tunnels and their attributes.
Related information

For information LSP tunnel, see: LSP Tunnel (p. 11-66).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > MPLS.


Result: The MPLS menu is displayed.
...................................................................................................................................................................................................

Select: LSP Tunnels.


Result: The LSP Tunnel list is displayed.

See the following topic in this document: Description of the list of LSP Tunnels
(p. 15-42)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-41
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Description of the list of LSP Tunnels

....................................................................................................................................................................................................................................

Description of the list of LSP Tunnels


Attributes of a LSP Tunnel

The attributes displayed for each LSP tunnel are:

User Label.

Parent Subnetwork.

Usage State (Idle, Busy).

Working State (Normal, Removing, Allocating, De-allocating, Implementing,


De-implementing).

Provisioning State (Defined, Allocated, Partially Implemented, Implemented).

Availability Status (Normal, Degraded, In failure).

Consistency State (Consistent, Not consistent, Not meaningful).

....................................................................................................................................................................................................................................
1350 OMS
15-42
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Create an LSP tunnel

....................................................................................................................................................................................................................................

Create an LSP tunnel


When to use

This function consists in creating an LSP tunnel.


Related information

For information on LSP tunnel, see: LSP Tunnel (p. 11-66).


LSP tunnel creation states

The LSP tunnel is created into the 1350 OMS PKT with the following states:

Working State: Normal.

Usage State: Idle.

Availability Status: Not Meaningful.

Consistency State: Not Meaningful.


Provisioning State: Defined.

The Usage state of LSP tunnel changes to busy when the LSP Tunnel supports at least
one VC-LSP.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The MPLS Transport Link at the extremity must be based on SDH.


The User Label must be different as one which is exists.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > MPLS > Create LSP Tunnel.
Result: The LSP tunnel creation window is displayed.

To create an LSP tunnel:


Enter an LSP tunnel User label.
Enter a Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
15-43
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Create an LSP tunnel

....................................................................................................................................................................................................................................

In the Origin and Destination areas, choose the NE User Label and Termination
Identifier (that is the TDM termination Identifier). Repeat the procedure for each
extremity of the LSP tunnel.
Choose the Traffic Descriptor User Label associated to this LSP tunnel by using
the sensitive help.

...................................................................................................................................................................................................

Click Ok.
Result: The tree area, opened graphical views, and the LSP Tunnel List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-44
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Modify an LSP tunnel

....................................................................................................................................................................................................................................

Modify an LSP tunnel


When to use

The function modifies LSP tunnel characteristics.


Related information

The LSP tunnel modification gives the possibility to modify:

User Label.

Comment.

Traffic Descriptor.

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The new User Label must be not in use by another LSP tunnel.

To modify the Traffic Descriptor associated to a LSP Tunnel, the provisioning state
of the LSP tunnel must be Defined and usage state must be Idle.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MLSP > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > LSP Tunnels > Modify.

....................................................................................................................................................................................................................................
1350 OMS
15-45
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Modify an LSP tunnel

....................................................................................................................................................................................................................................

Result: The LSP tunnel modification window is displayed.


Figure 15-12 LSP Tunnel Modification window (for an LSP tunnel defined)

...................................................................................................................................................................................................

To modify an LSP tunnel, do one or more of the following:

Enter a new User Label.

Modify the Comment.

Modify the Traffic Descriptor User Label (by using the sensitive help). Modification
permitted if the provisioning state of LSP Tunnel is Defined and the usage state is
Idle.

...................................................................................................................................................................................................

Select OK.
Result: After confirmation, the tree area and LSP Tunnel list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-46
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Delete an LSP tunnel

....................................................................................................................................................................................................................................

Delete an LSP tunnel


When to use

This function consists in deleting an LSP tunnel from the 1350 OMS PKT supervision.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected LSP tunnel must be set to Defined.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > MPLS > LSP Tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > MPLS > LSP Tunnels > Delete or Click the third key of the
mouse and select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, if concerned LSP tunnel is associated to a Traffic
Descriptor, a disassociation is automatically done and the LSP tunnel is removed.

Then LSP Tunnel list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-47
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Allocate LSP tunnel

....................................................................................................................................................................................................................................

Allocate LSP tunnel


When to use

This operation finds a path route between the two extremities of an LSP tunnel.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
effective bandwidth

The system calculates the effective bandwidth of the LSP tunnel according to the
associated Traffic Descriptor (see the table).
Each MPLS Transport Link of the given route must provide the effective bandwidth of
the LSP tunnel. Available Bandwidth of Transport Link is greater than or equal to
Effective bandwidth of LSP tunnel.
For all traffic contract, CIR must be less than or equal to PIR and PIR must be less than or
equal to Transport Link Total bandwidth.
Traffic contract type.

Effective bandwidth reserved on Transport Link.

Best Effort.

0 1.

Assured Forwarding.

CIR.

Expedited Forwarding.

CIR.

Notes:

1.

In the case Best Effort traffic contract, no effective bandwidth is reserved. In this case, for
each Transport Link, a Table B-19, Limits for MPLS Transport Links (p. B-4) of Best
Effort LSP Tunnel is checked.

Allocation route

Before the allocation operation, the user has given a complete path route in term of
constraints (MPLS Transport Link List). Constraints can optionally be associated with the
MPLS Labels. See Add a constraint to an LSP tunnel (p. 15-56).
If the LSP Tunnel is only one, the route is already defined. In this case, the constraint List
is not mandatory. The Transport Link is identified by the LSP tunnel extremities given
during the definition. Even not mandatory, it can be useful for the user to gives a specific
MPLS label.
If the user gives an MPLS Label in the constraint list, the system checks the availability
of the MPLS Label. If the MPLS Label. is used by another LSP Tunnel or VC-LSP, 1350
OMS PKT chooses and reserves automatically an available MPLS label.

....................................................................................................................................................................................................................................
1350 OMS
15-48
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Allocate LSP tunnel

....................................................................................................................................................................................................................................

Allocation phase

The LSP tunnel is allocated:

Along the route used by the LSP Tunnel, LSP links are created. Tunnels are
referenced by an MPLS Label of each crossed Transport Link.
MPLS Label of each involved Transport Link is reserved to the LSP tunnel.
LSP Tunnel cross connections are generated.
Bandwidth of each Transport Link (used and available bandwidths) is computed in

the used direction.


If the Usage State of each MPLS Transport Link used by the LSP Tunnel was idle,
the Usage State is changed to busy.

Allocation states

The LSP tunnel is also updated with the following states:

Provisioning State: Allocated.

Working State: Normal.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected LSP tunnel must be set to Defined.

The working state must be set to Normal (if not, an operation is running on it).

The LSP tunnel must be associated to a Traffic Descriptor.


The constraints on this LSP tunnel have been previously added (except for unitary
LSP tunnel).

The MPLS Transport Links defined as constraints are contiguous.


The constraint lists must be compliant with the LSP tunnel extremities.
The Table B-19, Limits for MPLS Transport Links (p. B-4)of Best Effort LSP
tunnel for each Transport Link is not reached.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.

....................................................................................................................................................................................................................................
1350 OMS
15-49
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Allocate LSP tunnel

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > LSP Tunnels > Allocate.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: At the beginning of the operation, the LSP tunnel Working state is set to
Allocating. Then, the 1350 OMS PKT checks the continuity of the route. Then, the

LSP tunnel List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-50
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Deallocate LSP tunnel

....................................................................................................................................................................................................................................

Deallocate LSP tunnel


When to use

This operation allows to the user to deallocate an LSP tunnel.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Deallocation phase

The 1350 OMS PKT retrieves all MPLS Transport Links used by this LSP tunnel. It
updates for each of them available and used bandwidths for the used direction. It frees the
involved MPLS Labels.
The LSP links and the LSP cross connections are also retrieved and deleted.
The LSP Tunnel is de-allocated:

Bandwidth of each Transport Links used by the LSP tunnel are updated.

If no more LSP Tunnel is carried, the Usage State of Transport Links used by the LSP
tunnel is changed to idle.
MPLS Label of each Transport Link involved in LSP links is released.

Deallocation states

The LSP tunnel is also updated with the following states:

Provisioning State: Defined.

Working State: Normal.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected LSP tunnel must be set to Allocated.

The working state must be set to Normal (if not, an operation is running on it).

The LSP tunnel state is not busy.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.

....................................................................................................................................................................................................................................
1350 OMS
15-51
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Deallocate LSP tunnel

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > LSP Tunnels > Deallocate.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the LSP tunnel working state is set to De-allocating. Then,

the LSP tunnel List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-52
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

List the constraints of an LSP tunnel

....................................................................................................................................................................................................................................

List the constraints of an LSP tunnel


When to use

This function lists the transports links added as constraints for the selected LSP tunnel.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The working state must be Normal (that is no operation is running on it).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select: Search > Packet > MPLS > LSP Tunnels > Constraints.

....................................................................................................................................................................................................................................
1350 OMS
15-53
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

List the constraints of an LSP tunnel

....................................................................................................................................................................................................................................

Result: The list window is displayed.


Figure 15-13 Constraint List related to an LSP tunnel

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-54
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Description of constraints of LSP tunnel

....................................................................................................................................................................................................................................

Description of constraints of LSP tunnel


Attributes of a constraint

The attributes displayed for each constraint are:

Constraint Class.

Class Label (that is User label of the Transport Link).

Constraint Type.

....................................................................................................................................................................................................................................
1350 OMS
15-55
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Add a constraint to an LSP tunnel

....................................................................................................................................................................................................................................

Add a constraint to an LSP tunnel


When to use

This function adds a Transport Link as constraint to an LSP tunnel.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected LSP tunnel must be Defined.

The working state must be Normal (that is no operation is running on it).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select: Action > Packet > MPLS > LSP Tunnel > Add Constraints.

....................................................................................................................................................................................................................................
1350 OMS
15-56
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Add a constraint to an LSP tunnel

....................................................................................................................................................................................................................................

Result:
Figure 15-14 Add Constraint to an LSP tunnel window

To add a new LSP tunnel constraint:


Enter the User Label of the Transport Link.
Enter a MPLS Label (optional) by using the sensitive help.
...................................................................................................................................................................................................

Select OK.
Result: After confirmation, the LSP tunnel constraint is added at the end of the

constraint list as the last one of the route.


Then, the LSP tunnel Constraint List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-57
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Delete a constraint from an LSP tunnel

....................................................................................................................................................................................................................................

Delete a constraint from an LSP tunnel


When to use

This function deletes one constraint related to an LSP tunnel.


Related information

For information LSP tunnel, see: LSP Tunnel (p. 11-66).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected LSP tunnel must be Defined.

The working state must be Normal (that is no operation is running on it).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > MPLS > LSP Tunnels > Constraints.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > LSP Tunnels > Delete.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS
15-58
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Delete a constraint from an LSP tunnel

....................................................................................................................................................................................................................................

Result: After confirmation, the LSP tunnel constraints are deleted and the LSP Tunnel
Constraint List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-59
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the details of the LSP tunnel constraints

....................................................................................................................................................................................................................................

View the details of the LSP tunnel constraints


When to use

This function gets information about a constraint of an LSP tunnel.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > MPLS > LSP Tunnels > Constraints.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > LSP Tunnels > Properties.

....................................................................................................................................................................................................................................
1350 OMS
15-60
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the details of the LSP tunnel constraints

....................................................................................................................................................................................................................................

Result: The property window is displayed.

See the following topic in this document: Details of a LSP Tunnel Constraint
(p. 15-62)
Figure 15-15 LSP Tunnel Constraint Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-61
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Details of a LSP Tunnel Constraint

....................................................................................................................................................................................................................................

Details of a LSP Tunnel Constraint


Attributes of aLSP Tunnel Constraint

The attributes displayed for each constraint are:

Constraint Class.

Class Label (that is User label of the Transport Link).

Constraint Type.

MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS
15-62
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the list of cross connections

....................................................................................................................................................................................................................................

View the list of cross connections


When to use

This function lists all cross connections of an LSP tunnel.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > LSP Tunnels > Constraints.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > LSP Tunnels > Cross Connections.
Result: The list window is displayed.

See the following topic in this document: Description of the list of LSP cross
connections (p. 15-64)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-63
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Description of the list of LSP cross connections

....................................................................................................................................................................................................................................

Description of the list of LSP cross connections


Attributes of a LSP cross connection

The attributes displayed for each cross connection are:

NE User label used by the LSP tunnel.

cross connection type (LER for the extremity or LSR).

Ingress Termination Identifier.

Ingress MPLS Label.

Egress Termination Identifier.

Egress MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS
15-64
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Implement an LSP tunnel

....................................................................................................................................................................................................................................

Implement an LSP tunnel


When to use

This function implements LSP tunnels.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Implementation phase

Each NE involved in the LSP tunnel is provisioned as following:

If does not exit in the NE, Traffic Descriptor is created.


The LER and LSR connections are added to the NE.
Extremities are activated.

Implementation states

After click Ok button, the cross connections are downloaded and then the LSP tunnel is
updated with the following states:

Provisioning State: Implemented (or Partially Implemented).

Working State: Normal.

Availability Status: Normal (or Degraded or In Failure).

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected LSP tunnel must be set to Allocated or
Partially implemented.
The working state must be set to Normal (if not, an operation is running on it).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.

....................................................................................................................................................................................................................................
1350 OMS
15-65
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Implement an LSP tunnel

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select: Action > Packet > LSP Tunnels > Implement.


Result:
Figure 15-16 LSP Tunnel Implementation window

...................................................................................................................................................................................................

The user chooses an LSP tunnel and requests its implementation then its working state is
set to Implementing.
Tick the square to proceed with a VC-LSP creation command after the implementation
procedure.
...................................................................................................................................................................................................

Select OK.
Result: After implementation, the LSP Tunnel List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-66
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Get the LSP tunnel extremities

....................................................................................................................................................................................................................................

Get the LSP tunnel extremities


When to use

This function gets information about extremities (origin and destination) of an LSP
tunnel.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > LSP Tunnels > Extremities.

....................................................................................................................................................................................................................................
1350 OMS
15-67
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Get the LSP tunnel extremities

....................................................................................................................................................................................................................................

Result: The LSP Tunnel Extremities is shown.

See the following topic in this document: Description of the list of LSP Tunnel
Extremities (p. 15-69)
Figure 15-17 The LSP Tunnel Extremity window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-68
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Description of the list of LSP Tunnel Extremities

....................................................................................................................................................................................................................................

Description of the list of LSP Tunnel Extremities


Attributes of a LSP Tunnel Extremity

The attributes displayed are:

User Label.

NE User Label (A).

Termination User Label (A).

NE User Label (Z).

Termination User Label (Z).

....................................................................................................................................................................................................................................
1350 OMS
15-69
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the details of the LSP tunnels

....................................................................................................................................................................................................................................

View the details of the LSP tunnels


When to use

This function gets information about an LSP tunnel.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > LSP Tunnels > Properties.


Result: The property window is displayed.

See the following topic in this document: Details of a LSP Tunnel (p. 15-71)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-70
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Details of a LSP Tunnel

....................................................................................................................................................................................................................................

Details of a LSP Tunnel


Attributes of a LSP Tunnel

The attributes displayed for each LSP tunnel are:

User Label.

Parent Subnetwork.

Usage State (Idle, Busy).

Working State (Normal, Removing, Allocating, De-allocating, Implementing,


De-implementing).

Provisioning State (Defined, Allocated, Partially Implemented, Implemented).

Availability Status (Normal, Degraded, In failure).

Consistency State (Consistent, Not consistent, Not meaningful).

Comment.

Last Action Type.

Last Action Date.

Traffic Descriptor User Label.

....................................................................................................................................................................................................................................
1350 OMS
15-71
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the inventory of VC-LSPs

....................................................................................................................................................................................................................................

View the inventory of VC-LSPs


When to use

This function gets information about each VC-LSP (and their states) contained in the
previously selected LSP tunnel.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
From the VC-LSP Inventory List window, when you select a VC-LSP entity, you are able
to display, with the right button, a list of commands. Commands depend on the
provisioning state and availability status of this selected entity.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > VC-LSP Inventory.


Result: The list window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-72
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Description of the LSP Tunnel Inventory

....................................................................................................................................................................................................................................

Description of the LSP Tunnel Inventory


Attributes of a VC-LSP

The attributes displayed for each VC-LSP are:

VC-LSP User Label.

Parent Subnetwork.

LSP tunnel User Label or VC-LSP User Label.

Working State.

Provisioning State (Defined, Allocated, Partially Implemented, Implemented,


Commissioned, Partially Configured, Configured).

Availability Status.

Consistency State (Consistent, Not Consistent).

....................................................................................................................................................................................................................................
1350 OMS
15-73
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the bandwidth load of LSPs

....................................................................................................................................................................................................................................

View the bandwidth load of LSPs


When to use

This function gets information about the bandwidth load of an LSP tunnel.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > LSP Tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > LSP Tunnels > Bandwidth Load.

....................................................................................................................................................................................................................................
1350 OMS
15-74
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the bandwidth load of LSPs

....................................................................................................................................................................................................................................

Result:
Figure 15-18 LSP Tunnel (Best Effort) Bandwidth Load window

Figure 15-19 LSP Tunnel (Assured Forwarding) Bandwidth Load window

....................................................................................................................................................................................................................................
1350 OMS
15-75
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the bandwidth load of LSPs

....................................................................................................................................................................................................................................

Figure 15-20 LSP Tunnel (Expedited Forwarding) Bandwidth Load window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-76
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the route of LSP Tunnels

....................................................................................................................................................................................................................................

View the route of LSP Tunnels


When to use

This function presents graphically all Transport Links used by the previously selected
LSP tunnel.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > LSP Tunnels > Display Route.

....................................................................................................................................................................................................................................
1350 OMS
15-77
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the route of LSP Tunnels

....................................................................................................................................................................................................................................

Result:
Figure 15-21 LSP Tunnel Route window

Appear in blue the Transport Links used by the LSP tunnel.


The following commands are available from the graphical view, depending on the
selected object and its position on the route:
With no selection: Begin of Route and End of Route commands highlights the
NE used for the beginning or the end of the route.

With a selected entity (NE, Transport Link, ENE, Off page connector): Begin of
Route and End of Route commands are completed by other commands depending
on the selected entity.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-78
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

View the list of the Transport Links related to an LSP Tunnel

....................................................................................................................................................................................................................................

View the list of the Transport Links related to an LSP Tunnel


When to use

This function consists in listing the Transport Links related to a previously selected LSP
tunnel.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > LSP Tunnels > List Transport Links.
Result: The list window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-79
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing LSP Tunnels (MPLS)

Description of the LSP Tunnel inventory

....................................................................................................................................................................................................................................

Description of the LSP Tunnel inventory


Attributes of a Transport Link

The attributes displayed for each listed Transport Link are:

LSP Tunnel User Label.

Transport link User Label.

MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS
15-80
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Overview

....................................................................................................................................................................................................................................

Managing VC-LSP (MPLS)


Overview
Purpose

This section provides information about VC-LSP management.


Contents
Overview about VC-LSP

15-82

View the list of VC-LSPs

15-83

Description of the list of VC-LSPs

15-84

Create a VC-LSP

15-85

Modify a VC-LSP

15-89

Delete a VC-LSP

15-91

Implement a VC-LSP

15-92

De-implement a VC-LSP

15-94

Commission a VC-LSP

15-96

De-commission a VC-LSP

15-98

Get the VC-LSP extremities

15-99

Description of the list of VC-LSP Extremities

15-101

View the details of the VC-LSPs

15-102

Details of a VC-LSP

15-103

....................................................................................................................................................................................................................................
1350 OMS
15-81
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Overview about VC-LSP

....................................................................................................................................................................................................................................

Overview about VC-LSP


VC-LSP description

VC-LSP is an infrastructure which can carry one Ethernet Segment.


A VC-LSP can be carried by one LSP tunnel with the same QoS. A VC-LSP can be
carried by a Link Over Cable between ISA PR EA and ISA PR board or between ISA
ES16 and ISA PR.
The VC-LSP management tool chain gives the order in which the available actions can be
performed.
Figure 15-22 VC-LSP management chain

....................................................................................................................................................................................................................................
1350 OMS
15-82
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

View the list of VC-LSPs

....................................................................................................................................................................................................................................

View the list of VC-LSPs


When to use

The VC-LSP List window presents all the VC-LSPs and their attributes.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
If this list is required from the LSP Tunnel List, only the VC-LSPs supported by the
selected LSP tunnel is displayed.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > MPLS.


Result: The MPLS menu is displayed.
...................................................................................................................................................................................................

Select: VC-LSPs.
Result: The VC-LSP list window is displayed.

See the following topic in this document: Description of the list of VC-LSPs
(p. 15-84)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-83
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Description of the list of VC-LSPs

....................................................................................................................................................................................................................................

Description of the list of VC-LSPs


Attributes of a VC-LSP

The attributes displayed for each VC-LSP are:

User Label.

Parent Subnetwork.

Working State (None, Normal, Implementing, De-implementing, Commissioning,


De-commissioning).

Provisioning State (Allocated, Partially Implemented, Implemented,


Commissioned).

Availability Status (Normal, Not meaningful, In failure).

Consistency State (Consistent, Not Consistent, Not meaningful).

....................................................................................................................................................................................................................................
1350 OMS
15-84
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Create a VC-LSP

....................................................................................................................................................................................................................................

Create a VC-LSP
When to use

This function consists in creating a Virtual Connection LSP.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
If this action is required from the Transport Link List, the Origin and the Destination
fields are filled with the information contained in the selected Transport Link.
If this action is required from the LSP tunnel List, the Origin, the Destination fields, and
LSP Tunnel user label, are filled with the information contained in the selected LSP
tunnel.
Creation state

The VC-LSP is created into the 1350 OMS PKT with the following state:

Working State: Normal.

Provisioning State: Allocated.

Availability Status: Not Meaningful.

Consistency State: Not Meaningful.

At the same time, the consumed bandwidth and used MPLS label of the VC-LSP is
reserved. And the related Traffic Descriptor is associated to this VC-LSP.
If the Usage State is idle, the Usage State of supporting LSP tunnel or Transport Link is
set to busy.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

if the creating VC-LSP is based on Transport Link, the provisioning state of the
concerned MPLS Transport Link must be configured. See View the list of Transport
Links (p. 15-23).
if the creating VC-LSP is based on LSP tunnel, the provisioning state of the
concerned LSP tunnel must be allocated. See View the list of LSP tunnels
(p. 15-41).
The User Label must be not in use.

....................................................................................................................................................................................................................................
1350 OMS
15-85
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Create a VC-LSP

....................................................................................................................................................................................................................................

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > VC-LSPs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create VC-LSP.

....................................................................................................................................................................................................................................
1350 OMS
15-86
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Create a VC-LSP

....................................................................................................................................................................................................................................

Result:
Figure 15-23 VC-LSP Creation window

To create a VC-LSP:
Enter a VC-LSP User label.
Enter a Comment (optional).

If the extremity is an ENE, in the Origin and Destination areas, tick the ENE box.

Choose the User Label.

Choose the Termination Identifier. The object can be the TDM termination
Identifier or ETP identifier.
Select a Traffic Descriptor User Label by using the sensitive help.

....................................................................................................................................................................................................................................
1350 OMS
15-87
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Create a VC-LSP

....................................................................................................................................................................................................................................

Choose the LSP Tunnel User Label. The action is only needed if the VC-LSP is
based on LSP tunnel. If this field is filled, as the LSP tunnel is unidirectional, the
origin and destination of the VC-LSP must be the same as the chosen LSP tunnel.
Select a MPLS Label (optional).
Tick the Process with VC-LSP Implementation box if you want to implement the
VC-LSP just after the VC-LSP creation; the VC-LSP is implemented.

...................................................................................................................................................................................................

Click Ok.
Result: The tree area, the opened graphical view and the VC-LSP List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-88
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Modify a VC-LSP

....................................................................................................................................................................................................................................

Modify a VC-LSP
When to use

The function modifies VC-LSP characteristics.


Related information

The VC-LSP modification gives the possibility to modify:

VC-LSP User Label.


Comment.

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different as one which is
already used by another LSP tunnel.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > VC-LSPs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > VC-LSPs > Modify.

....................................................................................................................................................................................................................................
1350 OMS
15-89
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Modify a VC-LSP

....................................................................................................................................................................................................................................

Result:
Figure 15-24 VC-LSP Modification window

...................................................................................................................................................................................................

To modify a VC-LSP:

Enter a new User Label (optional).

Modify the Comment (optional).

...................................................................................................................................................................................................

Select OK.
Result: After confirmation, the tree area and the VC-LSP list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-90
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Delete a VC-LSP

....................................................................................................................................................................................................................................

Delete a VC-LSP
When to use

This function consists in deleting a VC-LSP from the 1350 OMS PKT supervision.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected VC-LSP must be set to Allocated.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > MPLS > VC-LSPs.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > MPLS > VC-LSPs > Delete or Click the third key of the mouse
and Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the VC-LSPs are removed.

The reserved bandwidth and MPLS label are free. If the supporting LSP tunnel or
Transport Link contains no more VC-LSP, the usage state of is set to idle.
The VC-LSP list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-91
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Implement a VC-LSP

....................................................................................................................................................................................................................................

Implement a VC-LSP
When to use

This function consists in implementing a VC-LSP.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Implementation phase

Each NE involved in the VC-LSP is provisioned by doing the following actions:

Traffic Descriptor is created if does not exist in the NE.


Implement the connections (defined by port and label) or cross connections.

After the implementation of the VC-LSP,the working state is set to Normal, the
provisioning state is set to Implemented, and the Consistency State is set to
Consistent.
The VC-LSP List is updated and the VC-LSP appears in the View the list of links over
MPLS (p. 14-89) and in the View the list of Transport Links (p. 15-23).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected VC-LSP must be set to Allocated or Partially
implemented.
The working state of the selected VC-LSP must be set to Normal (if not, an operation
is running on it).
If the VC-LSP is based on LSP tunnel, the Provisioning State of the associated LSP
tunnel must be Implemented.
The NE extremities must not be locked (that is audit, alignment, reserve are not in
progress).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > VC-LSPs.

....................................................................................................................................................................................................................................
1350 OMS
15-92
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Implement a VC-LSP

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > MPLS > VC-LSP > Implement.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The working state of the VC-LSP is set to Implemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-93
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

De-implement a VC-LSP

....................................................................................................................................................................................................................................

De-implement a VC-LSP
When to use

This function consists in de-implementing a VC-LSP.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Deimplementation phase

For each NE involved in the VC-LSP, the following action is performed:

The LER connections are deleted from the NE.


Traffic Descriptor is deleted from the NE when no LSP tunnel or VC-LSP connection
use it.

After de-implementation, the VC-LSP provisioning state is set to Allocated, the


availability status changes to Not-Meaningful, and working state is set to Normal.
In case of error, provisioning state is set to partially implemented.
The VC-LSP List is updated and the VC-LSP disappears in the View the list of links
over MPLS (p. 14-89) and in the View the list of Transport Links (p. 15-23).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected VC-LSP must be set to implemented or


Partially implemented.

The working state of the selected VC-LSP must be set to Normal (if not, an operation
is running on it).
If the VC-LSP is based on LSP tunnel, the Provisioning State of the associated LSP
tunnel must be Implemented.
The NE extremities must not be locked (that is audit, alignment, reserve are not in
progress).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > VC-LSPs.

....................................................................................................................................................................................................................................
1350 OMS
15-94
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

De-implement a VC-LSP

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > MPLS > VC-LSP > Deimplement.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The working state of the VC-LSP is set to Deimplemented and no traffic

could be carried by it.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-95
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Commission a VC-LSP

....................................................................................................................................................................................................................................

Commission a VC-LSP
When to use

This function consists in commissioning a VC-LSP.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Commission phase

This operation is an administrative operation. It allows to notify the availability of the


VC-LSP to be used as a transport infrastructure to carry Ethernet Segments.
After the commission of the VC-LSP, the working state is set to Normal, the
provisioning state is set to Commissioned. According to the Transport Link availability
status, the availability status changes to Normal, Degraded, or In Failure .
The VC-LSP List is updated.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected VC-LSP must be set to implemented.

The working state of the selected VC-LSP must be set to Normal (if not, an operation
is running on it).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > VC-LSPs.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > MPLS > VC-LSP > Commission.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS
15-96
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Commission a VC-LSP

....................................................................................................................................................................................................................................

Result: The working state of the VC-LSP is set to Commissioned.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-97
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

De-commission a VC-LSP

....................................................................................................................................................................................................................................

De-commission a VC-LSP
When to use

This function consists in decommissioning a VC-LSP.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Decommission phase

After de-commission, for each concerned VC-LSP, the provisioning state is set to
Implemented and the working state is set to Normal.
The VC-LSP List is updated.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected VC-LSP must be set to Commissioned.

The working state of the selected VC-LSP must be set to Normal (if not, an operation
is running on it).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > VC-LSPs.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > MPLS > VC-LSP > Decommission.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The working state of each concerned VC-LSP is set to decommissioning.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-98
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Get the VC-LSP extremities

....................................................................................................................................................................................................................................

Get the VC-LSP extremities


When to use

This function gets information about the extremities (origin and destination) of a VC-LSP.
Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > LSP Tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet >LSP Tunnels > Extremities.

....................................................................................................................................................................................................................................
1350 OMS
15-99
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Get the VC-LSP extremities

....................................................................................................................................................................................................................................

Result: The list window is displayed.

See the following topic in this document: Description of the list of VC-LSP
Extremities (p. 15-101)
Figure 15-25 VC-LSP Extremities window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-100
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Description of the list of VC-LSP Extremities

....................................................................................................................................................................................................................................

Description of the list of VC-LSP Extremities


Attributes of a VC-LSP Extremity

The attributes displayed are:

User Label.

NE User Label (A).

Termination User Label (A).

MPLS Tunnel Index (A).

MPLS Tunnel Instance (A).

NE User Label (Z).

Termination User Label (Z).

MPLS Tunnel Index (Z).

MPLS Tunnel Instance (Z).

....................................................................................................................................................................................................................................
1350 OMS
15-101
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

View the details of the VC-LSPs

....................................................................................................................................................................................................................................

View the details of the VC-LSPs


When to use

This function gets information about a VC-LSP.


Related information

For information about LSP tunnel, see: LSP Tunnel (p. 11-66).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > MPLS > VC-LSPs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > VC-LSPs > Properties.


Result: The list window is displayed.

See the following topic in this document: Details of a VC-LSP (p. 15-103)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
15-102
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management


Managing VC-LSP (MPLS)

Details of a VC-LSP

....................................................................................................................................................................................................................................

Details of a VC-LSP
Attributes of a VC-LSP

The attributes displayed for each VC-LSP are:

User Label.

Parent SubNetwork.

Traffic Descriptor.

Working State (None, Normal, Implementing, De-implementing, Commissioning,


De-commissioning).

Provisioning State (Allocated, Partially Implemented, Implemented,


Commissioned).

Availability Status (Normal, Not meaningful, In failure).

Consistency State (Consistent, Not Consistent, Not meaningful).

Comment.

MPLS Label.

Last Action Type.

Last Action Date.

....................................................................................................................................................................................................................................
1350 OMS
15-103
8DG42227DAAA 9.6
Issue 3 December 2012

MPLS Provisioning Management

Details of a VC-LSP

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
15-104
8DG42227DAAA 9.6
Issue 3 December 2012

16

16
T-MPLS
Provisioning
Management

Overview
Purpose

This chapter describes how to provision and monitor the T-MPLS data.
Contents
Managing T-MPLS PHB profile

16-5

Overview about PHB profile management

16-5

View the list of PHB profiles (T-MPLS)

16-6

Description of the list of T-MPLS PHB Profiles

16-7

Create a PHB profile (T-MPLS)

16-8

Modify a PHB profiles (T-MPLS)

16-9

Delete a PHB profile (T-MPLS)

16-11

View the details of the PHB profiles (T-MPLS)

16-13

Managing Transport Links (T-MPLS)

16-14

Overview about Transport Links

16-14

View the list of Transport Links

16-16

Description of the list of T-MPLS Transport Links

16-17

Define the Transport Link characteristics

16-18

Get the Transport Link extremities

16-20

Description of the list of Transport Link Extremities

16-22

View the details of the Transport Links

16-23

Details of a T-MPLS Transport Link

16-24

View the bandwidth load of Transport Links

16-25

View the inventory of Transport Links

16-28

Description of the inventory of Transport Links

16-30

Managing Virtual Transport (T-MPLS)

16-31

...................................................................................................................................................................................................................................
1350 OMS
16-1
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management

Overview

....................................................................................................................................................................................................................................

Overview about Virtual Transports

16-31

View the list of Virtual Transports

16-33

Description of the list of Virtual Transports

16-34

Create a Virtual Transport

16-35

Modify a Virtual Transport

16-37

Delete a Virtual Transport

16-39

View the details of the Virtual Transport

16-40

Details of a Virtual Transport

16-41

Configuration of a Virtual Transport

16-42

Implement a Virtual Transport

16-44

De-implement a Virtual Transport

16-46

View the Virtual Transport extremities

16-48

Description of the list of Virtual Transports

16-49

Managing Pseudo Wires (T-MPLS)

16-50

Overview about Pseudo Wires

16-50

View the list of Pseudo Wires

16-51

Description of the list of Pseudo Wires

16-52

Create a Pseudo Wire

16-53

Modify a PseudoWire

16-55

Delete a Pseudo Wire

16-57

View the details of the Pseudo Wires

16-58

Details of a Pseudo Wire

16-59

Configuration of the route of a Pseudo Wire

16-60

Delete a constraint from a Pseudo Wire

16-62

Configuration of PHB profile of a Pseudo Wire

16-64

Configuration of Layer-2 encapsulation of a Pseudo Wire

16-66

Allocate Pseudo Wire

16-67

De-allocate Pseudo Wire

16-70

Implement a Pseudo Wire

16-72

De-implement a Pseudo Wire

16-74

List the constraints of a Pseudo Wire

16-76

Description of the list of Pseudo Wire Constraints

16-77

View the details of the Pseudo Wire constraints

16-78

Details of a Pseudo Wire Constraint

16-79

View the list of cross connections

16-80

....................................................................................................................................................................................................................................
1350 OMS
16-2
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management

Overview

....................................................................................................................................................................................................................................

Description of the list of PW Cross Connections

16-81

View the Pseudo Wire extremities

16-82

Description of the list of PW Extremities

16-83

View the section inventory from Pseudo Wire

16-84

Description of the T-MPLS section Inventory

16-85

View the bandwidth load of Pseudo Wire

16-86

View the route of Pseudo Wires

16-87

View the Pseudo Wires crossing a Pseudo Wire

16-88

Description of the list of Pseudo Wires

16-89

T-MPLS tunnel schema

16-90

T-MPLS tunnel schema

16-90

Ethernet Services in the T-MPLS Domain

16-93

Managing T-MPLS tunnels

16-97

T-MPLS tunnel description

16-97

View the list of T-MPLS tunnels

16-99

Description of the list of T-MPLS tunnels

16-100

Create a T-MPLS tunnel

16-101

Modify a T-MPLS tunnel

16-104

Delete a T-MPLS tunnel

16-106

View the details of the T-MPLS tunnels

16-107

Details of a T-MPLS tunnel

16-108

Configuration of the route of a T-MPLS tunnel

16-109

Delete a constraint from a T-MPLS tunnel

16-111

Configuration of PHB profile of a T-MPLS tunnel

16-113

Configuration of Layer-2 encapsulation of a tunnel

16-115

Allocate T-MPLS tunnel

16-117

De-allocate T-MPLS tunnel

16-120

Implement a T-MPLS tunnel

16-122

De-implement a T-MPLS tunnel

16-124

List the constraints of a T-MPLS tunnel

16-126

Description of the list of T-MPLS tunnel Constraints

16-127

View the details of the T-MPLS tunnel constraints

16-128

Details of a T-MPLS tunnel Constraint

16-129

View the list of cross connections

16-130

Description of the list of T-MPLS tunnel Cross Connections

16-131

....................................................................................................................................................................................................................................
1350 OMS
16-3
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management

Overview

....................................................................................................................................................................................................................................

View the T-MPLS tunnel extremities

16-132

Description of the list of T-MPLS tunnel Extremities

16-133

View the section inventory from T-MPLS tunnel

16-134

Description of the Inventory of sections

16-135

View the bandwidth load of T-MPLS tunnel

16-136

View the route of T-MPLS tunnels

16-137

View the Pseudo Wires crossing a T-MPLS tunnel

16-138

Description of the list of Pseudo Wires

16-139

Tunnel protection

16-140

Tunnel protection create

16-140

T-MPLS Routing display

16-144

Tunnel switch commands

16-147

Other info on T-MPLS routing display

16-152

MAC Flushing Protection

16-156

MAC flushing protection description

16-157

MAC flushing protection creation

16-158

MAC flushing protection list

16-160

Attributes of MAC-flushing protection

16-161

Interconnection Scheme list

16-162

Attributes of Interconnection Schemes

16-163

TMPLS EVC: Force MAC flushing

16-164

Tunnel Redundancy

16-165

Description

16-166

Create one-to-one-open protection

16-173

Create Dual-point-to-point Protection

16-175

Create MAC Flushing Protection Schema

16-177

EVC setup

16-178

....................................................................................................................................................................................................................................
1350 OMS
16-4
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS PHB profile

Overview about PHB profile management

....................................................................................................................................................................................................................................

Managing T-MPLS PHB profile


Overview about PHB profile management
PHB profile description

T-MPLS manages the PHB profile configuration in the network.


PKT manages LSP PHB profile creation on domain basis. The creation affects PKT
database only.
The system checks that the requested profile is compatible with the PHB profile on
domain basis.
The LSP PHB profile is created in the network only at tunnel/PW implementation time,
on all nodes crossed by the tunnel.
The elementary LSP PHB profiles automatically created in each NE are called
Node-PHB-Profiles and the system manages their consistency status.
The Node-PHB-Profile exists in PKT database only if there exists an associated
implemented tunnel/PW.
PKT manages PHB profile configuration on domain basis. PHB profile configuration is
allowed only when no traffic is supported, that is, no associated Node-PHB-Profiles exist
and no implemented tunnel/PW is associated to the PHB profile.

....................................................................................................................................................................................................................................
1350 OMS
16-5
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS PHB profile

View the list of PHB profiles (T-MPLS)

....................................................................................................................................................................................................................................

View the list of PHB profiles (T-MPLS)


When to use

This function lists all the PHB profiles.


Related information

For information about LSP PHB profiles, see: Overview about PHB profile management
(p. 16-5).
The elementary LSP PHB profiles automatically created in each NE are called
Node-PHB-Profiles. The Node-PHB-Profile exists in PKT database only if there exists an
associated implemented tunnel/PW.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS.


Result: The T-MPLS menu is displayed.
...................................................................................................................................................................................................

Select QoS > T-MPLS PHB Profile.


Result: The tb-limMplsTransportLinkLSP PHB profile list is displayed.

See the following topic in this document: Description of the list of T-MPLS PHB
Profiles (p. 16-7)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-6
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS PHB profile

Description of the list of T-MPLS PHB Profiles

....................................................................................................................................................................................................................................

Description of the list of T-MPLS PHB Profiles


Attributes of a T-MPLS PHB Profile

T-MPLS manages the PHB profile configuration in the network.


PKT manages LSP PHB profile creation on domain basis. The creation affects PKT
database only.
The system checks that the requested profile is compatible with the PHB profile on
domain basis.
The LSP PHB profile is created in the network only at tunnel/PW implementation time,
on all nodes crossed by the tunnel.
The elementary LSP PHB profiles automatically created in each NE are called
Node-PHB-Profiles and the system manages their consistency status.
The Node-PHB-Profile exists in PKT database only if there exists an associated
implemented tunnel/PW.
PKT manages PHB profile configuration on domain basis. PHB profile configuration is
allowed only when no traffic is supported, that is, no associated Node-PHB-Profiles exist
and no implemented tunnel/PW is associated to the PHB profile.
The attributes displayed for each item are:

User Label.

Native PHB(True, False).

Exp-0, , Exp-7.

....................................................................................................................................................................................................................................
1350 OMS
16-7
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS PHB profile

Create a PHB profile (T-MPLS)

....................................................................................................................................................................................................................................

Create a PHB profile (T-MPLS)


When to use

This function creates PHB profiles.


Related information

For information about LSP PHB profiles, see: Overview about PHB profile management
(p. 16-5).
PKT manages LSP PHB profile creation on domain basis.
Note: The creation affects PKT database only. The system checks that the requested
profile is compatible with the PHB profile on domain basis. The LSP PHB profile is
created in the network only at tunnel/PW implementation time, on all nodes crossed
by the tunnel. The elementary LSP PHB profiles automatically created in each NE are
called Node-PHB-Profiles and the system manages their consistency status. The
Node-PHB-Profile exists in PKT database only if there exists an associated
implemented tunnel/PW.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS > Create T-MPLS PHB profile.
Result: To create a LSP PHB profile:

Enter a User Label.

Enter a Comment.

Enter the traffic parameters.

...................................................................................................................................................................................................

Click Ok button.
Result: After checking the coherence of the traffic parameters values and the selected

traffic contract, the LSP PHB profile is created.


The LSP PHB profile list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-8
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS PHB profile

Modify a PHB profiles (T-MPLS)

....................................................................................................................................................................................................................................

Modify a PHB profiles (T-MPLS)


When to use

PKT manages PHB profile configuration on domain basis.


Related information

For information about LSP PHB profiles, see: Overview about PHB profile management
(p. 16-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

PHB profile configuration is allowed only when no traffic is supported, that is, no
associated Node-PHB-Profiles exist and no implemented tunnel/PW is associated to
the PHB profile.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > PHB profile.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS > PHB profile > Modify or Click the third key of the
mouse and select Modify.
Result: The PHB profile modification window is displayed.

If the PHB profile is associated to an implemented tunnel/PW, only the Traffic User
Label and Comment can be modified.
...................................................................................................................................................................................................

To modify a PHB profile:

Enter a new User Label (optional).

Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
16-9
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS PHB profile

Modify a PHB profiles (T-MPLS)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select OK.
Result: After confirmation of the modification: the PHB profile list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-10
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS PHB profile

Delete a PHB profile (T-MPLS)

....................................................................................................................................................................................................................................

Delete a PHB profile (T-MPLS)


When to use

This function deletes the PHB profiles.


Related information

For information about LSP PHB profiles, see: Overview about PHB profile management
(p. 16-5).
PKT manages PHB profile deletion on domain basis. only PHB profiles with no
associated tunnel/PW can be deleted.
Note: The deletion affects only PKT database.
PKT manages TD deletion in the NE. The deletion affect all crossed NEs at
tunnel/PW deimplementation time. TD deletion is transparent to the operator.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

No more Tunnel or PW are using this profile.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > PHB profile.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS > PHB profile > Delete or Click the third key of the
mouse and select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS
16-11
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS PHB profile

Delete a PHB profile (T-MPLS)

....................................................................................................................................................................................................................................

Result: After confirmation, the selected PHB profiles are removed.

The PHB profile list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-12
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS PHB profile

View the details of the PHB profiles (T-MPLS)

....................................................................................................................................................................................................................................

View the details of the PHB profiles (T-MPLS)


When to use

This function gets information about the PHB profile.


Related information

For information about LSP PHB profiles, see: Overview about PHB profile management
(p. 16-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > PHB profile.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > PHB profile > Properties or Click the third key of
the mouse and select Properties.
Result: The PHB profile properties window is displayed.

The attributes displayed for each PHB profile are:


User Label.
Comment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-13
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

Overview about Transport Links

....................................................................................................................................................................................................................................

Managing Transport Links (T-MPLS)


Overview about Transport Links
Transport Link description

For details about Transport Links, see: T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Two kinds of Transport Link can be used as infrastructure:

based on Link Over TDM, in this case, they can be used to carry LSP Tunnel. In that
case, the extremities of the Transport Link are TDM termination and its transport type
is Link Over TDM.
based on Link Over Cable, in this case, they can be used to carry VC-LSP. In that
case, the extremities of the Transport Link are one Physical Port and one ETP and its
transport type is Link Over Cable.

The different steps to provide a Transport Link are the following:

Create Transport link (in the scope of network construction).


The Transport Link is created automatically after the creation or the upload of Links
Over TDM and Links Over Cable dedicated to T-MPLS.

Characteristic definition.
For each extremity of the Transport Link, to provision the characteristics (T-MPLS
Label range) and to activate them. The T-MPLS Label range is stored.

The Transport Link management tool chain gives the order in which the available actions
can be performed.

....................................................................................................................................................................................................................................
1350 OMS
16-14
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

Overview about Transport Links

....................................................................................................................................................................................................................................

Figure 16-1 T-MPLS Transport Link management chain

....................................................................................................................................................................................................................................
1350 OMS
16-15
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

View the list of Transport Links

....................................................................................................................................................................................................................................

View the list of Transport Links


When to use

The Transport Link list window presents all the T-MPLS Transport Links and their
attributes.
Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 16-14).
For details about Transport Links, see: T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Transport Links.


...................................................................................................................................................................................................

Select: Links Over T-MPLS.


Result: The T-MPLS Transport Link list is displayed.

See the following topic in this document: Description of the list of T-MPLS
Transport Links (p. 16-17)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-16
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

Description of the list of T-MPLS Transport Links

....................................................................................................................................................................................................................................

Description of the list of T-MPLS Transport Links


Attributes of a T-MPLS Transport Link

The attributes displayed for each Transport Link are:

User Label.

Parent Subnetwork.

Transport Type (Link Over Cable, Link Over TDM).

Bandwidth (In Kbit/s).

Usage State (Idle, Busy, Reserved, Not meaningful).

Working State (Normal, Configuring, Removing).

Provisioning State (Defined, Partially Configured, Configured).

....................................................................................................................................................................................................................................
1350 OMS
16-17
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

Define the Transport Link characteristics

....................................................................................................................................................................................................................................

Define the Transport Link characteristics


When to use

This function consists in defining the characteristics of a Transport Link.


Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 16-14).
For details about Transport Links, see: T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Characteristic definition

Characteristic definition of a Transport Link is made by setting T-MPLS label range and
by activation of the interface.
The proposed Static Range Min and Max depend on the type of the boards at the
extremities of the Transport Link:

for two ISA boards (PR EA or ES16), the Min Range is equal to 1024 and the Max
range is equal to 5119.
for one ENE (ISA PR) and one ISA PR EA, the Min Range is equal to 1024 and the
Max range is equal to 5119.
for one ENE (not an ISA PR) and one ISA ES16 board, the label range is set to
1024-5119, by automatic configuration. The user can change it by configuration of the
Transport Link manually. In this case, the Min Range is 16 and the Max range is
5119.

The user has the possibility to change these values inside the range.
At the end, on each NE involved in the Transport Link, the physical port, or the logical
port is configured. The T-MPLS label range is stored in 1350OMS-PKT database, and the
1350 OMS PKT interface is activated.
If the selected Transport Link is based on Link Over Cable, the user can open the
VC-LSP creation window by ticking the Proceed with VC-LSP creation box.
If the selected Transport Link is based on Link Over TDM, the user can open the LSP
tunnel creation window by ticking the Proceed with LSP Tunnel creation box.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS
16-18
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

Define the Transport Link characteristics

....................................................................................................................................................................................................................................

Conditions

To get a positive result:

The Transport Link does not carry any LSP tunnel (if based on Link Over TDM) or
any VC-LSP (if based on Link Over Cable).
The NE (extremities of the Transport Link) must not be locked (that is, audit,
alignment, ad reserve are not in progress on the NEs).
The NE (extremities of the Transport Link) LAC state must not be granted.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS Transport Link > Define Characteristics or Click the
third key of the mouse and select Define Characteristics.
Result: The Define window is shown.
...................................................................................................................................................................................................

Select OK.
Result: After click Ok button, the Transport Link is updated with the following

states:

Provisioning State: Configured.

Working State: Normal.

After the characteristic definition, the Transport Link List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-19
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

Get the Transport Link extremities

....................................................................................................................................................................................................................................

Get the Transport Link extremities


When to use

This function gets information about extremities of a Transport Link.


Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 16-14).
For details about Transport Links, see: T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS Transport Link > Extremities or Click the third key of
the mouse and Extremities.

....................................................................................................................................................................................................................................
1350 OMS
16-20
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

Get the Transport Link extremities

....................................................................................................................................................................................................................................

Result: The Transport Link Extremities window is shown.

See the following topic in this document: Description of the list of Transport Link
Extremities (p. 16-22)
Figure 16-2 Transport Link Extremities window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-21
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

Description of the list of Transport Link Extremities

....................................................................................................................................................................................................................................

Description of the list of Transport Link Extremities


Attributes of a Transport Link Extremity

The attributes displayed are:

User Label.

NE User Label (A).

Termination Identifier (A).

Activation Status (A).

NE User Label (Z).

Termination Identifier (Z).

Activation Status (Z).

....................................................................................................................................................................................................................................
1350 OMS
16-22
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

View the details of the Transport Links

....................................................................................................................................................................................................................................

View the details of the Transport Links


When to use

This function gets information about a Transport Link.


Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 16-14).
For details about Transport Links, see: T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS Transport Link > Properties or Click the third key of
the mouse and Properties.
Result: The T-MPLS Transport Link properties window is displayed.

See the following topic in this document: Details of a T-MPLS Transport Link
(p. 16-24)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-23
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

Details of a T-MPLS Transport Link

....................................................................................................................................................................................................................................

Details of a T-MPLS Transport Link


Attributes of a T-MPLS Transport Link

The attributes displayed for each Transport Link are:

User Label.

Parent Subnetwork.

Transport Type (Link Over Cable, Link Over TDM).

Bandwidth (In Kbit/s).

Usage State (Idle, Busy, Reserved, Not meaningful).

Working State (Normal, Configuring, Removing).

Provisioning State (Defined, Partially Configured, Configured).

Routing Service Type.

Directionality.

Label Range Max.

Last Action Type.

Last Action Date.

Label Range Min.

....................................................................................................................................................................................................................................
1350 OMS
16-24
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

View the bandwidth load of Transport Links

....................................................................................................................................................................................................................................

View the bandwidth load of Transport Links


When to use

This function gets information about the bandwidth load of a Transport Link.
Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 16-14).
For details about Transport Links, see: T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS Transport Link > Bandwidth Load or Click the third
key of the mouse and select Bandwidth Load.

....................................................................................................................................................................................................................................
1350 OMS
16-25
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

View the bandwidth load of Transport Links

....................................................................................................................................................................................................................................

Result:
Figure 16-3 Transport Link Over TDM Bandwidth Load window

....................................................................................................................................................................................................................................
1350 OMS
16-26
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

View the bandwidth load of Transport Links

....................................................................................................................................................................................................................................

Figure 16-4 Transport Link Over Cable Bandwidth Load window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-27
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

View the inventory of Transport Links

....................................................................................................................................................................................................................................

View the inventory of Transport Links


When to use

This function gets information about each LSP tunnel and VC-LSP (and their states)
contained in the previously selected Transport Link.
Related information

For information about Transport Link management, see: Overview about Transport
Links (p. 16-14).
For details about Transport Links, see: T-MPLS Transport link (p. 11-65).
For general information about Transport Links, see: Transport link management
(p. 11-50).
If you select an entity (LSP Tunnel or VC-LSP) in the inventory list and click the right
button, you see a list of commands. The listed commands depend on the provisioning
state and availability status of the selected entity.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS Transport Link > Get Inventory or Click the third key
of the mouse and select Get Inventory.

....................................................................................................................................................................................................................................
1350 OMS
16-28
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

View the inventory of Transport Links

....................................................................................................................................................................................................................................

Result: The Transport Link Inventory list is displayed.


Figure 16-5 Transport Link Inventory List window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-29
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Transport Links (T-MPLS)

Description of the inventory of Transport Links

....................................................................................................................................................................................................................................

Description of the inventory of Transport Links


Attributes of a Transport Link inventory

The attributes displayed for each LSP tunnel or VC-LSP are:

T-MPLS Label.

LSP Type(LSP Tunnel or VC-LSP).

LSP tunnel or VC-LSP User Label.

Provisioning State (Defined, Allocated, Partially Implemented, Implemented,


Commissioned, Partially Configured, Configured).

Availability Status.

....................................................................................................................................................................................................................................
1350 OMS
16-30
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Overview about Virtual Transports

....................................................................................................................................................................................................................................

Managing Virtual Transport (T-MPLS)


Overview about Virtual Transports
T-MPLS Virtual Transport description

Application manages the VT creation and configuration both in database (read-write


access) and in the NE. T-MPLS and EOT are notified about VT creation and
configuration. T-MPLS and EOT can request to CORE the configuration of adaptive VTs
only. VT and VTQ information is stored in database tables that can be also read by
T-MPLS and EOT (read-only access). T-MPLS and EOT manage the bandwidth reserved
on each VT and VTQ. CORE has to know the bandwidth lock/unlock only on VT basis.
CORE does not need to know the exact amount of reserved bandwidth. The VT concept
represents a portion of the section egress bandwidth and allows to reserve that bandwidth
portion for a specific transport class. When the service is allocated (Ethernet Segment
allocated over one Transport Link or T-MPLS tunnel/PW allocated over one section), the
system associates that Ethernet Segment/tunnel/PW with one Virtual Transport (VT) of
the egress port. At allocation time, the operator can optionally specify the underlying
associated VT. If not specified by user, the system automatically associates the Ethernet
Segment/Tunnel/PW with the default Virtual Transport associated with the egress port.
The default VT initially uses all the bandwidth corresponding to the egress shaping rate.
The manual addition of new VTs over the same egress port forces the automatic reduction
of the bandwidth available to the default VT.
User is requested to create all VTs in advance to traffic implementation. PKT is also
requested to Takeover VTs existing in the network. When the operator creates a new VT,
the operator has to specify, with respect to VT bandwidth management, whether this VT
is adaptive or fixed. For fixed VTs, the VT bandwidth parameters can only be changed by
operator (carried traffic must fit VT bandwidth parameters). For adaptive VTs, the VT
bandwidth can only be changed automatically when traffic is set up or torn-down (VT
bandwidth parameters must fit traffic bandwidth demand). VTs Takeover from the
network are automatically managed by PKT as fixed VTs.
Application behavior creating T-MPLS Virtual Transport

When creates a Virtual Transport, the application:

Checks that the section constraints describe a fully connected route between the end
nodes.
Checks that the PW PHB profile is supported by the domain Egress PHB Profile.
Defines the PW and updates the T-MPLS DB allocating the PW along the constraints.
Associates the PW to a null TD (PIR=CIR=0 and PBS=CBS=0), if the user does not
specify the bandwidth parameters.

....................................................................................................................................................................................................................................
1350 OMS
16-31
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Overview about Virtual Transports

....................................................................................................................................................................................................................................

Set the reserved CIR parameter equal to the TD CIR parameter. If an allocated service
is over one implemented PW, the PW reserved CIR represents the CIR required to
support the PW committed bandwidth, while the TD CIR represents the committed
bandwidth of the implemented PW.

When the supported services are implemented, TD CIR is enlarged to match the
reserved CIR. If the PW are deallocated, the reserved CIR is reduced down to the TD
CIR value.
If the user does not constrain the underlying Virtual Transport (by means of VT
parameter), the application allocates the PW on the default VT.

If the user requests Control Word enabling (CW enabling), then CW insertion is
enabled on PW terminations at implementation time.
Note: It is not possible to create the PW using other underlying PWs. Only E-LSP
PWs are supported.

....................................................................................................................................................................................................................................
1350 OMS
16-32
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

View the list of Virtual Transports

....................................................................................................................................................................................................................................

View the list of Virtual Transports


When to use

This function presents all the Virtual Transports and their attributes.
Related information

For information about Virtual Transports, see: Overview about Virtual Transports
(p. 16-31).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS.


Result: The T-MPLS menu is displayed.
...................................................................................................................................................................................................

Select: Virtual Transport.


Result: The Virtual Transport list is displayed.

See the following topic in this document: Description of the list of Virtual
Transports (p. 16-34)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-33
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Description of the list of Virtual Transports

....................................................................................................................................................................................................................................

Description of the list of Virtual Transports


Attributes of a Virtual Transport

The attributes displayed for each Pseudo Wire are:

User Label.

Working State (Normal, Removing, Allocating, De-allocating, Implementing,


De-implementing).

Last Action.

Configuration State (Idle, Busy).

Operational State (Idle, Busy).

Alarm Status (Normal, Degraded, In failure).

Flow (Idle, Busy).

Protection Role (Working, Protecting).

Protection Status (Working, Protecting).

Provisioning Type (Defined, Allocated, Partially Implemented, Implemented).

Cration date.

CIR.

PIR.

CBS.

PBS.

Reserved CIR.

A Port ID.

Z Port ID.

A Port.

Z Port.

....................................................................................................................................................................................................................................
1350 OMS
16-34
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Create a Virtual Transport

....................................................................................................................................................................................................................................

Create a Virtual Transport


When to use

This function manages Virtual Transport creation and allocation.


Related information

For information about Virtual Transport, see: Overview about Virtual Transports
(p. 16-31).
For details about the checks performed and default values assumed, refer to: Application
behavior creating T-MPLS Virtual Transport (p. 16-31).
Note: It is not possible to create the PW using other underlying PWs. Only E-LSP
PWs are supported.
When creates a Virtual Transport, the application:

Checks that the section constraints describe a fully connected route between the end
nodes.

Checks that the PW PHB profile is supported by the domain Egress PHB Profile.
Defines the PW and updates the T-MPLS DB allocating the PW along the constraints.
Associates the PW to a null TD (PIR=CIR=0 and PBS=CBS=0), if the user does not
specify the bandwidth parameters.

Set the reserved CIR parameter equal to the TD CIR parameter. If an allocated service
is over one implemented PW, the PW reserved CIR represents the CIR required to
support the PW committed bandwidth, while the TD CIR represents the committed
bandwidth of the implemented PW.
When the supported services are implemented, TD CIR is enlarged to match the
reserved CIR. If the PWs are deallocated, the reserved CIR is reduced down to the TD
CIR value.
If the user does not constrain the underlying Virtual Transport (by means of VT
parameter), the application allocates the PW on the default VT.
If the user requests Control Word enabling (CW enabling), then CW insertion is
enabled on PW terminations at implementation time.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS
16-35
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Create a Virtual Transport

....................................................................................................................................................................................................................................

Conditions

To get a positive result:

The User Label must be different as one which is exists.

The user must define the complete route of Virtual Transport in terms of section
constraints.
If the user does not define the PW route, PW is created in defined state.
Note: The creation of a PW using other underlying PWs is forbidden. Only E-LSP
PWs are supported.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create Virtual Transport.
Result: The Virtual Transport creation wizard is displayed.

To create a Virtual Transport, the user specify:


Pseudo Wire User label.
PHB Profile (optional).
Direction (bidirectional, unidirectional).

PM enabling (no, on-implementation).

CW enabling (no, on-implementation).

Edge points (end NNI ports).

Bandwidth parameters: (optionally)

PIR.

Reserved CIR.

PBS.

CBS.

Routing constraints (optionally).

...................................................................................................................................................................................................

Click Ok.
Result: If the operation completes without errors the final PW state is allocated,
otherwise the state is defined with workingState equal to failedToAllocate.

The Usage state of Pseudo Wire changes to busy when the Pseudo Wire supports at
least one T-MPLS section.
Then, the tree area, opened graphical views and the Pseudo Wire List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-36
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Modify a Virtual Transport

....................................................................................................................................................................................................................................

Modify a Virtual Transport


When to use

The function modifies Virtual Transport characteristics.


Related information

For information about Pseudo Wire, see: T-MPLS tunnel description (p. 16-97).
This function gives the possibility to modify:

User Label.

Comment.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different as one which is
already used by another Pseudo Wire.
If the provisioning state of the Pseudo Wire is Defined and usage state is Idle, the
user can modify the Traffic Descriptor associated to the Pseudo Wire.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Virtual Transport.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Packet > Virtual Transport > Modify.


Result: The Virtual Transport modification window is displayed.
...................................................................................................................................................................................................

To modify a Virtual Transport:

Enter a new User Label (optional).

Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
16-37
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Modify a Virtual Transport

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select OK.
Result: After confirmation of the modification: the tree area and the Virtual Transport

list are updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-38
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Delete a Virtual Transport

....................................................................................................................................................................................................................................

Delete a Virtual Transport


When to use

This function consists in deleting a Virtual Transport.


Related information

For information about Virtual Transport, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The selected Pseudo Wire must be set toAllocated or Defined.

The selected Pseudo Wire must not support allocated nor implemented Pseudo
Wires.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > Virtual Transports.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > Virtual Transports > Delete or Click the third key of the
mouse and select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, if concerned Virtual Transport is associated to a Traffic
Descriptor, a disassociation is automatically done and the Virtual Transport is
removed.

Then Virtual Transport list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
16-39
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

View the details of the Virtual Transport

....................................................................................................................................................................................................................................

View the details of the Virtual Transport


When to use

This function gets information about a Virtual Transport.


Related information

For information about Virtual Transport, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > Virtual Transports.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Virtual Transports > Properties.


Result: The property window is displayed.

See the following topic in this document: Details of a Virtual Transport (p. 16-41)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-40
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Details of a Virtual Transport

....................................................................................................................................................................................................................................

Details of a Virtual Transport


Attributes of a Virtual Transport

The attributes displayed for each Virtual Transport are:

User Label.

Parent Subnetwork.

Usage State (Idle, Busy).

Working State (Normal, Removing, Allocating, De-allocating, Implementing,


De-implementing).

Provisioning State (Defined, Allocated, Partially Implemented, Implemented).

Availability Status (Normal, Degraded, In failure).

Consistency State (Consistent, Not consistent, Not meaningful).

Comment.

Last Action Type.

Last Action Date.

Traffic Descriptor User Label.

....................................................................................................................................................................................................................................
1350 OMS
16-41
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Configuration of a Virtual Transport

....................................................................................................................................................................................................................................

Configuration of a Virtual Transport


When to use

This function consists configuring Virtual Transport.


Related information

For information about Virtual Transport, see: T-MPLS tunnel description (p. 16-97).
For information about LSP PHB profiles, see: Overview about PHB profile management
(p. 16-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Virtual Transport must not support any Pseudo Wire.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > Virtual Transport.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > Virtual Transport > configure.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS Pseudo Wire CTP > Add PHB Profile.
The operator selects the previously created PHB profile on domain basis to be associated
with that tunnel CTP.

....................................................................................................................................................................................................................................
1350 OMS
16-42
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Configuration of a Virtual Transport

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select OK.
Result: PKT associates the new PHB to the CTP in database and then, if the tunnel is

implemented, PKT creates automatically the new Node-PHB in the node and deletes
the previously associated one, if not used by any other tunnel. PKT checks that the
tunnel does not support any PW, since the operation requires tunnel deactivation and
reactivation.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-43
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Implement a Virtual Transport

....................................................................................................................................................................................................................................

Implement a Virtual Transport


When to use

This function implements a Virtual Transport.


Related information

For information about Virtual Transport, see: T-MPLS tunnel description (p. 16-97).
Virtual Transport provisioning

Each NE involved in the Virtual Transport is provisioned as following:

If does not exit in the NE, Traffic Descriptor is created.


The LER and LSR connections are added to the NE.
Extremities are activated.

If tunnel alarm enabling rule is on-implementation, MEPs are automatically created and
activated on tunnel terminations at this stage.
If tunnel PM enabling rule is on-implementation, PM counting is automatically started
on tunnel terminations at this stage.
If at tunnel creation time the operator specified one PHB profile (selecting from a
portfolio of profiles available on domain basis) different from default, PKT automatically
implements the corresponding Node-PHB profiles on all tunnel segments. Similarly,
based on the tunnel bandwidth parameters, PKT automatically creates in each crossed NE
the corresponding TD.
If the tunnel uses an adaptive VT, PKT automatically configures VT bandwidth as
follows:

VT Reserved CIR = Sum (LSP CIR) , where the sum spans all allocated and

implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
VT CIR = Sum (LSP CIR) , where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, including current tunnel.
VT PIR = Max (LSP PIR) , where the max is computed for all implemented LSP
(tunnel or PW) directly supported by the VT, including current tunnel.

Virtual Transport states

The Virtual Transport is updated with the following states:

Provisioning State: Implemented (or Partially Implemented).

Working State: Normal.

Availability Status: Normal (or Degraded or In Failure).

Before you begin

The system is running.


The system is properly configured.
....................................................................................................................................................................................................................................
1350 OMS
16-44
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Implement a Virtual Transport

....................................................................................................................................................................................................................................

The system is connected by MS-GUI.


The MS-GUI is set to map mode.

Conditions

To get a positive result:

The selected Pseudo Wire must be set to Allocated.

The working state must be set to Normal.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > Virtual Transports.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS > Virtual Transport > Implement.
...................................................................................................................................................................................................

Select OK.
Result: After implementation, the Virtual Transport List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-45
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

De-implement a Virtual Transport

....................................................................................................................................................................................................................................

De-implement a Virtual Transport


When to use

This function consists in de-implementing a Virtual Transport to remove the tunnel from
the network.
Related information

For information about Virtual Transport, see: T-MPLS tunnel description (p. 16-97).
deimplementation phase

If the tunnel were using a dedicated Node PHB profile, the PHB is automatically deleted
from the NE. If the tunnel were using a dedicated TD, TD is automatically deleted from
the NE.
If the tunnel uses an adaptive VT, PKT automatically reconfigures VT bandwidth as
follows:

VT Reserved CIR=sum(LSP CIR , where the sum spans all allocated and

implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
VT CIR=sum(LSP CIR , where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, excluding current tunnel.
VT Reserved PIR=Max(LSP PIR , where the max is computed for all
implemented LSP (tunnel or PW) directly supported by the VT, excluding current
tunnel.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected Pseudo Wire must be set to Implemented or
Partially implemented.
The Pseudo Wire must carry no implemented T-MPLS Pseudo Wires.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > Virtual Transports.

....................................................................................................................................................................................................................................
1350 OMS
16-46
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

De-implement a Virtual Transport

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > Virtual Transport > De-Implement.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The user chooses a Pseudo Wire and requests its de-implementation then
working state is set to allocated and no traffic could be carried by it.

After de-implementation, the Pseudo Wire List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-47
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

View the Virtual Transport extremities

....................................................................................................................................................................................................................................

View the Virtual Transport extremities


When to use

This function gets information about extremities (origin and destination) of a Virtual
Transport.
Related information

For information about Virtual Transport, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > Virtual Transport.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Virtual Transports > Extremities.


Result: The list window is displayed.

See the following topic in this document: Description of the list of Virtual
Transports (p. 16-49)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-48
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Virtual Transport (T-MPLS)

Description of the list of Virtual Transports

....................................................................................................................................................................................................................................

Description of the list of Virtual Transports


Attributes of a Virtual Transport

The attributes displayed are:

User Label.

NE User Label (A).

Termination User Label (A).

NE User Label (Z).

Termination User Label (Z).

....................................................................................................................................................................................................................................
1350 OMS
16-49
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Overview about Pseudo Wires

....................................................................................................................................................................................................................................

Managing Pseudo Wires (T-MPLS)


Overview about Pseudo Wires
T-MPLS Pseudo Wire description

Pseudo Wires are point-to-point logical connections between NNI ports. Pseudo Wires are
usable by only one service.
The route of a Pseudo Wire spans one or more T-MPLS sections and or tunnels.
The purpose of a Pseudo Wire is to carry one service across T-MPLS network.
Pseudo Wires are Label Switched Paths (LSP). The Pseudo Wire terminations correspond
to:

a label Push at the ingress LER.


a label Pop at the egress LER.

The cross connection (XC) correspond to a Label Swap at the LSR.


T-MPLS manages the T-MPLS tunnel creation in the database, requested by user
(bottom-up approach) or by PW creation (top-down approach). The T-MPLS Tunnel, or
T-MPLS Path, is a logical entity that represents point-to-point connections between NNI
ports. The tunnel route can span one or more T-MPLS sections or one or more underlying
tunnels. The T-MPLS tunnel is an example of Label Switched Path (LSP). The tunnel
purpose is to enhance the scalability of T-MPLS logical connections. The tunnel can carry
one or more services (PW), it can be involved in a protection schema (linear colon, linear
plus, or MPLS Ring). The tunnel supports OAM capabilities: tunnel terminations can
instantiate and enable the Maintenance End Points (MEPs). The system is able to
configure a tunnel between NNI ports belonging to contiguous T-MPLS domains using
only the sections present in T-MPLS DB. In this version, a tunnel cannot be created using
other underlying tunnels. Only E-LSP tunnels are supported. The tunnel creation can be
performed by the operator using the T-MPLS GUI or automatically during a client service
definition. When creating the tunnel, the operator can fully specify the tunnel route by
means of section constraints or can specify only the end NNI ports with, optionally, a
partial or complete list of section constraints. The tunnel creation is an operation that
defines the tunnel and reserves the resources in T-MPLS DB. If the operation fails, the
tunnel is put in defined state with working state failedToAllocate value and the
system notifies the cause of the failure. While in defined state, the operator can remove
the tunnel or modify the input parameters (edge points, section constraints, and so on) and
perform again the creation. If the creation completes successfully the tunnel is in
allocated state. Tunnel creation is the same for static, dynamic, and mixed tunnels. In
all cases, the system is required to compute the tunnel nominal route. The static case and
the dynamic case differ only in the way the nominal route is provisioned.

....................................................................................................................................................................................................................................
1350 OMS
16-50
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

View the list of Pseudo Wires

....................................................................................................................................................................................................................................

View the list of Pseudo Wires


When to use

This function presents all the Pseudo Wires and their attributes.
Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS.


Result: The T-MPLS menu is displayed.
...................................................................................................................................................................................................

Select: T-MPLS Pseudo Wires.


Result: The Pseudo Wire list is displayed.

See the following topic in this document: Description of the list of Pseudo Wires
(p. 16-52)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-51
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Description of the list of Pseudo Wires

....................................................................................................................................................................................................................................

Description of the list of Pseudo Wires


Attributes of a Pseudo Wire

The attributes displayed for each Pseudo Wire are:

User Label.

Working State (Normal, Removing, Allocating, De-allocating, Implementing,


De-implementing).

Last Action.

Configuration State (Idle, Busy).

Operational State (Idle, Busy).

Alarm Status (Normal, Degraded, In failure).

Flow (Idle, Busy).

Protection Role (Working, Protecting).

Protection Status (Working, Protecting).

Provisioning Type (Defined, Allocated, Partially Implemented, Implemented).

Cration date.

CIR.

PIR.

CBS.

PBS.

Reserved CIR.

A Port ID.

Z Port ID.

A Port.

Z Port.

....................................................................................................................................................................................................................................
1350 OMS
16-52
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Create a Pseudo Wire

....................................................................................................................................................................................................................................

Create a Pseudo Wire


When to use

This function manages Pseudo Wire creation and allocation.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Pseudo Wire allocation

The system checks that the section constraints describe a fully connected route between
the end nodes.
The system checks that the PW PHB profile is supported by the domain Egress PHB
Profile.
The system defines the PW and updates the T-MPLS DB allocating the PW along the
constraints.
If the operator does not specify the bandwidth parameters, the system creates the PW with
associated null TD (PIR=CIR=0 and PBS=CBS=0 ).
The reserved CIR parameter is always equal to the TD CIR parameter, except when the
services is allocated and over one implemented PW. In such case, the PW reserved CIR
represents the CIR required to support the PW committed bandwidth, while the TD CIR
represents the committed bandwidth of the implemented PW.
When the supported services are implemented, TD CIR is enlarged to match the reserved
CIR.
If the PWs are deallocated, the reserved CIR is reduced down to the TD CIR value.
If the operator does not constrain the underlying Virtual Transport (by means of VT
parameter), the system allocates the PW on the default VT.
If the operator requests Control Word enabling (CW enabling), then CW insertion is
enabled on PW terminations at implementation time.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The User Label must be different as one which is exists.


The user must define the complete route of Pseudo Wire in terms of section
constraints.

....................................................................................................................................................................................................................................
1350 OMS
16-53
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Create a Pseudo Wire

....................................................................................................................................................................................................................................

If the user does not define the PW route, PW is created in defined state.
Note: In this version, a PW cannot be created using other underlying PWs. Only
E-LSP PWs are supported.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS > Create Pseudo Wire.
Result: The Pseudo Wire creation wizard is displayed.

To create a Pseudo Wire, the user specify:


Pseudo Wire User label.
PHB Profile (optional).
Direction (bidirectional, unidirectional).

PM enabling (no, on-implementation).

CW enabling (no, on-implementation).

Edge points (end NNI ports).

Routing constraints (optionally).

Bandwidth parameters: (optionally)

PIR.

Reserved CIR.

PBS.
CBS.

...................................................................................................................................................................................................

Click Ok.
Result: If the operation completes without errors, the final PW state is allocated;
otherwise the state is defined with workingState equal to failedToAllocate.

The Usage state of Pseudo Wire changes to busy when the Pseudo Wire supports at
least one T-MPLS section.
Then, the tree area, opened graphical views and the Pseudo Wire List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-54
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Modify a PseudoWire

....................................................................................................................................................................................................................................

Modify a PseudoWire
When to use

This function modifies PseudoWire characteristics.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
This function gives the possibility to modify:

User Label.

Comment.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different as one which is
already used by another Pseudo Wire.
If the provisioning state of the Pseudo Wire is Defined and usage state is Idle, the
Traffic Descriptor associated to the Pseudo Wire is modifiable.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS Pseudo Wire > Modify.
Result: The Pseudo Wire modification window is displayed.
...................................................................................................................................................................................................

To modify a Pseudo Wire:

Enter a new User Label (optional).

Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
16-55
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Modify a PseudoWire

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select OK.
Result: After confirmation of the modification: the tree area and Pseudo Wire list are

updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-56
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Delete a Pseudo Wire

....................................................................................................................................................................................................................................

Delete a Pseudo Wire


When to use

This function consists in deleting a Pseudo Wire.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The selected Pseudo Wire must be set toAllocated or Defined.

The selected Pseudo Wire must not support allocated nor implemented Pseudo
Wires.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS Pseudo Wires > Delete or Click the third key of the
mouse and select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, if concerned Pseudo Wire is associated to a Traffic
Descriptor, a disassociation is automatically done and the Pseudo Wire is removed.

Then Pseudo Wire list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-57
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

View the details of the Pseudo Wires

....................................................................................................................................................................................................................................

View the details of the Pseudo Wires


When to use

This function gets information about a Pseudo Wire.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS Pseudo Wires > Properties.
Result: The property window is displayed.

See the following topic in this document: Details of a Pseudo Wire (p. 16-59)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-58
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Details of a Pseudo Wire

....................................................................................................................................................................................................................................

Details of a Pseudo Wire


Attributes of a Pseudo Wire

The attributes displayed for each Pseudo Wire are:

User Label.

Parent Subnetwork.

Usage State (Idle, Busy).

Working State (Normal, Removing, Allocating, De-allocating, Implementing,


De-implementing).

Provisioning State (Defined, Allocated, Partially Implemented, Implemented).

Availability Status (Normal, Degraded, In failure).

Consistency State (Consistent, Not consistent, Not meaningful).

Comment.

Last Action Type.

Last Action Date.

Traffic Descriptor User Label.

....................................................................................................................................................................................................................................
1350 OMS
16-59
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Configuration of the route of a Pseudo Wire

....................................................................................................................................................................................................................................

Configuration of the route of a Pseudo Wire


When to use

This function consists in adding/removing sections as constraint to a Pseudo Wire.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
PKT starts the reroute operation and reallocates the tunnel along a new route that satisfies
the updated list of constraints.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Pseudo Wire must be allocated.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS Pseudo Wire > Add Constraints.
Result: To add a new Pseudo Wire constraint:

Enter the User Label of the Pseudo Wire.

Enter a T-MPLS Label (optional) by using the sensitive help.

...................................................................................................................................................................................................

Select OK.

....................................................................................................................................................................................................................................
1350 OMS
16-60
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Configuration of the route of a Pseudo Wire

....................................................................................................................................................................................................................................

Result: After confirmation, the Pseudo Wire constraint is added at the end of the
constraint list as the last one of the route.

Then, the Pseudo Wire Constraint List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-61
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Delete a constraint from a Pseudo Wire

....................................................................................................................................................................................................................................

Delete a constraint from a Pseudo Wire


When to use

This function consists in deleting one constraint related to a Pseudo Wire.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
PKT starts the reroute operation and reallocates the tunnel along a new route that satisfies
the updated list of constraints.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected Pseudo Wire must be Defined.

The working state must be Normal (that is, no operation is running on it).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS Pseudo Wire > Constraints.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > T-MPLS Pseudo Wires > Delete.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS
16-62
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Delete a constraint from a Pseudo Wire

....................................................................................................................................................................................................................................

Result: After confirmation, the Pseudo Wire constraints are deleted and the Pseudo
Wire Constraint List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-63
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Configuration of PHB profile of a Pseudo Wire

....................................................................................................................................................................................................................................

Configuration of PHB profile of a Pseudo Wire


When to use

This function consists in adding/removing PHB Profile to a Pseudo Wire.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
For information about LSP PHB profiles, see: Overview about PHB profile management
(p. 16-5).
The operator selects the previously created PHB profile on domain basis to be associated
with that tunnel CTP.
PKT associates the new PHB to the CTP in database and then, if the tunnel is
implemented, PKT creates automatically the new Node-PHB in the node and deletes the
previously associated one, if not used by any other tunnel. PKT checks that the tunnel
does not support any PW, since the operation requires tunnel deactivation and
reactivation.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Pseudo Wire must not support any Pseudo Wire.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS Pseudo Wire > tunnel CTP.

....................................................................................................................................................................................................................................
1350 OMS
16-64
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Configuration of PHB profile of a Pseudo Wire

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS Pseudo Wire CTP > Add PHB Profile.
...................................................................................................................................................................................................

Select OK.
Result: Profile is added to the Pseudo Wire CTP.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-65
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Configuration of Layer-2 encapsulation of a Pseudo Wire

....................................................................................................................................................................................................................................

Configuration of Layer-2 encapsulation of a Pseudo Wire


When to use

This function consists in adding/removing Layer-2 encapsulation Profile to a Pseudo


Wire.
Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Pseudo Wire must not support any Pseudo Wire.


Underlying layer of the T-MPLS Port is MAU.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS Pseudo Wire > Add Layer-2 encapsulation Profile.
...................................................................................................................................................................................................

Select OK.
Result: Profile is added to the Pseudo Wire.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-66
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Allocate Pseudo Wire

....................................................................................................................................................................................................................................

Allocate Pseudo Wire


When to use

This operation is performed when the user wants to find a path route between the two
extremities of a Pseudo Wire.
Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before the allocation operation, the user has given a complete path route in term of
constraints (T-MPLS Pseudo Wire List). Constraints can optionally be associated with the
T-MPLS Labels. See Add a constraint to an LSP tunnel (p. 15-56).
If the Pseudo Wire is only one, the route is already defined. In this case, the constraint
List is not mandatory. The Pseudo Wire is identified by the Pseudo Wire extremities given
during the definition. Even not mandatory, it can be useful for the user to gives a specific
T-MPLS label.
Pseudo Wire bandwidth

The system calculates the effective bandwidth of the Pseudo Wire according to the
associated Traffic Descriptor (see the table).
Each T-MPLS Pseudo Wire of the given route must provide the effective bandwidth of the
Pseudo Wire. Available Bandwidth of Pseudo Wire is greater than or equal to Effective
bandwidth of Pseudo Wire.
Traffic contract type.

Effective bandwidth reserved on Pseudo Wire.

Best Effort.

0 1.

Assured Forwarding.

CIR.

Expedited Forwarding.

CIR.

Notes:

1.

In the case Best Effort traffic contract, no effective bandwidth is reserved. In this case, for
each Pseudo Wire, a maximum number of Best Effort Pseudo Wire is checked.

For all traffic contract, CIR must be less than or equal to PIR and PIR must be less than or
equal to Pseudo Wire Total bandwidth.
If the user gives a T-MPLS Label in the constraint list, the system checks the availability
of the T-MPLS Label. If the T-MPLS Label. is used by another Pseudo Wire or T-MPLS
section, 1350 OMS PKT chooses and reserves automatically an available T-MPLS label.

....................................................................................................................................................................................................................................
1350 OMS
16-67
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Allocate Pseudo Wire

....................................................................................................................................................................................................................................

Allocation phase

The Pseudo Wire is allocated:

LSP links along the route used by the Pseudo Wire are created, referenced by a
T-MPLS Label of each crossed Pseudo Wire.
The 1350 OMS PKT checks the continuity of the route.
T-MPLS Label of each involved Pseudo Wire is reserved to the Pseudo Wire.
Pseudo Wire cross connections are generated.

Bandwidth of each Pseudo Wire (used and available bandwidths) is computed in the

used direction.
If the Usage State of each T-MPLS Pseudo Wire used by the Pseudo Wire is idle, the
state change to busy.

Pseudo Wire states

The Pseudo Wire is also updated with the following states:

Provisioning State: Allocated.

Working State: Normal.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected Pseudo Wire must be set to Defined.

The working state must be set to Normal (if not, an operation is running on it).

The Pseudo Wire must be associated to a Traffic Descriptor.


The constraints on this Pseudo Wire have been previously added (except for unitary
Pseudo Wire).

The T-MPLS sections defined as constraints are contiguous.


The constraint lists must be compliant with the Pseudo Wire extremities.
The maximum number of Best Effort Pseudo Wire for each Pseudo Wire is not
reached.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.

....................................................................................................................................................................................................................................
1350 OMS
16-68
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Allocate Pseudo Wire

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > T-MPLS Pseudo Wires > Allocate.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The Pseudo Wire Working state is set to Allocated.

The Pseudo Wire List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-69
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

De-allocate Pseudo Wire

....................................................................................................................................................................................................................................

De-allocate Pseudo Wire


When to use

This operation allows to the user to de-allocate a Pseudo Wire.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
deallocation phase

The 1350 OMS PKT retrieves all T-MPLS Pseudo Wires used by this Pseudo Wire. It
updates for each of them available and used bandwidths for the used direction. It frees the
involved T-MPLS Labels.
The LSP links and the LSP cross connections are also retrieved and deleted.
The Pseudo Wire is de-allocated:

Bandwidth of each Pseudo Wires used by the Pseudo Wire are updated.

If no more Pseudo Wire is carried, the Usage State of Pseudo Wires used by the
Pseudo Wire is changed to idle.
T-MPLS Label of each Pseudo Wire involved in LSP links is released.

Pseudo Wire states

The Pseudo Wire is also updated with the following states:

Provisioning State: Defined.

Working State: Normal.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected Pseudo Wire must be set to Allocated.

The working state must be set to Normal (if not, an operation is running on it).

The Pseudo Wire state is not busy.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.

....................................................................................................................................................................................................................................
1350 OMS
16-70
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

De-allocate Pseudo Wire

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > T-MPLS Pseudo Wires > Deallocate.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the Pseudo Wire working state is set to De-allocated.

Then, the Pseudo Wire List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-71
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Implement a Pseudo Wire

....................................................................................................................................................................................................................................

Implement a Pseudo Wire


When to use

This function implements a Pseudo Wire.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Implementation phase

The tunnel provisioning can be static, dynamic, or mixed. Static means that the tunnel is
provisioned directly by NMS. Dynamic means that the tunnel is provisioned through
control plane. In mixed provisioning, PKT manages the tunnel creation and activation,
partially in the data plane and partially in the control plane.
Each NE involved in the Pseudo Wire is provisioned as following:

If does not exit in the NE, Traffic Descriptor is created.


The LER connections and the LSR connections are added to the NE.
Extremities are activated.

If tunnel alarm enabling rule is on-implementation, MEPs are automatically created and
activated on tunnel terminations at this stage.
If tunnel PM enabling rule is on-implementation, PM counting is automatically started
on tunnel terminations at this stage.
If at tunnel creation time the operator specified one PHB profile (selecting from a
portfolio of profiles available on domain basis) different from default, PKT automatically
implements the corresponding Node-PHB profiles on all tunnel segments. Similarly,
based on the tunnel bandwidth parameters, PKT automatically creates in each crossed NE
the corresponding TD.
If the tunnel uses an adaptive VT, PKT automatically configures VT bandwidth as
follows:

VT Reserved CIR = Sum (LSP CIR), where the sum spans all allocated and
implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
VT CIR = Sum (LSP CIR), where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, including current tunnel.
VT PIR = Max (LSP PIR), where the max is computed for all implemented LSP
(tunnel or PW) directly supported by the VT, including current tunnel.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
....................................................................................................................................................................................................................................
1350 OMS
16-72
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Implement a Pseudo Wire

....................................................................................................................................................................................................................................

The MS-GUI is set to map mode.


Conditions

To get a positive result:

The selected Pseudo Wire must be set to Allocated.

The working state must be set to Normal.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS Pseudo Wire > Implement.
...................................................................................................................................................................................................

Select OK.
Result: The Pseudo Wire is updated with the following states:

Provisioning State: Implemented (or Partially Implemented).

Working State: Normal.

Availability Status: Normal (or Degraded or In Failure).

After implementation, the Pseudo Wire List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-73
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

De-implement a Pseudo Wire

....................................................................................................................................................................................................................................

De-implement a Pseudo Wire


When to use

This function consists in de-implementing a Pseudo Wire to remove the tunnel from the
network.
Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Deimplementation phase

PKT manages the static tunnel removal from the data plane, dynamic tunnel removal
from the control plane, or both.
If the tunnel were using a dedicated Node-PHB profile, the profile is automatically
deleted from the NE. If the tunnel were using a dedicated TD, the TD is automatically
deleted from the NE.
If the tunnel uses an adaptive VT, PKT automatically reconfigures VT bandwidth as
follows:

VT Reserved CIR = Sum (LSP CIR), where the sum spans all allocated and
implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
VT CIR = Sum (LSP CIR), where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, excluding current tunnel.
VT PIR = Max (LSP PIR), where the max is computed for all implemented LSP
(tunnel or PW) directly supported by the VT, excluding current tunnel.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Provisioning state of the selected Pseudo Wire must be set to Implemented or
Partially implemented.
The Pseudo Wire must carry no implemented T-MPLS Pseudo Wires.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.

....................................................................................................................................................................................................................................
1350 OMS
16-74
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

De-implement a Pseudo Wire

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > T-MPLS Pseudo Wires > De-Implement.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The user chooses a Pseudo Wire and requests its de-implementation then
working state is set to allocated and no traffic could be carried by it.

After de-implementation, the Pseudo Wire List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-75
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

List the constraints of a Pseudo Wire

....................................................................................................................................................................................................................................

List the constraints of a Pseudo Wire


When to use

This function lists the T-MPLS sections acting as constraints for the selected Pseudo
Wire.
Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Pseudo Wire must be allocated.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS Pseudo Wire > Constraints.
Result: The list window is displayed.

See the following topic in this document: Description of the list of Pseudo Wire
Constraints (p. 16-77)
Only routing constraints created by operator are displayed to the UI.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-76
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Description of the list of Pseudo Wire Constraints

....................................................................................................................................................................................................................................

Description of the list of Pseudo Wire Constraints


Attributes of a Pseudo Wire Constraint

The attributes displayed for each constraint are:

User label.

HOPLIST-ID.

PATH-ID.

HOP-ID.

Hop-Ip-Address.

Hop Port AID.

Label in.

Label out.

Include mode.

Loose mode.

Explicit mode.

Note: Only routing constraints created by operator are displayed to the UI.

....................................................................................................................................................................................................................................
1350 OMS
16-77
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

View the details of the Pseudo Wire constraints

....................................................................................................................................................................................................................................

View the details of the Pseudo Wire constraints


When to use

This function gets information about a constraint of a Pseudo Wire.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

SelectSearch > Packet > T-MPLS > T-MPLS Pseudo Wires.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS Pseudo Wire > Constraints.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS Pseudo Wires > Properties.
Result: The property windiow is shown.

See the following topic in this document: Details of a Pseudo Wire Constraint
(p. 16-79)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-78
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Details of a Pseudo Wire Constraint

....................................................................................................................................................................................................................................

Details of a Pseudo Wire Constraint


Attributes of a Pseudo Wire Constraint

The attributes displayed for each Pseudo Wire are:

User Label.

Parent Subnetwork.

Usage State (Idle, Busy).

Working State (Normal, Removing, Allocating, De-allocating, Implementing,


De-implementing).

Provisioning State (Defined, Allocated, Partially Implemented, Implemented).

Availability Status (Normal, Degraded, In failure).

Consistency State (Consistent, Not consistent, Not meaningful).

Comment.

Last Action Type.

Last Action Date.

Traffic Descriptor User Label.

....................................................................................................................................................................................................................................
1350 OMS
16-79
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

View the list of cross connections

....................................................................................................................................................................................................................................

View the list of cross connections


When to use

This function lists all cross connections of a Pseudo Wire.


Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS Pseudo Wire > Constraints.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS Pseudo Wires > Cross Connections.
Result: The list window is displayed.

See the following topic in this document: Description of the list of PW Cross
Connections (p. 16-81)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-80
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Description of the list of PW Cross Connections

....................................................................................................................................................................................................................................

Description of the list of PW Cross Connections


Attributes of a PW Cross Connection

The attributes displayed for each cross connection are:

NE User label used by the Pseudo Wire.

cross connection type (LER for the extremity or LSR).

Ingress Termination Identifier.

Ingress T-MPLS Label.

Egress Termination Identifier.

Egress T-MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS
16-81
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

View the Pseudo Wire extremities

....................................................................................................................................................................................................................................

View the Pseudo Wire extremities


When to use

This function gets information about extremities (origin and destination) of a Pseudo
Wire.
Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS Pseudo Wires > Extremities.
Result: The list window is displayed.

See the following topic in this document: Description of the list of PW Extremities
(p. 16-83)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-82
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Description of the list of PW Extremities

....................................................................................................................................................................................................................................

Description of the list of PW Extremities


Attributes of a PW Extremities

The attributes displayed are:

User Label.

NE User Label (A).

Termination User Label (A).

NE User Label (Z).

Termination User Label (Z).

....................................................................................................................................................................................................................................
1350 OMS
16-83
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

View the section inventory from Pseudo Wire

....................................................................................................................................................................................................................................

View the section inventory from Pseudo Wire


When to use

This function gets information about each T-MPLS section (and their states) contained in
the previously selected Pseudo Wire.
Related information

For information about Pseudo Wire, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS Pseudo Wires > T-MPLS Section Inventory.
choose one of the objects related to the tunnel:

Pseudo Wires crossing the T-MPLS tunnel.


Protection Groups involving the tunnel.
T-MPLS server sections.

Routing constraints associated to the tunnel.


Spare (working/protecting) tunnel in case of trail 1-to-1 protection.
Result: The list of the requested object is shown.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-84
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Description of the T-MPLS section Inventory

....................................................................................................................................................................................................................................

Description of the T-MPLS section Inventory


Attributes of a T-MPLS section Inventory

One of the objects related to the tunnel is shown:

Pseudo Wires crossing the T-MPLS tunnel.

Protection Groups involving the tunnel.


T-MPLS server sections.
Routing constraints associated to the tunnel.

Spare (working/protecting) tunnel in case of trail 1-to-1 protection.

....................................................................................................................................................................................................................................
1350 OMS
16-85
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

View the bandwidth load of Pseudo Wire

....................................................................................................................................................................................................................................

View the bandwidth load of Pseudo Wire


When to use

This function gets information about the bandwidth load of a Pseudo Wire.
Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS Pseudo Wires.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS section Bandwidth Load.


Result: The system displays:

the green-committed bandwidth = TU-CIR.


the green-reserved bandwidth used by all supported PWs = TU-reserved-CIR.
the yellow (peak minus committed) bandwidth = TU-PIR TU-CIR.
the yellow (peak minus reserved) bandwidth used by all supported PWs = TU-PIR
TU-reserved-CIR.
the overbooking ratio.
Note: The overbooking ratio is computed as the ratio between the yellow
bandwidth used by all supported PWs and the yellow bandwidth made available
by the tunnel.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-86
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

View the route of Pseudo Wires

....................................................................................................................................................................................................................................

View the route of Pseudo Wires


When to use

This function presents graphically all Pseudo Wires used by the previously selected
Pseudo Wire.
Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
commands on map

The following commands are available from the graphical view, depending on the
selected object and its position on the route:

With no selection: Begin of Route and End of Route commands highlights the NE
used for the beginning or the end of the route.
With a selected entity (NE, Pseudo Wire, ENE, Off page connector): Begin of Route
and End of Route commands are completed by other commands depending on the
selected entity.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS section Display Route.


Result: The Pseudo Wires used by the Pseudo Wire appear in blue.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-87
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

View the Pseudo Wires crossing a Pseudo Wire

....................................................................................................................................................................................................................................

View the Pseudo Wires crossing a Pseudo Wire


When to use

This function consists in listing the Pseudo Wires related to a previously selected Pseudo
Wire.
Related information

For information about Pseudo Wire, see: Overview about Pseudo Wires (p. 16-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > List Pseudo Wires.


Result: The list window is displayed.

See the following topic in this document: Description of the list of Pseudo Wires
(p. 16-89)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-88
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing Pseudo Wires (T-MPLS)

Description of the list of Pseudo Wires

....................................................................................................................................................................................................................................

Description of the list of Pseudo Wires


Attributes of a Pseudo Wire

The attributes displayed for each listed Pseudo Wire are:

Pseudo Wire User Label.

Pseudo Wire User Label.

T-MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS
16-89
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


T-MPLS tunnel schema

T-MPLS tunnel schema

....................................................................................................................................................................................................................................

T-MPLS tunnel schema


T-MPLS tunnel schema
Layering

Layering
Figure 16-6 Layering

Tunnel entities

Tunnel entities

....................................................................................................................................................................................................................................
1350 OMS
16-90
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


T-MPLS tunnel schema

T-MPLS tunnel schema

....................................................................................................................................................................................................................................

Figure 16-7 Tunnel entities

PW entities

PW entities

....................................................................................................................................................................................................................................
1350 OMS
16-91
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


T-MPLS tunnel schema

T-MPLS tunnel schema

....................................................................................................................................................................................................................................

Figure 16-8 PW entities

....................................................................................................................................................................................................................................
1350 OMS
16-92
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


T-MPLS tunnel schema

Ethernet Services in the T-MPLS Domain

....................................................................................................................................................................................................................................

Ethernet Services in the T-MPLS Domain


Generals on T-MPLS Ethernet services

The following considerations are valid for all Ethernet services built over one T-MPLS
domain:
in case of Virtual services, e.g. EVPLINE and EVPLAN, it is possible to share the same
UNI for more than one service
each T-MPLS transport link (PW) is dedicated to only one Ethernet service (EVC). The
hardware implementation is standard compliant (the FPGA inserts/strips the PW label at
the UNI in case of p2p connections)
there is no need to have a routing algorythm at the Ethernet layer over one T-MPLS
domain. In fact, one PW connects always two edge nodes and so routing is done at the
T-MPLS layer. The notable exception to this rule is the case of H-VPLS services, but in
that case routing at the Ethernet layer is again avoided since the operator has to specify
the VPLS core nodes
for scalability reasons, for all service types, all Ethernet flows belonging to the same
EVC termination must be transported over the same PW towards each remote EVC
termination. Specifically,
for point-to-point services: in case an EVC termination has multiple ingress Ethernet
flows, all flows must be mapped to the same PW; similarly, in case of multiple egress
flows, all flows must be (de)mapped from the same PW
for multipoint services: in case one EVC termination has multiple Ethernet ingress
flows, all flows must be mapped to only one PW dedicated to each remote destination;
similarly, in case of multiple egress flows, all flows must be (de)mapped from only one
PW for each remote source
POINT-TO-POINT EVC OVER T-MPLS - EVPL service

The EVPL EVC must be layered over two unidirectional T-MPLS PWs (uniformly or
diversely routed) if different bandwidth characteristics (traffic descriptors) are required
for the forward and backward directions.
All Ethernet flows that compose the EVC termination must be carried over the same PW.
PKT checks that the bandwidth parameters of the T-MPLS transport link satisfy the
bandwidth requirements of the associated ETS ingress flow:
- Max Flow PIR <= TL PIR
- Flow CIR <= TL CIR
- Max Flow PBS <= TL PBS
- Flow CBS <= TL CBS
PKT reserves the flows bandwidth on the TL in PKT database
: - TL reserved PIR = Max (Max flow PIR, flow CIR)
....................................................................................................................................................................................................................................
1350 OMS
16-93
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


T-MPLS tunnel schema

Ethernet Services in the T-MPLS Domain

....................................................................................................................................................................................................................................

- TL reserved CIR = flow CIR


- TL reserved PBS = Max (Max flow PBS, flow CBS)
- TL reserved CBS = flow CBS
POINT-TO-POINT EVC OVER T-MPLS - EPL service

The EPL service reserves the edge port (UNI) usage to only one service.
Other service constraints are
: - service frame disposition is only deliver unconditionally
- L2 CP processing is always tunnel except for PAUSE frames that are discarded
- policing mode of Ethernet flow is only color blind
- only guaranteed CoS of Ethernet flow is allowed
- no specific traffic classification is applied to the Ethernet flow
Apart from service characteristic values, the same management of the EVPL service
applies.
MULTI POINT-TO-MULTI POINT EVC OVER T-MPLS - EVPLAN service

The EVC contains a set of EVC terminations at the edge nodes. There is a set of core
PWs interconnecting a set of core nodes, in full-mesh modality. The core PWs are always
bidirectional. The core nodes are also edge nodes when they have EVC terminations.
All edge nodes are also core nodes and, in the top-down workflow, they are automatically
interconnected by the system with a full mesh of core PWs (top-down allocation phase).
In the bottom-up workflow, the operator has to manually select the full-mesh of core PWs
(bottom-up allocation phase).
If an edge node is not a core node, then it must be interconnected to one core node with
one unidirectional or bidirectional spoke PW for each EVC termination in the edge node.
A core node contains one Virtual Switch Instance (VSI). The VSI is a split-horizon
bridge, in the sense that no traffic egressing from one core PW is allowed to ingress
another core PW. An edge node contains at least one EVC termination.
The case where all EVC terminations are present in one single edge node is allowed.
The same UNI and the same tunnel infrastructure could be shared between different
services, point-to-point or multi-point services.
DUAL-HOMED EVPLINE SERVICES FOR HYBRID T-MPLS NETWORK

The management of hybrid ring-closure scenarios, requires the introduction of a the


Dual-Homed EVPLINE service type.
The Dual-Homed EVPLINE service is always bidirectional, while the infrastructure PWs
can be:
- bidirectional, in the hierarchical topology scenario
....................................................................................................................................................................................................................................
1350 OMS
16-94
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


T-MPLS tunnel schema

Ethernet Services in the T-MPLS Domain

....................................................................................................................................................................................................................................

- unidirectional, in the flat topology scenario


In the flat scenario, two unidirectional spoke PWs are associated to the same TSS40 EVC
termination.
Figure 16-9 DH EVPLINE infrastructure

....................................................................................................................................................................................................................................
1350 OMS
16-95
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


T-MPLS tunnel schema

Ethernet Services in the T-MPLS Domain

....................................................................................................................................................................................................................................

Broadband TeleVision (BTV) service

The BTV service is a rooted-multipoint service (aka bidirectional E-TREE service w/


packet replication) for video distribution from one root EVC termination towards many
leaf EVC terminations. The BTV traffic flows in the downstream direction for video
distribution, but it could need also upstream traffic for video channel selection.
It is needed to block traffic from leaf to leaf
Broadcast service

The broadcast service is a rooted-multipoint service (aka unidirectional E-TREE service


w/ packet replication) for traffic distribution from one root EVC termination towards
many leaf EVC terminations. The broadcast traffic flows only in the downstream
direction.
High-Speed Internet (HSI) service

The HSI service is a rooted-multipoint service (aka bidirectional E-TREE service w/o
packet replication), namely a service characterized by one EVC termination as root and
all other EVC terminations as leaves.
It allows connecting one main site with many remote sites of the same customer
(back-hauling) or one main site with many remote sites associated to different customers
(broadband access).
The HSI traffic flows both in the root to leaf direction (downstream) and in the leaf to
root direction (upstream). The downstream and upstream directions have usually different
bandwidth characteristics.
The features are:
- it is possible to have different bandwidth characteristics for downstream and upstream
traffic
- there is no need to replicate packets originated by the root termination towards more
than one leaf termination

....................................................................................................................................................................................................................................
1350 OMS
16-96
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

T-MPLS tunnel description

....................................................................................................................................................................................................................................

Managing T-MPLS tunnels


T-MPLS tunnel description
Tunnel definition

Tunnels are point-to-point logical connections between NNI ports. The tunnel route spans
one or more T-MPLS sections.
The same tunnel can carry one or more PW. The tunnel purpose is to enhance scalability
of T-MPLS logical connections.
Tunnels as LSPs

Tunnels are Label Switched Paths (LSP). The Tunnel terminations correspond to:

A label Push at the ingress LER.

Aa label Pop at the egress LER.

T-MPLS manages the T-MPLS tunnel creation in the database, requested by user
(bottom-up approach) or by PW creation (top-down approach). The T-MPLS Tunnel, or
T-MPLS Path, is a logical entity that represents point-to-point connections between NNI
ports. The tunnel route can span one or more T-MPLS sections or one or more underlying
tunnels. The T-MPLS tunnel is an example of Label Switched Path (LSP).
Purpose of the tunnel

The tunnel purpose is to enhance the scalability of T-MPLS logical connections. The
tunnel can carry one or more client services (PW), it can be involved in a protection
schema (linear colon, linear plus, or MPLS Ring).
The tunnel supports OAM capabilities: the user can instantiate and enable the
Maintenance End Points (MEPs) on tunnels terminations.
System configuration of the tunnel

The system is able to configure a tunnel between NNI ports belonging to contiguous
T-MPLS domains using only the sections present in T-MPLS DB. A tunnel cannot be
created using other underlying tunnels. Only E-LSP tunnels are supported.
User creation of the tunnel

The tunnel creation can be performed by the operator using the T-MPLS GUI or
automatically during a client service definition. When creating the tunnel, the operator
can fully specify the tunnel route by means of section constraints or can specify only the
end NNI ports with, optionally, a partial or complete list of section constraints. The tunnel
creation is an operation that defines the tunnel and reserves the resources in T-MPLS DB.

....................................................................................................................................................................................................................................
1350 OMS
16-97
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

T-MPLS tunnel description

....................................................................................................................................................................................................................................

When creation fails

If the operation fails, the tunnel is put in defined state with working state
failedToAllocate value and the system notifies the cause of the failure. While in
defined state, the operator can remove the tunnel or modify the input parameters (edge
points, section constraints, and so on) and perform again the creation.
Successful creation

If the creation completes successfully the tunnel is in allocated state. Tunnel creation is
the same for static, dynamic, and mixed tunnels. In all cases, the system is required to
compute the tunnel nominal route. The static case and the dynamic case differ only in the
way the nominal route is provisioned.

....................................................................................................................................................................................................................................
1350 OMS
16-98
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

View the list of T-MPLS tunnels

....................................................................................................................................................................................................................................

View the list of T-MPLS tunnels


When to use

The T-MPLS tunnel List window presents all the T-MPLS tunnels and their attributes.
Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS.


Result: The T-MPLS menu is displayed.
...................................................................................................................................................................................................

Select: T-MPLS tunnel.


Result: The T-MPLS tunnel list is displayed.

See the following topic in this document: Description of the list of T-MPLS tunnels
(p. 16-100)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-99
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Description of the list of T-MPLS tunnels

....................................................................................................................................................................................................................................

Description of the list of T-MPLS tunnels


Attributes of a T-MPLS tunnel

The attributes displayed for each T-MPLS tunnel are:

User Label.

Working State (Normal, Removing, Allocating, De-allocating, Implementing,


De-implementing).

Last Action.

Configuration State (Idle, Busy).

Operational State (Idle, Busy).

Alarm Status (Normal, Degraded, In failure).

Flow (Idle, Busy).

Protection Role (Working, Protecting).

Protection Status (Working, Protecting).

Provisioning Type (Defined, Allocated, Partially Implemented, Implemented).

Cration date.

CIR.

PIR.

CBS.

PBS.

Reserved CIR.

A Port ID.

Z Port ID.

A Port.

Z Port.

....................................................................................................................................................................................................................................
1350 OMS
16-100
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Create a T-MPLS tunnel

....................................................................................................................................................................................................................................

Create a T-MPLS tunnel


When to use

This function manages T-MPLS tunnel creation and allocation.


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
creation phase

The system perform the following actions:

The system checks that the section constraints describe a fully connected route
between the end nodes.
The system checks that the tunnel PHB profile is supported by the domain Egress
PHB Profile.
The system defines the tunnel and updates the T-MPLS DB allocating the tunnel
along the section constraints.
If the operator does not specify the bandwidth parameters, the system creates the
tunnel with associated null TD (PIR=CIR=0 and PBS=CBS=0 ).
If the operator does not constrain the underlying Virtual Transport (by means of VT
parameter), the system allocates the tunnel on the default VT.

The reserved CIR parameter is always equal to the TD CIR parameter, except when an
allocated PWs is over one implemented tunnel. In such case, the tunnel reserved CIR
represents the CIR required to support the PW committed bandwidth, while the TD CIR
represents the committed bandwidth of the implemented tunnel.
When the supported PWs are implemented, TD CIR is enlarged to match the reserved
CIR. If the PWs are deallocated, the reserved CIR is reduced down to the TD CIR value.
The alarms enabling rule tells if the alarm correlation for this tunnel is enabled or not. It
tells also when the correlation has been enabled, either at tunnel implementation or
subsequently by manual enabling command. In case of alarms enabling-onimplementation or manual-enabling, the system creates MEPs with default values. The
user is also allowed to set MEP attribute values.
The PM enabling rule tells whether the performance monitoring for this tunnel is started
or not. It tells also when the monitoring has been enabled, either at tunnel implementation
or subsequently by manual start command. In case of PM enabling-on-implementation
or manual-enabling after the implementation, the operator has also to specify the
granularity of the measures to be started.
The routing constraints are specified in terms of underlying T-MPLS sections. With VT
management, the constraint can also be further refined selecting the VT logical
connection over the selected T-MPLS section. The association between Tunnel and VT is
provisioned by means of TL1.

....................................................................................................................................................................................................................................
1350 OMS
16-101
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Create a T-MPLS tunnel

....................................................................................................................................................................................................................................

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The User Label must be different as one which is exists.

The user must define the complete route of T-MPLS tunnel in terms of section
constraints.
If the user does not define the tunnel route, tunnel is created in defined state.
Note: In this version, a tunnel cannot be created using other underlying tunnels. Only
E-LSP tunnels are supported.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS > Create T-MPLS tunnel.
Result: The T-MPLS tunnel creation wizard is displayed.

To create a T-MPLS tunnel, the user specify:


T-MPLS tunnel User label.
PHB Profile (optional).
Direction (bidirectional, unidirectional).

Alarms enabling rule (no-enabling, manual-enabling, enabling-onimplementation).

PM enabling rule (no-enabling, manual-enabling, enabling-onimplementation).

Protection level (unprotected, trail-1-to-1, full-restoration).

Edge points (end NNI ports).

Routing constraints (optionally).

PIR.

Reserved CIR.

PBS.

CBS.

Bandwidth parameters (optionally)

...................................................................................................................................................................................................

Click Ok.

....................................................................................................................................................................................................................................
1350 OMS
16-102
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Create a T-MPLS tunnel

....................................................................................................................................................................................................................................

Result: If the operation completes without errors the final tunnel state is allocated;
otherwise. the state is defined with workingState equal to failedToAllocate.

The Usage state of T-MPLS tunnel changes to busy when the T-MPLS tunnel
supports at least one T-MPLS section.
Then, the tree area, opened graphical views and the T-MPLS tunnel List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-103
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Modify a T-MPLS tunnel

....................................................................................................................................................................................................................................

Modify a T-MPLS tunnel


When to use

The function modifies T-MPLS tunnel characteristics


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
The T-MPLS tunnel modification gives the possibility to modify:

T-MPLS tunnel User Label.

Comment.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different as one which is
already used by another T-MPLS tunnel.
If the provisioning state of the T-MPLS tunnel is Defined and usage state is Idle,
the Traffic Descriptor associated to the T-MPLS tunnel is modifiable.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS tunnel > Modify.


Result: The T-MPLS tunnel modification window is displayed.
...................................................................................................................................................................................................

To modify a T-MPLS tunnel:

Enter a new User Label (optional).

Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
16-104
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Modify a T-MPLS tunnel

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select OK.
Result: After confirmation, the tree area and the T-MPLS tunnel list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-105
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Delete a T-MPLS tunnel

....................................................................................................................................................................................................................................

Delete a T-MPLS tunnel


When to use

This function consists in deleting a T-MPLS tunnel.


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The selected T-MPLS tunnel must be set toAllocated or Defined.

The selected T-MPLS tunnel must not support allocated nor implemented Pseudo
Wires.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Packet > T-MPLS tunnels > Delete or Click the third key of the mouse
and select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, if concerned T-MPLS tunnel is associated to a Traffic
Descriptor, a disassociation is automatically done and the T-MPLS tunnel is removed.

Then T-MPLS tunnel list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-106
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

View the details of the T-MPLS tunnels

....................................................................................................................................................................................................................................

View the details of the T-MPLS tunnels


When to use

This function gets information about a T-MPLS tunnel.


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > T-MPLS tunnels > Properties.


Result: The property window is displayed.

See the following topic in this document: Details of a T-MPLS tunnel (p. 16-108)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-107
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Details of a T-MPLS tunnel

....................................................................................................................................................................................................................................

Details of a T-MPLS tunnel


Attributes of a T-MPLS tunnel

The attributes displayed for each T-MPLS tunnel are:

User Label.

Parent Subnetwork.

Usage State (Idle, Busy).

Working State (Normal, Removing, Allocating, De-allocating, Implementing,


De-implementing).

Provisioning State (Defined, Allocated, Partially Implemented, Implemented).

Availability Status (Normal, Degraded, In failure).

Consistency State (Consistent, Not consistent, Not meaningful).

Comment.

Last Action Type.

Last Action Date.

Traffic Descriptor User Label.

....................................................................................................................................................................................................................................
1350 OMS
16-108
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Configuration of the route of a T-MPLS tunnel

....................................................................................................................................................................................................................................

Configuration of the route of a T-MPLS tunnel


When to use

This function consists in adding/removing sections as constraint to a T-MPLS tunnel.


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
PKT starts the reroute operation and reallocates the tunnel along a new route that satisfies
the updated list of constraints.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The T-MPLS tunnel must be allocated.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS tunnel > Add Constraints.
Result: To add a new T-MPLS tunnel constraint:

Enter the User Label of the Pseudo Wire.

Enter a T-MPLS Label (optional) by using the sensitive help.

...................................................................................................................................................................................................

Select OK.

....................................................................................................................................................................................................................................
1350 OMS
16-109
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Configuration of the route of a T-MPLS tunnel

....................................................................................................................................................................................................................................

Result: After confirmation, the T-MPLS tunnel constraint is added at the end of the
constraint list as the last one of the route.

Then, the T-MPLS tunnel Constraint List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-110
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Delete a constraint from a T-MPLS tunnel

....................................................................................................................................................................................................................................

Delete a constraint from a T-MPLS tunnel


When to use

This function consists in deleting one constraint related to a T-MPLS tunnel.


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
PKT starts the reroute operation and reallocates the tunnel along a new route that satisfies
the updated list of constraints.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected T-MPLS tunnel must be Defined.

The working state must be Normal (that is, no operation is running on it).

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS > T-MPLS tunnels > Constraints.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > T-MPLS tunnels > Delete.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS
16-111
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Delete a constraint from a T-MPLS tunnel

....................................................................................................................................................................................................................................

Result: After confirmation, the T-MPLS tunnel constraints are deleted and the
T-MPLS tunnel Constraint List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-112
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Configuration of PHB profile of a T-MPLS tunnel

....................................................................................................................................................................................................................................

Configuration of PHB profile of a T-MPLS tunnel


When to use

This function consists in adding/removing PHB Profile to a T-MPLS tunnel.


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
For information about LSP PHB profiles, see: Overview about PHB profile management
(p. 16-5).
The operator selects the previously created PHB profile on domain basis to be associated
with that tunnel CTP.
PKT associates the new PHB to the CTP in database. If the tunnel is implemented, PKT
creates automatically the new Node-PHB in the node and deletes the previously
associated one. If the old Node-PHB must not be used by any other tunnel. PKT checks
that the tunnel does not support any PW, since the operation requires tunnel deactivation
and reactivation.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The T-MPLS tunnel must not support any Pseudo Wire.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS tunnel > tunnel CTP.

....................................................................................................................................................................................................................................
1350 OMS
16-113
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Configuration of PHB profile of a T-MPLS tunnel

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS tunnel CTP > Add PHB Profile.
...................................................................................................................................................................................................

Select OK.
Result: The profile is added to tunnel.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-114
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Configuration of Layer-2 encapsulation of a tunnel

....................................................................................................................................................................................................................................

Configuration of Layer-2 encapsulation of a tunnel


When to use

This function consists in adding/removing Layer-2 encapsulation Profile to a T-MPLS


tunnel.
Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
The operator selects the previously created PHB profile on domain basis to be associated
with that tunnel CTP.
PKT associates the new PHB to the CTP in database. If the tunnel is implemented, PKT
creates automatically the new Node-PHB in the node and deletes the previously
associated one. The old Node-PHB must not be used by any other tunnel. PKT checks
that the tunnel does not support any PW, since the operation requires tunnel deactivation
and reactivation.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The T-MPLS tunnel must not support any Pseudo Wire.


Underlying layer of the T-MPLS Port is MAU.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS tunnel > tunnel CTP.

....................................................................................................................................................................................................................................
1350 OMS
16-115
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Configuration of Layer-2 encapsulation of a tunnel

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS tunnel CTP > Add PHB Profile.
...................................................................................................................................................................................................

Select OK.
Result: The profile is added to the tunnel CTP.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-116
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Allocate T-MPLS tunnel

....................................................................................................................................................................................................................................

Allocate T-MPLS tunnel


When to use

This operation is performed when the user wants to find a path route between the two
extremities of a T-MPLS tunnel.
Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
route

Before the allocation operation, the user has given a complete path route in term of
constraints (T-MPLS Pseudo Wire List). Constraints can optionally be associated with the
T-MPLS Labels. See Add a constraint to an LSP tunnel (p. 15-56).
The 1350 OMS PKT checks the continuity of the route.
If the T-MPLS tunnel is only one, the route is already defined. In this case, the constraint
List is not mandatory. The Pseudo Wire is identified by the T-MPLS tunnel extremities
given during the definition. Even not mandatory, it can be useful for the user to gives a
specific T-MPLS label.
If the user gives a T-MPLS Label in the constraint list, the system checks the availability
of the T-MPLS Label. If the T-MPLS Label. is used by another T-MPLS tunnel or
T-MPLS section, 1350 OMS PKT chooses and reserves automatically an available
T-MPLS label.
bandwidth

The system calculates the effective bandwidth of the T-MPLS tunnel according to the
associated Traffic Descriptor (see the table).
Each T-MPLS Pseudo Wire of the given route must provide the effective bandwidth of the
T-MPLS tunnel. Available Bandwidth of Pseudo Wire is greater than or equal to Effective
bandwidth of T-MPLS tunnel.
Traffic contract type.

Effective bandwidth reserved on Pseudo Wire.

Best Effort.

0 1.

Assured Forwarding.

CIR.

Expedited Forwarding.

CIR.

Notes:

1.

In the case Best Effort traffic contract, no effective bandwidth is reserved. In this case, for
each Pseudo Wire, a maximum number of Best Effort T-MPLS tunnel is checked.

For all traffic contract, CIR must be less than or equal to PIR and PIR must be less than or
equal to Pseudo Wire Total bandwidth.

....................................................................................................................................................................................................................................
1350 OMS
16-117
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Allocate T-MPLS tunnel

....................................................................................................................................................................................................................................

allocation phase

The T-MPLS tunnel is allocated:

LSP links along the route used by the T-MPLS tunnel are created, referenced by a
T-MPLS Label of each crossed Pseudo Wire.
T-MPLS Label of each involved Pseudo Wire is reserved to the T-MPLS tunnel.
T-MPLS tunnel cross connections are generated.
Bandwidth of each Pseudo Wire (used and available bandwidths) is computed in the

used direction.
If the Usage State of each T-MPLS Pseudo Wire used by the T-MPLS tunnel is idle,
the state changes to busy.

tunnel states

The T-MPLS tunnel is also updated with the following states:

Provisioning State: Allocated.

Working State: Normal.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected T-MPLS tunnel must be set to Defined.

The working state must be set to Normal (if not, an operation is running on it).

The T-MPLS tunnel must be associated to a Traffic Descriptor.


The constraints on the T-MPLS tunnel have been previously added (except for unitary
T-MPLS tunnel).

The T-MPLS sections defined as constraints are contiguous.


The constraint lists must be compliant with the T-MPLS tunnel extremities.
The maximum number of Best Effort T-MPLS tunnel for each Pseudo Wire is not
reached.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.

....................................................................................................................................................................................................................................
1350 OMS
16-118
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Allocate T-MPLS tunnel

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > T-MPLS tunnels > Allocate.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: At the beginning of the operation, the T-MPLS tunnel Working state is set to
Allocated. Then, the T-MPLS tunnel List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-119
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

De-allocate T-MPLS tunnel

....................................................................................................................................................................................................................................

De-allocate T-MPLS tunnel


When to use

This operation allows to the user to de-allocate a T-MPLS tunnel.


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
deallocation phase

The 1350 OMS PKT retrieves all T-MPLS Pseudo Wires used by the T-MPLS tunnel. It
updates for each of them available and used bandwidths for the used direction. It frees the
involved T-MPLS Labels.
The LSP links and the LSP cross connections are also retrieved and deleted.
The T-MPLS tunnel is de-allocated:

Bandwidth of each Pseudo Wires used by the T-MPLS tunnel are updated.

If no more T-MPLS tunnel is carried, the Usage State of Pseudo Wires used by the
T-MPLS tunnel is changed to idle.
T-MPLS Label of each Pseudo Wire involved in LSP links is released.

The T-MPLS tunnel is also updated with the following states:

Provisioning State: Defined.

Working State: Normal.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected T-MPLS tunnel must be set to Allocated.

The working state must be set to Normal (if not, an operation is running on it).

The T-MPLS tunnel state is not busy.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.

....................................................................................................................................................................................................................................
1350 OMS
16-120
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

De-allocate T-MPLS tunnel

....................................................................................................................................................................................................................................

Result: The list window is shown.


...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > T-MPLS > T-MPLS tunnels > Deallocate.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the T-MPLS tunnel working state is set to Defined.

Then, the T-MPLS tunnel List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-121
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Implement a T-MPLS tunnel

....................................................................................................................................................................................................................................

Implement a T-MPLS tunnel


When to use

This function implements a T-MPLS tunnel.


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Implementation phase

The tunnel provisioning can be static, dynamic, or mixed. Static means that the tunnel is
provisioned directly by NMS. Dynamic means that the tunnel is provisioned through
control plane. In mixed provisioning, PKT manages the tunnel creation and activation,
partially in the data plane and partially in the control plane.
Each NE involved in the T-MPLS tunnel is provisioned as following:

If does not exit in the NE, Traffic Descriptor is created.


The LER connections and the LSR connections are added to the NE.
Extremities are activated.

If tunnel alarm enabling rule is on-implementation MEPs are automatically created and
activated on tunnel terminations at this stage.
If tunnel PM enabling rule is on-implementation, PM counting is automatically started
on tunnel terminations at this stage.
If at tunnel creation time the operator specified one PHB profile (selecting from a
portfolio of profiles available on domain basis) different from default, PKT automatically
implements the corresponding Node-PHB profiles on all tunnel segments. Similarly,
based on the tunnel bandwidth parameters, PKT automatically creates in each crossed NE
the corresponding TD.
If the tunnel uses an adaptive VT, PKT automatically configures VT bandwidth as
follows:

VT Reserved CIR = Sum (LSP CIR), where the sum spans all allocated and
implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
VT CIR = Sum (LSP CIR), where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, including current tunnel.
VT PIR = Max (LSP PIR), where the max is computed for all implemented LSP
(tunnel or PW) directly supported by the VT, including current tunnel.

tunnel states

The T-MPLS tunnel is updated with the following states:

Provisioning State: Implemented (or Partially Implemented).

Working State: Normal.

Availability Status: Normal (or Degraded or In Failure).

....................................................................................................................................................................................................................................
1350 OMS
16-122
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Implement a T-MPLS tunnel

....................................................................................................................................................................................................................................

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The selected T-MPLS tunnel must be set to Allocated.

The working state must be set to Normal.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Action > Packet > T-MPLS > T-MPLS tunnel > Implement.
...................................................................................................................................................................................................

Select OK.
Result: After implementation, the T-MPLS tunnel List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-123
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

De-implement a T-MPLS tunnel

....................................................................................................................................................................................................................................

De-implement a T-MPLS tunnel


When to use

This function consists in de-implementing a T-MPLS tunnel to remove the tunnel from
the network.
Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Deimplementation phase

PKT manages the static tunnel removal from the data plane, dynamic tunnel removal
from the control plane, or both.
If the tunnel were using a dedicated Node-PHB profile, the profile is automatically
deleted from the NE. If the tunnel were using a dedicated TD, the TD is automatically
deleted from the NE.
If the tunnel uses an adaptive VT, PKT automatically reconfigures VT bandwidth as
follows:

VT Reserved CIR = Sum (LSP CIR), where the sum spans all allocated and
implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
VT CIR = Sum (LSP CIR), where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, excluding current tunnel.
VT PIR = Max (LSP PIR), where the max is computed for all implemented LSP
(tunnel or PW) directly supported by the VT, excluding current tunnel.

Tunnel states

The user chooses a T-MPLS tunnel and requests its de-implementation. After operation,
then the working state is set to de-implementing and no traffic can be carried by it.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the selected T-MPLS tunnel must be set to Implemented
or Partially implemented.
The T-MPLS tunnel must carry no implemented T-MPLS Pseudo Wires.

....................................................................................................................................................................................................................................
1350 OMS
16-124
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

De-implement a T-MPLS tunnel

....................................................................................................................................................................................................................................

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > T-MPLS tunnels > De-Implement.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The user chooses a T-MPLS tunnel and requests its de-implementation then
working state is set to allocated and no traffic could be carried by it.

After de-implementation, the T-MPLS tunnel List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-125
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

List the constraints of a T-MPLS tunnel

....................................................................................................................................................................................................................................

List the constraints of a T-MPLS tunnel


When to use

This function lists the T-MPLS sections acting as constraints for the selected T-MPLS
tunnel.
Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The T-MPLS tunnel must be allocated.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS tunnels > Constraints.


Result: The list window is displayed.

See the following topic in this document: Description of the list of T-MPLS tunnel
Constraints (p. 16-127)
Only routing constraints created by operator are displayed to the UI.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-126
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Description of the list of T-MPLS tunnel Constraints

....................................................................................................................................................................................................................................

Description of the list of T-MPLS tunnel Constraints


Attributes of a T-MPLS tunnel Constraint

The attributes displayed for each constraint are:

User label.

HOPLIST-ID.

PATH-ID.

HOP-ID.

Hop-Ip-Address.

Hop Port AID.

Label in.

Label out.

Include mode.

Loose mode.

Explicit mode.

Note: Only routing constraints created by operator are displayed to the UI.

....................................................................................................................................................................................................................................
1350 OMS
16-127
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

View the details of the T-MPLS tunnel constraints

....................................................................................................................................................................................................................................

View the details of the T-MPLS tunnel constraints


When to use

This function gets information about a constraint of a T-MPLS tunnel.


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS > T-MPLS tunnels > Constraints.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > T-MPLS tunnels > Properties.


Result: The property window is displayed.

See the following topic in this document: Details of a T-MPLS tunnel Constraint
(p. 16-129)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-128
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Details of a T-MPLS tunnel Constraint

....................................................................................................................................................................................................................................

Details of a T-MPLS tunnel Constraint


Attributes of a T-MPLS tunnel Constraint

The attributes displayed for each constraint are:

User label.

HOPLIST-ID.

PATH-ID.

HOP-ID.

Hop-Ip-Address.

Hop Port AID.

Label in.

Label out.

Include mode.

Loose mode.

Explicit mode.

....................................................................................................................................................................................................................................
1350 OMS
16-129
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

View the list of cross connections

....................................................................................................................................................................................................................................

View the list of cross connections


When to use

This function lists all cross connections of a T-MPLS tunnel.


Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select: Search > Packet > T-MPLS tunnels > Constraints.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Search > T-MPLS tunnels > Cross Connections.


Result: The list window is displayed.

See the following topic in this document: Description of the list of T-MPLS tunnel
Cross Connections (p. 16-131)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-130
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Description of the list of T-MPLS tunnel Cross Connections

....................................................................................................................................................................................................................................

Description of the list of T-MPLS tunnel Cross Connections


Attributes of a Cross Connection

The attributes displayed for each cross connection are:

NE User label used by the T-MPLS tunnel.

cross connection type (LER for the extremity or LSR).

Ingress Termination Identifier.

Ingress T-MPLS Label.

Egress Termination Identifier.

Egress T-MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS
16-131
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

View the T-MPLS tunnel extremities

....................................................................................................................................................................................................................................

View the T-MPLS tunnel extremities


When to use

This function gets information about extremities (origin and destination) of a T-MPLS
tunnel.
Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Action > T-MPLS tunnels > Extremities.


Result: The list window is displayed.

See the following topic in this document: Description of the list of T-MPLS tunnel
Extremities (p. 16-133)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-132
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Description of the list of T-MPLS tunnel Extremities

....................................................................................................................................................................................................................................

Description of the list of T-MPLS tunnel Extremities


Attributes of a T-MPLS tunnel Extremity

The attributes displayed are:

User Label.

NE User Label (A).

Termination User Label (A).

NE User Label (Z).

Termination User Label (Z).

....................................................................................................................................................................................................................................
1350 OMS
16-133
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

View the section inventory from T-MPLS tunnel

....................................................................................................................................................................................................................................

View the section inventory from T-MPLS tunnel


When to use

This function gets information about each T-MPLS section (and their states) contained in
the previously selected T-MPLS tunnel.
Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS section Inventory.
choose one of the objects related to the tunnel:

Pseudo Wires crossing the T-MPLS tunnel.

Protection Groups involving the tunnel.

Server T-MPLS sections.

Routing constraints associated to the tunnel.

Spare tunnel (working/protecting) in case of trail-1-to-1 protection.


Result: The list of the requested object is shown.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-134
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Description of the Inventory of sections

....................................................................................................................................................................................................................................

Description of the Inventory of sections


Attributes of a sections

Oone of the objects related to the section is shown:

Pseudo Wires crossing the T-MPLS tunnel.

Protection Groups involving the tunnel.

Server T-MPLS sections.

Routing constraints associated to the tunnel.

Spare tunnel (working/protecting) in case of trail-1-to-1 protection.

....................................................................................................................................................................................................................................
1350 OMS
16-135
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

View the bandwidth load of T-MPLS tunnel

....................................................................................................................................................................................................................................

View the bandwidth load of T-MPLS tunnel


When to use

This function gets information about the bandwidth load of a T-MPLS tunnel.
Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS sections.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS section inventory.


Result: The list window is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-136
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

View the route of T-MPLS tunnels

....................................................................................................................................................................................................................................

View the route of T-MPLS tunnels


When to use

This function presents graphically all Pseudo Wires used by the previously selected
T-MPLS tunnel.
Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
commands on map

The following commands are available from the graphical view, depending on the
selected object and its position on the route:

With no selection: Begin of Route and End of Route commands highlights the NE
used for the beginning or the end of the route.
With a selected entity (NE, Pseudo Wire, ENE, Off page connector): Begin of Route
and End of Route commands are completed by other commands depending on the
selected entity.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS section Display Route.
Result: The Pseudo Wires used by the T-MPLS tunnel appears in blue.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-137
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

View the Pseudo Wires crossing a T-MPLS tunnel

....................................................................................................................................................................................................................................

View the Pseudo Wires crossing a T-MPLS tunnel


When to use

This function consists in listing the Pseudo Wires related to a previously selected T-MPLS
tunnel.
Related information

For information about T-MPLS tunnel, see: T-MPLS tunnel description (p. 16-97).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

Select one item in the list.


...................................................................................................................................................................................................

Select Search > Packet > List Pseudo Wires.


Result: The list window is displayed.

See the following topic in this document: Description of the list of Pseudo Wires
(p. 16-139)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-138
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Managing T-MPLS tunnels

Description of the list of Pseudo Wires

....................................................................................................................................................................................................................................

Description of the list of Pseudo Wires


Attributes of a Pseudo Wire

The attributes displayed for each listed Pseudo Wire are:

T-MPLS tunnel User Label.

Pseudo Wire User Label.

T-MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS
16-139
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Tunnel protection create

....................................................................................................................................................................................................................................

Tunnel protection
Tunnel protection create
When to use

The scope of this procedure is to create a protection for a T-MPLS Tunnel.


Related Information

All needed conditions are detailed along the procedure


Before you begin

Tunnels MAIN and SPARE have been created separately, with same origin/destination
and same values of transmission parameters.

....................................................................................................................................................................................................................................
1350 OMS
16-140
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Tunnel protection create

....................................................................................................................................................................................................................................

Task
...................................................................................................................................................................................................

Select the Tunnel MAIN and issue Actions>T-MPLS Tunnel Protection Management
Figure 16-10 Tunnel MAIN: Actions>T-MPLS Tunnel Protection Management

...................................................................................................................................................................................................

The T-MPLS Tunnel Protection Management box is displayed. The working tunnel is
already selected. Select the protecting tunnel. Select hold-off time and reverting time.

....................................................................................................................................................................................................................................
1350 OMS
16-141
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Tunnel protection create

....................................................................................................................................................................................................................................

Click on Apply.
Figure 16-11 T-MPLS Tunnel Protection Management

...................................................................................................................................................................................................

Display the tunnel list via command Search>Packet>T-MPLS>T-MPLS Tunnels


Note: the Protection Role of tunnel MAIN is now Working and the Protection Role of
tunnel SPARE is now Protecting.

....................................................................................................................................................................................................................................
1350 OMS
16-142
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Tunnel protection create

....................................................................................................................................................................................................................................

The Protection State of tunnel SPARE is now Activeand the Protection State of tunnel
SPARE is now StandBy.
Figure 16-12 T-MPLS tunnel list

...................................................................................................................................................................................................

Select the MAIN or the Spare T-MPLS tunnel and issue Search>Routing display
Figure 16-13 T-MPLS tunnel: Search>Routing display

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-143
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

T-MPLS Routing display

....................................................................................................................................................................................................................................

T-MPLS Routing display


When to use

The scope of this procedure is to show the T-MPLS Tunnel Routing display
Related Information

All needed conditions are detailed along the procedure


Before you begin

All needed conditions are detailed along the procedure


Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > T-MPLS > T-MPLS Tunnels.
Figure 16-14 Search>Packet>T-MPLS>T-MPLS>Tunnels

....................................................................................................................................................................................................................................
1350 OMS
16-144
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

T-MPLS Routing display

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select a T-MPLS tunnel from the displayed list, with the right mouse button, display the
popup Actions menu
Figure 16-15 T-MPLS tunnel: Actions menu

....................................................................................................................................................................................................................................
1350 OMS
16-145
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

T-MPLS Routing display

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the T-MPLS tunnel Action popup menu select : Search > Routing display
Figure 16-16 T-MPLS tunnel: Search>Routing display

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-146
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Tunnel switch commands

....................................................................................................................................................................................................................................

Tunnel switch commands


When to use

The scope of this procedure is to manage Tunnel switch commands.


Related Information

All needed conditions are detailed along the procedure


Before you begin

All needed conditions are detailed along the procedure


Task
...................................................................................................................................................................................................

T-MPLS Protection Group Properties are shown below.


Figure 16-17 T-MPLS Protection Group

....................................................................................................................................................................................................................................
1350 OMS
16-147
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Tunnel switch commands

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the T-MPLS Protection Group (Tunnel Switch) you can open the Actions menu
Figure 16-18 Tunnel Switch: Actions

....................................................................................................................................................................................................................................
1350 OMS
16-148
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Tunnel switch commands

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the protecting Tunnel and issue Actions > Remove Protection (keeping Main)
Figure 16-19 Tunnel:Actions>Remove Protection(keeping Main)

...................................................................................................................................................................................................

After the remove protection the routing display changes view accordingly.
Figure 16-20 Spare tunnel routing display

....................................................................................................................................................................................................................................
1350 OMS
16-149
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Tunnel switch commands

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Both protection role and protection state of the two tunnels are don't care.
Figure 16-21 Don't care protection role and protection state

....................................................................................................................................................................................................................................
1350 OMS
16-150
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Tunnel switch commands

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Main tunnel routing display is shown below.


Figure 16-22 Main tunnel routing display

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-151
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Other info on T-MPLS routing display

....................................................................................................................................................................................................................................

Other info on T-MPLS routing display


When to use

The scope of this procedure is to show other info on T-MPLS routing display
Related Information

All needed conditions are detailed along the procedure


Before you begin

All needed conditions are detailed along the procedure


Task
...................................................................................................................................................................................................

Select the T-MPLS Node PHB Profile and issue Properties.


Figure 16-23 T-MPLS Node PHB Profile

....................................................................................................................................................................................................................................
1350 OMS
16-152
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Other info on T-MPLS routing display

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the T-MPLS Node Traffic Descriptor and issue Properties.


Figure 16-24 T-MPLS Node Traffic Descriptor

....................................................................................................................................................................................................................................
1350 OMS
16-153
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Other info on T-MPLS routing display

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select T-MPLS Segment and issue Properties.


Figure 16-25 T-MPLS Segment

....................................................................................................................................................................................................................................
1350 OMS
16-154
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel protection

Other info on T-MPLS routing display

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

select the T-MPLS Port and issue properties.


Figure 16-26 T-MPLS Port

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-155
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


MAC Flushing Protection

Overview

....................................................................................................................................................................................................................................

MAC Flushing Protection


Overview
Purpose

User is able to create, configure, and delete MAC flushing protection schemes in a
TMPLS domain.
Contents
MAC flushing protection description

16-157

MAC flushing protection creation

16-158

MAC flushing protection list

16-160

Attributes of MAC-flushing protection

16-161

Interconnection Scheme list

16-162

Attributes of Interconnection Schemes

16-163

TMPLS EVC: Force MAC flushing

16-164

....................................................................................................................................................................................................................................
1350 OMS
16-156
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


MAC Flushing Protection

MAC flushing protection description

....................................................................................................................................................................................................................................

MAC flushing protection description


Description

The MAC flushing protection operates at Ethernet layer


The NE types that can be selected for participating to MAC flushing protection are the
following:

TSS320/160 since R3.2


TSS100 since R4.0

Configuration of MAC flushing protection on TMPLS domain


PKT supports the MAC flushing topology configuration. The operator may add/remove
interconnection schemes from the MAC flushing protection. When removing one
interconnection scheme, PKT checks that the interconnection scheme is not used by any
EVC.

....................................................................................................................................................................................................................................
1350 OMS
16-157
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


MAC Flushing Protection

MAC flushing protection creation

....................................................................................................................................................................................................................................

MAC flushing protection creation


When to use

The function creates a MAC flushing protection PKT defining protection schemes in a
TMPLS domain.
Related Information

For more information, refer to:MAC flushing protection description (p. 16-157).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > Services > Ethernet over T-MPLS > Create MAC Flushing
Protection.
Result: The Create MAC Flushing Protection wizard is shown.
...................................................................................................................................................................................................

For each interconnection scheme, the user specifies:

User Label

Domain

Interconnection Type. (SNI, DNI, DPI).

The Interconnection Type is SNI when only one port is involved; it is DNI when two
ports on two different nodes are involved; it is DPI when two ports on the same node
are involved.

The involved T-MPLS Node

For each Node, the involved Port(s). The Port can be UNI or NNI. A port can be
involved in only one interconnection scheme and in only one MAC flushing
protection.
Click Add Schema

Result: The Protection Schemes window is updated.


...................................................................................................................................................................................................

At the end of Protection Schemes creation, Click OK.

....................................................................................................................................................................................................................................
1350 OMS
16-158
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


MAC Flushing Protection

MAC flushing protection creation

....................................................................................................................................................................................................................................

Result: If at least one interconnection scheme is created on the involved NEs, MAC
flushing protection is created. If not all the interconnection schemes are created, a
warning is issued.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-159
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


MAC Flushing Protection

MAC flushing protection list

....................................................................................................................................................................................................................................

MAC flushing protection list


When to use

The function lists MAC flushing protections.


Related Information

If MAC flushing is enabled, the command issued from a T-MPLS EVC shows protections
associated to the selected EVC.
For more information, refer to: MAC flushing protection description (p. 16-157).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Ethernet over T-MPLS.
Result: The Ethernet over T-MPLS menu is shown.
...................................................................................................................................................................................................

Select MAC Flushing Protections.


Result: The MAC Flushing Protection list is shown. See: Attributes of

MAC-flushing protection (p. 16-161)


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-160
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


MAC Flushing Protection

Attributes of MAC-flushing protection

....................................................................................................................................................................................................................................

Attributes of MAC-flushing protection


Attributes of a MAC-flushing protection

The attributes displayed for each MAC-flushing protection are:

User Label.

Domain (T-MPLS).

....................................................................................................................................................................................................................................
1350 OMS
16-161
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


MAC Flushing Protection

Interconnection Scheme list

....................................................................................................................................................................................................................................

Interconnection Scheme list


When to use

The function lists Interconnection Schemes of a MAC flushing protection.


Related Information

For more information, refer to: MAC flushing protection description (p. 16-157).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Ethernet over T-MPLS > MAC Flushing
Protection.
Result: The MAC Flushing Protection list is shown.
...................................................................................................................................................................................................

Select one item in the list


Select Search > Interconnection Schemes.
Result: The Interconnection Scheme list is shown. See: Attributes of

Interconnection Schemes (p. 16-163)


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-162
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


MAC Flushing Protection

Attributes of Interconnection Schemes

....................................................................................................................................................................................................................................

Attributes of Interconnection Schemes


Attributes of a Interconnection Schemes

The attributes displayed for each Interconnection Scheme are:

User Label.

Interconnection Type. (SNI, DNI, DPI)

Node A.

Node B.

Select an item and expand hierarchical tree. (Click the item and click the +sign icon).
The sub-tree displays the objects belonging to the selected item:

T-MPLS port User Label.

Parent Node User Label

....................................................................................................................................................................................................................................
1350 OMS
16-163
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


MAC Flushing Protection

TMPLS EVC: Force MAC flushing

....................................................................................................................................................................................................................................

TMPLS EVC: Force MAC flushing


When to use

The function forces protections associated to an EVC.


Related Information

For more information, refer to: MAC flushing protection description (p. 16-157).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

Ethernet over TMPLS EVC service type is EVPLAN, BTV, Broadcast.


MAC flushing is enabled on the selected Ethernet over TMPLS EVC.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Ethernet over T-MPLS > T-MPLS EVC.
Result: The T-MPLS EVC list is shown.
...................................................................................................................................................................................................

Select one item in the list


Select Action > Force MAC Flushing.
Result: The command triggers the following behavior: PKT automatically selects one

target NE hosting the VSI and sends one SNMP SET request with MAC flushing
forced = true. Target NE flushes all learned entries in the MAC table. Target NE
generates R-APS message towards all other HUB nodes. Other HUB nodes, upon
detection of R-APS MAC flushing message, perform MAC@ table flushing for the
VSI instance associated to EVC.
The force MAC flushing state is not persisted by PKT, since after flushing, the
attribute is automatically reset to false by NE.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-164
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management

Overview

....................................................................................................................................................................................................................................

Tunnel Redundancy
Overview
Purpose

This section describes how to setup T-MPLS Tunnel Redundancy.


Contents
Description

16-166

Create one-to-one-open protection

16-173

Create Dual-point-to-point Protection

16-175

Create MAC Flushing Protection Schema

16-177

EVC setup

16-178

....................................................................................................................................................................................................................................
1350 OMS
16-165
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Description

....................................................................................................................................................................................................................................

Description
Reference network

This section describes a reference network that implements the Tunnel Redundancy.
Figure 16-27 Tunnel Redundancy Reference network

Redundancy creation types

PKT supports the creation of Tunnel Redundancy:

Tunnel 1-to-1-open protection Tunnel one-to-one-open protection (p. 16-166)

PW Dual-point-to-point protection (p. 16-167)

Tunnel one-to-one-open protection

Tunnel one-to-one-open protection is set via GUI wizard.


The tunnel creation accomplishes the following functions:

Selection of CPE working port and protecting port


Allocation of DHOME protection block on CPE node
Allocation of working tunnel termination on HUB working node
Allocation of protecting tunnel termination on HUB protecting node

....................................................................................................................................................................................................................................
1350 OMS
16-166
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Description

....................................................................................................................................................................................................................................

Enabling of signal degrade MAC flushing on HUB termination


The working and protecting tunnel converge on the same CPE node on node side,
while on the other side they terminate on different HUB nodes

For 1-to-1-open tunnel, by default, the GUI creation wizard proposes CV enabling =
true. PKT creates MEPs and enables CV-TX/Rx with the specified CV period value
on both working and protecting tunnels.

PW Dual-point-to-point protection

PW Dual-point-to-point protection is set via GUI wizard.


The PW creation accomplishes the following functions:

If no tunnel is specified as constraint and if no suitable tunnel exists, creation of


Tunnel one-to-one-open protection
Allocation of PW CPE termination over working tunnel CPE termination
Allocation of PW HUB working termination over working tunnel HUB termination
Allocation of PW HUB protecting termination over protecting tunnel HUB
termination

MAC Black Hole forwarding prevention

The NE behavior on CPE and HUB nodes coordinates to prevent the MAC black-hole for
downstream traffic generated by the remote HUB.
HUB node triggers MAC flushing and R-APS generation (towards other HUB nodes)
upon detection of one of the following conditions:

Fault detected on a local port inserted into MAC flushing topology


Fault detected on a 1:1 open protected tunnel (due to bidirectional fault)
RDI packet received from CPE node (due to unidirectional fault detected by CPE
node)
R-APS packet received from CPE node (triggered by manual command switch or
WTR elapsed)
R-APS packet received from other HUB node

Interconnection types

Interconnection characteristics:

The interconnection types:


Single Node Interconnection (SNI): only one port is involved
Dual Node Interconnection (DNI): two ports on two different nodes are involved
Dual Point Interconnection (DPI): two ports on the same node are involved
The same node can be involved in different interconnection schemes (with different
ports)
MAC flushing protection can be composed of multiple interconnection schemes
MAC flushing protection can be enabled or disabled also on implemented EVC

....................................................................................................................................................................................................................................
1350 OMS
16-167
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Description

....................................................................................................................................................................................................................................

Reference scenarios

Consider the following scenarios.


Legenda

Reference Scenario #1

Scenario #1

1 x 1:1 open protected tunnel (CPE B -> NodeX & NodeY)


2 x 1:1 linear protected tunnel (NodeY -> NodeZ & NodeX -> NodeZ)

1 x DP2P PW + 2 x P2P PW
2 x MAC Flushing Schema: DNI + SNI
1 x EVC (EVPLAN w/ 2 UNI)

....................................................................................................................................................................................................................................
1350 OMS
16-168
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Description

....................................................................................................................................................................................................................................

Reference Scenario #2

Scenario #2

1 x 1:1 open protected tunnel (CPE B -> NodeX & NodeY)


2 x 1:1 linear protected tunnel (NodeY -> NodeZ & NodeX -> NodeZ)
1 x DP2P PW + 2 x P2P PW
2 x MAC Flushing Schema: DNI + DPI

1 x EVC (EVPLAN w/ 3 UNI)

Reference Scenario #3

Scenario #3

1 x 1:1 open protected tunnel (CPE B -> NodeX & NodeY)


4 x 1:1 linear protected tunnel (NodeY -> NodeZ & NodeX -> NodeZ & NodeY ->
NodeW & NodeX -> NodeW)
1 x DP2P PW + 4 x P2P PW

2 x MAC Flushing Schema: DNI


x EVC (EVPLAN w/ 3 UNI)

....................................................................................................................................................................................................................................
1350 OMS
16-169
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Description

....................................................................................................................................................................................................................................

Reference Scenario #4

Scenario #4

1 x 1:1 open protected tunnel (CPE B -> NodeX & NodeY)


1 x DP2P PW
2 x MAC Flushing Schema: DNI + SNI
1 x EVC (EVPLAN w/ 2 UNI)

Reference Scenario #5

....................................................................................................................................................................................................................................
1350 OMS
16-170
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Description

....................................................................................................................................................................................................................................

Scenario #5

1 x 1:1 open protected tunnel (CPE B -> NodeX & NodeY)

1 x DP2P PW
2 x MAC Flushing Schema: DNI + DPI
1 x EVC (EVPLAN w/ 3 UNI)

Reference Scenario #6

Scenario #6

1 x 1:1 open protected tunnel (CPE B -> NodeX & NodeY)


1 x DP2P PW
2 x MAC Flushing Schema: DNI
1 x EVC (EVPLAN w/ 3 UNI)

Reference Scenario #7

....................................................................................................................................................................................................................................
1350 OMS
16-171
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Description

....................................................................................................................................................................................................................................

Scenario #7

2 x 1:1 open protected tunnel (CPE B -> NodeX & NodeY + CPE E -> NodeZ &
NodeW)
4 x 1:1 linear protected tunnel (NodeY -> NodeZ & NodeX -> NodeZ & NodeY ->
NodeW & NodeX -> NodeW)
2 x DP2P PW + 4 x P2P PW

2 x MAC Flushing Schema: DNI


1 x EVC (EVPLAN w/ 2 UNI)

....................................................................................................................................................................................................................................
1350 OMS
16-172
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Create one-to-one-open protection

....................................................................................................................................................................................................................................

Create one-to-one-open protection


When to use

The operator creates one-to-one-open protection.


Related Information

For more information, refer to Tunnel one-to-one-open protection (p. 16-166).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > MPLS-TP and T-MPLS > Create TMPLS Tunnel.
Result: The wizard is open.
...................................................................................................................................................................................................

Insert the following values:

User Label: (user defined)


Protection Level: 1 to 1 open
Flow: Bidirectional
Comment (optional)
Bandwidth Extension Policy: Automatic (default)/Manual

CIR: (user defined)


PIR: (user defined)
CBS: (user defined)

PBS: (user defined)


T-MPLS PHB Profiles: 5-Cos (default)/8-Cos
Signal Degraded: Disable (default)/ Enable

OAM Tx Operation Mode


PM Granularity: none (default)
T-MPLS PHB Profiles: default (default)
Enable MEPs: true
CV Enabling: CV (default)

....................................................................................................................................................................................................................................
1350 OMS
16-173
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Create one-to-one-open protection

....................................................................................................................................................................................................................................

CV Direction: Both (default)


CV Period: 3_33ms (default)

CV/SLM PHB: EF (default)

...................................................................................................................................................................................................

In the 2.nd step, insert the following values:

HUB Working Node (user defined)

HUB Working Port (user defined, optional)


HUB Protecting Node (user defined)
HUB Protecting Port (user defined, optional)

CPE Node (user defined)


CPE Port (user defined, optional)

...................................................................................................................................................................................................

In the 3.rd step, insert the following values:

Automatic implementation (optional)


Routing Display Automatic (optional)
Click OK
Result: Main Tunnel and Spare Tunnel are created.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-174
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Create Dual-point-to-point Protection

....................................................................................................................................................................................................................................

Create Dual-point-to-point Protection


When to use

The operator creates create dual-point-to-point Protection.


Related Information

For more information, refer to PW Dual-point-to-point protection (p. 16-167).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > MPLS-TP and T-MPLS > Create T-MPLS Pseudo-Wire.
Result: The wizard is open.
...................................................................................................................................................................................................

Insert the following values:

User Label: (user defined)


Topology: Dual point to point
Flow: Bidirectional
Comment (optional)
Supported Service: Ethernet

CIR: (user defined)


PIR: (user defined)
CBS: (user defined)

PBS: (user defined)


T-MPLS PHB Profile: 5-Cos (default)/8-Cos

...................................................................................................................................................................................................

In the 2.nd step, insert the following values:

HUB Node1 (user defined)


HUB Port1 (user defined, optional)
HUB Node2 (user defined)

....................................................................................................................................................................................................................................
1350 OMS
16-175
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Create Dual-point-to-point Protection

....................................................................................................................................................................................................................................

HUB Port2 (user defined, optional)


CPE Node (user defined)
Result: Pseudo-Wires Main and Spare are created.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-176
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

Create MAC Flushing Protection Schema

....................................................................................................................................................................................................................................

Create MAC Flushing Protection Schema


When to use

The operator creates MAC Flushing Protection Schema.


Related Information

For more information, refer to:


Interconnection types (p. 16-167).
MAC Black Hole forwarding prevention (p. 16-167).
Reference scenarios (p. 16-168).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

The MAC flushing protection schema is characterized by the following attributes:

User Label -> user defined


Domain > T-MPLS / MPLS-TP domain instance

For each interconnection scheme, the operator has to specify:

Interconnection type : DNI, SNI, DPI

Involved nodes
Involved NNI or UNI ports (each port can be involved in only one interconnection
scheme)

The MAC flushing protection operates at Ethernet layer then ports involved in MAC
flushing protection can be:

Ethernet UNI
Link over T-MPLS (MPLS-TP) termination

For the detailed procedure, refer to:


MAC flushing protection creation (p. 16-158).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
16-177
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management


Tunnel Redundancy

EVC setup

....................................................................................................................................................................................................................................

EVC setup
When to use

The operator creates MAC Flushing Protection Schema.


Related Information

For more information, refer to:


Create EVC over T-MPLS wizard (p. 17-27).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

The EVC is characterized by the following attributes:

User Label -> user defined


Domain > T-MPLS domain instance
EVC must be defined as EVPLAN (even in case theres just two UNI)

MAC tab in the creation step includes the following attributes:

MAC flushing (new attribute) -> enabled


MAC flush VLAN-ID: 4096 (untagged fixed value)

MAC flush VLAN-PRI: 7 (fixed value)


MAC flush Drop-enable: false
MAC flush MEL: 7

MAC flush Version: v2 (fixed value)

dp2p PW (Y shaped PW) has to be associated to the CPE UNI:

In Termination Setting step and when configuring the CPE UNI the operator select
the Remote VSI port tab

Transport Link: dp2p PW


Bind Type: Spoke

Refer to:
Create EVC over T-MPLS wizard (p. 17-27).
E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
16-178
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management

EVC setup

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
16-179
8DG42227DAAA 9.6
Issue 3 December 2012

T-MPLS Provisioning Management

EVC setup

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
16-180
8DG42227DAAA 9.6
Issue 3 December 2012

17

EVC over T-MPLS


17

Overview
Purpose

This chapter provides the conceptual information and the associated tasks for managing
Ethernet Virtual Connection over T-MPLS .
Contents
Create T-MPLS Structure

17-2

Create Link over Cable

17-2

T-MPLS tunnel create

17-14

T-MPLS-Create PW

17-21

EVC on T-MPLS

17-27

Create EVC over T-MPLS wizard

17-27

List the T-MPLS EVC

17-32

Description of the list of T-MPLS EVC

17-33

Create EVC over T-MPLS EVPL bottom up

17-34

Create EVC over T-MPLS EVPL top down

17-55

Create EVC over T-MPLS EVPLAN

17-72

Create EVC over T-MPLS BTV

17-86

Create EVC over T-MPLS HSI

17-90

Alarms EVC T-MPLS

17-94

Delete NE with EVC over T-MPLS

17-97

What to do deleting a NE

17-97

Delete NE detailed procedure

17-98

Verify create EVC over T-MPLS


Verify create EVC over T-MPLS

17-114
17-114

...................................................................................................................................................................................................................................
1350 OMS
17-1
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................

Create T-MPLS Structure


Create Link over Cable
When to use

The scope of this procedure is to create the LoC


Related Information

This task does not have any related information.


Before you begin

All needed conditions are detailed along the procedure.

....................................................................................................................................................................................................................................
1350 OMS
17-2
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................

Task
...................................................................................................................................................................................................

Figure which follows shows the reference map.


Figure 17-1 Physical map

....................................................................................................................................................................................................................................
1350 OMS
17-3
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the main menu bar issue Search > Packet > Construction > Network Elements >
Defined NEs.
Figure 17-2 Search>Packet>Construction>Network Elements>Defined NEs

...................................................................................................................................................................................................

The list of the defined NEs is displayed. Select the relevant NE and issue Search >
Ethernet Physical Ports
Figure 17-3 NE: Search>Ethernet Physical Ports

...................................................................................................................................................................................................

The list of the Ethernet Physical Ports is displayed.

....................................................................................................................................................................................................................................
1350 OMS
17-4
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................

There are idle ports which could be used to create the Link over Cable.
Figure 17-4 Ethernet Physical Ports

...................................................................................................................................................................................................

Via SDH menus, you can create an Ethernet Physical Connection.


Select Actions>Physical>Create Physical Connection.

....................................................................................................................................................................................................................................
1350 OMS
17-5
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Enter the physical connection name, select physcon type=Ethernet. Click on Next.
Figure 17-5 Create Physcon-basic

...................................................................................................................................................................................................

Select Physcon rate.

Select Physcon end points by means of the usual selection mechanism: select node and
port on both ends.

....................................................................................................................................................................................................................................
1350 OMS
17-6
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................

Click on OK to confirm.
Figure 17-6 Create Physcon: End Points

....................................................................................................................................................................................................................................
1350 OMS
17-7
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The created physical connection is present in the Physical connection list.


Figure 17-7 Physcon list

...................................................................................................................................................................................................

Thorough a notification mechanism the created physical connection is present in the Link
over Cable list. To get the Link over Cable list, select Search > Packet > Construction >
Transport Links > Link over Cable
Figure 17-8 Search>Packet>Construction>Transport Links>Link over Cable

....................................................................................................................................................................................................................................
1350 OMS
17-8
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

10

The Link over Cable list is displayed.


Figure 17-9 Link over Cable list

...................................................................................................................................................................................................

11

Alternatively, or if SDH is not installed, you can issue Actions > Packet > Construction
> Create Link over Cable
Figure 17-10 Actions>Packet>Construction>Create Link over Cable

...................................................................................................................................................................................................

12

Enter Link over Cable name.


Select end points by means of the usual selection mechanism: select node and port on
both ends.

....................................................................................................................................................................................................................................
1350 OMS
17-9
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................

Click on Apply to confirm.


Figure 17-11 Create Link over Cable

....................................................................................................................................................................................................................................
1350 OMS
17-10
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13

The LoC is created and is present in the LoC list. Select the LoC and issue Actions >
Assign Resources to Domain.
Figure 17-12 Actions>Assign Resources to Domain

...................................................................................................................................................................................................

14

Click on button Domains. From the domain list select T-MPLS and click on the green V
to confirm.
The selection of the domain is present in the main window.

....................................................................................................................................................................................................................................
1350 OMS
17-11
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................

Click on Apply to confirm.


Figure 17-13 Assign Resources to Domain box

...................................................................................................................................................................................................

15

A Loc, when assigned to T-MPLS domain, becomes a Section.

....................................................................................................................................................................................................................................
1350 OMS
17-12
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

Create Link over Cable

....................................................................................................................................................................................................................................

From the main menu bar select Search > Packet > T-MPLS > T-MPLS Sections.
Figure 17-14 Search>Packet>T-MPLS>T-MPLS Sections

...................................................................................................................................................................................................

16

The T-MPLS Section list is displayed below.


Figure 17-15 T-MPLS Section list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-13
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS tunnel create

....................................................................................................................................................................................................................................

T-MPLS tunnel create


When to use

The scope of this procedure is to create a T-MPLS tunnel.


Related Information

All needed conditions are detailed along the procedure.


Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > T-MPLS > Create T-MPLS tunnel.
Figure 17-16 Actions>Packet>T-MPLS>Create T-MPLS tunnel

...................................................................................................................................................................................................

In the Create T-MPLS tunnel box enter name, flow=bidirectional.


Select A and Z nodes.

....................................................................................................................................................................................................................................
1350 OMS
17-14
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS tunnel create

....................................................................................................................................................................................................................................

Select as constraint the relevant T-MPLS Section. In this case the ports are automatically
selected.
Figure 17-17 Create T-MPLS tunnel:Constraints

...................................................................................................................................................................................................

Select folder Quality of Service.

....................................................................................................................................................................................................................................
1350 OMS
17-15
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS tunnel create

....................................................................................................................................................................................................................................

Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile.
Figure 17-18 Create T-MPLS tunnel: Quality of Service

...................................................................................................................................................................................................

Select folder OAM

....................................................................................................................................................................................................................................
1350 OMS
17-16
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS tunnel create

....................................................................................................................................................................................................................................

Set fields Alarm Enable, CV (Connectivity Verification) Enable, CV Period, PM


granularity.
Figure 17-19 Create T-MPLS tunnel: OAM

....................................................................................................................................................................................................................................
1350 OMS
17-17
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS tunnel create

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select folder Protection. Click on OK to confirm.


Figure 17-20 Create T-MPLS tunnel: Protection

....................................................................................................................................................................................................................................
1350 OMS
17-18
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS tunnel create

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The tunnel has been created. To verify the creation issue Search > Packet > T-MPLS >
T-MPLS Tunnels.
Figure 17-21 Search>Packet>T-MPLS>T-MPLS Tunnels

...................................................................................................................................................................................................

The tunnel is created with status defined. Select the created tunnel in the list and issue,
using the right mouse button, Actions > Allocate.
Figure 17-22 Tunnel list

....................................................................................................................................................................................................................................
1350 OMS
17-19
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS tunnel create

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Implement the tunnel.


Figure 17-23 Actions>Implement T-MPLS Tunnel

...................................................................................................................................................................................................

The tunnel is now implemented.


Figure 17-24 The tunnel is implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-20
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS-Create PW

....................................................................................................................................................................................................................................

T-MPLS-Create PW
When to use

The scope of this procedure is to create a pseudo wire.


Related Information

All needed conditions are detailed along the procedure.


Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main bar select Actions > Packet > T-MPLS > Create T-MPLS Pseudo Wire.
Figure 17-25 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire

...................................................................................................................................................................................................

In the Create T-MPLS Pseudo Wire box enter name, select flow=Bidirectional
Select end nodes

....................................................................................................................................................................................................................................
1350 OMS
17-21
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS-Create PW

....................................................................................................................................................................................................................................

Select as constraint the relevant T-MPLS tunnel


Figure 17-26 Create T-MPLS Pseudo Wire: Constraints

...................................................................................................................................................................................................

Select folder Quality of Service


Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile.

....................................................................................................................................................................................................................................
1350 OMS
17-22
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS-Create PW

....................................................................................................................................................................................................................................

Note: these values must be consistent with those specified for the relevant tunnel
Figure 17-27 Create T-MPLS Pseudo Wire: Quality of Service

...................................................................................................................................................................................................

Select OAM values and click on Apply. The Pseudo Wire is created.

....................................................................................................................................................................................................................................
1350 OMS
17-23
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS-Create PW

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select Search>Packet>T-MPLS>T-MPLS Pseudo Wire


Figure 17-28 Search>Packet>T-MPLS>T-MPLS Pseudo Wire

...................................................................................................................................................................................................

The list of the T-MPLS pseudo wires is shown below. The PW just created is Allocated.
Figure 17-29 T-MPLS Pseudo Wires

....................................................................................................................................................................................................................................
1350 OMS
17-24
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS-Create PW

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the relevant Pseudo Wire and issue Actions > Implement T-MPLS Pseudo wire.
Figure 17-30 PW Implementation

...................................................................................................................................................................................................

The T-MPLS Pseudo wire is now implemented.


Figure 17-31 T-MPLS Pseudo wire implemented

...................................................................................................................................................................................................

The Pseudo Wire is seen as a T-MPLS Transport Link in the area of the Services.

....................................................................................................................................................................................................................................
1350 OMS
17-25
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Create T-MPLS Structure

T-MPLS-Create PW

....................................................................................................................................................................................................................................

From the main menu bar issue Search > Packet > Services > T-MPLS > T-MPLS
Transport Links to list the Transport Links.
Figure 17-32 Search>Packet>Services>T-MPLS>T-MPLS Transport Links

...................................................................................................................................................................................................

10

The list of the T-MPLS Transport Links is displayed. It includes the Pseudo Wire just
created.
Figure 17-33 T-MPLS Transport Links

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-26
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS

Create EVC over T-MPLS wizard

....................................................................................................................................................................................................................................

EVC on T-MPLS
Create EVC over T-MPLS wizard
When to use

The scope of this procedure is to create an EVC over T-MPLS by the wizard.
Related Information

EVPL stands for Ethernet Virtual Private Line. In the bottom up process, the creation and
selection of the PW (pseudo wire) to associate is done by the user. See: Create EVC over
T-MPLS EVPL bottom up (p. 17-34). In the top down process, the creation and selection
of the PW (pseudo wire) to associate is done automatically. See: Create EVC over
T-MPLS EVPL top down (p. 17-55)
EVPLAN stands for Ethernet Virtual Private LAN. See: Create EVC over T-MPLS
EVPLAN (p. 17-72)
BTV stands for Broadcast Television. See: Create EVC over T-MPLS BTV (p. 17-86)
EVPLAN stands for High Speed Internet. See: Create EVC over T-MPLS HSI
(p. 17-90)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Actions > Packet > Services > T-MPLS > Create T-MPLS EVC
Result: The Create T-MPLS EVC window is shown.
...................................................................................................................................................................................................

Select the folder Specific.

Enter the User Label.

Select the Service Type. (EVPL, EVPLAN, BTV, HSI).

Select the Ethernet service.

Select the Domain . (T-MPLS)

Select the Topology. (Point-to-Point, Point-to-Multipoint, Any-to-Any)

....................................................................................................................................................................................................................................
1350 OMS
17-27
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS wizard

....................................................................................................................................................................................................................................

Select traffic Traffic Type. (Unicast, Multicast).


Select Resource Sharing. It describes the resource reservation (UNI and link). (Full).

...................................................................................................................................................................................................

Select the folder Detail.

VLAN Bundle

Set Standard VLAN Type (8100). (True)

Unicast Service Frame Delivery. (Deliver Unconditionally).

Multicast Service Frame Delivery. (Deliver Unconditionally).

Broadcast Service Frame Delivery. (Deliver Unconditionally).

IGMP Snooping State. (Not Meaningful).

If not standard, set VLAN Type.

Confirm Default values.


...................................................................................................................................................................................................

Select folder Info. Insert comments (Optional).


...................................................................................................................................................................................................

Select folder PM.


Select The following fields:

Under PM. (True, False)

Granularity. (24 hours, 15 min)

Involved TPs. ( No Points, End Points, Intermediate Points, All Points,Not


Meaningful)

CSV Reporting. (24 hours, No Report)

Policy. ( Keep, Purge on Stop, Purge on Delete, Not Meaningful)

...................................................................................................................................................................................................

Select folder OAM.


Select the following fields:

Enable OAM. (True, False)

CCM Priority. (0..7)

Maintenance Domain.

Enable LPT. (True, False)

...................................................................................................................................................................................................

Select folder Miscellaneous.


Select the following fields:

Service Level. (Premium, Gold,Silver,Bronze)

CVLAN Preservation. (True, False)

CVLAN COS Preservation. (True, False)

....................................................................................................................................................................................................................................
1350 OMS
17-28
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS wizard

....................................................................................................................................................................................................................................

NAD.
External Mark.

...................................................................................................................................................................................................

Select folder MAC.

Pseudo-Wire Distribution. Full Mesh.

MAC Address Limit.

MAC Learning. Select or unselect the field.

Discard Unknown Destinations. Select or unselect the field.

MAC Aging. Select or unselect the field.

MAC Flushing. Select or unselect the field.

MAC Flush Vlan Id. 4096 (Untagged). (Fixed value)

MAC Flush Vlan Priority. 7. (Fixed value)

MAC Flush Drop Enable. Select or unselect the field.

MAC Flush MEL. 0,...7.

MAC Flush Version. V2. (Fixed value)

...................................................................................................................................................................................................

Click Next.
Result: The Termination Selection window is shown.
...................................................................................................................................................................................................

10

Select the A-node. Select the port.


Select the Z-node. Select the port.
Result: The selection of the two nodes and ports is completed.
...................................................................................................................................................................................................

11

Click Next.
Result: The Termination Setting window is shown.
...................................................................................................................................................................................................

12

Select a termination.
Select folder Ingress Flow.
In the folder Ingress Flow, select sub-older General.
Click Traffic Descriptor button. Select the Traffic Descriptor from the selection box and
Click V-sign to confirm.
Note: Traffic Descriptor values (CIR, PIR,....) must be contained in the
corresponding values of the PW being associated.
...................................................................................................................................................................................................

13

Select Policy mode. (Color Blind, Color Aware). If you choose Color Aware, you can
select Color Profile.

....................................................................................................................................................................................................................................
1350 OMS
17-29
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS wizard

....................................................................................................................................................................................................................................

Select Classification Mode.


Select VLAN POP Enabled. (True, False)
...................................................................................................................................................................................................

14

In the folder Ingress Flow, select sub-older Traffic Classifier.


...................................................................................................................................................................................................

15

In the folder Ingress Flow, select sub-older L2CP.


...................................................................................................................................................................................................

16

In the folder Ingress Flow, select sub-older Leaf Term. (set HSI).
...................................................................................................................................................................................................

17

In the folder Ingress Flow, select sub-older Reuse Flows to copy and reuse flow
characteristics.
...................................................................................................................................................................................................

18

ClickCreate Ingress Flow.


Result: The Ingress Flow is created and added in the window.
...................................................................................................................................................................................................

19

Select Egress Flow.


In the folder Egress Flow, select sub-older Push.
Select:

Class of service (guaranteed,best effort, regulated).

If you select Clear all fields, subsequent fields can be ignored.

VLAN ID. It is an additional ID added to the stack.

Priority Mode. (Color Aware, Color Blind).

If Priority Mode is set to Color Aware, the fields Green Priority and Yellow Priority
are active.

...................................................................................................................................................................................................

20

In the folder Egress Flow, select sub-older Push.


...................................................................................................................................................................................................

21

Select Spoke.
Folder Spoke is significant only for BTV and HSI.
...................................................................................................................................................................................................

22

Click Create Egress Flow.


Result: The Egress Flow is created and added in the window.
...................................................................................................................................................................................................

23

Select the undefined termination.


All fields are already set with the selections made for the last defined port.

....................................................................................................................................................................................................................................
1350 OMS
17-30
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS wizard

....................................................................................................................................................................................................................................

Repeat steps from Step 12 to Step 22, then go to next step.


...................................................................................................................................................................................................

24

Click Next button.


Result: The Transport Link Selection window is shown.
...................................................................................................................................................................................................

25

Select Automatic Pseudowire[/Tunnel] creation.


If you do not select automatic, you will choose the transport link.

Select the Pseudo Wire in the list and confirm clicking the V-sign.

...................................................................................................................................................................................................

26

Click Next button.


Result: The Allocate & implement window is shown.
...................................................................................................................................................................................................

27

Select EVC final state:

Select Allocate EVC after creation

Select Implement EVC after creation

...................................................................................................................................................................................................

28

Click OK to confirm EVC creation.


Result: The EVC is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-31
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

List the T-MPLS EVC

....................................................................................................................................................................................................................................

List the T-MPLS EVC


When to use

The List window shows all the T-MPLS EVC and their attributes.
Related Information

No related information.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Ethernet over T-MPLS >.


Result: The Ethernet over T-MPLS menu is shown.
...................................................................................................................................................................................................

Select T-MPLS EVCs.


Result: The list window is displayed.

See the following topic in this document: Description of the list of T-MPLS EVC
(p. 17-33).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-32
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Description of the list of T-MPLS EVC

....................................................................................................................................................................................................................................

Description of the list of T-MPLS EVC


Attributes of a T-MPLS EVC

The attributes displayed for each T-MPLS EVC are:

User Label.

Topology. (Point-to-point, Point-to-multipoint, multipoint-to-multipoint)

Service Type.(EVPL, EVPLAN, BTV, HSI)

Traffic Type. (unicast, multicast)

Working State

Provisioning State

Service State

Availability Status (Normal, In Failure).

LPT Indication. (Enabled, Disabled)

LPT Provisioning State. (Enabled, Disabled)

LPT Period

LPT Priority

MAC Flush Provisioning State

Domain (T.MPLS).
For Infrastructure. (true, false)

....................................................................................................................................................................................................................................
1350 OMS
17-33
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

Create EVC over T-MPLS EVPL bottom up


When to use

The scope of this procedure is to create an EVC over T-MPLS, service type EVPL, modality
bottom up.
Related Information

EVPL stands for Ethernet Virtual Private Line.


In the bottom up process, the creation and selection of the PW (pseudo wire) to associate
is done by the user.
Before you begin

All needed conditions are detailed along the procedure


Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC
Figure 17-34 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC

...................................................................................................................................................................................................

Folder Specific is already selected.


Enter name.
Select Service type=EVPL.

....................................................................................................................................................................................................................................
1350 OMS
17-34
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

Ethernet Service and type are not meaningful.

Select Domain=T-MPLS.
Select Traffic Ttype=Unicast. For Service Type=BTV, Traffic Type=Multicast.

....................................................................................................................................................................................................................................
1350 OMS
17-35
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

Select Resource Sharing= Full. It describes the resource reservation (UNI and link). We
select full sharing.
Figure 17-35 Create T-MPLS EVC: Specific

...................................................................................................................................................................................................

Select folder Detail.

....................................................................................................................................................................................................................................
1350 OMS
17-36
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

Leave default values.


Figure 17-36 Create T-MPLS EVC: Detail

...................................................................................................................................................................................................

Select folder Info. This folder houses only textual comments.

....................................................................................................................................................................................................................................
1350 OMS
17-37
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select folder PM
Execute the suitable selections.
Figure 17-37 Create T-MPLS EVC: PM

....................................................................................................................................................................................................................................
1350 OMS
17-38
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select folder Miscellaneous.


Execute the suitable selections.
Click Next.
...................................................................................................................................................................................................

Select the node. Select the port.


Figure 17-38 Create T-MPLS EVC: Terminations Selection

....................................................................................................................................................................................................................................
1350 OMS
17-39
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The selection of the two nodes and relevant ports is completed.


Figure 17-39 Terminations Selection

...................................................................................................................................................................................................

Termination Setting. It is the definition of the traffic flows.

....................................................................................................................................................................................................................................
1350 OMS
17-40
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

Click Traffic Descriptor button. Select the traffic descriptor from the selection box and
click V-sign to confirm.
Note: Traffic Descriptor values (CIR, PIR,....) must be contained in the
corresponding values of the PW being associated.

....................................................................................................................................................................................................................................
1350 OMS
17-41
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

See Transport link selection phase of the EVC over T-MPLS tunnel create (this
procedure).
Figure 17-40 Termination Settings

...................................................................................................................................................................................................

10

Select Policy Mode. If you select Color Aware, you will select Color Profile.

....................................................................................................................................................................................................................................
1350 OMS
17-42
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

Select classification priority code = 0-7 and DSCP code = 0-63


Select VLAN POP disabled
...................................................................................................................................................................................................

11

Folder Traffic Classifier deals on VLAN id.


Folder Leaf Term deals on HSI.
Folder Reuse Flows allows to copy and reuse flow characteristics.

....................................................................................................................................................................................................................................
1350 OMS
17-43
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12

Click Create.
Figure 17-41 Ingress flow create

....................................................................................................................................................................................................................................
1350 OMS
17-44
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13

You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
Figure 17-42 Ingress Flow: create monitoring

....................................................................................................................................................................................................................................
1350 OMS
17-45
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14

Select button Egress Flow, folder Push. Select:

Class of Service. (guaranteed, best effort, regulated)

If you select Clear all fields, subsequent fields can be ignored.

....................................................................................................................................................................................................................................
1350 OMS
17-46
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

VLAN ID. It is an additional ID added to the stack.


Priority Mode. If set to Color Aware fields Green Priority and Yellow Priority are

active.
Figure 17-43 Egress Flow: Push

...................................................................................................................................................................................................

15

Folder Spoke is significant only for BTV and HSI.


Click Create Egress.

....................................................................................................................................................................................................................................
1350 OMS
17-47
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
Figure 17-44 Create Egress monitoring

...................................................................................................................................................................................................

16

Select the other port (on TSS-A).


All fields are already set with the selections made for the first port.

....................................................................................................................................................................................................................................
1350 OMS
17-48
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

Select Create Ingress.


Figure 17-45 Create Ingress node A

...................................................................................................................................................................................................

17

Select Crete Egress.

....................................................................................................................................................................................................................................
1350 OMS
17-49
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

Click Next button.


Figure 17-46 Create Egress node A

...................................................................................................................................................................................................

18

If you do not select automatic (first row of the dialog), you will choose the transport link.

....................................................................................................................................................................................................................................
1350 OMS
17-50
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

Click Transport Link Selection.


Figure 17-47 Transport Link selection

....................................................................................................................................................................................................................................
1350 OMS
17-51
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

19

Select the Pseudo Wire we had created and confirm clicking the V-sign.
Figure 17-48 Select the transport link

....................................................................................................................................................................................................................................
1350 OMS
17-52
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

20

The transport link has been selected.


Figure 17-49 Pseudo Wire selected

...................................................................................................................................................................................................

21

Select EVC state (implemented).

....................................................................................................................................................................................................................................
1350 OMS
17-53
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL bottom up

....................................................................................................................................................................................................................................

Click OK to confirm EVC creation.


Figure 17-50 T-MPLS EVC Allocate and Implement

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-54
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

Create EVC over T-MPLS EVPL top down


When to use

The scope of this procedure is to create an EVC over T-MPLS, service type EVPL, modality
top down.
Related Information

EVPL stands for Ethernet Virtual Private Line


In the top down process, the creation and selection of the PW (Pseudo Wire) to associate
is done automatically.
The reference network is shown below.
Figure 17-51 EVPL reference network

Before you begin

All needed conditions are detailed along the procedure

....................................................................................................................................................................................................................................
1350 OMS
17-55
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

Task
...................................................................................................................................................................................................

As a prerequisite, select Actions > Packet > Services > Create Traffic Descriptor. This
traffic descriptor will be dedicated to the new PW which will be created by the system.
This is not strictly necessary; anyway, in this context, it allows a better understanding of
the resource utilization.
Figure 17-52 Actions>Packet>Services>Create Traffic Descriptor

....................................................................................................................................................................................................................................
1350 OMS
17-56
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In the Create Traffic Descriptor box enter User Label name, select Class Of Service,
CIR, PIR, PBS. Click Apply.
Figure 17-53 Create Traffic Descriptor

....................................................................................................................................................................................................................................
1350 OMS
17-57
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC
Figure 17-54 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC

...................................................................................................................................................................................................

Folder Specific is already selected.

Enter User Label name

Select Service Type=EVPL

Ethernet Service and type are not meaningful

Select Domain=T-MPLS

....................................................................................................................................................................................................................................
1350 OMS
17-58
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

Select Traffic Type=Unicast. For Service Type=BTV, Traffic Type=Multicast

Select Resource Sharing=Full. It describes the resource reservation (UNI and link).

Figure 17-55 Create T-MPLS EVC: Specific

...................................................................................................................................................................................................

Select folder Detail. Default values are OK.

....................................................................................................................................................................................................................................
1350 OMS
17-59
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

Select folder Info. This folder houses only textual comments.


Select folder PM. Execute the suitable selections.
Select folder Miscellaneous. Execute the suitable selections.
Click Next.
...................................................................................................................................................................................................

Select the node. Select the port.

....................................................................................................................................................................................................................................
1350 OMS
17-60
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

The selection of the two nodes and relevant ports is completed.


Figure 17-56 Terminations Selection

...................................................................................................................................................................................................

Termination Setting. It is the definition of the traffic flows.

....................................................................................................................................................................................................................................
1350 OMS
17-61
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

Click Traffic Descriptor button. Select the Traffic Descriptor from the selection box and
click V-sign to confirm.
Note: Traffic Descriptor values (CIR, PIR,....) must be contained in the corresponding
values of the PW being associated..
See Transport link selection phase of the EVC over T-MPLS tunnel create (this
procedure)
...................................................................................................................................................................................................

Select Policy Mode. If you select Color Aware, you will select Color Profile.
Select classification priority-code = 0-7 and DSCP code = 0-63.
Select VLAN POP disabled.
...................................................................................................................................................................................................

Folder Traffic Classifier deals on VLAN id.


Folder Leaf Term deals on HSI.
Folder Reuse Flows allows to copy and reuse flow characteristics.
...................................................................................................................................................................................................

10

Click Create.

....................................................................................................................................................................................................................................
1350 OMS
17-62
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window.
Figure 17-57 Ingress Flow: create

....................................................................................................................................................................................................................................
1350 OMS
17-63
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

11

Select button Egress Flow, folder Push. Select:

Class of Service (guaranteed, best effort, regulated.)

If you select Clear all fields, subsequent fields can be ignored.

....................................................................................................................................................................................................................................
1350 OMS
17-64
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

VLAN ID. It is an additional ID added to the stack.


Priority Mode. If set to Color Aware fields Green Priority and Yellow Priority are

active.
Figure 17-58 Egress Flow: Push

Folder Spoke is significant only for BTV and HSI.


....................................................................................................................................................................................................................................
1350 OMS
17-65
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

Click Create Egress.


You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window.
...................................................................................................................................................................................................

12

Select the other port (on TSS-B)


All fields are already set with the selections made for the first port.
Select Create Ingress.
Select Create Egress.
Click Next button.
...................................................................................................................................................................................................

13

The Transport Link Selection window opens.

....................................................................................................................................................................................................................................
1350 OMS
17-66
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

Select automatic (first row of the dialog), the system will create the transport link.
Figure 17-59 Transport Link selection

....................................................................................................................................................................................................................................
1350 OMS
17-67
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14

Issue Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Figure 17-60 Search>Packet>T-MPLS>T-MPLS Pseudo Wires

...................................................................................................................................................................................................

15

The PW list before EVC TD create is displayed.


Figure 17-61 PW list before EVC TD create

...................................................................................................................................................................................................

16

Select EVC state (implemented).

....................................................................................................................................................................................................................................
1350 OMS
17-68
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

Click Apply to confirm EVC creation.


Figure 17-62 T-MPLS EVC Allocate and Implement

....................................................................................................................................................................................................................................
1350 OMS
17-69
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

17

The PW list after EVC TD create is displayed. It contains the new PW created by the
system.
Figure 17-63 PW list after EVC TD create

...................................................................................................................................................................................................

18

Select the list of T-MPLS EVCs to show the EVC which has just been created. Issue
Search > Packet > T-MPLS > T-MPLS EVCs
Figure 17-64 Search>Packet>T-MPLS>T-MPLS EVCs

...................................................................................................................................................................................................

19

In the list the EVPL EVC is defined.

....................................................................................................................................................................................................................................
1350 OMS
17-70
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPL top down

....................................................................................................................................................................................................................................

Issue Actions > Allocate.


Figure 17-65 EVC list: EVPL EVC allocate

...................................................................................................................................................................................................

20

Implement the EVC. The EVC goes implemented.


Figure 17-66 EVC goes implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-71
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Create EVC over T-MPLS EVPLAN


When to use

The scope of this procedure is to create an EVC over T-MPLS, service type EVPLAN
Related Information

EVPLAN stands for Ethernet Virtual Private LAN.


Figure which follow show the EVPLAN reference network (3-nodes).
Figure 17-67 EVPLAN reference network (3-nodes)

....................................................................................................................................................................................................................................
1350 OMS
17-72
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Figure which follow show an example of EVPLAN network (4-nodes)


Figure 17-68 EVPLAN network (4-nodes)

Before you begin

All needed conditions are detailed along the procedure


Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC
...................................................................................................................................................................................................

Folder specific is already selected.


Enter name
Select Service type=EVPLAN
Ethernet service and type are not meaningful

....................................................................................................................................................................................................................................
1350 OMS
17-73
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Select domain=T-MPLS
Select Topology= Any to Any
Select traffic type=unicast. For service type=BTV, traffic type=multicast

....................................................................................................................................................................................................................................
1350 OMS
17-74
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Select resource sharing=full. It describes the resource reservation (UNI and link).
Figure 17-69 Create T-MPLS EVC: Specific

...................................................................................................................................................................................................

Select folder Detail. Default values are OK.

....................................................................................................................................................................................................................................
1350 OMS
17-75
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Select folder Info. This folder houses only textual comments.


Select folder PM. Execute the suitable selections.
Select folder Miscellaneous. Execute the suitable selections.
Click Next.
...................................................................................................................................................................................................

Per each LAN termination, one at a time, select the node and select the port.

....................................................................................................................................................................................................................................
1350 OMS
17-76
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Click Next.
Figure 17-70 Terminations Selection

...................................................................................................................................................................................................

Termination Setting. It is the definition of the traffic flows.

....................................................................................................................................................................................................................................
1350 OMS
17-77
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Click traffic descriptor button. Select the traffic descriptor from the selection box and
Click V to confirm.
Note: traffic descriptor values (CIR, PIR,....) must be contained in the
corresponding values of the PW being associated..
See Transport link selection phase of the EVC over T-MPLS tunnel create (this
procedure)
...................................................................................................................................................................................................

Select Policy Mode. If you select Color Aware, you will select Color Profile.
Select classification Priority-Code=0-7 and DSCP code= 0-63.
Select VLAN POP disabled.
...................................................................................................................................................................................................

Folder Traffic Classifier deals on VLAN id.


Folder Leaf Term deals on HSI
Folder Reuse Flows allows to copy and reuse flow characteristics.
...................................................................................................................................................................................................

Click Create.

....................................................................................................................................................................................................................................
1350 OMS
17-78
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
Figure 17-71 EVPLAN: Ingress Flow: create

...................................................................................................................................................................................................

Select button Egress Flow, folder Push.

....................................................................................................................................................................................................................................
1350 OMS
17-79
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Select:
Class of service (guaranteed, best effort, regulated, ...)
If you select clear all fields, subsequent fields can be ignored.
VLAN ID. It is an additional ID added to the stack.

....................................................................................................................................................................................................................................
1350 OMS
17-80
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Priority Mode. If set to Color Aware fields Green and Yellow are active.
Figure 17-72 EVPLAN:Egress Flow

Folder Spoke is significant only for BTV and HSI.


Click Create Egress.
....................................................................................................................................................................................................................................
1350 OMS
17-81
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
...................................................................................................................................................................................................

10

Select the other port (on TSS-B)


All fields are already set with the selections made for the first port.
Select Create Ingress.
Select Create Egress.
Click Next button.
...................................................................................................................................................................................................

11

The Transport Link selection window opens.

....................................................................................................................................................................................................................................
1350 OMS
17-82
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Select the 3 PWs.


Figure 17-73 Transport Link selection

...................................................................................................................................................................................................

12

Select EVC state.

....................................................................................................................................................................................................................................
1350 OMS
17-83
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................

Click Apply to confirm EVC creation.


Figure 17-74 T-MPLS EVC Allocate and Implement

....................................................................................................................................................................................................................................
1350 OMS
17-84
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS EVPLAN

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13

The PW list after EVC TD create is displayed. It contains the new PW created by the
system.
Figure 17-75 PW list after EVC TD create

...................................................................................................................................................................................................

14

Select the list of T-MPLS EVCs to show the EVC which has just been created. Issue
Search > Packet > T-MPLS > T-MPLS EVCs
...................................................................................................................................................................................................

15

In the EVC list the EVPL EVC is defined.


Issue Actions > Allocate.
...................................................................................................................................................................................................

16

Implement the EVC. The EVC goes implemented.


Figure 17-76 EVC goes implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-85
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS BTV

....................................................................................................................................................................................................................................

Create EVC over T-MPLS BTV


When to use

The scope of this procedure is to create an EVC over T-MPLS, service type BTV
Related Information

BTV stands for Broadcast Television.


The figure which follows, shows the BTV reference network.
Figure 17-77 BTV reference network

Before you begin

All needed conditions are detailed along the procedure.

....................................................................................................................................................................................................................................
1350 OMS
17-86
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS BTV

....................................................................................................................................................................................................................................

Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC
...................................................................................................................................................................................................

Folder Specific is already selected.

Enter name

Select Service Type=BTV

Ethernet Service and type are not meaningful in this context

Select Topology= Multicast


Select Resource Sharing=Full. It describes the resource reservation (UNI and link)

Select Domain=T-MPLS

...................................................................................................................................................................................................

Select folder Detail. Default values are OK.


Select folder Info. This folder houses only textual comments.
Select folder PM. Execute the suitable selections.
Select folder Miscellaneous. Execute the suitable selections.
Click Next.
...................................................................................................................................................................................................

For each LAN termination, one at a time, select the node and select the port.
Click Next.
...................................................................................................................................................................................................

Termination Setting. It is the definition of the traffic flows.

Click Traffic Descriptor button. Select the Traffic Descriptor from the selection box and
Click V-sign to confirm.
Note: Traffic Descriptor values (CIR, PIR,....) must be contained in the corresponding
values of the PW being associated.
See Transport link selection phase of the EVC over T-MPLS tunnel create (this
procedure)
...................................................................................................................................................................................................

Select Policy Mode. If you select Color Aware, you will select Color Profile
Select classification priority-code = 0-7 and DSCP code = 0-63.
Select VLAN POP disabled
...................................................................................................................................................................................................

Folder Traffic Classifier deals on VLAN id.

....................................................................................................................................................................................................................................
1350 OMS
17-87
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS BTV

....................................................................................................................................................................................................................................

Folder Leaf Term deals on HSI.


Folder Reuse Flows allows to copy and reuse flow characteristics.
...................................................................................................................................................................................................

Click Create.
You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
...................................................................................................................................................................................................

Select button Egress Flow, folder Push


Select:

Class of Service (guaranteed/best effort/regulated,...)

If you select Clear all fields, subsequent fields can be ignored.

VLAN ID. It is an additional ID added to the stack.

Priority Mode. If Priority Mode is set to Color Aware, fields Green Priority and
Yellow Priority are active.

Folder Spoke is significant only for BTV and HSI.

Click Create Egress.

You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window.
...................................................................................................................................................................................................

10

Select the other port (on TSS-B).


All fields are already set with the selections made for the first port.
Select Create Ingress.
Select Create Egress.
Click Next button.
...................................................................................................................................................................................................

11

The Transport Link selection window opens.


...................................................................................................................................................................................................

12

Select EVC state after creation.


Click Apply to confirm EVC creation.
...................................................................................................................................................................................................

13

The PW list after EVC TD create is displayed. It contains the new PW created by the
system.
...................................................................................................................................................................................................

14

Select the list of T-MPLS EVCs to show the EVC which has just been created. Issue
Search > Packet > T-MPLS > T-MPLS EVCs

....................................................................................................................................................................................................................................
1350 OMS
17-88
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS BTV

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

15

In the EVC list the EVPL EVC is defined.


Issue Actions > Allocate.
...................................................................................................................................................................................................

16

Implement the EVC. The EVC goes implemented.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-89
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS HSI

....................................................................................................................................................................................................................................

Create EVC over T-MPLS HSI


When to use

The scope of this procedure is to create an EVC (Ethernet Virtual Call) over T-MPLS,
service type=HSI
Related Information
HSI=High Speed Internet

Figure which follow show the EVPLAN reference network (3-nodes).


Figure 17-78 HSI reference network

Before you begin

All needed conditions are detailed along the procedure

....................................................................................................................................................................................................................................
1350 OMS
17-90
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS HSI

....................................................................................................................................................................................................................................

Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC
...................................................................................................................................................................................................

Folder specific is already selected.


Enter name
Select Service type=HSI
Ethernet service and type are not meaningful
Select domain=T-MPLS
Select Topology=
Select resource sharing. It describes the resource reservation (UNI and link). We select
full sharing
...................................................................................................................................................................................................

Select folder Detail. Default values are OK.


Select folder Info. This folder houses only textual comments.
Select folder PM. Execute the suitable selections.
Select folder Miscellaneous. Execute the suitable selections.
Click on Next.
...................................................................................................................................................................................................

Per each LAN termination, one at a time, select the node and select the port.
Click on Next.
...................................................................................................................................................................................................

Termination Setting. It is the definition of the traffic flows.

Click on traffic descriptor button. Select the traffic descriptor from the selection box and
click on V to confirm.
Note: traffic descriptor values (CIR, PIR,....) must be contained in the
corresponding values of the PW being associated..
See Transport link selection phase of the EVC over T-MPLS tunnel create (this
procedure)
...................................................................................................................................................................................................

Select policy mode. If you select color aware, you will select color profile
Select classification priority-code0-7 / DSCP code 0-63
Select VLAN POP disabled

....................................................................................................................................................................................................................................
1350 OMS
17-91
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS HSI

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Folder traffic classifier deals on VLAN id ,....


Folder Leaf Term deals on HSI
Folder Reuse Flows allows to copy and reuse flow characteristics.
...................................................................................................................................................................................................

Click on Create.
You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
...................................................................................................................................................................................................

Select button Egress Flow, folder Push.


Select:
Class of service (guaranteed, best effort, regulated, ...)
If you select clear all fields, subsequent fields can be ignored.
VLAN ID. It is an additional ID added to the stack.
Priority mode. If set to Color Aware, fields Green and Yellow are active.
Folder Spoke is significant only for BTV and HSI.
Click on Create Egress.
You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window.
...................................................................................................................................................................................................

10

Select the other port (on TSS-B)


All fields are already set with the selections made for the first port.
Select Create Ingress.
Select Create Egress.
Click on Next button.
...................................................................................................................................................................................................

11

The Transport Link selection window opens.


...................................................................................................................................................................................................

12

Select EVC state.


Click on Apply to confirm EVC creation.
...................................................................................................................................................................................................

13

The PW list after EVC TD create is displayed. It contains the new PW created by the
system.

....................................................................................................................................................................................................................................
1350 OMS
17-92
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Create EVC over T-MPLS HSI

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14

Select the list of T-MPLS EVCs to show the EVC which has just been created. Issue
Search>Packet>T-MPLS>T-MPLS EVCs
...................................................................................................................................................................................................

15

In the EVC list the EVPL EVC is defined.


Issue Actions>Allocate.
...................................................................................................................................................................................................

16

Implement the EVC. The EVC goes implemented.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-93
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Alarms EVC T-MPLS

....................................................................................................................................................................................................................................

Alarms EVC T-MPLS


When to use

The scope of this procedure is to detect a fault condition on a T-MPLS EVC.


Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

From the T-MPLS EVC list attribute Availability is marked In Failure.


Figure 17-79 T-MPLS EVC list: Availability

....................................................................................................................................................................................................................................
1350 OMS
17-94
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Alarms EVC T-MPLS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the T-MPLS EVC issue Search>Fault Localization


Figure 17-80 EVC: Search>Fault Localization

...................................................................................................................................................................................................

The Transport Section is In Failure.


Figure 17-81 Navigation to Transport Section

....................................................................................................................................................................................................................................
1350 OMS
17-95
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


EVC on T-MPLS

Alarms EVC T-MPLS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

You can navigate to Link over Cable


Figure 17-82 Navigate to Link over Cable

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-96
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

What to do deleting a NE

....................................................................................................................................................................................................................................

Delete NE with EVC over T-MPLS


What to do deleting a NE
When to use

The scope of this procedure is to delete a NE with EVC over Tunnel


Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

Delete EVC over T-MPLS


...................................................................................................................................................................................................

Remove T-MPLS tunnel protection group


...................................................................................................................................................................................................

Remove PW (Pseudo Wire)


...................................................................................................................................................................................................

Remove Tunnel(s)
...................................................................................................................................................................................................

Deassign Link over Cable from T-MPLS Domain.


T-MPLS section is automatically deleted.
...................................................................................................................................................................................................

Deassign UNI ports used by EVC-T-MPLS.


...................................................................................................................................................................................................

Delete Link over Cable


...................................................................................................................................................................................................

Delete Node.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-97
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................

Delete NE detailed procedure


When to use

The scope of this procedure is to delete a NE with EVC over Tunnel


Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

From the bar select Search>Packet>Services>T-MPLS>T-MPLS EVCs


Figure 17-83 Search>Packet>Services>T-MPLS>T-MPLS EVCs

....................................................................................................................................................................................................................................
1350 OMS
17-98
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The EVC list is displayed. Select the relevant T-MPLS EVC and issue
Actions>Deimplement.
Figure 17-84 T-MPLS EVC:Actions>Deimplement

...................................................................................................................................................................................................

Select the T-MPLS EVC and issue Actions>Deallocate


Figure 17-85 T-MPLS EVC:Actions>Deallocate

....................................................................................................................................................................................................................................
1350 OMS
17-99
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the T-MPLS EVC and issue Search>T-MPLS Transport Links


Figure 17-86 T-MPLS EVC: Search>T-MPLS Transport Links

...................................................................................................................................................................................................

The T-MPLS Transport Links list is displayed. In the fact our T-MPLS EVC is carried by
the displayed PW.
Figure 17-87 T-MPLS Transport Links

....................................................................................................................................................................................................................................
1350 OMS
17-100
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Anyway the complete list of the Pseudo Wires can be obtained by selecting
Search>Packet>T-MPLS>T-MPLS Pseudo Wires
Figure 17-88 Search>Packet>T-MPLS>T-MPLS Pseudo Wires

....................................................................................................................................................................................................................................
1350 OMS
17-101
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the T-MPLS Pseudo Wire and issue Search>T-MPLS Tunnels


Figure 17-89 T-MPLS Pseudo Wire: Search>T-MPLS Tunnels

....................................................................................................................................................................................................................................
1350 OMS
17-102
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The involved T-MPLS Tunnel is displayed. Issue Search>T-MPLS Protection Involved


Tunnel.
Figure 17-90 T-MPLS Tunnel: Search>T-MPLS Protection Involved Tunnel

...................................................................................................................................................................................................

You can also issue the T-MPLS Tunnel Routing Display.


Figure 17-91 T-MPLS Tunnel Routing Display

....................................................................................................................................................................................................................................
1350 OMS
17-103
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

10

Select the Tunnel spare and issue Actions>Remove Protection keeping Main
Figure 17-92 Tunnel spare: Actions>Remove Protection keeping Main

...................................................................................................................................................................................................

11

The Routing Display after Remove Protection is shown below.


Figure 17-93 Routing Display after Remove Protection

....................................................................................................................................................................................................................................
1350 OMS
17-104
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12

Select the Tunnel and issue Search>T-MPLS Pseudo Wires


Figure 17-94 Tunnel: Search>T-MPLS Pseudo Wires

...................................................................................................................................................................................................

13

Delete the T-MPLS EVC. It was defined.


Figure 17-95 T-MPLS EVC: Actions>Delete

....................................................................................................................................................................................................................................
1350 OMS
17-105
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14

The deleted EVC is no longer present in the list.


Figure 17-96 EVC deletion evidence

...................................................................................................................................................................................................

15

Deimplement the involved Pseudo Wires


Figure 17-97 Pseudo Wires: Actions>Deimplement

....................................................................................................................................................................................................................................
1350 OMS
17-106
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

16

Delete the Pseudo Wires via Actions>Delete


Figure 17-98 Pseudo Wires: Actions>Delete

...................................................................................................................................................................................................

17

Deimplement tunnels MAIN and SPARE


...................................................................................................................................................................................................

18

Delete Tunnel SPARE


Figure 17-99 Delete Tunnel SPARE

....................................................................................................................................................................................................................................
1350 OMS
17-107
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

19

From the Tunnel issue Search>T-MPLS Section List


Figure 17-100 Tunnel: Search>T-MPLS Section List

...................................................................................................................................................................................................

20

The Tunnel related Section is shown.


Figure 17-101 Tunnel related Section

....................................................................................................................................................................................................................................
1350 OMS
17-108
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

21

Delete the T-MPLS tunnel


Figure 17-102 Delete T-MPLS tunnel

...................................................................................................................................................................................................

22

The involved tunnel is no longer present in the Tunnel list.


Figure 17-103 Tunnel deletion evidence

...................................................................................................................................................................................................

23

The Link over Cable has the same name as the Section

....................................................................................................................................................................................................................................
1350 OMS
17-109
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................

Deassign the LoC from the Domain.


Figure 17-104 Deassign LoC from Domain

...................................................................................................................................................................................................

24

Field Domain is deleted from the involved LoC.


Figure 17-105 Field Domain is deleted

....................................................................................................................................................................................................................................
1350 OMS
17-110
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

25

The associated Section is automatically deleted.


Figure 17-106 The associated Section is automatically deleted

...................................................................................................................................................................................................

26

From the defined Node select Search>Ethernet Physical Ports


Figure 17-107 Defined Node: Search>Ethernet Physical Ports

....................................................................................................................................................................................................................................
1350 OMS
17-111
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

27

Deassign the UNI port from the domain.


Figure 17-108 Deassign UNI port from the domain

...................................................................................................................................................................................................

28

The relevant field domain is empty.


Figure 17-109 Field domain is empty

....................................................................................................................................................................................................................................
1350 OMS
17-112
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Delete NE with EVC over T-MPLS

Delete NE detailed procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

29

Delete the NE.


Figure 17-110 Delete the NE

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-113
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Verify create EVC over T-MPLS

Overview

....................................................................................................................................................................................................................................

Verify create EVC over T-MPLS


Verify create EVC over T-MPLS
When to use

The scope of this procedure is to verify create EVC over T-MPLS.


Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > Services > T-MPLS > T-MPLS EVCs.
Figure 17-111 Search>Packet>Services>T-MPLS>T-MPLS EVCs

....................................................................................................................................................................................................................................
1350 OMS
17-114
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Verify create EVC over T-MPLS

Verify create EVC over T-MPLS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The list of the T-MPLS EVCs is displayed.


Figure 17-112 T-MPLS EVCs

...................................................................................................................................................................................................

Allocate the EVC


Figure 17-113 Allocate the EVC

....................................................................................................................................................................................................................................
1350 OMS
17-115
8DG42227DAAA 9.6
Issue 3 December 2012

EVC over T-MPLS


Verify create EVC over T-MPLS

Verify create EVC over T-MPLS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Implement the EVC


Figure 17-114 Implement the EVC

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
17-116
8DG42227DAAA 9.6
Issue 3 December 2012

18

18 to End Ethernet
End
Provisioning Management

Overview
Purpose

This chapter describes how to provision and monitor the Ethernet data.
Contents
IP DSCP/TOS and EtherType

18-6

Classification of the frames

18-6

Managing Customer

18-8

Overview about Customer

18-8

Display the Customer List

18-9

Description of the list of Customers

18-10

Create a Customer

18-11

Modify a Customer

18-12

Delete a Customer

18-14

Get Details of the Customer

18-15

Details of a Customer

18-16

Managing Ethernet Services

18-17

Overview about Ethernet Services

18-17

Display the Service List

18-20

Description of the list of Services

18-21

Create a Service

18-22

Service Setup

18-24

Modify a Service

18-30

Delete a Service

18-32

Get details of the Service

18-33

Details of a Service

18-35

...................................................................................................................................................................................................................................
1350 OMS
18-1
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management

Overview

....................................................................................................................................................................................................................................

Display the Services of a Customer


Managing ETS Ethernet Virtual Connections (EVC)

18-36
18-37

Overview about ETS Ethernet Virtual Connections

18-37

Resource Reservation for Private Services

18-39

Display the list of Connection Oriented EVC

18-42

Description of the list of EVCs

18-43

Create a Connection Oriented EVC

18-44

Modify an ETS EVC

18-47

Delete an ETS EVC

18-49

Get the EVC properties

18-51

Details of a EVC

18-53

Allocate ETS EVC

18-54

Deallocate ETS EVC

18-55

Implement ETS EVC

18-56

Deimplement ETS EVC

18-57

Commission ETS EVC

18-58

Decommission ETS EVC

18-59

List the EVC terminations

18-60

Description of the list of terminations

18-61

Delete an EVC Termination

18-62

Get the EVC termination properties

18-63

Details of a Termination

18-65

Add an EVC termination

18-66

EVC Fault Localization

18-68

Description of the list of Fault Localization

18-69

Description of the list of Alarms

18-70

Start PM on an EVC

18-71

Stop PM on an EVC

18-72

Synchronize PM on an EVC

18-73

Show PM on an EVC

18-74

View the Routing Display on an EVC

18-75

Managing End-to-End Ethernet Virtual Connections (E2E EVC)

18-76

Overview about E2E Ethernet Virtual Connections

18-76

Display the list of E2E EVC

18-78

Description of the list of EVCs

18-79

....................................................................................................................................................................................................................................
1350 OMS
18-2
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management

Overview

....................................................................................................................................................................................................................................

Create an E2E EVC

18-80

Create a full E2E EVC

18-84

Create a raw E2E EVC

18-86

Modify a full E2E EVC

18-87

Join E2E EVC

18-89

Managing an E2E EVC

18-91

EVC over SDH


Structure for EVC over SDH

18-93
18-93

Assign ports to domain

18-102

EVC over SDH

18-106

Alarms EVC T-MPLS

18-118

Full EVC Takeover

18-121

Overview about Full EVC Takeover procedure

18-121

Full EVC Takeover Procedure

18-122

T-MPLS Takeover

18-130

T-MPLS Takeover description

18-130

Takeover procedure for T-MPLS

18-131

Managing Color Profiles

18-133

Overview about Color Profiles

18-133

Display the Color Profile list

18-134

Create a Color Profile

18-135

Modify a Color Profile

18-136

Delete a Color Profile

18-139

Get the Color Profile Properties

18-140

Managing Traffic Descriptors

18-142

Overview about Traffic Descriptor

18-142

Display the Traffic Descriptor list

18-144

Description of the list of Traffic Descriptors

18-145

Create a Traffic Descriptor

18-146

Modify a Traffic Descriptor

18-149

Delete a Traffic Descriptor

18-152

Get the Traffic Descriptor Properties

18-153

Details of a Traffic Descriptor

18-155

Managing Traffic Classifiers

18-156

Overview about Traffic Classifiers

18-156

....................................................................................................................................................................................................................................
1350 OMS
18-3
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management

Overview

....................................................................................................................................................................................................................................

Display the Traffic Classifier list

18-158

Description of the list of Traffic Classifiers

18-159

Create a Traffic Classifier

18-160

Modify a Traffic Classifier

18-162

Delete a Traffic Classifier

18-164

Get the Traffic Classifier Properties

18-165

Details of a Traffic Classifier

18-167

Managing Ethernet ETS Edge Physical Ports

18-168

Overview about Ethernet edge physical ports

18-168

Display the ETS edge port list

18-169

Modify an edge port

18-170

Configure an ETS Edge Port

18-172

Get the ETS Edge Port Properties

18-175

Display the traffic parameter list

18-177

Description of the list of Traffic Parameters

18-178

Details of Traffic Parameters

18-179

Navigation to equipment

18-180

Show PM on an Edge Port

18-182

Show External Termination Point

18-183

Managing Ethernet Transport Links

18-184

Overview about Ethernet Transport Links

18-184

Display the Ethernet ETS Transport Link list

18-186

Description of the list of ETS Transport Links

18-187

Configure an ETS Transport Link

18-188

Get the Transport Link extremities

18-190

Get the Transport Link properties

18-193

Details of ETS Transport Links

18-195

Display the Transport Link bandwidth load

18-196

Managing Ethernet Segments

18-197

Overview about Ethernet Segments

18-197

Display the Ethernet Segment list

18-199

Description of the list of Ethernet Segments

18-200

Create an Ethernet Segment

18-202

Modify an Ethernet Segment

18-205

Delete an Ethernet Segment

18-208

....................................................................................................................................................................................................................................
1350 OMS
18-4
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management

Overview

....................................................................................................................................................................................................................................

Associate a Traffic Classifier to an Ethernet Segment

18-209

Disassociate a Traffic Classifier to an Ethernet Segment

18-211

Add a constraint to an Ethernet Segment

18-213

List the constraints related to an Ethernet Segment

18-216

Description of the list of Constraints

18-217

Delete an Ethernet Segment Constraint

18-218

Get the Ethernet Segment Constraint Properties

18-219

Details of an Ethernet Segment Constraint

18-221

Modify a Constraint

18-222

VLAN Push/Pop at ETS NNI Interface

18-225

Allocate an Ethernet Segment

18-226

Deallocate an Ethernet Segment

18-227

Implement an Ethernet Segment

18-229

Deimplement an Ethernet Segment

18-231

Configure an Ethernet Segment

18-233

Get the Ethernet Segment extremities

18-235

Description of the list of Ethernet Segment Extremities

18-239

Get the Ethernet Segment properties

18-240

Details of an Ethernet Segment

18-241

Display the route of an Ethernet Segment

18-242

Display the connectivity view of an Ethernet Segment

18-244

Managing VLAN types

18-246

Overview about VLAN types

18-246

Display the VLAN type list

18-247

Create a VLAN type

18-248

Modify a VLAN type

18-251

Delete a VLAN type

18-253

....................................................................................................................................................................................................................................
1350 OMS
18-5
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


IP DSCP/TOS and EtherType

Classification of the frames

....................................................................................................................................................................................................................................

IP DSCP/TOS and EtherType


Classification of the frames
Additional criteria

The Vlan and Priority based Classification is extended with the following criteria:

IP DSCP/TOS Classification.
Ether Type Classification.

These new Classifications live together with existing Vlan and Priority based
Classification. So the global way to manage incoming Ethernet Frames allows the
definition of more Classification combinations.
Application context

The new classification management is applicable in following contexts:

At Flow Level for Ethernet Connection Oriented Domains (ETS).


At Flow Level for Provider Bridge Edge Terminations (ETS_P).

The Feature is not applicable to MAC and Virtual (ETB) contexts.


The customer equipments (CE) at the border of the provider network are often IP routers
in charge of managing the frontier between IP and Ethernet. These routers translate the IP
Diff-Service Code Point (DSCP) field (and/or the IP Precedence field) into Ethernet
priority bits (PRI bits). Since not all the routers perform that translation, the NE
functionalities have been extended to IP DSCP management.
The user managing an Ethernet network offers differentiated services also when IP routers
are not able to write the PRI bits of the transmitted Ethernet frames. In fact, the NE
inspects the code-point of the IPv4 header, representing PHB (CoS + Dropping
Precedence). Then NE pushes at the NNI a VLAN tag whose PRI bits value encodes that
PHB information.
Classification management summary

The classification management is summarized in following table


Classification Type.

ETS Flow Specific Classifier


Criteria.

Prio.

VlanId.

EtherType.

IP.
TOS.
DSCP.

DEFAULT.

Default Classifier Criteria.

Do not
care.

4097.

Do not care.

65.

Untagged.

Untagged Classifier Criteria.

8.

4096.

Do not care.

65.

Untagged+EtherType.

Untagged Classifier Criteria +


EthType.

8.

4096.

EtherType.

65.

Untagged+ NO IP.

Untagged Non IP Classifier Criteria.

Do not
care.

4096.

Do not care.

64.

....................................................................................................................................................................................................................................
1350 OMS
18-6
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


IP DSCP/TOS and EtherType

Classification of the frames

....................................................................................................................................................................................................................................
Classification Type.

ETS Flow Specific Classifier


Criteria.

Prio.

VlanId.

EtherType.

IP.
TOS.
DSCP.

Untagged+ NO
IP+EtherType.

Untagged Non IP Classifier Criteria


+ EthType.

Do not
care.

4096.

EthType.

64.

Untagged+DSCP+IP.

Untagged Specific DSCP Classifier


Criteria + EthType.

Do not
care.

4096.

IP(0x0800).

0.

VLAN.

Specific Classifier Criteria.

PRIO.

VID.

Do not care.

65.

Mixed (VLAN Range) Classifier


Criteria.

PRIO.

Range.

Do not care.

65.

Mixed (PRI Range) Classifier


Criteria.

Range.

VID.

Do not care.

65.

Range Classifier Criteria.

Range.

Range.

Do not care.

65.

Specific Classifier Criteria +


EthType.

Prio.

VID.

EthType.

65.

Mixed (VLAN Range) Classifier


Criteria + EthType.

Prio.

Range.

EthType.

65.

Mixed (PRI Range) Classifier


Criteria + EthType.

Range.

VID.

EthType.

65.

Range Classifier Criteria + EthType.

Range.

Range.

EthType.

65.

Specific VLAN Classifier Criteria.

Do not
care.

VID.

Do not care.

64.

VLAN Range Classifier Criteria.

Do not
care.

Range.

Do not care.

64.

Tagged Non IP Classifier Criteria.

Do not
care.

Full
Range.

Do not care.

64.

Specific VLAN Classifier Criteria +


EthType.

Do not
care.

VID.

EtherType IP.

64.

VLAN Range Classifier Criteria +


EthType.

Do not
care.

Range.

EtherType IP.

64.

Tagged Non IP Classifier Criteria +


EthType.

Do not
care.

Full
Range.

EtherType IP.

64.

Specific Classifier Criteria +


EthType.

Do not
care.

VID.

IP(0x0800).

DSCP.

Mixed (VLAN Range) Classifier


Criteria + EthType.

Do not
care.

Range.

IP(0x0800).

Range.

Mixed (DSCP Range) Classifier


Criteria + EthType.

Do not
care.

VID.

IP(0x0800).

Range.

Range Classifier Criteria + EthType.

Do not
care.

Full
Range.

IP(0x0800).

DSCP.

Tagged DSCP Range Classifier


Criteria + EthType.

Do not
care.

Full
Range.

IP(0x0800).

Range.

VLAN+EtherType.

VLAN+NO IP.

VLAN+NO
IP+EtherType.

VLAN+DSCP+EtherType.

....................................................................................................................................................................................................................................
1350 OMS
18-7
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Customer

Overview about Customer

....................................................................................................................................................................................................................................

Managing Customer
Overview about Customer
Customer description

A customer is the owner of one or more Customer Edges (equipment).


The customer is the final user of the Ethernet services defined across the boundaries of
the managed network.
A customer encompasses a series of Ethernet Services provided by the Service Provider.
User Label is the identifier of a given customer. The user label is used or displayed when
defining or displaying the other entities (that is EVC). The EVC defines the Ethernet
services for the customer.

....................................................................................................................................................................................................................................
1350 OMS
18-8
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Customer

Display the Customer List

....................................................................................................................................................................................................................................

Display the Customer List


When to use

The Customer List window presents all the customers and their attributes.
Related Information

For more information, refer to Customer description (p. 18-8).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Customer.
Result: The list window is displayed.

See the following topic in this document: Description of the list of Customers
(p. 18-10)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-9
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Customer

Description of the list of Customers

....................................................................................................................................................................................................................................

Description of the list of Customers


Attributes of a Customer

The attributes displayed for each customer are:

User Label.

Address.

Company.

Comment.

....................................................................................................................................................................................................................................
1350 OMS
18-10
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Customer

Create a Customer

....................................................................................................................................................................................................................................

Create a Customer
When to use

This function allows the user to define the characteristics of the customer.
Related Information

For more information, refer to Customer description (p. 18-8).


The definition of a customer allows the usage of services defined across the boundaries of
the managed network.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The maximum number of customers must not be reached.


The User Label must be different from the existing ones.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > Services > Create Customer.


...................................................................................................................................................................................................

On the Create Customer Window.


To create a customer:

Enter a User Label.

Enter a Company (optional).

Enter an Address (optional).

Enter a Comment (optional).

...................................................................................................................................................................................................

Click Ok.
Result: The customer is created.

The tree area and the Customer list are updated.


E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
18-11
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Customer

Modify a Customer

....................................................................................................................................................................................................................................

Modify a Customer
When to use

The function modifies Customer characteristics.


Related Information

For more information, refer to Customer description (p. 18-8).


The customer modification function gives the possibility to modify the:

User Label.
Company.
Address.
Comment.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If modified, the new User Label must be different from the existing ones.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Customers.


...................................................................................................................................................................................................

On the Customer List Window, select the Customer to modify. Click the right mouse
button and select Modify on the popup menu.
...................................................................................................................................................................................................

The Modify Customer window is displayed.


For the selected customer, you can modify:

Enter a new User Label (optional).

Modify the Company (optional).

Modify the Address (optional).

Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
18-12
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Customer

Modify a Customer

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok.
Result: The customer is modified.

The tree area and the Customer list are updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-13
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Customer

Delete a Customer

....................................................................................................................................................................................................................................

Delete a Customer
When to use

This function consists in deleting a customer from the 1350 OMS PKT supervision.
Related Information

For more information, refer to Customer description (p. 18-8).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

No more service is related to the customer to be deleted.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Customers.


...................................................................................................................................................................................................

On the Customer List Window, select the Customer to delete. Select Action > Customer
> Delete from the Action menu.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The customer is deleted.

After confirmation, the customers are removed.


The Customer List and the tree area are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-14
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Customer

Get Details of the Customer

....................................................................................................................................................................................................................................

Get Details of the Customer


When to use

This function gets information about a customer.


Related Information

For more information, refer to Customer description (p. 18-8).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Customers.


...................................................................................................................................................................................................

On the Customer List Window, select a Customer. Select Action from Customer >
Properties from the popup menu.
Result: The property window is displayed.

See the following topic in this document: Details of a Customer (p. 18-16)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-15
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Customer

Details of a Customer

....................................................................................................................................................................................................................................

Details of a Customer
Attributes of a Customer

For the selected customer, the properties are:

User Label the customer name.

Company the Customer Company name (optional).

Address the Customer Company address (optional).

Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
18-16
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Overview about Ethernet Services

....................................................................................................................................................................................................................................

Managing Ethernet Services


Overview about Ethernet Services
Ethernet Service description

There are two ways to define a Service:

by means of a user action. In this way, the user defines all characteristics of the new
Ethernet service.
automatically after an EVC creation. In this case, all characteristics of the service
must be derived as much as possible from the EVC characteristics. This action is
automatically performed by 1350 OMS PKT).

Ethernet service classification

The Ethernet service is a concept useful to define the way in which end-to-end Ethernet
connections are organized:

Ethernet Line (E-Line): for point-to-point connectivity. E-line services are used to
create Ethernet private line services, Ethernet-based Internet access services, and
point-to-point Ethernet VPNs.

Ethernet LAN (E-LAN): for multipoint-to-multipoint (any-to-any) connectivity.


E-LAN Services are designed for multipoint Ethernet VPNs and native Ethernet
Transparent LAN services.

Ethernet service types

Following types of Ethernet services can be defined for each customer:

EPL (Ethernet Private Line Service) (p. 18-17).

EVPL (Ethernet Virtual Private Line Service) (p. 18-18).

EVPLAN (Ethernet Virtual Private LAN Service) (p. 18-18).

Extended EVPLAN (Extended Ethernet Virtual Private LAN Service) (p. 18-18).

HSI (High Speed Internet) (p. 18-19).

Broadcast (p. 18-19).

EPL (Ethernet Private Line Service)

This service consists of a point-to-point EVC that uses dedicated bandwidth. Bandwidth
can be virtual concatenated Sonet/SDH channels or reserved packet bandwidth in a packet
switched network. The bottom line is that the Ethernet frames of the customer stay strictly
separated from others' at the Ethernet layer. The customer always has available the
committed or contracted bandwidth rate also known as CIR (committed information rate).
The Ethernet Private Line is much like today TDM-based private lines. It offers the
benefit of a native Ethernet interface to the customer and to the network user edge
equipment. In a Private Service, no resource is sharing and no UNI Multiplexing. The
network resources used by one Service cannot be used by other Services.
....................................................................................................................................................................................................................................
1350 OMS
18-17
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Overview about Ethernet Services

....................................................................................................................................................................................................................................

EVPL (Ethernet Virtual Private Line Service)

For the Ethernet Virtual Private Line, the rules are slightly different. In this service, the
customer still gets point-to-point connectivity, but over shared bandwidth instead of
dedicated. The shared bandwidth can be a TDM channel in the transport network or the
switch fabric bandwidth of switches and routers in the packet network. Features such as
committed information rates (CIR) and excess information rates (EIR) can be offered by
the service provider. They have service performance metrics to support true SLAs. This
service is therefore similar to Frame Relay and its model of creating networks using
PVCs (permanent virtual circuits). The MEF defines the Ethernet Virtual Private Line
service as a point-to-point Ethernet Virtual Connection (EVC) between two UNIs
(subscribers). The EVPL supports a service multiplexed UNI. It means that multiple
EVCs can share a single UNI. This characteristic is useful when creating hub-and-spoke
architectures in which multiple remote offices all require access to a headquarters.
Multiple customers all require access to a POP (point of presence) of the ISP. The user
can mix connectivity services and managed services.
EVPLAN (Ethernet Virtual Private LAN Service)

EVPLAN allows any edge node to send/receive information to/from others edge nodes. It
supports every Network topology (Point to point, Point to multipoint, Multipoint to
multipoint). It can be based on Connection Oriented or on Connection Less networks
based on 802.1Q (Virtual Bridge) and/or on 802.1ad (Provider Bridge). EVPLANis a
Virtual Service as network resources used by one Service can be used by other Services.
Resource sharing and UNI Multiplexing are allowed. The Ethernet Virtual Private LAN
(EVPLAN) has gone by different names over the past two years. From Virtual Private
LAN Service (VPLS) to Transparent LAN Service (TLS), to Virtual Private Switched
Network (VPSN). Regardless of how EVPLAN is termed, the EVPLan is a network
service providing Layer-2 multipoint connectivity between Ethernet edge devices.
Customer separation is accomplished through encapsulation or Ethernet virtual
connections. The EVPLan is designed as the most cost-effective service for the carrier, as
it can leverage shared transmission bandwidth in the network. As a multipoint service, it
can be complex to administer. Customer service separation by Provider VLAN tags is not
likely to be sufficient because of the limited address space of Provider VLAN IDs (only
4096). Hence other service delivery technologies providing customer frame encapsulation
must be used such as MPLS, MAC-in-MAC, and RPR. The user must also decide how to
implement protection, bandwidth profiles, congestion management, buffering, and so on.
These properties are much more complex to be implement compared to point-to-point
services.
Extended EVPLAN (Extended Ethernet Virtual Private LAN Service)

Extended EVPLAN allows any edge node to send/receive information to/from others
edge nodes. It supports every Network topology (Point to point, Point to multipoint,
Multipoint to multipoint). It can be based on Connection Oriented or on Connection Less
network based on 802.1D (MAC Bridge) or on 802.1Q (Virtual Bridge). This service is a
Private Service as network resources used by one Service cannot be used by other
Services. No resource is sharing and no UNI is Multiplexing.
....................................................................................................................................................................................................................................
1350 OMS
18-18
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Overview about Ethernet Services

....................................................................................................................................................................................................................................

HSI (High Speed Internet)

HSI is an Internet Access service. The advertised throughput reaches, or which


consistently achieves, speeds over narrowband (128 Kbit/s). Throughput is considered
between the end-user equipment and the first Internet router reached outside the IP
network managed by the Internet provider.
Broadcast

A broadcast is the transmission of a single message to all hosts on the network


simultaneously. Broadcasting is supported on most local area networks (LANs).
Broadcast is also a useful feature in e-mail systems. Multicasting differs from
broadcasting in that it sends the message just to a select list of recipients rather than to
every host on the network. Unicasting is sending a message to a single host. A broadcast
address is a special type of networking address that is used for broadcasting. A broadcast
domain is a logical area in a network that is reachable by a broadcast. The word broadcast
originally meant scattering seed or fertilizer over a broad area rather than placing it in
rows.
Ethernet service containment tree

In the definition of Ethernet service, the used terminations are not specified, they are
defined in the Ethernet Virtual Connection (EVC) definition.
Figure 18-1 Ethernet service containment tree

customer

EthService

EVC_1

EthSegm_1

........

EVC_2

........

EthSegm_n

........

Depending on Service Type, an Ethernet service can include one or more EVCs.

....................................................................................................................................................................................................................................
1350 OMS
18-19
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Display the Service List

....................................................................................................................................................................................................................................

Display the Service List


When to use

The Ethernet Service List window presents all the Ethernet services and their attributes.
Related Information

The list can be required in different manners:

If the list is required from Main Menu, all the Ethernet Services are displayed.
If the list is required from the Customer List, only the Ethernet services associated to
the selected customer are displayed.
If the list is required from Ethernet Transport Link List, only the Ethernet services
associated to the selected Ethernet Transport Links are displayed.

For more information about Services, refer to Ethernet Service description (p. 18-17).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Service.
Result: The list window is displayed.

See the following topic in this document: Description of the list of Services
(p. 18-21)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-20
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Description of the list of Services

....................................................................................................................................................................................................................................

Description of the list of Services


Attributes of a Service

The attributes displayed for each service are:

User Label.

Customer User Label.

Type (EPL, EVPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI, Broadcast,
BTV).

Working State (Normal, Configuring, Removing).

Service State (Not in service, In service, Upgrading).

Availability Status (Normal, Degraded, In Failure, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS
18-21
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Create a Service

....................................................................................................................................................................................................................................

Create a Service
When to use

This function allows creating an Ethernet Service.


Related Information

If this creation window is required from the Customer List, the Customer field of the
creation window is automatically filled with the selected value.
For more information about Services, refer to Ethernet Service description (p. 18-17).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

At least, one customer must previously be defined.


The User Label must be different from the existing ones.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > Services > Create Ethernet Service.
...................................................................................................................................................................................................

On the Create Service Window.


To create a service define following data:

Enter a Service User label.

Choose the Customer from the list (this field is automatically filled if this window is
required from the Customer List).
Select a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended
EVPLAN, HSI, BTV, or Broadcast).
Enter the Reference SLA(string optional).

Enter a Comment (optional).

...................................................................................................................................................................................................

Click Ok.

....................................................................................................................................................................................................................................
1350 OMS
18-22
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Create a Service

....................................................................................................................................................................................................................................

Result: The service is created.

A correlation with the selected customer is created.


Then, the tree area and the Ethernet Service List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-23
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Service Setup

....................................................................................................................................................................................................................................

Service Setup
When to use

The wizard creates and configure at once: Service, EVC, and Ethernet Segment.
Related Information

For more information about Services, refer to Ethernet Service description (p. 18-17).
wizard results

For EVPL, EPTL, EPL, and Extended EVPL connectivity only an Automatic Setup function
can be chosen.
The wizard creates at once:

a new service.
a Point-to-Point Bi-directional EVC (named "<Service User Label > _EVC_<Id > "),.
two Ethernet Segments (named "<Service User Label > _ESG_A_Z_<Id > " and
"<Service User Label > _ESG_Z_A_<Id > ").
associate a Traffic Descriptor and a Traffic Classifier to Ethernet Segments.

Service states

The Ethernet service is created into the 1350 OMS PKT with the following state:

Working State: Normal.


Service State: Not In Service.

Availability Status: depending on the availability status of created EVC.

A correlation with the selected customer is created. Then, the tree area and the Ethernet
Service List are updated.
EVC states

One EVC is created into the 1350 OMS PKT with the following attributes:

User Label: <Service User Label > _EVC_<progressive_number >.

Type: Point to Point.

Traffic type: Unicast.

Directionality: Bidir.

Service Level: Gold.

Provisioning State: Defined.

Working State: Normal.

A correlation with the Service is created.


Then, the EVC is allocated and then, implemented (Provisioning State set to
Implemented). At the end, the tree area and the EVC List are updated.

....................................................................................................................................................................................................................................
1350 OMS
18-24
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Service Setup

....................................................................................................................................................................................................................................

Ethernet Segment states

Two Ethernet Segments are created into the 1350 OMS PKT with the following attributes:

User Label: <Service User Label > _ESG_A_Z_<progressive_number > and

<Service User Label > _ESG__Z_A_<progressive_number >.


Subnetwork: NE Subnetwork.
Provisioning State: Defined.

Working State: Normal.

Traffic type: Unicast.

Policy Mode: Color Blind.

Color Profile: "No associated Color Profile".

Final settings

If the Transport Link is chosen by the user (case NE are not E/FE/GE), that Transport
Link is used as a constraint.
If the Transport Link is not chosen by the user, the Transport Link must be derived by one
of the two ports. Then, the retrieved Transport Link is used as constraint.
A correlation with the EVC is created.
Then, the two Ethernet Segments are allocated and then, implemented Provisioning State
set to Implemented).
At the end, the tree area and the Ethernet Segment List are updated.
A correlation with the default Traffic Descriptor is created. Correlation is based on
bandwidth parameter.
At the end, the Service State of the Ethernet service is set to 'In Service'.
Recovery consideration in case of error

In case of error, no global rollback is provided.


The execution is immediately stopped at the last useful step (and a message is returned to
the user to describe the occurred problem. The function can be split in term of other sub
functions (create Service, create EVC, .) and consider each sub function as atomic. so
when a sub function fails, the operation fails but for all previous sub functions and no
rollback is possible.
In case of any negative result, the user has two possibilities:

Continue manually supplying all missing operations proceeding step by step.


Invoke a manual deletion of the partially built tree starting from the Ethernet Service.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
....................................................................................................................................................................................................................................
1350 OMS
18-25
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Service Setup

....................................................................................................................................................................................................................................

Conditions

To get a positive result:

No more service is related to the customer to be deleted.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > Services > Create Ethernet Service.
Result: The wizard EVPL/EPTL/EPL/Extended EVPL Automatic Setup is shown.
Figure 18-2 EVPL/EPTL/EPL/Extended EVPL service creation wizard

...................................................................................................................................................................................................

In the panel insert:

Enter a Service User label.

Choose the Customer by using the sensitive help (this field is automatically filled if
this window is required from the Customer List).
Select the Service Type (EPTL, EVPL, EPL, or Extended EVPL). If you insert EVPL or
Extended EVPL Service Type. Refer to: Task for EVPL or Extended EVPL
(p. 18-28).

....................................................................................................................................................................................................................................
1350 OMS
18-26
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Service Setup

....................................................................................................................................................................................................................................

Select a NAD Value from the list.


Enter the Reference SLA (a string) (optional).
The Class of Service is Guaranteed.
Enter a Comment (optional).

Click Next.
Result: The wizard goes to the next step.

...................................................................................................................................................................................................

Fill the following fields:

Select Resources section (by using the sensitive help and menu).

Select a NE or ENE for the "A" end by using sensitive help.

Select an Edge Port A by using sensitive help.

....................................................................................................................................................................................................................................
1350 OMS
18-27
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Service Setup

....................................................................................................................................................................................................................................

Select a NE or ENE for the "Z" end by using sensitive help.


Select an Edge Port Z by using sensitive help.
Select if free Transport Link (by checking the box).
Select the Transport Link (by using the sensitive help; in the case of E/FE/GE NE, the
Transport Link is automatically determined by the 1350 OMS PKT).
Click Next.
On the next panel click the Finish button.
Result: The wizard creates and configure at once: Service, EVC, and Ethernet

Segment.
E...................................................................................................................................................................................................
N D O F S T E P S

Task for EVPL or Extended EVPL


...................................................................................................................................................................................................

If you insert EVPL or Extended EVPL Service Type, the following panel is displayed:

Enter a Service User label.

Choose the Customer by using the sensitive help (this field is automatically filled if
this window is required from the Customer List).
Select the Service Type (EVPL, Extended EVPL).
Enter the Reference SLA (a string) (optional).

Enter a Comment (optional).

In the Traffic Descriptor tab:


The Traffic Descriptor can be selected from the already created list, or checking the
box Create, insert the Traffic Descriptor characteristics:
Class of Service: Guaranteed, Regulated, Best Effort.

CIR, PIR, CES, PBS values.

In the Traffic Classifier tab:


The Traffic Classifier can be selected from the already created list, or checking the
box Create, insert the Traffic Classifier characteristics:

Vlan Id.

Priority Id.

Priority Max.

Vlan Max.

Click Next.
Result: The wizard goes to the next step.

...................................................................................................................................................................................................

Fill Resources section (by using the sensitive help and menu): this panel has the same
layout as the EPLINE Service panel.
On the panel click the Finish button.

....................................................................................................................................................................................................................................
1350 OMS
18-28
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Service Setup

....................................................................................................................................................................................................................................

Result: The wizard creates and configure at once: Service, EVC, and Ethernet
Segment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-29
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Modify a Service

....................................................................................................................................................................................................................................

Modify a Service
When to use

The function modifies Service characteristics.


Related Information

For more information about Services, refer to Ethernet Service description (p. 18-17).
The service modification gives the possibility to modify one or all the following
parameters:

Service User Label.

Service Type (only if no EVCs are currently associated to the Ethernet service).

Comment.

Reference SLA.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

No operation is pending on the Ethernet service.


If modified, the new User Label must be different from the existing ones.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Services.


...................................................................................................................................................................................................

On the Service List Window, select the Service to modify. Click the right mouse button
and select Modify on the popup menu.
...................................................................................................................................................................................................

The Modify Service window is displayed.


To modify an Ethernet service:

Enter a new User Label (optional).

Modify the Service Type (optional).

....................................................................................................................................................................................................................................
1350 OMS
18-30
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Modify a Service

....................................................................................................................................................................................................................................

Modify the Reference SLA (optional).


Modify the Comment (optional).

...................................................................................................................................................................................................

Click Ok.
Result: The service is modified.

If the Service User Label is modified, after confirmation of the modification: the tree
area (in customer section) and the Service List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-31
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Delete a Service

....................................................................................................................................................................................................................................

Delete a Service
When to use

This function consists in deleting an Ethernet service from the 1350 OMS PKT
supervision.
Related Information

For more information about Services, refer to Ethernet Service description (p. 18-17).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

No more EVC related to the Service to be deleted.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Services.


...................................................................................................................................................................................................

On the Service List Window, select the service to delete. Select Action > Service >
Delete from the Action menu.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The service is deleted.

After confirmation, the services are removed.


The Service List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-32
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Get details of the Service

....................................................................................................................................................................................................................................

Get details of the Service


When to use

This function gets information about an Ethernet service.


Related Information

For more information about Services, refer to Ethernet Service description (p. 18-17).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Services.


...................................................................................................................................................................................................

On the Service List Window, select a Service. Select Properties from the popup menu
activated using the mouse right button.

....................................................................................................................................................................................................................................
1350 OMS
18-33
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Get details of the Service

....................................................................................................................................................................................................................................

Result: The Properties window is displayed.

See the following topic in this document: Details of a Service (p. 18-35)
Figure 18-3 Ethernet Service Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-34
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Details of a Service

....................................................................................................................................................................................................................................

Details of a Service
Attributes of a Service

The attributes displayed for each service are:

Id

User Label.

Customer User Label.

Service Type (EPL, EVPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI,
Broadcast, BTV).

Reference SLA

Comment

Action Type

Action Date

Working State (Normal, Configuring, Removing).

Availability Status (Normal, Degraded, In Failure, Not Meaningful).

ETS ID label

ETS LABEL label

Customer Id label User Label.

Service State (Not in service, In service, Upgrading).

....................................................................................................................................................................................................................................
1350 OMS
18-35
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Services

Display the Services of a Customer

....................................................................................................................................................................................................................................

Display the Services of a Customer


When to use

The function lists all the Ethernet services belonging to a Customer.


Related Information

The list can be required in different manners:

If the list is required from Main Menu, all the Ethernet Services are displayed.
If the list is required from the Customer List, only the Ethernet services associated to
the selected customer are displayed.
If the list is required from Ethernet Transport Link List, only the Ethernet services
associated to the selected Ethernet Transport Links are displayed.

For more information about Services, refer to Ethernet Service description (p. 18-17).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Service.
Result: The list window is displayed.

See the following topic in this document: Description of the list of Services
(p. 18-21)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-36
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Overview about ETS Ethernet Virtual Connections

....................................................................................................................................................................................................................................

Managing ETS Ethernet Virtual Connections (EVC)


Overview about ETS Ethernet Virtual Connections
EVC description

The Ethernet Virtual Connection (EVC) specifies the connectivity among two or more
Ethernet Edge Terminations (UNIs). If they belong to the same Metro Ethernet Network,
the association of Ethernet Edge Termination is implicitly specified, too.
The following main rules govern the EVC:
The EVC is common to Connection Oriented and Connection Less management

a frame sent in the EVC can be delivered to one or more egress EVC Termination
(Ethernet Edge Termination).
a frame sent in the EVC cannot be delivered back to the ingress EVC Termination.
a frame sent in the EVC cannot be delivered to another EVC.

Every EVC is terminated by Edge Ports.


The same Edge Port can be used by different EVCs.
EVC topologies

The EVC can be used in different topologies and can have different properties. In
particular, the EVC can be:

Point-to-point (PtoP): It connects exactly two points (that is, two Ethernet Edge
Ports). It can be unidirectional or bidirectional. It supports only Unicast traffic.
Rooted-multipoint (RMP): A multipoint EVC in which each UNI is designated as
either a Root or a Leaf. Ingress Service Frames at a Root UNI can be delivered to one
or more of any of the other UNIs in the EVC. Ingress Service Frames at a Leaf UNI
can only be delivered to one or more Root UNIs in the EVC.
Multipoint-to-multipoint (MPtoMP): It connects two or more points. It can be
unidirectional or bidirectional. It supports only traffic Unicast.

The Role of Edge Port

Depending on the EVC topology, every Edge Port used by a given EVC assumes a
specific Role.

In PtoP topology, the two ports assume the "both" role (that is, root + leaf).
In PtoMP topology, one port assumes the "root" role while all the others assume the
"leaf" role.
In MPtoMP topology, all ports assume the "both" role (that is, root + leaf).

....................................................................................................................................................................................................................................
1350 OMS
18-37
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Overview about ETS Ethernet Virtual Connections

....................................................................................................................................................................................................................................

The following figure summarizes the role assumed by Edge Port for different EVCs.
Figure 18-4 EVCs and Edge Ports relationships

....................................................................................................................................................................................................................................
1350 OMS
18-38
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Resource Reservation for Private Services

....................................................................................................................................................................................................................................

Resource Reservation for Private Services


Overview

When the user defines a new Service Type, an important aspect is to define the expected
usage of physical resources. In particular, the management of Resource Sharing attribute
introduced at EVC level. This parameter defines the global policy, in terms of
privacy/sharing of UNI (Edge Ports) and Transport Links.
To manage the issue related to Shared or Dedicated Transport Link usage, the Resource
Sharing attribute at EVC Level can assume following values.

Full: the EVC Service under definition can use every resource without any restriction.

Private UNI: the EVC Service under definition must use Private UNI, that is UNI

uniquely used by that EVC Service.


Private Link: The EVC Service under definition must use Private Links, that is
Transport Links uniquely used by that EVC Service.
Private UNI and LINK: The EVC Service under definition must use Private UNI and
Private Links, that is chosen Transport Links and UNIs are uniquely used by that EVC
Service.

Resource Sharing

The following table reports the possible choices of Resource Sharing respect to Service
Type and respect to crossed technological domain.
Service Type.

Resource Sharing.
Full.

Private UNI.

Private Link.

Private UNI and Link.

UNKNOWN.
EVPL.

ETS.
Provider Bridge.

EPTL.

ETS.

EPL.

ETS.
Provider
Bridge.

EVPLAN.

Extended EVPL.

Extended
EVPLAN.

ETS.

ETS.

Provider Bridge.

Provider
Bridge.

ETS.

ETS.

ETS.

ETS.

Provider Bridge.

Provider
Bridge.

Provider
Bridge.

Provider Bridge.

ETS.

ETS.

ETS.

ETS.

Provider Bridge.

Provider
Bridge.

Provider
Bridge.

Provider Bridge.

....................................................................................................................................................................................................................................
1350 OMS
18-39
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Resource Reservation for Private Services

....................................................................................................................................................................................................................................

Service Type.
HSI.

Resource Sharing.
ETS.
Provider Bridge.

BTV.

ETS.
Provider Bridge.

BROADCAST.

ETS.

ETS.

Connection Oriented Service Type relations


Table 18-1

Connection Oriented Service Type relations

Service Type.

Type.

Traffic Type.

Resource Sharing.

EVPL.

Point-to-Point.

Unicast.

Full.

EPTL.

Point-to-Point.

Unicast.

Private UNI and Link.

EPL.

Point-to-Point.

Unicast.

Private UNI.

EVPLAN.

Any-to-Any.

Unicast.

Full.
Private UNI.
Private UNI and Link.
1

Extended EVPL.

Point-to-Point.

Unicast.

Full.
Private UNI.
Private UNI and Link.
1

Extended
EVPLAN.

Any-to-Any.

Unicast.

Full.

Rooted
Multipoint.

Multicast.

Private UNI.

HSI.

Private UNI and Link.

Rooted
Multipoint.

Unicast.

Rooted
Multipoint.

Rooted
Multipoint.

Full.

Unicast.

Full.

Multicast.
1

Broadcast.

Multicast.
1

BTV.

Unicast.

Full.
Private UNI.
Private UNI and Link.
1

....................................................................................................................................................................................................................................
1350 OMS
18-40
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Resource Reservation for Private Services

....................................................................................................................................................................................................................................

Notes:

1.

This case allows a selection of the parameters.

Frame delivery

Frame delivery types are the following:

Unicast Service Frame Delivery: MAC ACL configuration on Edge Ports can

influence the behavior. It verifies if the MAC ACL can be used to filter all unicast
address. For Connection Oriented EVCs transporting Unicast frames, the default
value is assumed always equal to Deliver Unconditionally. For Connection Less
EVCs, the default value is Deliver Conditionally (depending on filtering set on UNI).
The default value is modifiable and it does not affect real traffic due to the fact that
MAC ACL is not known to 1350 OMS PKT. The MAC ACL is managed through
Navigation, The full compliancy is in the user hands.
Multicast Service Frame Delivery: MAC ACL configuration on Edge Ports can
influence the behavior. It must be verified if the MAC ACL can be used to filter all
multicast address. For Connection Oriented EVCs transporting Multicast Frames, the
default value is assumed always equal to Deliver Unconditionally. For Connection
Less EVCs or when IGMP is used, the default value is Deliver Conditionally
(depending on filtering set on UNI). The MAC ACL is managed through Navigation.
The full compliancy is in the user hands.
Broadcast Service Frame Delivery: MAC ACL configuration on Edge Ports can
influence the behavior. It must be verified if the MAC ACL can be used to filter all
broadcast address. For Connection Oriented EVCs, the default value is assumed
always equal to Deliver Unconditionally. For Connection Less EVCs, the default
value is Conditional (depending on filtering set on UNI). The MAC ACL is managed
through Navigation. The full compliancy is in the user hands.

C-VLAN and CoS Preservation

C-VLAN and CoS Preservation:

C-VLAN Preservation ensures that each packet exiting the EVC has the same VLAN

Id information that it had when it entered the EVC.


The following relation is respected: VLAN Id Egress UNI = VLAN IdIngress UNI.
C-VLAN Preservation attribute must be defined at EVC definition and is modifiable

before EVC allocation.

C-VLAN CoS Preservation ensures that each packet exiting the EVC has the same
Priority Bits information that it had when it entered the EVC.

The following relation is respected: Priority Bit at ingress = Priority Bit at egress .

....................................................................................................................................................................................................................................
1350 OMS
18-41
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Display the list of Connection Oriented EVC

....................................................................................................................................................................................................................................

Display the list of Connection Oriented EVC


When to use

The Ethernet Virtual Connection List window presents all the EVCs and their attributes.
Related Information

This list can be required also from the Ethernet Service List, from the Ethernet Segment
List, or from the Ethernet Transport Link List. In These cases, only the EVCs associated
to the selected object are displayed.
For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select ConnectionOriented > ETS EVCs.


Result: The list window is displayed.

See the following topic in this document: Description of the list of EVCs (p. 18-43)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-42
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Description of the list of EVCs

....................................................................................................................................................................................................................................

Description of the list of EVCs


Attributes of a EVC

The attributes displayed for each EVC are:

User Label.

Ethernet Service User Label.

Type (Point to point, Routed multi-point, Any to any).

Traffic Type (Unicast, Multicast).

Working State (Normal, Configuring, Allocating, De-allocating, Implementing,

De-implementing, Commissioning, De-commissioning, Termination adding,


Termination removing, Constraint adding, Constraint removing, removing).
Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,
Implemented, Commissioned).
Service State (Not in Service, In Service).

Availability Status (Normal, Degraded, In Failure, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS
18-43
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Create a Connection Oriented EVC

....................................................................................................................................................................................................................................

Create a Connection Oriented EVC


When to use

This function allows creating a Connection Oriented Ethernet Virtual Connection.


Related Information

For more information about EVC, refer to EVC description (p. 18-37).
If the EVC Creation window is required from the Service List, the Ethernet Service field
is filled with the selected value.
When no Ethernet Service reference is supplied a dummy service is created.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The User Label must be not in use.


Only one Root termination is authorized.

The EVC Type must be compatible with the service type of the associated Ethernet
Service.
The EVC Type must be compatible with the selected Traffic Type.
The role of each EVC termination must be compatible with the EVC Type.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > Services > ConnectionOriented > Create EVC.
Result: The EVC Creation window is displayed.
...................................................................................................................................................................................................

On the General Panel insert following data:

Enter an EVC User Label.

Insert the Ethernet Service.

....................................................................................................................................................................................................................................
1350 OMS
18-44
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Create a Connection Oriented EVC

....................................................................................................................................................................................................................................

Two different choices are possible:


Choose an already created Ethernet Service selecting it from the available list.
The list is displayed clicking in the field. If this window is required from the
Service List, this field is automatically filled.
Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended
EVPLAN, HSI, BTV, Broadcast).
The parameters: Type, Traffic Type, and Resource Sharing are assigned according to
the chosen Service Type as indicated in: Table 18-1, Connection Oriented Service
Type relations (p. 18-40).
Execute the following steps:
Select a Service Level (Premium, Gold, Silver, Bronze).

Resource Sharing: (Full, Private UNI, Private Link, Private UNI and LINK).

See: Overview (p. 18-39).

C-VLAN Preservation: check it to keep the VLAN Id through the EVC.

(see: C-VLAN and CoS Preservation (p. 18-41)).

C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.

(see: C-VLAN and CoS Preservation (p. 18-41)).

Enter a NAD value for the EVC.

Enter a Comment (optional).

Enter an External Mark (optional). It can be used to identify external systems having
relations with the EVC (for example an ownership).

...................................................................................................................................................................................................

On the Detail Panel.


Set the Frame Delivery:

Select the Frame Delivery parameters (see Frame delivery (p. 18-41))

Unicast Service Frame Delivery.

Multicast Service Frame Delivery.

Broadcast Service Frame Delivery.


Select the standard Vlan Type (8100).

...................................................................................................................................................................................................

On PM Panel.
Select the following parameters

Under PM: select True if the Performance Monitoring is applied on the EVC, if true is
selected the following parameters are activated.
Granularity: select the required type of granularity (15 min, 1 h, 24 h, Not
Meaningful).
Report Output Type: select the desired output type (No Report, CSV Delta, CSV Raw,
Performance Counter Tabular, Performance Counter Graphical, Delta Counter
Tabular, Delta Counter Graphical, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS
18-45
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Create a Connection Oriented EVC

....................................................................................................................................................................................................................................

Report Output Frequency: select the desired frequency for the output report (15
min, 1 h, 24 h, 1 Week, 1 Month, 1 Year, Not Meaningful).

Report Output Name: type a significant name for the output report.

Policy: select the policy for the output report management (Keep, Purge on Stop,
Purge on Delete, Not Meaningful).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-46
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Modify an ETS EVC

....................................................................................................................................................................................................................................

Modify an ETS EVC


When to use

The function modifies EVC characteristics.


Related Information

For more information about EVC, refer to EVC description (p. 18-37).
The EVC modification function allow the user to modify:

EVC User Label.


C-VLAN Preservation (Yes/No).
C-VLAN CoS Preservation (Yes/No).
NAD Value.

Comment.
External Mark.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different from other
already used by another EVC.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

Select the EVC to modify in the list.


...................................................................................................................................................................................................

Click the right mouse button and select from the popup menu Modify.

....................................................................................................................................................................................................................................
1350 OMS
18-47
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Modify an ETS EVC

....................................................................................................................................................................................................................................

Result: The EVC modification window is displayed.


Figure 18-5 EVC Modification window

...................................................................................................................................................................................................

On the modification window to modify an EVC.


Following parameters can be modified:

Enter a new User Label (optional).

C-VLAN Preservation: check it to keep the VLAN Id through the EVC.

(see: C-VLAN and CoS Preservation (p. 18-41)).

C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.

(see: C-VLAN and CoS Preservation (p. 18-41)).

Modify the NAD Value.

Modify the Comment (optional).

Modify the External Mark (optional).

Then, the EVC list, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-48
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Delete an ETS EVC

....................................................................................................................................................................................................................................

Delete an ETS EVC


When to use

This function allows deleting an ETS EVC from the 1350 OMS PKT supervision.
Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the EVC must be defined.


No operation is pending on the EVC.
No Ethernet Segment is referring the EVC.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

Select the element to delete in the list.


...................................................................................................................................................................................................

Click the right mouse button and select from the popup menu Action from ETS EVC >
Delete.
Result: A confirmation box is displayed.
...................................................................................................................................................................................................

Confirm the deletion operation.


After confirmation:

the 1350 OMS PKT checks that no Ethernet Segment is referring the EVCs.
the EVCs are dissociated from the related service (if no more EVC are associated to
the service, the service is also removed).
the EVCs are removed.

....................................................................................................................................................................................................................................
1350 OMS
18-49
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Delete an ETS EVC

....................................................................................................................................................................................................................................

The EVC list, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-50
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Get the EVC properties

....................................................................................................................................................................................................................................

Get the EVC properties


When to use

This function gets information about an Ethernet Virtual Connection.


Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

Select an element in the list.


...................................................................................................................................................................................................

Click the right mouse button and select from the popup menu Properties.

....................................................................................................................................................................................................................................
1350 OMS
18-51
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Get the EVC properties

....................................................................................................................................................................................................................................

Result: The EVC properties window is displayed.

See the following topic in this document: Details of a EVC (p. 18-53)
Figure 18-6 EVC Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-52
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Details of a EVC

....................................................................................................................................................................................................................................

Details of a EVC
Attributes of an EVC

The attributes displayed for each EVC are:

Id.

User Label.

Service Id Label.

Ethernet Service User Label.

Type (Point to point, Routed multi-point, Any to any).

Traffic Type (Unicast, Multicast).

Directionality.

Service Level.

Comment.

Action Type.

Action Date.

Working State (Normal, Configuring, Allocating, De-allocating, Implementing,


De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, removing).

Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,


Implemented, Commissioned).

Service State (Not in Service, In Service).

Availability Status (Normal, Degraded, In Failure, Not Meaningful).

ETS Id Label.

ETS LABEL label.

Vlan Type.

Resource sharing.

Domain Id.

VLAN distribution.

S-VLAN Id.

External Mark.

Domain.

....................................................................................................................................................................................................................................
1350 OMS
18-53
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Allocate ETS EVC

....................................................................................................................................................................................................................................

Allocate ETS EVC


When to use

This function allocates a Connection Oriented EVC.


Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > ETS EVC > Allocate.
Result: The confirmation box is displayed.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The EVC is allocated.

The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-54
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Deallocate ETS EVC

....................................................................................................................................................................................................................................

Deallocate ETS EVC


When to use

This function deallocates a Connection Oriented EVC.


Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > ETS EVC > Deallocate.
Result: The confirmation window is displayed.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The EVC is deallocated.

The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-55
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Implement ETS EVC

....................................................................................................................................................................................................................................

Implement ETS EVC


When to use

This function implements a Connection Oriented EVC.


Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > ETS EVC > Implement.
Result: The confirmation box is displayed.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The EVC is Implemented.

The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-56
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Deimplement ETS EVC

....................................................................................................................................................................................................................................

Deimplement ETS EVC


When to use

This function deimplements a Connection Oriented EVC.


Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > ETS EVC > Deimplement.
Result: The confirmation window is displayed.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The EVC is deallocated.

The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-57
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Commission ETS EVC

....................................................................................................................................................................................................................................

Commission ETS EVC


When to use

This function commissions a Connection Oriented EVC.


Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > ETS EVC > Commission.
Result: The confirmation box is displayed.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The EVC is commissioned.

The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-58
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Decommission ETS EVC

....................................................................................................................................................................................................................................

Decommission ETS EVC


When to use

This function decommissions a Connection Oriented EVC.


Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > ETS EVC > Decommission.
Result: The confirmation window is displayed.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The EVC is decommissioned.

The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-59
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

List the EVC terminations

....................................................................................................................................................................................................................................

List the EVC terminations


When to use

The EVC Termination List window presents all the terminations of the selected EVC and
their attributes.
Related Information

If this list is required from the Ethernet Service List or from the EVC List, only the EVC
terminations associated to the selected item are displayed.
For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

Select the EVC to modify in the list.


...................................................................................................................................................................................................

Select Search > Inventory from ETS EVC > List EVC Terminations.
Result: The list of the EVC terminations is displayed.

See the following topic in this document: Description of the list of terminations
(p. 18-61)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-60
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Description of the list of terminations

....................................................................................................................................................................................................................................

Description of the list of terminations


Attributes of a termination

The attributes displayed for each EVC termination are:

EVC Termination User Label.

Rate.

Network Element.

EVC User Label.

Role (Root, Leaf, Both).

Usage State.

Ethernet Service.

VLAN Type.

....................................................................................................................................................................................................................................
1350 OMS
18-61
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Delete an EVC Termination

....................................................................................................................................................................................................................................

Delete an EVC Termination


When to use

This function allows deleting an ETS EVC termination from the 1350 OMS PKT
supervision.
Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The specified EVC termination is not used as Ethernet Segment extremity.


No operation is pending on the selected EVC termination.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

Select the element to delete in the list.


...................................................................................................................................................................................................

Click the right mouse button and select from the popup menu Action from ETS EVC
Termination > Delete.
Result: A confirmation box is displayed.
...................................................................................................................................................................................................

Confirm the deletion operation.


After confirmation:

the EVC terminations are dissociated from the related EVC.


the EVC terminations are removed.

The EVC Termination list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
18-62
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Get the EVC termination properties

....................................................................................................................................................................................................................................

Get the EVC termination properties


When to use

This function shows all the termination attributes.


Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

Select the EVC in the list.


...................................................................................................................................................................................................

Follow the menu path Search > Inventory from ETS EVC > List EVC Terminations.
...................................................................................................................................................................................................

Select the termination in the list.


...................................................................................................................................................................................................

Click the right mouse button and select from the popup menu Properties.

....................................................................................................................................................................................................................................
1350 OMS
18-63
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Get the EVC termination properties

....................................................................................................................................................................................................................................

Result: The properties window is displayed.

See the following topic in this document: Details of a Termination (p. 18-65)
Figure 18-7 EVC Termination Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-64
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Details of a Termination

....................................................................................................................................................................................................................................

Details of a Termination
Attributes of a Termination

The attributes displayed for each EVC termination are:

EVC Termination User Label.

Rate.

Network Element.

EVC User Label.

Role (Root, Leaf, Both).

Usage State.

Ethernet Service.

VLAN Type.

....................................................................................................................................................................................................................................
1350 OMS
18-65
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Add an EVC termination

....................................................................................................................................................................................................................................

Add an EVC termination


When to use

This function add a termination to an EVC.


Related Information

In case of Connection Oriented EVCs, the bandwidth profiles defined for each EVC
termination have to be intended in the following way:

It represents the bandwidth profile for the traffic at "ingress" of that UNI (Profile is
immediately checked).
It must be reflected to the corresponding Ethernet Segments (that is to the Ethernet
Segment starting from that UNI).

The affects along the Ethernet Segment route is evaluated at Ethernet Segment allocation.
This function consists in adding a new termination to an existing EVC.
For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

No operation is pending on the selected EVC.


The EVC provisioning state must be set to Defined.
EVC Termination Role must be congruent with the EVC topology.
Only one termination can have "Root" role.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

Select the EVC in the list.


...................................................................................................................................................................................................

Follow the menu path Action > ETS EVC > Add Connection Oriented EVC Termination.

....................................................................................................................................................................................................................................
1350 OMS
18-66
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Add an EVC termination

....................................................................................................................................................................................................................................

Result: The add termination window is displayed.


Figure 18-8 Add EVC Termination window

...................................................................................................................................................................................................

To add a termination:

Select a NE or ENE by using sensitive help.

Select an Edge Port by using sensitive help.

Select the termination Role (Root, Leaf, Both).

...................................................................................................................................................................................................

Click Ok button.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-67
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

EVC Fault Localization

....................................................................................................................................................................................................................................

EVC Fault Localization


When to use

This function displays the localization of the fault present for the selected EVC.
Related Information

This function is active when EVC or Ethernet Segment associated are implemented.
For more information about EVC, refer to EVC description (p. 18-37).
For details about Fault Localization, see: Fault Localization (p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

Select the EVC and issue Search > Fault Localization.


Result: The list window is displayed.

See the following topic in this document: Description of the list of Fault
Localization (p. 18-69)
The list is not refreshed automatically, click Actualize button to refresh it.
...................................................................................................................................................................................................

Selecting an item in the Fault Localization list, using the popup menu the user visualize
the alarm list of the selected item.
Select one EVC in the list and click Search > External Navigation to > AS .
Result: The Fault Management window is displayed with selected EVC alarm list.

See the following topic in this document: Description of the list of Alarms
(p. 18-70)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-68
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Description of the list of Fault Localization

....................................................................................................................................................................................................................................

Description of the list of Fault Localization


Attributes of a Fault Localization

The Fault Localization window displays:

The User Label of the alarmed entity.

The Entity Type of the alarmed entity.

The Network Element (if any) of the alarmed entity.

The Alarm Status.

The Event Date.

The Operator Label (if any).


Note: The list is not refreshed automatically, click Actualize button to refresh it.

....................................................................................................................................................................................................................................
1350 OMS
18-69
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Description of the list of Alarms

....................................................................................................................................................................................................................................

Description of the list of Alarms


Attributes of an Alarm

The alarm list window displays:

The Perceived Severity.

The Event Date & Time.

The Friendly Name.

The Alarm Type.

The Probable Cause.

....................................................................................................................................................................................................................................
1350 OMS
18-70
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Start PM on an EVC

....................................................................................................................................................................................................................................

Start PM on an EVC
When to use

This function starts Performance Monitoring (PM) on a Connection Oriented EVC or


Connection Less EVC.
Related Information

For more information about EVC, refer to EVC description (p. 18-37).
For more information about PM, refer to Quality of service: PM management
(p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge
EVCs.
Result: The EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > EVC > Start PM.
Result: The PM is started on the EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-71
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Stop PM on an EVC

....................................................................................................................................................................................................................................

Stop PM on an EVC
When to use

This function Stops Performance Monitoring (PM) on a Connection Oriented EVC or


Connection Less EVC.
Related Information

For more information about EVC, refer to EVC description (p. 18-37).
For more information about PM, refer to Quality of service: PM management
(p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge
EVCs.
Result: The EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > EVC > Stop PM.
Result: The PM is Stopped on the EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-72
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Synchronize PM on an EVC

....................................................................................................................................................................................................................................

Synchronize PM on an EVC
When to use

This function Synchronizes Performance Monitoring (PM) on a Connection Oriented


EVC or Connection Less EVC.
Related Information

For more information about EVC, refer to EVC description (p. 18-37).
For more information about PM, refer to Quality of service: PM management
(p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge
EVCs.
Result: The EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > EVC > Synchronize PM.
Result: The PM is Synchronized on the EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-73
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

Show PM on an EVC

....................................................................................................................................................................................................................................

Show PM on an EVC
When to use

This function Shows Performance Monitoring (PM) on a Connection Oriented EVC or


Connection Less EVC.
Related Information

For more information about EVC, refer to EVC description (p. 18-37).
For more information about PM, refer to Quality of service: PM management
(p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge
EVCs.
Result: The EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Search > EVC > Show > PM.
Result: The PM related to the EVC is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-74
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing ETS Ethernet Virtual Connections (EVC)

View the Routing Display on an EVC

....................................................................................................................................................................................................................................

View the Routing Display on an EVC


When to use

This function starts Routing Display on a Connection Oriented EVC or Connection Less
EVC.
Related Information

For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge
EVCs.
Result: The EVC list is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Search > EVC > Routing Display.
Result: The Routing Display is started on the EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-75
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Overview about E2E Ethernet Virtual Connections
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Managing End-to-End Ethernet Virtual Connections


(E2E EVC)
Overview about E2E Ethernet Virtual Connections
Introduction to End to End EVC connection

The following two modalities can be used in creating an End to End EVC connection:

bottom-up. This modality requires the separate creation of the EVCs within their
domains, then the user will join the different EVCs.
top-down. This modality is completely automatic. The user creates the full EVC over
different domains and all relevant commands are forwarded to the subordinate
network.

Managing Extended Ethernet Virtual Connection

Ethernet Virtual Connections (EVC) span over only one domain, ETB or ETS, at a time.
It is possible to create an End-To-End EVC (E2E EVC), crossing one ETB domain and
one ETS domain, which are connected by Inter-Domain-Links.
E2E EVC Categories

The categories of E2E EVCs are:

Full E2E EVC (p. 18-76)

Raw E2E EVC (p. 18-76)

Full E2E EVC

Full E2E EVC is a E2E EVC that is created in the top-down way, it is defined by end
points and other EVC parameters, and the fragment EVCs are created then accordingly.
Full E2E EVC must be consistent, its fragment EVCs must match each other and the E2E
EVC itself. If, for any reason, the consistency is not kept, it becomes a raw E2E EVC.
Raw E2E EVC

Raw E2E EVC is an E2E EVC that is created in the bottom-up way, there are fragment
EVCs, which are joined to create the raw E2E EVC. It is used mainly in the Takeover,
having in the network already existing groups of EVCs, which can be joined into E2E
EVCs. Raw E2E EVC does not have to be consistent with its fragment EVCs. Raw E2E
EVC can be created also from a full E2E EVC, which is not consistent any more. If a raw
E2E EVC reaches a level of full consistency, it can become a full E2E EVC.

....................................................................................................................................................................................................................................
1350 OMS
18-76
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Overview about E2E Ethernet Virtual Connections
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

EVC Prevented Actions

When an EVC is a part of a Full E2E EVC, any direct modification of its attributes may
affect the E2E EVC it belongs to, and also other fragment EVCs that belong to the same
E2E EVC. Therefore only the EVC attributes User Label, Comment and External Mark
can be modified. The EVC cannot be deleted.
In order to do any of these actions, directly to the EVC, the parent E2E EVC must be
changed to be a Raw E2E EVC, and then all the actions are allowed.

....................................................................................................................................................................................................................................
1350 OMS
18-77
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Display the list of E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Display the list of E2E EVC


When to use

The Ethernet Virtual Connection List window presents all the EVCs and their attributes.
Related Information

This list can be required also from the Ethernet Service List, from the Ethernet Segment
List, or from the Ethernet Transport Link List. In These cases, only the EVCs associated
to the selected object are displayed.
For more information about EVC, refer to EVC description (p. 18-37).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select E2E EVCs.


Result: The list window is displayed.

See the following topic in this document: Description of the list of EVCs (p. 18-79)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-78
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Description of the list of EVCs
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Description of the list of EVCs


Attributes of an EVC

The attributes displayed for each EVC are:

User Label.

Ethernet Service User Label.

Type (Point to point, Routed multi-point, Any to any).

Traffic Type (Unicast, Multicast).

Working State (Normal, Configuring, Allocating, De-allocating, Implementing,


De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, Removing).

Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,


Implemented, Commissioned).

Service State (Not in Service, In Service).

Availability Status (Normal, Degraded, In Failure, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS
18-79
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Create an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Create an E2E EVC


When to use

This function create an Ethernet Virtual Connection in an end to end way.


Related Information

Related information can be found in EVC description (p. 18-37).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Select Action > Packet > Services > Create E2E EVC.
Result: The Create E2E EVC window is displayed.
...................................................................................................................................................................................................

Select the General panel.


Fill the following data:

Enter an EVC User Label.

Set the Service associated to the EVC:


To set the service the user can do one of the following steps:
Choose an existing Ethernet Service by using the sensitive help. If this window
is required from the Service List, this field is automatically filled.
Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended
EVPLAN, HSI, BTV, Broadcast).
According to the choice, Type, Traffic Type, and Resource Sharing are assigned as
indicated in Table 18-1, Connection Oriented Service Type relations (p. 18-40).

Select a Type (Point to Point, Routed Multipoint, Any to Any (also called Multipoint
to multipoint)). if allowed.
Select a Traffic Type (Unicast, Multicast), the selection of the parameter depends on
the selected type.
Select a Resource Sharing (Full, Private UNI, Private Link, Private UNI and LINK).
See Overview (p. 18-39).

Select a Domain Label by using the sensitive help.

....................................................................................................................................................................................................................................
1350 OMS
18-80
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Create an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the Detail panel.


Fill the following data:

Enter Vlan Distribution (Full mesh, Not full mesh).

Enter a Vlan Bundle in the range of the local Vlan.

Enter s-Vlan Id the range of the VLAN over SDH path, an equal value can go on the
same domain.
Select the Standard Vlan Type (8100).
Select the Frame Delivery parameters (see Frame delivery (p. 18-41))

Unicast Service Frame Delivery.

Multicast Service Frame Delivery.


Broadcast Service Frame Delivery.

Select the standard Vlan Type (8100).

Define IGMP Snooping State (Not Meaningful, Enabled, Disabled).


This option is enabled only for EVPLAN, Extended EVPLAN and BTV EVC types
and can optionally be defined.
The possible values are:

Enabled: to remind that the IGMP snooping protocol is not used on top of the
created EVC:
enable the IGMP snooping immediately after having implemented the EVC.
disable the IGMP snooping immediately before de-implemented the EVC.

Disabled: to remind that the IGMP snooping protocol is not used on the created
EVC.

...................................................................................................................................................................................................

Select the Layer-2 Control Protocol panel.


Fill the following data:

To set all the fields in the form with the same value at once:
Select Put entire set to and choose one of the following values:

Default: all the set is put to Tunnel.

Not Meaningful: all the set is put to Not Meaningful.

Free: every value can be different.

Set the Data Frames.

Set the Customer BPDU.

Set the Provider BPDU.

Set the Slow Protocols.

Set the 802.1X PAE.

Set the Provider GVRP.

Set the Bridge Management.

....................................................................................................................................................................................................................................
1350 OMS
18-81
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Create an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Set the Customer GMRP.


Set the Customer GVRP.
User chooses which control Protocol must be tunneled or discarded. The
configuration is propagated to all EVC terminations to ensure that all EVC
terminations use the same Tunneling criteria. A check is needed also toward Layer-2
Control Protocol Processing defined at UNI level. This check allows a congruent
management of Control protocols crossing the EVC.
The single L2 protocol can have different values. User can select a value for each
protocol between Tunnel, Not Meaningful and Discard.

...................................................................................................................................................................................................

Select the PM panel.


Fill the following data:

Select Under PM (True, False).

Choose the Granularity.

Choose the Report Output Type.

Choose the Report Output Frequency.

Set the Report Output Name.

Choose the Policy.

...................................................................................................................................................................................................

Select the Miscellaneous panel.


Fill the following data:

Select a Service Level (Premium, Gold, Silver, Bronze).

C-VLAN Preservation: check it to keep the VLAN Id through the EVC.

(see: C-VLAN and CoS Preservation (p. 18-41)).

C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.

(see: C-VLAN and CoS Preservation (p. 18-41)).

NAD: select a NAD value from the list.

Enter an External Mark (optional). It can be used to identify external systems having
relations with the EVC (for example an ownership).
Enter Comment (optional).

...................................................................................................................................................................................................

Click Next to set the EVC terminations.


...................................................................................................................................................................................................

Click Next to define the EVC.


...................................................................................................................................................................................................

Click Ok.

....................................................................................................................................................................................................................................
1350 OMS
18-82
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Create an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Result: A check is performed. If the check succeeded, the EVC is created.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-83
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Create a full E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Create a full E2E EVC


When to use

This function consists in creating a full end to end Ethernet Virtual Connection.
Related Information

Related information can be found in EVC description (p. 18-37).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Select Action > Packet > Services > Create Full E2E EVC.
Result: The E2E EVC Full Creation window is displayed.
...................................................................................................................................................................................................

Select the General panel.


Fill the following data:

Enter an EVC User Label.

Set the Service Type associated to the EVC:


To set the service the user can do one of the following steps:
Choose an existing Ethernet Service by using the sensitive help. If this window
is required from the Service List, this field is automatically filled.
Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended
EVPLAN, HSI, BTV, Broadcast).
According to the choice, Type, Traffic Type, and Resource Sharing are assigned as
indicated in Table 18-1, Connection Oriented Service Type relations (p. 18-40).

Select a Type (Point to Point, Routed Multipoint, Any to Any (also called Multipoint
to multipoint)). if allowed.
Select a Traffic Type (Unicast, Multicast), the selection of the parameter depends on
the selected type.
Select a Service Level (Premium, Gold, Silver, Bronze).
Select a Resource Sharing (Full, Private UNI, Private Link, Private UNI and LINK).
See Overview (p. 18-39).

....................................................................................................................................................................................................................................
1350 OMS
18-84
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Create a full E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Select a C-VLAN Preservation to keep the VLAN Id through the EVC.


(see: C-VLAN and CoS Preservation (p. 18-41)).

Select a C-VLAN CoS Preservation to keep the Priority Bits through the EVC.
(see: C-VLAN and CoS Preservation (p. 18-41)).

Select a NAD value from the list.

Enter an External Mark (optional). It can be used to identify external systems having
relations with the EVC (for example an ownership).
Enter Comment (optional).

...................................................................................................................................................................................................

Select the Detail panel.


Fill the following data:

Enter the Directionality (Unidirectional, Bidirectional).

Define the IGMP Snooping State (Not Meaningful, Enabled, Disabled).

Select the Standard Vlan Type (8100).

Enter a value for the VLAN Bundle or a range for the parameter.

...................................................................................................................................................................................................

Select the Termination panel.


Fill the following data:

Select the Domain Label by using the sensitive help.

Select the NE or the ENE user label by using the sensitive help. (The NEs belonging to
the selected domain are listed).
Select an Edge Port user label by using the sensitive help.
Select the Role of the termination (Root, Leaf, Both).

Enter a list of EVC terminations by using Add EVC Termination button.

...................................................................................................................................................................................................

Click Ok.
Result: A check is performed. If the check succeeded, the EVC is created. The tree
area and the EVC List are updated.

The EVC is created with the following states: Provisioning State set to Defined,
Working State set to Normal.
A correlation with the Service is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-85
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Create a raw E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Create a raw E2E EVC


When to use

This function consists in creating a raw end to end Ethernet Virtual Connection.
Related Information

Related information can be found in EVC description (p. 18-37).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Select Action > Packet > Services > Create Raw E2E EVC.
Result: The E2E EVC Raw Creation window is displayed.
...................................................................................................................................................................................................

Fill the following data:

Enter the EVC User Label.

Enter Comment (optional).

Enter an External Mark (optional). It can be used to identify external systems having
relations with the EVC (for example an ownership).
Enter a list of EVC terminations by using Add EVC Termination button. The EVC can
be Connection Oriented or Connection Less. To remove an EVC from the list, use the
Remove EVC button.

...................................................................................................................................................................................................

Click Ok.
Result: A check is performed. If the check succeeded, the EVC is created. The tree

area and the EVC List are updated.


The EVC is created with the following states: Provisioning State set to Defined,
Working State set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-86
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Modify a full E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Modify a full E2E EVC


When to use

The function allows the user to modify EVC characteristics.


Related Information

Related information can be found in EVC description (p. 18-37).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different from other
already used by another EVC.

Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services > E2E EVCs.


Result: The list window is displayed.
...................................................................................................................................................................................................

Select the EVC to modify in the list.


...................................................................................................................................................................................................

Click the right mouse button and select from the popup menu Modify.
Result: The EVC modification window is displayed.
...................................................................................................................................................................................................

To modify an EVC, modify one or more of the following items:

Modify the EVC User Label.

Modify the C-VLAN Preservation.


Modify the C-VLAN CoS Preservation.
Modify the NAD Value.

Modify the Comment.


Modify the External Mark.

....................................................................................................................................................................................................................................
1350 OMS
18-87
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Modify a full E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok.
Result: The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-88
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Join E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Join E2E EVC


When to use

This function joins two or more Ethernet Virtual Connections.


Related Information

Related Information can be found in EVC description (p. 18-37).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the Multi Service GUI Main view, follow the path Action > Packet > Services >
Join E2E EVC.
Result: The Join E2E EVC window is displayed.
...................................................................................................................................................................................................

To join two or more EVCs:

Enter a User Label.

Enter the Comment (optional).

Enter the External Mark (optional).

Select the EVCs to be joined.


Select an EVC domain (Connection Oriented, Connection Less, T-MPLS, eOMS)

Click the EVC List icon to list all the EVCs defined into the domain.

Select the one or more EVCs in the list.


Click the confirmation icon.

Note: The EVCs can be added to or removed from the list by the icons under EVC List
menu.
Note: Repeat this step for all the needed EVC.
Result: Selected EVCs are listed in the Join E2E EVC window.
...................................................................................................................................................................................................

Click Ok.

....................................................................................................................................................................................................................................
1350 OMS
18-89
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Join E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Result: A check is performed. If the check succeeded, the join is accomplished.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-90
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Managing an E2E EVC


When to use

The scope of this procedure is to create an End to End EVC connection. With reference to
the below schema.
Figure 18-9 Network schema for E2E connection

Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

Create LoC between NE-B and NE-C


...................................................................................................................................................................................................

Assign port B1 to Domain ETS


...................................................................................................................................................................................................

Assign port C1 to Domain T-MPLS


...................................................................................................................................................................................................

After the assignment of port B1 to Domain ETS and port C1 to Domain T-MPLS,
the Loc between NE-B and NE-C becomes IWI (it was generic)
ports B1 and port C1 become UNI (Edge port in their domains)

....................................................................................................................................................................................................................................
1350 OMS
18-91
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Assign port B2 to Domain ETS


...................................................................................................................................................................................................

Create EVC ETS (from B1 to B2)


...................................................................................................................................................................................................

Create EVC T-MPLS (from C1 to C2)


...................................................................................................................................................................................................

From the main bar select Actions>Packet>Service>Join E2E EVC


...................................................................................................................................................................................................

Select domain C.O.


Select EVC
Select domain T-MPLS
Select EVC
Click on OK to confirm.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-92
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Structure for EVC over SDH

....................................................................................................................................................................................................................................

EVC over SDH


Structure for EVC over SDH
When to use

The scope of this procedure is


Related Information

This task does not have any related information.


Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > Construction > Transport Links >
Links over TDM(Sdh/Sonet)
Figure 18-10 Search>Packet>Construction>Transport Links>Links over
TDM(Sdh/Sonet)

...................................................................................................................................................................................................

The list of Links over TDM(Sdh/Sonet) is displayed.

....................................................................................................................................................................................................................................
1350 OMS
18-93
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Structure for EVC over SDH

....................................................................................................................................................................................................................................

This list contains an Ethernet path, created on SDH, which will be used
Figure 18-11 Links over TDM(Sdh/Sonet)

...................................................................................................................................................................................................

From the bar select Search>Packet>Construction>Network Elements>Defined NEs


Figure 18-12 Search>Packet>Construction>Network Elements>Defined NEs

...................................................................................................................................................................................................

The list of the Defined NEs is displayed.

....................................................................................................................................................................................................................................
1350 OMS
18-94
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Structure for EVC over SDH

....................................................................................................................................................................................................................................

Select the relevant NE and issue Search > Ethernet Physical Ports
Figure 18-13 Defined NE:Search>Ethernet Physical Ports

...................................................................................................................................................................................................

Select the Ethernet port and issue Actions > Assign Resource to Domain
Figure 18-14 Port:Actions>Assign Resource to Domain

....................................................................................................................................................................................................................................
1350 OMS
18-95
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Structure for EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click on button Domains. From the domain list select the ETS Domain and click on V.
Figure 18-15 ETS Domain selection

....................................................................................................................................................................................................................................
1350 OMS
18-96
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Structure for EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click on OK to assign the port to ETS domain.


Figure 18-16 Assign port to ETS domain

...................................................................................................................................................................................................

Execute the assignment for the far end port on TSS-B. (Port:Actions>Assign Resource to
Domain)
...................................................................................................................................................................................................

From the main menu bar select Search>Packet>Construction>Transport Links>Links


over TDM(Sdh/Sonet)

....................................................................................................................................................................................................................................
1350 OMS
18-97
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Structure for EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

10

Select the relevant Link over TDM (path) and issue Actions>Assign Resources to Domain
Figure 18-17 Link over TDM (path): Actions>Assign Resources to Domain

...................................................................................................................................................................................................

11

Select ETS domain.


Figure 18-18 Select ETS domain

....................................................................................................................................................................................................................................
1350 OMS
18-98
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Structure for EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12

Click on OK to confirm the assignment.


Figure 18-19 Confirm the assignment

...................................................................................................................................................................................................

13

From the bar select Search>Packet>Services>Connection Oriented>ETS Transport Link

....................................................................................................................................................................................................................................
1350 OMS
18-99
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Structure for EVC over SDH

....................................................................................................................................................................................................................................

The path, when assigned, is now an ETS Transport Link


Figure 18-20 Search>Packet>Services>Connection Oriented>ETS Transport Link

...................................................................................................................................................................................................

14

Since we do not find the path in the list of ETS Transport Links, this is due to the fact that
we forgive to commission the path.
Figure 18-21 Path commissioning

....................................................................................................................................................................................................................................
1350 OMS
18-100
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Structure for EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

15

After path commissioning the path is included in the Links over TDM list.
Figure 18-22 Path included in the Links over TDM

...................................................................................................................................................................................................

16

And in the Transport Links, accordingly.


Figure 18-23 Transport Links

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-101
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Assign ports to domain

....................................................................................................................................................................................................................................

Assign ports to domain


When to use

The scope of this procedure is to assign ports to domain


Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > Construction > Network Elements >
Defined NEs
...................................................................................................................................................................................................

Select a Defined Network Element from the list and using the right mouse button, select
from the popup menu, Search > Ethernet Physical Ports

....................................................................................................................................................................................................................................
1350 OMS
18-102
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Assign ports to domain

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Port: Assign resources to Domain


Figure 18-24 Port: Assign resources to Domain

....................................................................................................................................................................................................................................
1350 OMS
18-103
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Assign ports to domain

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Assign resources to Domain. Click on Apply.


Figure 18-25 Assign resources to Domain

....................................................................................................................................................................................................................................
1350 OMS
18-104
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Assign ports to domain

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > Services > T-MPLS > T-MPLS Edge
Ports.
Figure 18-26 Search>Packet>Services>T-MPLS>T-MPLS Edge Ports

...................................................................................................................................................................................................

The list of the edge ports is displayed.


Figure 18-27 UNI ports became edge ports

...................................................................................................................................................................................................

Assign the other UNI port.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-105
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................

EVC over SDH


When to use

The scope of this procedure is to Create EVC over SDH.


Related Information

This task does not have any related information.


Before you begin

All needed coditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main bar select Actions > Packet > Services > Connection Oriented(ETS) >
Create EVC.
Figure 18-28 Actions>Packet>Services>Connection Oriented(ETS)>Create EVC

...................................................................................................................................................................................................

Complete following data on the Create EVC window :


name
service type=EVPL
ethernet service:automatically selected
select the domain: ETS
type=point to point automatically selected

....................................................................................................................................................................................................................................
1350 OMS
18-106
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................

traffic type=unicast
resource sharing=unicast
Select the NE
Select the Edge Port
Figure 18-29 EVC over SDH: EVC definition

....................................................................................................................................................................................................................................
1350 OMS
18-107
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the far end edge port.


Click on Next.
Figure 18-30 Far end edge port selection

...................................................................................................................................................................................................

Select the traffic descriptor to associate.

....................................................................................................................................................................................................................................
1350 OMS
18-108
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................

Click on Apply
Figure 18-31 Ethernet Segments definition

....................................................................................................................................................................................................................................
1350 OMS
18-109
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > Services > Connection
Oriented(ETS)
Figure 18-32 Search>Packet>Services>Connection Oriented(ETS)

...................................................................................................................................................................................................

The ETS EVC is created as defined.


Figure 18-33 ETS EVCs

....................................................................................................................................................................................................................................
1350 OMS
18-110
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the ETS EVC and issue Search > Ethernet Segments.
Figure 18-34 ETS EVC: Search>Ethernet Segments

...................................................................................................................................................................................................

The list of the Ethernet segments is shown below.


Figure 18-35 Ethernet segment list

....................................................................................................................................................................................................................................
1350 OMS
18-111
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

You may select an Ethernet Segment from the list and using the right mouse button, select
from the popup menu Actions > Add Constraints to an Ethernet Service
Figure 18-36 Actions>Add Constraints to an Ethernet Service

...................................................................................................................................................................................................

10

Select as constraint the transport link

....................................................................................................................................................................................................................................
1350 OMS
18-112
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................

Click on Apply.
Figure 18-37 Add Constraints to an Ethernet Service

....................................................................................................................................................................................................................................
1350 OMS
18-113
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

11

Select the Ethernet Segment in the list and using the right mouse button follow the path
Actions > Associate Traffic Classifier
Figure 18-38 Segment:Actions>Associate to Traffic Classifier

...................................................................................................................................................................................................

12

From the list select the Traffic Classifier.


Figure 18-39 Traffic Classifier list

....................................................................................................................................................................................................................................
1350 OMS
18-114
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13

Click on Apply to launch the association.


Figure 18-40 Associate Traffic Classifier

....................................................................................................................................................................................................................................
1350 OMS
18-115
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14

Allocate the segment.


Figure 18-41 Allocate the segment

...................................................................................................................................................................................................

15

Implement the segment.


Figure 18-42 Implement the segment

....................................................................................................................................................................................................................................
1350 OMS
18-116
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

EVC over SDH

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

16

Allocate and implement the other segment.


Figure 18-43 Both segments are implemented

Result: The EVC-ETS is implemented


Figure 18-44 EVC-ETS implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-117
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Alarms EVC T-MPLS

....................................................................................................................................................................................................................................

Alarms EVC T-MPLS


When to use

The scope of this procedure is to detect a fault condition on a T-MPLS EVC.


Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

From the T-MPLS EVC list attribute Availability is marked In Failure.


Figure 18-45 T-MPLS EVC list: Availability

....................................................................................................................................................................................................................................
1350 OMS
18-118
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Alarms EVC T-MPLS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the T-MPLS EVC issue Search>Fault Localization


Figure 18-46 EVC: Search>Fault Localization

...................................................................................................................................................................................................

The Transport Section is In Failure.


Figure 18-47 Navigation to Transport Section

....................................................................................................................................................................................................................................
1350 OMS
18-119
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


EVC over SDH

Alarms EVC T-MPLS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

You can navigate to Link over Cable


Figure 18-48 Navigate to Link over Cable

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-120
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Full EVC Takeover

Overview about Full EVC Takeover procedure

....................................................................................................................................................................................................................................

Full EVC Takeover


Overview about Full EVC Takeover procedure
Overview about Takeover procedure

Takeover manages the profile configuration in the network.


It manages profile creation on domain basis. The creation affects PKT database only.

....................................................................................................................................................................................................................................
1350 OMS
18-121
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Full EVC Takeover

Full EVC Takeover Procedure

....................................................................................................................................................................................................................................

Full EVC Takeover Procedure


When to use

When the PKT is deployed in a network where Network Elements and Ethernet
Connectivity (network wide) are already in place, then the need to take in charge such
Ethernet Connectivity is a must for PKT Network Manager.
Related information

The Full EVC Takeover Online procedure is applicable to all kind of Connection
Oriented, Connection Less and T-MPLS based EVCs and covers all managed topologies.
1. Connection Oriented EVC:
The Takeover is applied at Ethernet Segment Level. The Takeover is applied on all
Ethernet Segments types, unicast and multicast : the EVC which contains them are
automatically updated;
2. Connection Less EVC:
The Takeover is applied directly to the desired EVC. The Takeover is done on all
EVC types
3. Connection T-MPLS EVC:
The Takeover is applied directly to the desired EVC. The Takeover is done on all
EVC types
Note: The usage of the Offline Takeover procedure forces the shutdown and the
subsequent restart of PKT processes in order to let the Takeover Procedure work.
Using this procedure, there is no need to shutdown the services.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
Procedure

Following steps should be done to execute correctly the Takeover with online command:
From MS-GUI main window:
...................................................................................................................................................................................................

Create one or more domains that corresponds to the scenario already acting in field : from
the Construction application
Select Action > Packet > Costruction > Create Domain.

....................................................................................................................................................................................................................................
1350 OMS
18-122
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Full EVC Takeover

Full EVC Takeover Procedure

....................................................................................................................................................................................................................................

Insert the User Label, Domain Type, Bridge Type and STP Type compliant with the
attributes already present.
Figure 18-49 Create Domain

Result: The list Domain window is shown with new Domain.


...................................................................................................................................................................................................

Define the Network Elements to the PKT environment : from the Construction
application.
Select Action > Packet > Costruction > Define NE.

....................................................................................................................................................................................................................................
1350 OMS
18-123
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Full EVC Takeover

Full EVC Takeover Procedure

....................................................................................................................................................................................................................................

Insert the User Label, Working Mode and STP Type compliant with the attributes already
present.
Figure 18-50 Define NE

Select the Network Elements to be added from the list, click the confirm button. The
Defined Network Element List updated. When the NEs are added, assign the resources
already present or create them.
Select Action > Packet > Costruction > Assign Resources to Domain.
Result: The list Network Element window is shown with new NE.
...................................................................................................................................................................................................

If the Customer is not yet created, create it now, repeat the same operation for Traffic
Description and Traffic Classifier
Select Action > Packet > Services> Create Customer.

....................................................................................................................................................................................................................................
1350 OMS
18-124
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Full EVC Takeover

Full EVC Takeover Procedure

....................................................................................................................................................................................................................................

Select Action > Packet > Services> Create Traffic Descriptor.


Select Action > Packet > Services> Create Traffic Classifier.
Insert the information compliant with the attributes already present.
Result: The Customer list is shown with new elements.
...................................................................................................................................................................................................

Create one or more EVC (with the Service in automatic mode) that corresponds to the
scenario already acting in field :
Select Action > Packet > Services > (ETS,ETB and T-MPLS)> Create EVC.
Insert the parameters compliant with the attributes already present.
Important! Define one or more allocated services that should Takeover, the service
must have exactly the same characteristics as the service to Takeover.
Figure 18-51 Create EVC

Important! End the operation in the state of allocated EVC.


Note: If the EVCs are T-MPLS, to do the Discovery of the Tunnel and Pseudo-Wire.

....................................................................................................................................................................................................................................
1350 OMS
18-125
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Full EVC Takeover

Full EVC Takeover Procedure

....................................................................................................................................................................................................................................

Result: The list EVC window is shown with new EVC.


...................................................................................................................................................................................................

Perform the Audit and Reservation on all interested Network Elements : select the
interested NEs and from the main menu
Select Action > Packet > Audit Align Reservation> Start AAR procedure.
Insert the information compliant with the attributes already present.
...................................................................................................................................................................................................

Perform the Audit and Reservation on all interested Network Elements : from the NEs for
Auditlist select the interested NEs and start NE Audit.
Select all interested NEs:Search > Packet > Audit Align Reservation> NEs for
Audit>Start NE Audit.
Insert the information compliant with the attributes already present.
Perform the same operation for Reservation.
...................................................................................................................................................................................................

Perform the Align Up procedure for the Takeover on the involved ports.

....................................................................................................................................................................................................................................
1350 OMS
18-126
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Full EVC Takeover

Full EVC Takeover Procedure

....................................................................................................................................................................................................................................

Select Action > Packet > Audit Align Reservation> Service Align Up.
Figure 18-52 Align Up window

Insert the information compliant with the attributes already present.


Note: Execute the Align Up procedure maintaining the Audit window from the
Construction application open.
...................................................................................................................................................................................................

Stop Audit, Align and Reservation procedure.


Select Action > Packet > Audit Align Reservation> Stop AAR procedure.
...................................................................................................................................................................................................

The Ethernet Segments involved or the EVCs in case of connection less connection
should be in Allocated state.

....................................................................................................................................................................................................................................
1350 OMS
18-127
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Full EVC Takeover

Full EVC Takeover Procedure

....................................................................................................................................................................................................................................

Start the Takeover procedure:


Select Action > Packet > Services> Takeover>Enable Takeover.
Figure 18-53 Enable Takeover

Result: The full Takeover online procedure runs on the allocated services created in

the previous steps.


...................................................................................................................................................................................................

10

Implement the Ethernet Segments or EVCs to complete the Takeover procedure: From the
Ethernet Management application.
...................................................................................................................................................................................................

11

Verify that the Takeover is successfully done, the service should be now in Implemented
state.
Note: Verify that the Takeover is successfully done, the service should be now in
Implemented state.
...................................................................................................................................................................................................

12

Stop the Takeover procedure:

....................................................................................................................................................................................................................................
1350 OMS
18-128
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Full EVC Takeover

Full EVC Takeover Procedure

....................................................................................................................................................................................................................................

Select Action > Packet > Services> Takeover>Disable Takeover.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-129
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


T-MPLS Takeover

T-MPLS Takeover description

....................................................................................................................................................................................................................................

T-MPLS Takeover
T-MPLS Takeover description
T-MPLS Takeover Key features:

T-MPLS Takeover procedure is aimed to discover existing T-MPLS infrastructure (i.e.


tunnels and pseudo-wires) from the network, and import it into PKT database.
physical connectivity must be described
Circuit correctness checks only tunnel/PWs defined coherently in all the NEs involved
are uploaded
(e.g., two terminations must be found; traffic descriptor parameters must be equal along
the circuit; T-MPLS in-labels must match the out-labels, etc).
Takeover of 1+1 protected tunnels
Takeover of 1+1 APS Protections Groups defined in the NEs when tunnels are already in
PKT database.
Takeover of T-MPLS profiles (Traffic Descriptor, PHB, L2-encapsulation).
Takeover of all tunnels/PWs OR only tunnels/PWs terminating in a node.
Description of main steps

Define via NPR the physical/logical connectivity supporting T-MPLS, i.e., ethernet
physical-connections or SDH paths. This will result in the definition of links-over-cable /
links-over-SDH in PKT.
Assign via PKT these links to T-MPLS domain. This will result in the definition of
T-MPLS nodes and sections inside PKT database.
Start Takeover operation from T-MPLS domain OR, if only a small part of the network is
involved, from one of the T-MPLS nodes (in this latter case, choice is left to operator
whether to discover all circuits or only those terminating in the node).
This will result (if the circuit were defined correctly in the network) in the tunnels/PWs
objects (in implemented state) inside PKT database.
Check in the lists that tunnels/PWs have been uploaded

....................................................................................................................................................................................................................................
1350 OMS
18-130
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


T-MPLS Takeover

Takeover procedure for T-MPLS

....................................................................................................................................................................................................................................

Takeover procedure for T-MPLS


When to use

The procedure permit to take in charge Network Elements and Connectivity when the
PKT is deployed in a network where (network wide) such connectivity is already in place.
Related information

For more information refer to: T-MPLS Takeover description (p. 18-130)
For general procedure description, refer to: Description of main steps (p. 18-130)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
Conditions

The topology of the network must be already defined.


Task for T-MPLS

From MS-GUI main window:


...................................................................................................................................................................................................

Create a T-MPLS Domain.


Select Action > Packet > Construction > Create Domain.
For details refer to the procedure Create a Domain (p. 13-20).
Result: The T-MPLS domain is created.
...................................................................................................................................................................................................

Select Search > Packet > Construction > Link Over Cable.
Assign Links Over Cable to T-MPLS domain.
For details refer to the procedure Assign a Link Over Cable to a Domain (p. 14-60).
Result: The selected Links Over Cable are assigned to T-MPLS domain
...................................................................................................................................................................................................

Execute the T-MPLS PW Takeover:


Select Search > Packet > T-MPLS > T-MPLS domain..
Select the T-MPLS domain.
Select Action > T-MPLS > Takeover All
Note: In a large network the Takeover from the domain requires a long time to
execute. The user can start the Takeover only from involved nodes.

....................................................................................................................................................................................................................................
1350 OMS
18-131
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


T-MPLS Takeover

Takeover procedure for T-MPLS

....................................................................................................................................................................................................................................

Result: T-MPLS Tunnels and PseudoWires are discovered and created in the PKT

DB.
To check the object creation, refer to the procedure View the list of T-MPLS tunnels
(p. 16-99).
To check the object creation, refer to the procedure View the list of Pseudo Wires
(p. 16-51).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-132
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Color Profiles

Overview about Color Profiles

....................................................................................................................................................................................................................................

Managing Color Profiles


Overview about Color Profiles
Color Profile description

The Color Profile allows the user to define a priority in accepting or rejecting incoming
frames (Red/Yellow/Green). This rule applies when Traffic Descriptor is Regulated and
Policy Control is not Color Blind.

....................................................................................................................................................................................................................................
1350 OMS
18-133
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Color Profiles

Display the Color Profile list

....................................................................................................................................................................................................................................

Display the Color Profile list


When to use

The Color Profile List window presents all the Color Profiles and their attributes.
Related Information

If this list is required from the Ethernet Segment List, only the Color Profiles associated
to the selected Ethernet Segment are displayed.
For more information, refer to Overview about Color Profiles (p. 18-133).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Color Profile.


Result: The list window is displayed.

The attributes displayed for each Color Profile are:


User Label.
Color Profile Mode (Priority, DSCP).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-134
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Color Profiles

Create a Color Profile

....................................................................................................................................................................................................................................

Create a Color Profile


When to use

This function consists in defining a Color Profile used to describe the flow of Ethernet
frames over an Ethernet Segment.
Related Information

For more information, refer to Overview about Color Profiles (p. 18-133).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The maximum number of Color Profiles must not be reached.

The User Label must be different as one which exists.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > Services > Create Color Profile.
...................................................................................................................................................................................................

On the Create Color Profile Window, the following data must be entered.
To create a customer:

Enter a User Label.

Select the Color Profile Mode (Priority, DSCP).

If Priority Mode is selected, Priority Tab must be set up.

If DSCP Mode is selected, Code Point 1 to Code Point 4 Tabs must be set up,
selecting a color (Green, Yellow, or Red).

...................................................................................................................................................................................................

Click Ok button.
Result: The Color Profile is created.

The Color Profile list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-135
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Color Profiles

Modify a Color Profile

....................................................................................................................................................................................................................................

Modify a Color Profile


When to use

The function modifies Color Profile characteristics.


Related Information

For more information, refer to Overview about Color Profiles (p. 18-133).
The Color Profile modification gives the possibility to modify one or all the following
parameters:

Color Profile User Label,.


Color of each priority.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different as one which is
already used by another Color Profile.

The Color Profile must not be associated to any Ethernet Segment or could be
associated to Ethernet Segments in Defined provisioning state.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Color Profiles.


...................................................................................................................................................................................................

On the Color Profile List, select the Color Profile to modify. Select with the right mouse
button the path Action from Color Profile > Color Profile Modification.

....................................................................................................................................................................................................................................
1350 OMS
18-136
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Color Profiles

Modify a Color Profile

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Modify Color Profile window is displayed.


Figure 18-54 Color Profile Modification window

To modify a Color Profile:

Enter a new User Label (optional).

If Priority Mode is selected, Priority Tab must be set up.

If DSCP Mode is selected, Code Point 1 to Code Point 4 Tabs must be set up,
selecting a color (Green, Yellow, or Red).

...................................................................................................................................................................................................

Click Ok button.

....................................................................................................................................................................................................................................
1350 OMS
18-137
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Color Profiles

Modify a Color Profile

....................................................................................................................................................................................................................................

Result: The Color Profile is modified.

The Color Profile list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-138
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Color Profiles

Delete a Color Profile

....................................................................................................................................................................................................................................

Delete a Color Profile


When to use

This function consists in deleting a Color Profile from the supervision.


Related Information

For more information, refer to Overview about Color Profiles (p. 18-133).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Color Profile must not be associated to any Ethernet Segment or could be
associated to Ethernet Segments in Defined provisioning state.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Color Profiles.


...................................................................................................................................................................................................

On the Color Profile List Window, select the Color Profile to delete. Select with the right
mouse button from the popup menu Action from Color Profile > Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The Color Profile is deleted.

After confirmation, the Color Profiles are removed and the Color Profile List is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-139
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Color Profiles

Get the Color Profile Properties

....................................................................................................................................................................................................................................

Get the Color Profile Properties


When to use

This function gets information about a Color Profile.


Related Information

For more information, refer to Overview about Color Profiles (p. 18-133).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Color Profiles.


...................................................................................................................................................................................................

On the Color Profile List Window, select a Color. Select with the right mouse button from
the popup menu Properties.
...................................................................................................................................................................................................

The Properties window is displayed.


The attributes displayed for each Color Profile are:

Id

User Label.

....................................................................................................................................................................................................................................
1350 OMS
18-140
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Color Profiles

Get the Color Profile Properties

....................................................................................................................................................................................................................................

Priority 0 Priority 7.
Color Profile Mode (Priority, DSCP).

Figure 18-55 Color Profile Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-141
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management

Overview about Traffic Descriptor

....................................................................................................................................................................................................................................

Managing Traffic Descriptors


Overview about Traffic Descriptor
Traffic Descriptor description

The Traffic Descriptors describes the characteristics of an Ethernet Segment in term of


Class of Service (CoS) and bandwidth.
Another step toward the MEF alignment is provided by possibility to display bandwidth
parameters following both IETF definitions (as already available) and MEF definitions.
For reminder, the following definitions are applicable for IETF: CIR, PIR, PBS, CBS
while the following one are applicable for MEF: CIR, EIR, CBS, EBS.
The existing relationships are described as in the following:

EIR = PIR CIR .


EBS = PBS CBS .

Three Traffic Descriptors are created by default during the 1350 OMS PKT installation.
Class of services dependencies
Table 18-2

Class of services and traffic parameters dependencies


Class of Service.

Traffic
Descriptor
parameters.

CIR.

Best Effort.

Guaranteed.

Regulated.

0.

(CIR = PIR) & (CIR > 0).

(CIR <= PIR) & (CIR > =


0).
if (CIR > 0), (CBS > 0).
if (CIR = 0), (CBS=0).

PIR.

> 0.

(PIR = CIR) & (PIR > 0).

(PIR > = CIR) & (PIR > 0).

CBS.

0.

(CBS = PBS) & (CBS > 0).

(CBS > = 0) &


(CBS<=PBS).
if (CBS > 0), (CIR > 0).
if (CBS = 0), (CIR=0).

PBS.

> 0.

(PBS = CBS) & (PBS > 0).

(PBS > 0) & (PBS >


=CBS).

....................................................................................................................................................................................................................................
1350 OMS
18-142
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Overview about Traffic Descriptor

....................................................................................................................................................................................................................................

Table 18-3

ISA boards and Ethernet traffic parameters dependencies


ISA ES1 / ES4.

ISA PR EA / ISA ES16.

Minimum.

Maximum.

Minimum.

Maximum.

CIR.

0 or 8.

Up to PIR.

0 or 64.

Up to PIR.

PIR.

8.

Up to ELR.

64.

Up to ELR.

CBS.

0.

16384.

0.

Min (16384, 500/3*CIR).

PBS.

> 0.

16384.

> 0.

Min (65335, 500/3*PIR).

....................................................................................................................................................................................................................................
1350 OMS
18-143
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Display the Traffic Descriptor list

....................................................................................................................................................................................................................................

Display the Traffic Descriptor list


When to use

The Traffic Descriptor List window presents all the Traffic Descriptors and their
attributes.
Related Information

If this list is required from the Ethernet Segment List, only the Traffic Descriptors
associated to the selected Ethernet Segment are displayed.
For more information, refer to Traffic Descriptor description (p. 18-142).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Traffic Descriptors.


Result: The list window is displayed.

See the following topic in this document: Description of the list of Traffic
Descriptors (p. 18-145)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-144
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Description of the list of Traffic Descriptors

....................................................................................................................................................................................................................................

Description of the list of Traffic Descriptors


Attributes of a Traffic Descriptor

The attributes displayed for each Traffic Descriptor are:

User Label.

Class of Service (Guaranteed, Regulated, Best Effort, Guaranteed2, Regulated1,


Regulated3, Regulated4, Background).

CIR (Committed Information Rate).

PIR (Peak Information Rate).

CBS (Committed Burst Size).

PBS (Peak Burst Size).

....................................................................................................................................................................................................................................
1350 OMS
18-145
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Create a Traffic Descriptor

....................................................................................................................................................................................................................................

Create a Traffic Descriptor


When to use

This function consists in defining a Traffic Descriptor.


Related Information

Traffic Descriptor is used to describe the flow of the Ethernet frames over an Ethernet
Segment.
For more information, refer to Traffic Descriptor description (p. 18-142).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The maximum number of Traffic Descriptors must not be reached.

The traffic parameters of the Traffic Descriptor must be different from an existing
ones Traffic Descriptor.
The User Label must be different from the already used by other Traffic Descriptors.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > Services > Traffic Descriptor Creation.

....................................................................................................................................................................................................................................
1350 OMS
18-146
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Create a Traffic Descriptor

....................................................................................................................................................................................................................................

Result: The Creation window opens.

...................................................................................................................................................................................................

On the Create Traffic Descriptor Window, the following data must be entered.
To create a Traffic Descriptor:

Enter a User Label.

Select the Class of Service (Best Effort, Guaranteed, Regulated, Guaranteed2,


Regulated1, Regulated3, Regulated4, Background).
Enter a CIR value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
Enter a PIR value.

Enter a CBS value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
Enter a PBS value (if the selected Class of Service is 'Guaranteed', PBS value is
automatically set to CBS value - but could be modified).

....................................................................................................................................................................................................................................
1350 OMS
18-147
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Create a Traffic Descriptor

....................................................................................................................................................................................................................................

See CIR/PIR/CBS/PBSdependencies in Class of services dependencies (p. 18-142). The


relationship remains unchanged for the two Guaranteed as well as for the four Regulated.
...................................................................................................................................................................................................

Click Ok button.
Result: After checking the coherence of the traffic parameters values, the Traffic
Descriptor is created.

The Traffic Descriptor List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-148
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Modify a Traffic Descriptor

....................................................................................................................................................................................................................................

Modify a Traffic Descriptor


When to use

The function modifies Traffic Descriptor characteristics.


Related Information

For more information, refer to Traffic Descriptor description (p. 18-142).


The Traffic Descriptor modification gives the possibility to modify:

Traffic Descriptor User Label.


Class of Service.
CIR, PIR, CBS and/or PBS.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different from the one
used by another Traffic Descriptor.
The Traffic Descriptor must not be associated to any Ethernet Segment or could be
associated to Ethernet Segments in Defined provisioning state.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Traffic Descriptors.


...................................................................................................................................................................................................

On the Traffic Descriptor List, select the Traffic Descriptor to modify. Select with the
right mouse button the path Modify.

....................................................................................................................................................................................................................................
1350 OMS
18-149
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Modify a Traffic Descriptor

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Modify Traffic Descriptor window is displayed.


Figure 18-56 Traffic Descriptor Modification window

To modify a Traffic Descriptor:

Enter a new User Label (optional).

Modify the Class of Service (optional).


Modify the ClR (optional).

Modify the PIR (optional).

Modify the CBS (optional).

Modify the PBS (optional).

...................................................................................................................................................................................................

Click Ok button.

....................................................................................................................................................................................................................................
1350 OMS
18-150
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Modify a Traffic Descriptor

....................................................................................................................................................................................................................................

Result: After confirmation of the modification, 1350 OMS PKT checks the
consistence of the traffic parameter values and then, the Traffic Descriptor list is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-151
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Delete a Traffic Descriptor

....................................................................................................................................................................................................................................

Delete a Traffic Descriptor


When to use

This function consists in deleting a Traffic Descriptor.


Related Information

For more information, refer to Traffic Descriptor description (p. 18-142).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Traffic Descriptor must not be associated to any Ethernet Segment or could be
associated to Ethernet Segments in Defined provisioning state.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Traffic Descriptors.


...................................................................................................................................................................................................

On the traffic descriptor List Window, select the traffic descriptor to delete. Select with
the right mouse button from the popup menu Action from Traffic Descriptor > Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the Traffic Descriptors are removed.

The Traffic Descriptor list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-152
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Get the Traffic Descriptor Properties

....................................................................................................................................................................................................................................

Get the Traffic Descriptor Properties


When to use

This function gets information about a Traffic Descriptor.


Related Information

For more information, refer to Traffic Descriptor description (p. 18-142).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Traffic Descriptors.


...................................................................................................................................................................................................

On the Traffic Descriptor List Window, select a TD. Select with the right mouse button
from the popup menu Properties.
...................................................................................................................................................................................................

The Properties window is displayed.

....................................................................................................................................................................................................................................
1350 OMS
18-153
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Get the Traffic Descriptor Properties

....................................................................................................................................................................................................................................

See the following topic in this document: Details of a Traffic Descriptor (p. 18-155)
Figure 18-57 Traffic Descriptor (Ethernet Management) Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-154
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Descriptors

Details of a Traffic Descriptor

....................................................................................................................................................................................................................................

Details of a Traffic Descriptor


Attributes of a Traffic Descriptor

The attributes displayed for each Traffic Descriptor are:

Id

User Label.

PIR (Peak Information Rate).

CBS (Committed Burst Size).

PBS (Peak Burst Size).

Class of Service (Guaranteed, Regulated, Best Effort, Guaranteed2, Regulated1,


Regulated3, Regulated4, Background).

CIR (Committed Information Rate).

....................................................................................................................................................................................................................................
1350 OMS
18-155
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Overview about Traffic Classifiers

....................................................................................................................................................................................................................................

Managing Traffic Classifiers


Overview about Traffic Classifiers
Traffic Classifier description

The 1350OMS-PKT realizes a flow classification.


The 1350OMS-PKT is capable to distinguish different flows that are passing through the
same port or transport link using a Traffic Classifier
The Traffic Classifier describes the characteristics of an Ethernet frames on an Ethernet
Segment. Ethernet frames can be either tagged or untagged.
Three Traffic Classifiers are created by default during the 1350 OMS PKT installation.
The classification can be done with one or more of the following criteria:

Vlan Tag + Priority


IP DSCP/TOS
EtherType

When a VlanTag+Priority criteria is defined two flows are considered different if they
have different (or different sets of) VLAN Ids and/or VLAN Priorities.
A classification with IP DSCP/TOS criteria allows to identify distinct flows (at UNI/IWI)
basing on IPv4 frame.
The EthertType classification criteria is based on type/len field of Ethernet frame when it
assumes the Type meaning.
Each Ethernet Segment is characterized by a set of Traffic Classifiers that, in combination
with classification mode (Priority/DSCP), univocally determine which frames belongs to
it.
Each Provider Bridge Ingress Flow is characterized by a set of Traffic Classifiers that, in
combination with Classification Mode ("Priority"/"DSCP"), univocally determine which
frames passes through it. See also IP DSCP/TOS and EtherType (p. 18-6)
Classification criteria are not mutually excluded therefore some combinations of they are
allowed
Table 18-4
Vlan

Priority

Specific
or Range

Specific or
Range

Allowed combination of Traffic Classification criteria

DSCP

EtherType

Don'tCare Any
value

Note
Priority

Classification Type
SPECIFIC VLAN CLASSIFIER
SPECIFIC VLAN CLASSIFIER +
ETHTYPE

....................................................................................................................................................................................................................................
1350 OMS
18-156
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Overview about Traffic Classifiers

....................................................................................................................................................................................................................................

Table 18-4
Vlan
Any
value
(except
Don't
care)

Priority

Allowed combination of Traffic Classification criteria

DSCP

Don'tCareSpecific
or Range

EtherType
IP
(0x0800)

Note
Dscp

(continued)

Classification Type
UNTAGGED + SPECIFIC RANGE
DSCP + IP
SPECIFIC VLAN + SPECIFIC RANGE
DSCP + ETHTYPE

Don'tCare Don'tCareSpecific
or Range
or
NotIpPacket
Untagged

Untagged

Any
value
(except
Don't
care)

Don'tCareNotIpPacket

Any
value

Don'tCare Any
value

Tagged

TAGGED + SPECIFIC RANGE DSCP


TAGGED + NO IP
TAGGED + NO IP + ETHTYPE

Untagged

UNTAGGED CLASSIFIER
UNTAGGED CLASSIFIER +
ETHTYPE

NotIpPacket

UNTAGGED + NO IP CLASSIFIER
UNTAGGED + NO IP CLASSIFIER +
ETHTYPE
SPECIFIC VLAN + NO IP
SPECIFIC VLAN + NO IP + ETHTYPE

Don'tCare Don'tCareDon'tCare Don'tCare Default (Don'tCare)

Default

VLAN admitted values

For the VLAN, the following values/ranges are admitted:

Specific VLAN (0<= VLAN Id <=4095) and (VLAN Max = 0).

Range VLAN (0<= VLAN Id <=4094) and (1<= VLAN Max <= 4095) and (VLAN
Id < VLAN Max).
Untagged Frame (VLAN Id = 4096) and (VLAN Max = 0).
Do not Care (VLAN Id = 4097) and (VLAN Max = 0).

Priority admitted values

For the Priority, the following values/ranges are admitted:

Specific priority (0<= Priority Id <=7) and (Priority Max = 0).


Range priority (0<= Priority Id <=6) and (1<= Priority Max <= 7) and (Priority Id <
Priority Max).
Untagged Frame (Priority Id = 8) and (Priority Max = 0).

Do not Care (Priority Id = 9) and (Priority Max = 0).

....................................................................................................................................................................................................................................
1350 OMS
18-157
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Display the Traffic Classifier list

....................................................................................................................................................................................................................................

Display the Traffic Classifier list


When to use

The Traffic Classifier List window presents all the Traffic Classifiers and their attributes.
Related Information

If this list is required from the Ethernet Segment List (or VLAN Constraint List), only the
Traffic Classifiers associated to the selected items are displayed.
For more information, refer to Traffic Classifier description (p. 18-156).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Traffic Classifier.


Result: The list window is displayed.

See the following topic in this document: Description of the list of Traffic
Classifiers (p. 18-159)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-158
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Description of the list of Traffic Classifiers

....................................................................................................................................................................................................................................

Description of the list of Traffic Classifiers


Attributes of a Traffic Classifier

The attributes displayed for each Traffic Classifier are:

User Label.

VLAN Identifier.

VLAN Max.

Priority Identifier.

Priority Max.

DSCP (Differentiated Services Code Point).

DSCP Max.

EtherType.

....................................................................................................................................................................................................................................
1350 OMS
18-159
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Create a Traffic Classifier

....................................................................................................................................................................................................................................

Create a Traffic Classifier


When to use

This function consists in defining a Traffic Classifier that can be associated to an Ethernet
Segment.
Related Information

For more information, refer to Traffic Classifier description (p. 18-156).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The User Label must be not in use by another Traffic Classifier.


The maximum number of Traffic Classifiers must not be reached.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > Services > Create Traffic Classifier.
Result: The Create Traffic Classifier windows opens.
...................................................................................................................................................................................................

To create a Traffic Classifier the following data must be entered:

Enter a User Label.

Select a Classification Type.

Enter a Priority Identifier (value between 0 and 7, Untagged, Do not care). It


represents a value of field priority bit contained in VLAN tagged Ethernet frame.
Enter a VLAN Identifier (value between 0 and 4095). It represents the identifier of a
particular logical flow (logical grouping of stations).
Enter a value for IP DSCP (value between 0 and 63).

Enter a Priority Max (value between 0 and 7). It represents the maximum value of
priority range (0 if a range is not used).
Enter a VLAN Max (value between 0 and 4095). It represents the maximum value of
VLAN range (0 if a range is not used).

....................................................................................................................................................................................................................................
1350 OMS
18-160
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Create a Traffic Classifier

....................................................................................................................................................................................................................................

Enter a value for IP DSCP Max (value between 0 and 63).


Select the EtherType.

...................................................................................................................................................................................................

Click Ok button.
Result: After checking the coherence of the traffic parameters values, the Traffic

Classifier is created.
The Traffic Classifier List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-161
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Modify a Traffic Classifier

....................................................................................................................................................................................................................................

Modify a Traffic Classifier


When to use

The function modifies Traffic Classifier characteristics.


Related Information

Default Traffic Classifier cannot be modified.


The Traffic Classifier modification gives the possibility to modify:

Traffic Classifier User Label.


Priority Id, VLAN Id, Priority Max and/or VLAN Max.

For more information, refer to Traffic Classifier description (p. 18-156).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The new User Label must be not in use by another Traffic Classifier.
The Traffic Classifier is not in use by any Ethernet Segments.

The Traffic Classifier is associated to one or more Ethernet Segments in the Defined
provisioning state.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Traffic Classifiers.


...................................................................................................................................................................................................

On the Traffic Classifier List, select the Traffic Classifier to modify. Select with the right
mouse button the path Modify.

....................................................................................................................................................................................................................................
1350 OMS
18-162
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Modify a Traffic Classifier

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Modify Traffic Classifier window is displayed.


Figure 18-58 Traffic Classifier Modification window

To modify a Traffic Classifier:

Enter a new User Label (optional).

Modify the Priority Id (optional).

Modify the VLAN Id (optional).

Modify the Priority Max (optional).

Modify the VLAN Max (optional).

...................................................................................................................................................................................................

Click Ok button.
Result: After confirmation of the modification, 1350 OMS PKT checks the
consistence of the traffic parameter values and then, the Traffic Classifier list is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-163
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Delete a Traffic Classifier

....................................................................................................................................................................................................................................

Delete a Traffic Classifier


When to use

This function consists in deleting a Traffic Classifier from the supervision.


Related Information

Default Traffic Classifier cannot be deleted.


For more information, refer to Traffic Classifier description (p. 18-156).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

No more Ethernet Segments are using this Traffic Classifier.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Traffic Classifiers.


...................................................................................................................................................................................................

On the Traffic Classifier List Window, select the traffic descriptor to delete. Select with
the right mouse button from the popup menu Action > Traffic Classifier > Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the Traffic Classifier are removed.

The Traffic Classifier list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-164
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Get the Traffic Classifier Properties

....................................................................................................................................................................................................................................

Get the Traffic Classifier Properties


When to use

This function gets information about a Traffic Classifier.


Related Information

For more information, refer to Traffic Classifier description (p. 18-156).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Traffic Classifiers.


...................................................................................................................................................................................................

On the Traffic Classifier List Window, select a Traffic Classifier. Select with the right
mouse button from the popup menu Properties.
...................................................................................................................................................................................................

The Properties window is displayed.

....................................................................................................................................................................................................................................
1350 OMS
18-165
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Get the Traffic Classifier Properties

....................................................................................................................................................................................................................................

See the following topic in this document: Details of a Traffic Classifier (p. 18-167)
Figure 18-59 Traffic Classifier Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-166
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Traffic Classifiers

Details of a Traffic Classifier

....................................................................................................................................................................................................................................

Details of a Traffic Classifier


Attributes of a Traffic Classifier

The attributes displayed for each Traffic Classifier are:

Id.

User Label.

Ethernet Segment Id.

Ethernet Segment.

VLAN Id.

VLAN Max.

Priority Identifier.

Priority Max.

EVC Port Id Label

ESG Port Id Label

DSCP (Differentiated Services Code Point).

EtherType.

DSCP Max.

....................................................................................................................................................................................................................................
1350 OMS
18-167
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Overview about Ethernet edge physical ports

....................................................................................................................................................................................................................................

Managing Ethernet ETS Edge Physical Ports


Overview about Ethernet edge physical ports
Ethernet edge physical ports description

The Ethernet edge physical ports represent the border of the network managed by the
1350 OMS PKT.
They are the extremities of Ethernet Services, EVCs, and Ethernet Segments and they
represent UNIs and IWIs.
An Ethernet edge physical port is in the Ethernet Domain, the image of an Ethernet
Physical Port (PPT) or an External Termination Point (ETP) in the Construction Domain.
Ethernet edge physical port attributes

The fundamental attributes of an Ethernet physical edge port are:

The Activation State that tells whether the port is active or not. If active, the port can
carry traffic/is carrying traffic.
The VLAN Type (that identifies the VLAN Tag protocol Type used to distinguish
tagged and untagged frames and to form new VLAN Tags using push operations).

Ethernet edge physical port cannot be explicitly created or deleted by the user: Port is
automatically created when a proper PPT or ETP is created. Port is automatically deleted
when the related Construction object is deleted.
Ethernet edge physical port and VLAN

Whenever a new Ethernet edge physical port is created, it comes with an Activation State
and a VLAN Type that is aligned with what defined in the NE to which the Edge port
belongs. If the edge port is ETP then the Activation State is Down and the VLAN Type is
the default one (that is, 8100 hexadecimal).
In the scope of MEF alignment, a set of attributes is added to Ethernet Edge Port
(intended as UNI).
The Edge ports support the VLAN Type according to the board they belong to. The
boards like ISA PR EA supports any VLAN Type. The boards like ISA PR ES supports
only the standard VLAN. The boards like ISA E/FE/GE and ISA ES1/4 do not support
any VLAN.

....................................................................................................................................................................................................................................
1350 OMS
18-168
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Display the ETS edge port list

....................................................................................................................................................................................................................................

Display the ETS edge port list


When to use

The Edge Port List window presents all the edge ports and their attributes.
Related Information

For more information, refer to Ethernet edge physical ports description (p. 18-168).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Connection Oriented (ETS) > ETS Edge Ports.


Result: The list window is displayed.

The attributes displayed for each edge port are:


User Label.
Network Element.
Usage State (Busy, Reserved, Not Meaningful, Idle).

Rate.

Activation State (Down, Up).

VLAN Type.

Interface Type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-169
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Modify an edge port

....................................................................................................................................................................................................................................

Modify an edge port


When to use

This function allows to modify the characteristics of a selected edge port.


Related Information

For more information, refer to Ethernet edge physical ports description (p. 18-168).
Details when modifying the edge port characteristics:

Max Number of EVC: the number of EVC that must be allowed on that UNI. ( > = 1).

Service Multiplexing: new attribute for all Edge ports.

Default value:
Yes for ETS, ETS_P, ETB (Virt).

No for ETB (MAC).

Modifiable in all cases except ETB (MAC).

This attribute is checked against the other attributes like: Max Number of EVC,
Bundling and AllToOneBundling. The check is performed at attribute set and at UNI
usage.

Bundling: checked if the EVC can be mapped with one or more VLAN, not checked

if one EVC can be mapped only with one VLAN.


All to one Bundling: checked if the EVC maps all VLAN existing on that UNI (that
is, one EVC only on that UNI), not checked if the mapping is performed differently.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The edge port must be not active (for example: activation state equal to Down).

The edge port must not be an ENE edge port.


The edge port can be involved in defined Ethernet Segments only.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.

....................................................................................................................................................................................................................................
1350 OMS
18-170
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Modify an edge port

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

On the Edge Port List, select the Edge Port to modify. Select with the right mouse button
the path Modify or Action > Modify from the main menu.
...................................................................................................................................................................................................

The Modify Edge Port window is displayed.


Figure 18-60 Edge Port Modification window

To modify the edge port characteristics:

Max Number of EVC.

Service Multiplexing.

Bundling.

All to one Bundling.

...................................................................................................................................................................................................

Click Ok button.
Result: After confirmation of the modification: the new attribute values are

downloaded to the NE at the implementation time.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-171
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Configure an ETS Edge Port

....................................................................................................................................................................................................................................

Configure an ETS Edge Port


When to use

This function consists in configuring the VLAN type of a selected edge port.
Related Information

For more information, refer to Ethernet edge physical ports description (p. 18-168).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The edge port must not be active (for example: activation state equal to Down).
The edge port can be involved in defined Ethernet Segments only.
The edge port must not be an ENE edge port.

Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
...................................................................................................................................................................................................

On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path
Action > ETS Edge Port > Edge Port Configuration.

....................................................................................................................................................................................................................................
1350 OMS
18-172
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Configure an ETS Edge Port

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Edge Port configuration window is displayed.


Figure 18-61 Edge Port Configuration window

To modify the edge port characteristics:

Vlan Type: Insert the Vlan Type selecting it from the defined Vlan type list.

...................................................................................................................................................................................................

Click Ok button.

....................................................................................................................................................................................................................................
1350 OMS
18-173
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Configure an ETS Edge Port

....................................................................................................................................................................................................................................

Result: After confirmation of the modification: the VLAN type is downloaded to the
NE at the implementation time.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-174
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Get the ETS Edge Port Properties

....................................................................................................................................................................................................................................

Get the ETS Edge Port Properties


When to use

This function gets information about an ETS edge port.


Related Information

For more information, refer to Ethernet edge physical ports description (p. 18-168).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
...................................................................................................................................................................................................

On the ETS Edge Port List Window, select an Edge Port. Select with the right mouse
button from the popup menu Properties.
...................................................................................................................................................................................................

The Properties window is displayed.


The attributes displayed for each edge port are:

User Label.

Network Element.

Usage State (Busy, Reserved, Not Meaningful, Idle).

Rate.

Activation State (Down, Up).

....................................................................................................................................................................................................................................
1350 OMS
18-175
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Get the ETS Edge Port Properties

....................................................................................................................................................................................................................................

VLAN Type.
Interface Type.

Figure 18-62 Edge Port Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-176
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Display the traffic parameter list

....................................................................................................................................................................................................................................

Display the traffic parameter list


When to use

The Traffic Parameter List window presents all the information about the traffic
parameters of the selected edge port.
Related Information

This list is filled only when the Edge port is involved in an Ethernet Segment and
contains Traffic Classifier and Traffic Descriptor.
For more information, refer to Ethernet edge physical ports description (p. 18-168).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
...................................................................................................................................................................................................

On the ETS Edge Port List Window, select an Edge Port. Select with the right mouse
button from the popup menu Action from Ets Edge Port > Traffic Parameter List.
Result: The Traffic Parameter List window is displayed.

See the following topic in this document: Description of the list of Traffic
Parameters (p. 18-178)
...................................................................................................................................................................................................

Selecting a Traffic Parameter in the list, the corresponding properties window can be
displayed selecting with the right mouse button the item Properties from the popup
menu.
Result: The property window is displayed.

See the following topic in this document: Details of Traffic Parameters (p. 18-179)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-177
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Description of the list of Traffic Parameters

....................................................................................................................................................................................................................................

Description of the list of Traffic Parameters


Attributes of a Traffic Parameter

The attributes displayed for each traffic parameter are:

Ethernet Flow.

Edge port Role.

Class of Service (Best Effort, Guaranteed, Regulated).

Traffic Descriptor associated to the Ethernet Segment.

CIR.

PIR.

EIR.

Traffic Classifier associated to the Ethernet Segment.

VLAN Identifier.

Priority Identifier.

Priority Range.

VLAN Range.

....................................................................................................................................................................................................................................
1350 OMS
18-178
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Details of Traffic Parameters

....................................................................................................................................................................................................................................

Details of Traffic Parameters


Attributes of a Traffic Parameter

The attributes displayed for each traffic parameter are:

Ethernet Flow.

Edge port Role.

Class of Service (Best Effort, Guaranteed, Regulated).

Traffic Descriptor associated to the Ethernet Segment.

CIR.

PIR.

EIR.

Traffic Classifier associated to the Ethernet Segment.

VLAN Identifier.

Priority Identifier.

Priority Range.

VLAN Range.

....................................................................................................................................................................................................................................
1350 OMS
18-179
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Navigation to equipment

....................................................................................................................................................................................................................................

Navigation to equipment
When to use

This procedure permits to navigate to the Equipment starting from Edge Port List, with
port selection.
Related Information

For more information about Edge Port, refer to Ethernet edge physical ports description
(p. 18-168).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
Note: The navigation does not run if the address of the target server is not defined in
the file hosts of the PC where the MS-GUI is running.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one Edge Port in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Edge Port > External Navigation to > GUI.

....................................................................................................................................................................................................................................
1350 OMS
18-180
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Navigation to equipment

....................................................................................................................................................................................................................................

Result: The Show Equipment window is shown.


Figure 18-63 Show Equipment window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-181
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Show PM on an Edge Port

....................................................................................................................................................................................................................................

Show PM on an Edge Port


When to use

This function Shows Performance Monitoring (PM) on a Connection Oriented Edge Port
or Connection Less Edge Port.
Related Information

For more information about Edge Port, refer to Ethernet Edge Port management
(p. 11-51).
For more information about PM, refer to Quality of service: PM management
(p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

Select Connection Oriented (ETS) > ETS Edge Ports or Connection Less (Bridge) >
Bridge Edge Ports.
Result: The Edge Ports list is displayed.
...................................................................................................................................................................................................

Select the Edge Ports in the list and follow the path Search > Edge Port > Show > PM.
Result: The PM related to the Edge Port is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-182
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet ETS Edge Physical Ports

Show External Termination Point

....................................................................................................................................................................................................................................

Show External Termination Point


When to use

This procedure show the Edge Port External Termination Points.


Related Information

For more information about Edge Port, refer to Ethernet edge physical ports description
(p. 18-168).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one Edge Port in the list.


...................................................................................................................................................................................................

Select Search > Edge Port > Show > External Termination Point.
Result: The External Termination Point list is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-183
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Overview about Ethernet Transport Links

....................................................................................................................................................................................................................................

Managing Ethernet Transport Links


Overview about Ethernet Transport Links
Ethernet Transport Link description

The Ethernet Transport Link represents the elementary link that supports the connectivity
provisioned by the Ethernet Traffic Management Domain, that is, Ethernet links (and by
extensions EVCs and Services).
An Ethernet Transport Link is the image, on the Ethernet Domain, of a Transport Link of
the Construction Domain.
The Ethernet Transport Link cannot be explicitly created or deleted by the user. The
Ethernet Transport Link is automatically created when a Transport Link dedicated to
Ethernet is created and is automatically deleted when the related Transport Link is
deleted.
Transport Link attributes

Important attributes for a Transport Link are the Configuration State and, considering its
extremities, the Activation State and the VLAN Type.
To be able to transport Ethernet traffic, the extremities of the Transport Link must be
"activated", that is, a specific configuration must be performed on the NEs that host
terminations to activate them.
For this reason, at creation time, the Activation State of the Transport Link terminations is
checked (uploading it from the corresponding NEs) and each non-active termination is
activated.
To manage VLAN tagged frames, a port (and in particular an end point of a Transport
Link) must be configured with a proper VLAN Tag Protocol Type (used to distinguish
tagged and untagged frames and to form new VLAN Tags using push operations).
The VLAN Type attribute of the Transport Link extremities is managed in two ways:

at creation time, the VLAN Tag Protocol Type for each Transport Link extremity is
uploaded from the related NEs and the VLAN Type attribute is set. If in the 1350
OMS PKT there is no VLAN Type equivalent of the uploaded VLAN Tag Protocol
Type, a new VLAN Type (with a proper user label) is created to model the latter.
an operation is provided to configure the VLAN Tag Protocol Type of the extremities
of a Transport Link after its creation.

....................................................................................................................................................................................................................................
1350 OMS
18-184
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Overview about Ethernet Transport Links

....................................................................................................................................................................................................................................

Transport Link states

At any time, the configuration state of an Ethernet Transport Link could be recalculated
and set to:

Configured: If both extremities are active and are configured with the same VLAN

Tag protocol type.

Partially Configured: If only one extremity is active or when both extremities are

active but are configured with two different VLAN Tag protocol types.
Not Configured: If both extremities are not active.

....................................................................................................................................................................................................................................
1350 OMS
18-185
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Display the Ethernet ETS Transport Link list

....................................................................................................................................................................................................................................

Display the Ethernet ETS Transport Link list


When to use

The Ethernet Transport Link List window presents all the Ethernet Transport Links and
their attributes.
Related Information

If this list is required from the Ethernet Segment List, only the Transport Links associated
to the selected Ethernet Segment is displayed.
If this list is required from the VLAN type list, only Transport Links whose edge ports are
associated to the selected VLAN type is displayed.
For details see Overview about Ethernet Transport Links (p. 18-184).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Transport Link must not be in use by an Ethernet Segment (Its usage state must
be Idle).
The Transport Link must have a SDH or Cable technology.

Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Connection Oriented (ETS) > ETS Transport Links.


Result: The list window is displayed.

See the following topic in this document: Description of the list of ETS Transport
Links (p. 18-187)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-186
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Description of the list of ETS Transport Links

....................................................................................................................................................................................................................................

Description of the list of ETS Transport Links


Attributes of an ETS Transport Link

The attributes displayed for each Transport Link are:

User Label.

Subnetwork.

Technology (MPLS, SDH, Cable).

Guaranteed Bandwidth.

Best Effort Bandwidth.

Usage State (Idle, Busy, Reserved, Not Meaningful).

Working State (Normal, Configuring, Removing).

Configuration State (Configured, Partially Configured, Not Configured).

....................................................................................................................................................................................................................................
1350 OMS
18-187
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Configure an ETS Transport Link

....................................................................................................................................................................................................................................

Configure an ETS Transport Link


When to use

This function permits to change the VLAN Protocol Type of Transport Link extremities.
Related Information

The VLAN Type is not an attribute of the Transport Link. The VLAN Type is an attribute
of its extremities (that is, Transport Link terminations). So, VLAN Type is displayed in
the extremity window of the Transport Link.
For these reasons, while the Edge port modification command acts on one Edge port (and
its attributes), the Transport Link configuration command acts only on the Transport Link
terminations (that is, a shortcut for the user, to avoid him to configure separately the two
terminations.
For details see Overview about Ethernet Transport Links (p. 18-184).
Transport Link states

After confirmation, the Configuration state of the Transport Link is recalculated and set
to:

Configured: if both extremities are active and are configured with the same VLAN

Tag Protocol Type.

Partially Configured: if only one extremity is active (while the other is not active) or

when both extremities are active but are configured with two different VLAN Tag
Protocol Types.
Not Configured: if both extremities are not active.

Transport Link VLAN

The ports at the extremities of the Transport Link are active and configured with the
VLAN Type:

They recognize as tagged only the Ethernet frames that are tagged with the same
VLAN type.
Any push operation (that is, VLAN constraint of type "Push") defined on them uses
the specified VLAN type to create (and push) new VLAN tags.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS
18-188
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Configure an ETS Transport Link

....................................................................................................................................................................................................................................

Conditions

To get a positive result:

The Transport Link must not be in use by an Ethernet Segment (Its usage state must
be Idle).
The Transport Link must have a SDH or Cable technology.

Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport
Links.
...................................................................................................................................................................................................

On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path
Action > Transport Link > Transport Link Configuration.
...................................................................................................................................................................................................

The Transport Link configuration window is displayed.


To configure a Transport Link:

Select a Service Type (by using the sensitive help).

Select a VLAN Type (by using the sensitive help) or select True for the
Set standard VLAN Type (8100).

...................................................................................................................................................................................................

Click Ok button.
Result: The Transport Link configuration state is changed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-189
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Get the Transport Link extremities

....................................................................................................................................................................................................................................

Get the Transport Link extremities


When to use

This function gets information about the extremities of a Transport Link.


Related Information

For details see Overview about Ethernet Transport Links (p. 18-184).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Transport Link must not be in use by an Ethernet Segment (Its usage state must
be Idle).
The Transport Link must have a SDH or Cable technology.

Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport
Links.
...................................................................................................................................................................................................

On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path
Action > Transport Link > Extremities.

....................................................................................................................................................................................................................................
1350 OMS
18-190
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Get the Transport Link extremities

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Transport Link Extremities window is displayed.


Figure 18-64 Transport Link Extremities window

The window allows to modify:

The Network Element.

The NE Type (by using the sensitive help).

The Termination User Label (by using the sensitive help).


The Activation State (by using the sensitive help).

...................................................................................................................................................................................................

Click Ok button.

....................................................................................................................................................................................................................................
1350 OMS
18-191
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Get the Transport Link extremities

....................................................................................................................................................................................................................................

Result: After confirmation the extremities data are updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-192
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Get the Transport Link properties

....................................................................................................................................................................................................................................

Get the Transport Link properties


When to use

This function gets information about a Transport Link.


Related Information

For details see Overview about Ethernet Transport Links (p. 18-184).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport
Links.
...................................................................................................................................................................................................

On the Transport Link List, select the Transport Link to see the properties. Follow the
path Action > Properties.

....................................................................................................................................................................................................................................
1350 OMS
18-193
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Get the Transport Link properties

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Transport Link Properties window is displayed.


Figure 18-65 Transport Link Properties window

...................................................................................................................................................................................................

Click the window Close button.


Result: The properties window is closed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-194
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Details of ETS Transport Links

....................................................................................................................................................................................................................................

Details of ETS Transport Links


Attributes of an ETS Transport Link

The attributes displayed for each Transport Link are:

Id.

User Label.

Subnetwork Id Label.

Subnetwork.

Technology (MPLS, SDH, Cable).

Directionality.

Ethernet Segment Id.

Ethernet Segment.

Usage State (Idle, Busy, Reserved, Not Meaningful).

A END Id label.

Z END Id label.

A END Type label.

Z END Type label.

Forward cost.

Backward cost.

Guaranteed Bandwidth.

Best Effort Bandwidth.

Transport Link Label.

Consistency State.

Configuration State (Configured, Partially Configured, Not Configured).

VLAN Id.

VLAN Type.

NAD.

Working State (Normal, Configuring, Removing).

....................................................................................................................................................................................................................................
1350 OMS
18-195
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Transport Links

Display the Transport Link bandwidth load

....................................................................................................................................................................................................................................

Display the Transport Link bandwidth load


When to use

This function gets information about the bandwidth load of a Transport Link.
Related Information

For details see Overview about Ethernet Transport Links (p. 18-184).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport
Links.
...................................................................................................................................................................................................

On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path
Action Transport Link > Bandwidth Load.
...................................................................................................................................................................................................

The Transport Link Bandwidth Load window is displayed.


...................................................................................................................................................................................................

Click the window Close button.


Result: The properties window is closed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-196
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Overview about Ethernet Segments

....................................................................................................................................................................................................................................

Managing Ethernet Segments


Overview about Ethernet Segments
Ethernet Segment description

An Ethernet Segment is a unidirectional end-to-end connection between two Ethernet


physical ports (that is, between two PEs).
Every Ethernet Segment is terminated by means of two Ethernet Edge ports which
represent the terminations in the Provider Edges (where the Ethernet traffic "enter
in"/"exit from" the managed network).
An Ethernet Edge Physical port can support different Ethernet traffics.
Each Ethernet Segment is built by means of a series of Ethernet Links.
Ethernet Links (Transport Links) are unidirectional connections terminated by means of
two Ethernet Link Terminations.
The conjunction between two Ethernet Links is made by a cross connection named
Ethernet Switch.
Ethernet Segment representation
Figure 18-66 Ethernet Segment representation

....................................................................................................................................................................................................................................
1350 OMS
18-197
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Overview about Ethernet Segments

....................................................................................................................................................................................................................................

Bandwidth check for Transport Links

The following bandwidth checks are executed for SDH and Cable Transport Link:

The sum of all CIR of Ethernet Segments allocated using the Transport Link must be
less or equal the total bandwidth of the Transport Link; this check is executed
separately for forward and backward direction.
The PIR of Ethernet Segment must be less than or equal to of the total bandwidth.
The number of best effort Ethernet Segments must be less than or equal to the
configuration limit.

Bandwidth check for MPLS connections

For MPLS Transport Link:

The PIR, CIR, CBS and PBS of Ethernet Segment must be less than or equal to the
same values associated to Transport Link.

Bandwidth check for multicast connections

The bandwidth check for multicast connections is executed taking this connection type in
account. If more Ethernet Segments use the same Transport Link, the bandwidth
reservation is considered only for one Ethernet Segment.
For the extremities of the Ethernet Segment, the following bandwidth checks are
executed:

For Aend and Zend: The sum of CIR of the Ethernet Segment that uses the port as
Aend/Zend + the CIR of the Ethernet Segment that is allocating <= rate of the port.

Another check that must be executed is: only one Color Profile can be defined on the
same port; the Color Profile is managed based on port granularity, when a same port is
used by different Ethernet Segment, the same Color Profile must be defined.
A VLAN compatibility check is also performed (that is, verify that the same termination
ingress of connection with the same VLAN is not used more than once).
The Transport Link usage state is set to busy the first time that Transport Link is used by
one Ethernet Segment.
The bandwidth parameters of all involved Transport Links are updated taking into
account the bandwidth configured for the Ethernet Segment; the available bandwidth
(guaranteed) is decreased of the CIR value associated to the Ethernet Segment.
Then, the Ethernet Segment List is updated with, for each selected Ethernet Segment,
Provisioning state set to Allocated.
The provisioning state of the related EVC is updated in Allocated or Partially Allocated.

....................................................................................................................................................................................................................................
1350 OMS
18-198
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Display the Ethernet Segment list

....................................................................................................................................................................................................................................

Display the Ethernet Segment list


When to use

The Ethernet Segment List window presents all the Ethernet Segments and their
attributes.
Related Information

If this list is required from the Ethernet Service, Traffic Descriptor, Traffic Classifier, or
Color Profile list, only the Ethernet Segments associated to the selected the object is
displayed..
See Ethernet Segment description (p. 18-197).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Connection Oriented (ETS) > Ethernet Segments.


Result: The list window is displayed.

See the following topic in this document: Description of the list of Ethernet
Segments (p. 18-200)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-199
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Description of the list of Ethernet Segments

....................................................................................................................................................................................................................................

Description of the list of Ethernet Segments


Ethernet Segment description

An Ethernet Segment is a unidirectional end-to-end connection between two Ethernet


physical ports (that is, between two PEs).
Every Ethernet Segment is terminated by means of two Ethernet Edge ports which
represent the terminations in the Provider Edges (where the Ethernet traffic "enter
in"/"exit from" the managed network).
An Ethernet Edge Physical port can support different Ethernet traffics.
Each Ethernet Segment is built by means of a series of Ethernet Links.
Ethernet Links (Transport Links) are unidirectional connections terminated by means of
two Ethernet Link Terminations.
The conjunction between two Ethernet Links is made by a cross connection named
Ethernet Switch.
Ethernet Segment representation
Figure 18-67 Ethernet Segment representation

Attributes of a Ethernet Segment

The attributes displayed for each Ethernet Segment are:

User Label.

Subnetwork.

EVC.

....................................................................................................................................................................................................................................
1350 OMS
18-200
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Description of the list of Ethernet Segments

....................................................................................................................................................................................................................................

Policy Mode (Color Blind, Color Aware, Disabled).

Provisioning State (Defined, Partially Allocated, Allocated, Partially


Implemented, Implemented).

Availability Status (Normal, Degraded, In Failure, Not Meaningful).

Working State (Normal, Configuring, Allocating, De-allocating, Implementing,


De-implementing, Commissioning, De-commissioning, Constraint adding,
Constraint removing).

....................................................................................................................................................................................................................................
1350 OMS
18-201
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Create an Ethernet Segment

....................................................................................................................................................................................................................................

Create an Ethernet Segment


When to use

This function consists in creating an Ethernet Segment.


Related Information

See Ethernet Segment description (p. 18-197).


Policy Mode
Policy Mode values and meaning:

Disabled: no policy applies.

Color Blind: Policy is enabled and based only on Traffic Descriptor parameters.

Color Aware: Policy is enabled and based both on Traffic Descriptor parameters and
on Color Profile.

Color Profile

Color Profile depends on the selected Policy Mode:

Policy Mode = Disabled: Color Profile can be defined.

Policy Mode = Color Aware: Color Profile must be defined.

Policy Mode = Color Blind: Color Profile cannot be defined.

Traffic Descriptor

Traffic Descriptor depends on the selected Policy Mode:

Policy Mode = Disabled: No Traffic Descriptor.

Policy Mode = Color Aware: the Traffic Descriptor must be Regulated.

Policy Mode = Color Blind: the Traffic Descriptor must be Best Effort or Guaranteed.

Priority Mode
Priority Mode depends on the Policy Mode:

If Policy Mode is Color Blind, choose the Priority Id value between 0 and 7,
Untagged, Do not care. The Priority Id is priority of all the packets after the push.
If Policy Mode is Color Aware, choose Green Priority and Yellow Priority for all
green and yellow outgoing packets.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS
18-202
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Create an Ethernet Segment

....................................................................................................................................................................................................................................

Conditions

To get a positive result:

At least, one EVC, one Color Profile, one Traffic Descriptor, and two Edge Physical
Ports must exist.
The User Label must be not in use.
The Edge Physical Port can be in use by another Ethernet Segment provided that it
belongs to the same Ethernet service.

Task

From the MS-GUIMain view:


...................................................................................................................................................................................................

Select Action > Packet > Services > Connection Oriented (ETS) > Create Ethernet
Segment.
...................................................................................................................................................................................................

To create an Ethernet Segment:


On the Ethernet Segment Creation window General Panel

Enter an Ethernet Segment User label.

Enter the EVC the Ethernet Segment belongs to.

Choose the EVC Termination or ENE on side "A" and on side "Z" by using the
sensitive help (each termination is composed of 'Network Element'+'User
Label'+'Role').
Choose a Traffic Descriptor by using the sensitive help. See Traffic Descriptor
(p. 18-202).
Select a Policy Mode (Disabled, Color Blind, Color Aware). See Policy Mode
(p. 18-202).
Define a Color Profile by using the sensitive help (Regulated, Best Effort,
Guaranteed). See Color Profile (p. 18-202).
Select the Classification Mode (Priority, DSCP).

Enter a Comment (optional).

...................................................................................................................................................................................................

On the Pop Panel enter following data:


Execute the following steps:

Specify a list of Traffic Classifiers references by using the icon that lists the Traffic
Classifier.

Select one or more Traffic Classifier.

...................................................................................................................................................................................................

On the Push Panel enter following data:

....................................................................................................................................................................................................................................
1350 OMS
18-203
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Create an Ethernet Segment

....................................................................................................................................................................................................................................

Execute the following steps:

Enter the VLAN Id to be pushed.

Select a Policy Mode (Disabled, Color Blind, Color Aware). See Policy Mode
(p. 18-202).
Select the Priority Id (0, ,7, Untagged, Do not care,Green Priority,Yellow
Priority).

...................................................................................................................................................................................................

Click Ok.
Result: The Ethernet Segment is created into the 1350 OMS PKT with the following

state:

Provisioning State: Defined.

Availability Status: Normal.

Working State: Normal.

If the usage state of each EVC termination is idle, the usage state is marked busy.
The tree area, the Ethernet Segment list, and the EVC list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-204
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Modify an Ethernet Segment

....................................................................................................................................................................................................................................

Modify an Ethernet Segment


When to use

The function modifies Ethernet Segment characteristics.


Related Information

See Ethernet Segment description (p. 18-197).


See Color Profile (p. 18-202).
See Traffic Descriptor (p. 18-202).
The Ethernet modification gives the possibility to modify one or all the following
parameters:

Ethernet Segment User Label.


Color Profile.
Traffic Descriptor.

Comment.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must not be in use by another
Ethernet Segment.
Traffic Descriptor is modifiable only when Ethernet Segment provisioning state is
Defined.
Color Profile is modifiable only when Ethernet Segment provisioning state is Defined
or Allocated.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

On the Ethernet Segment List Window, select the Segment to modify. Click the right
mouse button and select Modify on the popup menu.

....................................................................................................................................................................................................................................
1350 OMS
18-205
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Modify an Ethernet Segment

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Modify Segment window is displayed.


Figure 18-68 Ethernet Segment Modification window

To modify an Ethernet Segment:

Enter a new User Label.

Choose a new Traffic Descriptor by using the sensitive help, according to the Policy
Mode.
Modify the Color Profile, by using the sensitive help, according to the Policy Mode.
Modify the Classification Mode (Priority, DSCP).

Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
18-206
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Modify an Ethernet Segment

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok.
Result: The segment is modified.

If the Ethernet User Label is modified, the tree area, the Ethernet Segment list, and
the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-207
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Delete an Ethernet Segment

....................................................................................................................................................................................................................................

Delete an Ethernet Segment


When to use

This function consists in deleting an Ethernet Segment from the 1350 OMS PKT
supervision.
Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment Provisioning state must be Defined.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

On the Traffic Classifier List Window, select the traffic descriptor to delete. Select with
the right mouse button from the popup menu Action > Ethernet Segment > Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the Ethernet Segments are deleted.

If the Ethernet Edge Physical Port terminating the deleted Ethernet Segments is no
more used by any other Ethernet Segment, the Ethernet Edge Physical Port is marked
as "not busy" (Usage State set to idle).
The provisioning state of parent EVC is recalculated.
The Ethernet Segment list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-208
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Associate a Traffic Classifier to an Ethernet Segment

....................................................................................................................................................................................................................................

Associate a Traffic Classifier to an Ethernet Segment


When to use

This function consists in associating a Traffic Classifier to an Ethernet Segment.


Related Information

One or more Traffic Classifier can be associated to an Ethernet Segment.


If two Ethernet Segments share the same Edge port, the Traffic Classifiers associated to
them must refer different VLAN Bit and Priority Bit.
See Ethernet Segment description (p. 18-197).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment Provisioning state must be Defined.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

From the Multi Service GUI Main view, follow the path Search > Packet > Services >
Connection Oriented (ETS) > Ethernet Segments.
...................................................................................................................................................................................................

Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

Follow the path Action > ETS Ethernet Segment > Associate Traffic Classifier.

....................................................................................................................................................................................................................................
1350 OMS
18-209
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Associate a Traffic Classifier to an Ethernet Segment

....................................................................................................................................................................................................................................

Result: The corresponding windows opens.


Figure 18-69 Traffic Classifier Association (to an Ethernet Segment) window

...................................................................................................................................................................................................

To associate a Traffic Classifier to an Ethernet Segment:

Choose a Traffic Classifier by using the sensitive help.

Click Ok button.
Result: After confirmation, the Traffic Classifier is associated to the Ethernet

Segment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-210
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Disassociate a Traffic Classifier to an Ethernet Segment

....................................................................................................................................................................................................................................

Disassociate a Traffic Classifier to an Ethernet Segment


When to use

This function consists in disassociating a Traffic Classifier from an Ethernet Segment.


Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment Provisioning state must be Defined.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

Follow the path Action > ETS Ethernet Segment > Disassociate Traffic Classifier.

....................................................................................................................................................................................................................................
1350 OMS
18-211
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Disassociate a Traffic Classifier to an Ethernet Segment

....................................................................................................................................................................................................................................

Result: The corresponding windows opens.


Figure 18-70 Traffic Classifier disassociation (from an Ethernet Segment) window

...................................................................................................................................................................................................

To disassociate a Traffic Classifier from an Ethernet Segment:

Choose a Traffic Classifier by using the sensitive help (only the associated Traffic
Classifiers to the concerned Ethernet Segment are displayed).
Click Ok button.
Result: After confirmation, the Traffic Classifier is disassociated from the Ethernet

Segment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-212
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Add a constraint to an Ethernet Segment

....................................................................................................................................................................................................................................

Add a constraint to an Ethernet Segment


When to use

This function consists in adding an allocation constraint to an Ethernet Segment.


Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment Provisioning state must be Defined.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

Follow the path Action > ETS Ethernet Segment > Add Constraint to an Ethernet
Segment.

....................................................................................................................................................................................................................................
1350 OMS
18-213
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Add a constraint to an Ethernet Segment

....................................................................................................................................................................................................................................

Result: The corresponding windows opens.


Figure 18-71 Add Constraint to an Ethernet Segment window (Pop)

....................................................................................................................................................................................................................................
1350 OMS
18-214
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Add a constraint to an Ethernet Segment

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

To add a constraint to an Ethernet Segment:

Choose a Transport Link by using the sensitive help.

On the Push Panel, execute the following steps:


Enter the VLAN Id to be pushed.

Select a Policy Mode (Disabled, Color Blind, Color Aware). See Policy Mode
(p. 18-202).
Select the Priority Id (0, ,7, Untagged, Do not care,Green Priority,Yellow
Priority).
Click Ok button.
Result: If the Constraint List is opened, this window is updated with the new added

constraint.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-215
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

List the constraints related to an Ethernet Segment

....................................................................................................................................................................................................................................

List the constraints related to an Ethernet Segment


When to use

This function consists in getting the list of constraints related to an Ethernet Segment.
Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment Provisioning state must be Defined.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

Select Search > Inventory from Ethernet Segment > List Constraints.
Result: The list window is displayed.

See the following topic in this document: Description of the list of Constraints
(p. 18-217)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-216
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Description of the list of Constraints

....................................................................................................................................................................................................................................

Description of the list of Constraints


Attributes of a Constraint

The attributes displayed for each constraint are:

Constraint Entity User Label (= user label of the Transport Link).

Constraint Type (Use, Not Use, Use For Multicast).

....................................................................................................................................................................................................................................
1350 OMS
18-217
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Delete an Ethernet Segment Constraint

....................................................................................................................................................................................................................................

Delete an Ethernet Segment Constraint


When to use

This function consists in deleting a constraint associated to an Ethernet Segment.


Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment Provisioning state must be Defined.


No operation is pending on the selected Ethernet Segment.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

On the traffic Ethernet Segment list Window, select the Ethernet Segment to which the
constraint belongs. Follow the path Search > Inventory from Ethernet Segment > List
Constraints.
...................................................................................................................................................................................................

Select the constraint to delete.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the Ethernet Segment constraints are dissociated from the

related Ethernet Segment and removed.


The Ethernet Segment Constraint list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-218
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Get the Ethernet Segment Constraint Properties

....................................................................................................................................................................................................................................

Get the Ethernet Segment Constraint Properties


When to use

This function consists in getting information about a constraint associated to an Ethernet


Segment.
Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment Provisioning state must be Defined.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

On the Traffic Classifier List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

Follow the path Search > Inventory from Ethernet Segment > List Constraints, select
the constraint in the list.
...................................................................................................................................................................................................

Select with the right mouse button from the popup menu Properties.
...................................................................................................................................................................................................

The Properties window is displayed.

....................................................................................................................................................................................................................................
1350 OMS
18-219
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Get the Ethernet Segment Constraint Properties

....................................................................................................................................................................................................................................

See the following topic in this document: Details of an Ethernet Segment Constraint
(p. 18-221)
Figure 18-72 Ethernet Segment constraint properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-220
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Details of an Ethernet Segment Constraint

....................................................................................................................................................................................................................................

Details of an Ethernet Segment Constraint


Attributes of an Ethernet Segment Constraint

The attributes displayed for each constraint are:

Id.

Constrained Class.

Constrained Class Id Label.

Constrained Entity User Label.

Constraint Class.

Constraint Class Id Label.

Constraint Entity User Label (= user label of the Transport Link).

Constraint Type (Use, Not Use, Use For Multicast).

Replication Factor.

Yellow Priority.

Green Priority.

Priority Mode.

Number of Traffic Classifiers.

VLAN Id.

....................................................................................................................................................................................................................................
1350 OMS
18-221
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Modify a Constraint

....................................................................................................................................................................................................................................

Modify a Constraint
When to use

The function modifies Ethernet Segment Constraint characteristics.


Related Information

See Ethernet Segment description (p. 18-197).


The Constraint modification gives the possibility to modify one or all the constraint
parameters:

VLAN Identifier.
Policy Mode.
Priority Id.

Green Priority.
Yellow Priority.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment Provisioning state must be Defined.


No operation is pending on the selected Ethernet Segment.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

Follow the path Search > Inventory from Ethernet Segment > List Constraints, select
the constraint in the list.
...................................................................................................................................................................................................

Select with the right mouse button from the popup menu Modify.

....................................................................................................................................................................................................................................
1350 OMS
18-222
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Modify a Constraint

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Properties window is displayed.


Figure 18-73 Constraint Modification window

...................................................................................................................................................................................................

To modify a constraint, modify one or all the following parameters:

On Pop Panel.
Execute the following step:

Choose a Traffic Classifier by using the sensitive help and Add button to insert it.

On Push Panel.

....................................................................................................................................................................................................................................
1350 OMS
18-223
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Modify a Constraint

....................................................................................................................................................................................................................................

Execute the following steps:


Enter a new VLAN Id.
Modify Policy Mode (Color Blind or Color Aware).
Modify Priority Id, Green Priority and/or Yellow Priority.
...................................................................................................................................................................................................

Confirm the modifications with Ok button.


Result: If the VLAN Id is modified, after modification, the VLAN Constraint list is

updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-224
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

VLAN Push/Pop at ETS NNI Interface

....................................................................................................................................................................................................................................

VLAN Push/Pop at ETS NNI Interface


Overview

The Vlan Push/Pop mechanism is extended to ETS domain, to allow the encapsulation of
untagged or C-Vlan Tagged Ethernet frames, with a Provider VLAN Tag. This behavior is
used to route the traffic in segregated way either only internally to the managed network
or for inter-working purpose. The difference for this operation is that the definition of
VLAN constraint is performed before the segment allocation. Early definition allows the
VLAN stacking on NNI.
See Ethernet Segment description (p. 18-197).
Sequence of operations

The new sequence of operations is:

Create an Ethernet Segment.


Associate a Traffic Classifier.
Definition of route Constraints (allowing to define the full routes of Ethernet traffic).
Definition of VLAN Constraints, defining the points where the Push/Pop on NNI
must be performed.
Allocation of the Ethernet Segment.
Implementation.

....................................................................................................................................................................................................................................
1350 OMS
18-225
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Allocate an Ethernet Segment

....................................................................................................................................................................................................................................

Allocate an Ethernet Segment


When to use

This function consists in finding a route between the end physical ports of the Ethernet
Segment.
Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment Provisioning state must be Defined.


A list of constraints containing all Transport Links used is associated to the Ethernet
Segment.
Traffic profile, Traffic Descriptor, and Traffic Classifier must be associated to the
Ethernet Segment.
No operation is pending on the Ethernet Segment.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

Follow the path Action > Ethernet Segment > Allocate.


Result: A confirmation box is displayed.

The 1350 OMS PKT checks the 'validation' of the Transport Links to be used in term
of traffic type, bandwidth, and continuity of the chosen Transport Links.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-226
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Deallocate an Ethernet Segment

....................................................................................................................................................................................................................................

Deallocate an Ethernet Segment


When to use

This function consists in finding a route between the end physical ports of the Ethernet
Segment.
Related Information

See Ethernet Segment description (p. 18-197).


After confirmation:

deletion of the VLAN constraints related to each Ethernet Segment is done (no more
VLAN constraint is associated to them).
Then the Ethernet Segment List is updated with provisioning state set to Defined.
The provisioning state of related EVC is updated in Defined or Partially Allocated.
The bandwidth parameters of all involved Transport Links are updated taken into
account the bandwidth freed by the de-allocation.
If the de-allocated segment is the last using the Transport Link, the Transport Link
usage state is set to Idle.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment Provisioning state must be Defined.

No operation is pending on the Ethernet Segment.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

Follow the path Action > Ethernet Segment > Deallocate.

....................................................................................................................................................................................................................................
1350 OMS
18-227
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Deallocate an Ethernet Segment

....................................................................................................................................................................................................................................

Result: A confirmation box is displayed.

The 1350 OMS PKT checks the 'validation' of the Transport Links to be used in term
of traffic type, bandwidth, and continuity of the chosen Transport Links.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-228
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Implement an Ethernet Segment

....................................................................................................................................................................................................................................

Implement an Ethernet Segment


When to use

This function establishes an Ethernet flow over an Ethernet Segment.


Related Information

See Ethernet Segment description (p. 18-197).


In case of correct execution, all the Ethernet Segment connections inside the NE are
implemented. The Ethernet Segment is updated into the 1350 OMS PKT with the
following states:

Provisioning State: Implemented.

Consistency State: Consistent.

Availability Status: Available.

In case of errors, the Ethernet Segment is set to:

Provisioning State: Partially Implemented.

Consistency State: Not Consistent.

Availability Status: Not Available.

The provisioning state of the related EVC is also updated to Implemented or Partially
Implemented.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment provisioning state must be set to Implemented or Partially


Implemented.
The NE extremities must not be locked (that is, audit/alignment/reserve not in
progress).
No operation is pending on the Ethernet Segment.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.

....................................................................................................................................................................................................................................
1350 OMS
18-229
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Implement an Ethernet Segment

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

Select Action > Ethernet Segment > Implement.


Result: A confirmation box is displayed.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the 1350 OMS PKT implements the Ethernet Segments.

The Ethernet Segment List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-230
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Deimplement an Ethernet Segment

....................................................................................................................................................................................................................................

Deimplement an Ethernet Segment


When to use

This function removes an Ethernet flow over an Ethernet Segment.


Related Information

See Ethernet Segment description (p. 18-197).


In case of correct execution, all the Ethernet Segment connections inside the NE are
de-implemented. The Ethernet Segment is updated into the 1350 OMS PKT with the
following states:

Provisioning State: Allocated.

Consistency State: Not Meaningful.

Availability Status: Not Meaningful.

In case of errors, the Ethernet Segment is set to:

Provisioning State: Partially Implemented.

Consistency State: Not Consistent.

Availability Status: Not Available.

The provisioning state of the related EVC is also updated in Allocated or Partially
Implemented.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment provisioning state must be set to Allocated.

The NE extremities must not be locked (that is, audit/alignment/reserve not in


progress).
No operation is pending on the Ethernet Segment.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.

....................................................................................................................................................................................................................................
1350 OMS
18-231
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Deimplement an Ethernet Segment

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

Follow the path Action > Ethernet Segment > Deimplement.


Result: A confirmation box is displayed.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the 1350 OMS PKT de-implements the Ethernet
Segments.

The Ethernet Segment List is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-232
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Configure an Ethernet Segment

....................................................................................................................................................................................................................................

Configure an Ethernet Segment


When to use

This function consists in configuring an Ethernet Segment, that is, assigning a traffic
descriptor to the Ethernet Segment.
Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Ethernet Segment provisioning state must be set to Implemented or Partially


Implemented.

Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

Follow the path Action > Ethernet Segment > Configure.

....................................................................................................................................................................................................................................
1350 OMS
18-233
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Configure an Ethernet Segment

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Configuration window is displayed.


Figure 18-74 Ethernet Segment Configuration window

...................................................................................................................................................................................................

To configure the selected Ethernet Segment:

Choose a Traffic Descriptor by using the sensitive help.

Click Ok button.
Result: After confirmation, the traffic descriptor is associated to the Ethernet

Segment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-234
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Get the Ethernet Segment extremities

....................................................................................................................................................................................................................................

Get the Ethernet Segment extremities


When to use

This function gets information about the extremities of an Ethernet Segment.


Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

No operation is pending on the selected Ethernet Segment.

Task

From the Multi Service GUI Main view


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

Follow the path Search > Inventory from Ethernet Segment > Extremities.
...................................................................................................................................................................................................

The Extremities window is displayed.

....................................................................................................................................................................................................................................
1350 OMS
18-235
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Get the Ethernet Segment extremities

....................................................................................................................................................................................................................................

See the following topic in this document: Description of the list of Ethernet Segment
Extremities (p. 18-239)
Figure 18-75 Ethernet Segment Extremities window

...................................................................................................................................................................................................

To modify a segment extremity Click Modify Button, for the Origin A following window
is displayed.

....................................................................................................................................................................................................................................
1350 OMS
18-236
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Get the Ethernet Segment extremities

....................................................................................................................................................................................................................................

Result: The Extremities modification window is displayed.


Figure 18-76 Ethernet Segment Extremity Modification window (Origin)

...................................................................................................................................................................................................

Choose a Traffic Classifier by using the sensitive help and Add button to insert it.
...................................................................................................................................................................................................

Click Modify button for the Destination Z.

....................................................................................................................................................................................................................................
1350 OMS
18-237
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Get the Ethernet Segment extremities

....................................................................................................................................................................................................................................

Result: Following window is displayed.


Figure 18-77 Ethernet Segment Extremity Modification window (Destination)

...................................................................................................................................................................................................

Execute the following steps:

Enter a new VLAN Id.

Modify Priority Mode (Color Blind or Color Aware).

Modify Priority Id, Green Priority and/or Yellow Priority.

...................................................................................................................................................................................................

Confirm with Ok button.


Result: Ethernet Segment Extremities characteristics change.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-238
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Description of the list of Ethernet Segment Extremities

....................................................................................................................................................................................................................................

Description of the list of Ethernet Segment Extremities


Attributes of an Ethernet Segment Extremity

The attributes displayed for each object are:

User Label.

User Label (A).

Committed Rate (A).

Rate (A).

Network Element (A).

Usage State (A).

Vlan Type (A).

User Label (Z).

Committed Rate (Z).

Network Element (Z).

Usage State (Z).

Vlan Type (Z).

VLAN Id.

Priority Mode.

Green Priority.

Rate (Z).

The attributes displayed for each Ethernet Segment extremity are:


Origin (A), Destination (Z):

User Label.
Committed Rate.
Rate.
Network Element.

Usage State (Idle, Busy).


Vlan Type.

....................................................................................................................................................................................................................................
1350 OMS
18-239
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Get the Ethernet Segment properties

....................................................................................................................................................................................................................................

Get the Ethernet Segment properties


When to use

This function gets information about an Ethernet Segment.


Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

No operation is pending on the selected Ethernet Segment.

Task

From the Multi Service GUI Main view


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

Follow the path Action > Properties.


Result: The Properties window is displayed.

See the following topic in this document: Details of an Ethernet Segment


(p. 18-241)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-240
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Details of an Ethernet Segment

....................................................................................................................................................................................................................................

Details of an Ethernet Segment


Attributes of a Ethernet Segment

The attributes displayed for each Ethernet Segment are:

User Label.

Subnetwork.

EVC.

Policy Mode (Color Blind, Color Aware, Disabled).

Working State (Normal, Configuring, Allocating, De-allocating, Implementing,


De-implementing, Commissioning, De-commissioning, Constraint adding,
Constraint removing).

Provisioning State (Defined, Partially Allocated, Allocated, Partially


Implemented, Implemented).

Availability Status (Normal, Degraded, In Failure, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS
18-241
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Display the route of an Ethernet Segment

....................................................................................................................................................................................................................................

Display the route of an Ethernet Segment


When to use

This function gets graphical information about the Transport Links used (crossed) by an
Ethernet Segment.
Related Information

See Ethernet Segment description (p. 18-197).


The following commands are available from the graphical view, depending on the
selected object and its position on the route:

With no selection: Begin of Route and End of Route commands allow to highlight the
NE used for the beginning or the end of the route.
With a selected entity (NE, Transport Link, ENE, Off page connector): Begin of
Route and End of Route commands are completed by other commands depending on
the selected entity.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

Follow the path Display Route.

....................................................................................................................................................................................................................................
1350 OMS
18-242
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Display the route of an Ethernet Segment

....................................................................................................................................................................................................................................

Result: The Route Display window is displayed.

The Transport Links used by the Ethernet Segment appears in blue.


Figure 18-78 Route Display - Ethernet Segment window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-243
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Display the connectivity view of an Ethernet Segment

....................................................................................................................................................................................................................................

Display the connectivity view of an Ethernet Segment


When to use

This function gets graphical information about the connectivity view of an Ethernet
Segment.
Related Information

See Ethernet Segment description (p. 18-197).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

Follow the path Connectivity view.

....................................................................................................................................................................................................................................
1350 OMS
18-244
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing Ethernet Segments

Display the connectivity view of an Ethernet Segment

....................................................................................................................................................................................................................................

Result: The Connectivity view window is displayed.


Figure 18-79 Connectivity view - Ethernet Segment window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-245
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing VLAN types

Overview

....................................................................................................................................................................................................................................

Managing VLAN types


Overview about VLAN types
VLAN types description

The VLAN type entity models the VLAN Tag Protocol Type allowing the user to give a
name (user label) to a specific VLAN Tag Protocol Type (either standard or not) to ease
its subsequent usage in the scope of VLAN management.
The VLAN can be associated to an Ethernet edge port or a Provider Network before the
creation of the Ethernet Segment (mapping model). If VLAN is associated to an Ethernet
Segment (tunneling model), association induces the propagation to the edge ports. A
VLAN Protocol type value could be duplicated according to its usage.
Note: The creation and modification of a VLAN Tag Protocol Type over an active
Ethernet interface has an influence on the active traffic. Only if the Ethernet Interface
is not affected by Active traffic, this operation is allowed. The provisioning state of all
EVCs and all Ethernet Segments using the interface is checked.

....................................................................................................................................................................................................................................
1350 OMS
18-246
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing VLAN types

Display the VLAN type list

....................................................................................................................................................................................................................................

Display the VLAN type list


When to use

This function gets graphical information about the connectivity view of an Ethernet
Segment.
Related Information

See Overview about VLAN types (p. 18-246).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select VLAN.
Result: The list window is displayed.

The attributes displayed for each VLAN Type are:


User Label.
Protocol Type (VLAN Id in hexadecimal value).
Role (Customer, Provider).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-247
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing VLAN types

Create a VLAN type

....................................................................................................................................................................................................................................

Create a VLAN type


When to use

This function consists in defining a VLAN Type and a user label to identify it (for
example in the operations of association to Edge Ports).
Related Information

To give maximum flexibility to the user, creation of two or more VLAN types with the
same VLAN Tag Protocol Type is possible.
See Overview about VLAN types (p. 18-246).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The User Label must be different from the existing ones.


The maximum number of VLAN types must not be reached.

Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > VLANs.
...................................................................................................................................................................................................

Follow the path Action > Add VLAN.

....................................................................................................................................................................................................................................
1350 OMS
18-248
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing VLAN types

Create a VLAN type

....................................................................................................................................................................................................................................

Result: The creation window is displayed.


Figure 18-80 VLAN Type Creation window

...................................................................................................................................................................................................

To create a VLAN type:

Enter a VLAN type User label.

Enter a VLAN Tag Protocol Type (hexadecimal value between 05dd a ffff ).

....................................................................................................................................................................................................................................
1350 OMS
18-249
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing VLAN types

Create a VLAN type

....................................................................................................................................................................................................................................

If Protocol Type is equal to 8100 (hex), Role attribute is set to Customer otherwise Role is
set to Provider.
...................................................................................................................................................................................................

Confirm the modifications with Ok button.


Result: The VLAN Type is created and the VLAN Type List is updated.

.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-250
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing VLAN types

Modify a VLAN type

....................................................................................................................................................................................................................................

Modify a VLAN type


When to use

The function modifies VLAN type characteristics.


Related Information

See Overview about VLAN types (p. 18-246).


The VLAN type modification gives the possibility to modify one or all the following
parameters:

VLAN type User Label.


VLAN Tag Protocol Type (hexadecimal value).

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be not in use by another
VLAN Type.

The VLAN type must not be not in use by any Provider Network, Edge Port,
Transport link, or Transport link end point.

Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > VLANs.
...................................................................................................................................................................................................

On the VLAN List Window, select the VLAN Type to modify.


...................................................................................................................................................................................................

Follow the path Action > Modify.

....................................................................................................................................................................................................................................
1350 OMS
18-251
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing VLAN types

Modify a VLAN type

....................................................................................................................................................................................................................................

Result: The modification window is displayed.


Figure 18-81 VLAN Type Modification window

...................................................................................................................................................................................................

To modify a VLAN type:

Enter a new User Label (optional).

Modify the VLAN Tag Protocol Type value (optional).

If new VLAN Tag Protocol Type is equal to 8100 (hex), Role attribute is set to Customer
otherwise Role is set to Provider.
...................................................................................................................................................................................................

Confirm the modifications with Ok button.


Result: After confirmation of the modification: the VLAN Type List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-252
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management


Managing VLAN types

Delete a VLAN type

....................................................................................................................................................................................................................................

Delete a VLAN type


When to use

This function consists in deleting a VLAN type from the 1350 OMS PKT supervision.
Related Information

See Overview about VLAN types (p. 18-246).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The VLAN type must not be used. It must not be associated to any provider network,
edge port, or Transport Link end point.

Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > VLANs.
...................................................................................................................................................................................................

On the traffic VLAN list Window, select the VLAN Type to delete.
...................................................................................................................................................................................................

Follow the path Action > Delete.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the VLAN types are removed and the VLAN Type List is

updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
18-253
8DG42227DAAA 9.6
Issue 3 December 2012

End to End Ethernet Provisioning Management

Delete a VLAN type

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
18-254
8DG42227DAAA 9.6
Issue 3 December 2012

19

19
Bridge
Network
Management

Overview
Purpose

This chapter describes how to set up a Connection Less network (Provider Bridge).
Contents
Connection Less Networks

19-4

Bridge Network Management

19-4

Bridge Traffic Management

19-6

Spanning Tree Instance Management

19-8

VLAN management

19-10

EVC Data Plane

19-11

The EVC life cycle

19-13

Layer-2 Control Protocol Processing

19-16

Bandwidth Profile per UNI

19-18

View the list of bridge NEs

19-22

Description of the list of Bridge NEs

19-23

View the list of bridge ENEs

19-24

Description of the list of Bridge ENEs

19-25

View the Provider Bridge Flows of an EVC

19-26

Connection Less Transport Link Management

19-27

Display the Ethernet Bridge Transport Link list

19-27

Description of the list of Bridge Transport Links

19-29

Configure a transport Link

19-30

Get the Transport Link extremities

19-34

Description of the list of Transport Link extremities

19-37

Get the Transport Link properties

19-38

...................................................................................................................................................................................................................................
1350 OMS
19-1
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management

Overview

....................................................................................................................................................................................................................................

Details of an ETB Transport Link

19-40

Activate a Bridge Transport Link

19-41

Deactivate a Bridge Transport Link

19-42

View the list of Bridge Edge Ports

19-43

Description of the list of Bridge Edge Ports

19-44

Activate a Bridge Edge Port

19-45

Deactivate a Bridge Edge Port

19-46

Connection Less EVC Management

19-47

View the Connection Less EVC list

19-47

Description of the list of Bridge EVCs

19-48

Create a Bridge EVC

19-49

Modify a Bridge EVC

19-53

Delete a Bridge EVC

19-56

Get the EVC properties

19-58

Details of a Bridge EVC

19-60

Configure a Bridge or an ETS EVC

19-61

Add bridge Transport Link to EVC

19-62

Remove bridge Transport Link to EVC

19-63

Inventory of bridge Transport Links of an EVC

19-64

EVC Fault Localization

19-65

Description of the list of Fault Localization

19-68

Description of the list of Alarms

19-69

Navigation to AS

19-70

Bridge EVC Termination Management

19-72

View the list of EVC terminations

19-72

Description of the list of EVC Terminations

19-73

Add Connection Less EVC Termination

19-74

Delete a Bridge EVC Termination

19-81

Configure a Bridge EVC Termination

19-83

Get the EVC termination properties

19-85

Details of an EVC Termination

19-87

Workflow for Bridge Management

19-88

Overview about Workflow

19-88

Create a Domain

19-90

Add NE to a Domain

19-91

....................................................................................................................................................................................................................................
1350 OMS
19-2
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management

Overview

....................................................................................................................................................................................................................................

Domain Configuration

19-94

Domain Modification

19-96

Configure a Network Element

19-98

Link Over TDM configuration

19-100

NE Ethernet Physical Port Configuration

19-102

Create a Customer

19-104

Create an Ethernet Service

19-107

Traffic Descriptor Definition

19-109

EVC Allocation and Implementation

19-111

EVC Bandwidth Management

19-112

Dynamic change capability

19-112

Function Description

19-113

Service Delimiting

19-117

Vlan Push/Pop On Provider Bridge UNI/IWI Management


Spanning Tree

19-117
19-119

Show the Spanning Tree Instance of EVC

19-119

Show the Spanning Tree Instance

19-120

Spanning Tree Instance configuration

19-121

Spanning Tree Instance Implementation

19-123

Spanning Tree Instance Deimplementation

19-124

....................................................................................................................................................................................................................................
1350 OMS
19-3
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Bridge Network Management

....................................................................................................................................................................................................................................

Connection Less Networks


Bridge Network Management
Bridge network description

The aim of bridge network management is to provide support for emerging


Ethernet-based Connection Less services like the virtual private LAN service (EVPLAN)
connecting in a transparent way various customer sites across a metropolitan network
(Metro-Ethernet).
An Ethernet switch learns the MAC addresses of end-hosts and associates them with
appropriate ports on which the end-host frames arrive. In case of mesh networks,
loop-free connectivity is assured by a distributed computation carried through control
frames and resulting in a spanning tree. In the context of Metro-Ethernet, a customer
network is a collection of multiple networks (LANs) that are physically connected by
means of a service provider network and operate as if all those multiple networks are
connected (virtually) as a single LAN.
Ethernet infrastructure participating to switching can be partitioned into virtual LANs
possibly overlapping and each one identified by a VLAN-Id. The Q-tag inserted in the
Ethernet frames can be used to limit packet broadcasting to the switches participating to
the VLAN. Packets tagged with a VLAN are never sent to interfaces that are not part in
the VLAN and therefore traffic segregation is achieved. This way, VLAN-Ids allow
additional pruning of the loop-free logical connectivity provided by the spanning tree.
Provider bridge added value

A provider bridge network brings the following main added values with respect to a
virtual bridge one:

If different customers use the same C-VLAN, for each customer a different P-VLAN
is stacked over that C-VLAN. Stacking segregates the traffic sourced by one customer
from the one sourced by the other, inside the provider network.

It is possible to perform in the NE traffic classification and traffic description of the


ingress frames at the edge of the provider domain:

Traffic classification allows sharing an IWI interface among different customers.


Traffic description allows enhanced quality of service management.

The introduction of the ISA ES family allows offering Ethernet bridging functionality
over SDH network and cables.
Bridge network functional areas

Bridge network management is based on the following functional areas:

Network construction.
Bridge infrastructure management including: Transport link activation/deactivation.

....................................................................................................................................................................................................................................
1350 OMS
19-4
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Bridge Network Management

....................................................................................................................................................................................................................................

Bridge traffic management including:


EVC association to bridge infrastructure.

Manual or automatic VLAN distribution inside 1350 OMS PKT resources.


STP parameters set-up inside 1350 OMS PKT resources.
VLAN and STP provisioning to the NE.
QoS management.
Maintenance management.

Utilities.

....................................................................................................................................................................................................................................
1350 OMS
19-5
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Bridge Traffic Management

....................................................................................................................................................................................................................................

Bridge Traffic Management


Overview

The traffic management is related to the elementary EVC management based on


Connection Less networks (MAC Bridge, Virtual Bridge, or Provider Bridge).
Bridge Traffic management handles the set-up of data traffic toward the customer edge,
STP tuning and VLAN distribution inside and at the edge of the domain.
Following main functions are in the scope of the bridge traffic management.

EVC association to bridge infrastructure.


Manual or automatic VLAN distribution inside 1350 OMS PKT resources.
STP parameters set-up inside 1350 OMS PKT resources.
VLAN and STP provisioning to the NE.

Bridge EVC

One EVC is an elementary EVC that spans the scope of a single bridge domain. In case of
MAC domain, no VLAN are managed and there exists at most only one EVC for the
domain. In case of Virtual or Provider domain, more EVC can insist on the same domain.
The EVC is associated to a set of edge ports of a bridge domain. EVC association to
domain is automatic for MAC or when the edge ports are specified at EVC creation-time:
the terminations of one EVC must correspond to edge ports belonging to the same bridge
domain. All or a subset of the domain edge ports can be selected as EVC terminations (all
by default in a MAC domain).
In case of Virtual or Provider domain, one EVC is optionally characterized by one VLAN
bundle, that is, a group of VLAN. Moreover, in case of Provider domain, we have to
distinguish the outer VLAN, that is, the C-VLAN, from the inner VLAN carried inside
the domain, namely the P-VLAN. This distinction is expressed by means of a
C-VLAN/P-VLAN mapping. The C-VLAN/P-VLAN mapping is defined at EVC level
since it must be uniform for all EVC terminations. Any given inner VLAN can be
associated to only one EVC supported by the same domain.
EVC Terminations

The EVC Termination is a:

MAC Bridge Termination if it uses a MAC Bridge Port.


Virtual Bridge Termination if it uses a Virtual Bridge Port.
Provider Bridge Termination if it uses a Provider Bridge Customer Port.

....................................................................................................................................................................................................................................
1350 OMS
19-6
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Bridge Traffic Management

....................................................................................................................................................................................................................................

The EVC Termination is conceptually associated to:

One Ethernet interface (either local or remote) in case of MAC Bridge Termination.
One set of ETB virtual ports insisting on the same Ethernet interface in case of Virtual
Bridge Termination. This set the set of ETB virtual ports corresponding to the
C-VLAN of the EVC ( One ETB virtual port correspond to one C-VLAN).
One ETS flow or set of ETS flows in case of Provider Bridge Termination. The flow
or set of flows referenced by the Traffic Classifiers is associated with the C-VLAN of
the EVC.

....................................................................................................................................................................................................................................
1350 OMS
19-7
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Spanning Tree Instance Management

....................................................................................................................................................................................................................................

Spanning Tree Instance Management


Network robustness

In Connection Less networks based on Bridge solution, the risk of network loop and
packet flooding can lead to network congestion. The usage of Spanning Tree Protocols
adds robustness to the network, as the active topology is automatically recalculated by the
ISA boards after the detection of one of the following conditions:

Alarms on Transport Links or edge ports.


Add/remove of NE or Transport Links in the Domain.
Tuning of STP parameters (for example: bridge priority) by management system.

STI tree topology

Network congestion can be avoided supplying a tree topology to the internal used
resources. The tree topology can be obtained in two different ways:

Manually by the user: the user statically shapes a tree in the network manually
configuring Transport Links to be used.
Automatically by ISA Boards: the user configures and enables the usage of Spanning
Tree Protocols inside a given Domain (STP/RSTP/PVSTP/MSTP) to let ISA Boards
to autonomously determine an active tree shape (also called active topology) inside
the network.

STI resources

The spanning tree instance (STI) is the set of NE, ENE and Ports carrying control frames
(BPDU) that participate to the same distributed computation. The spanning tree NE
(ST-NE) represents the image of one NE or ENE in the scope of the STI.
Each ST-Termination is characterized by a port state and a port forced state. The port state
tells whether the port is forwarding or discarding data frames in the scope of the STI. The
port forced state tells whether the control on the port state is delegated to the network
(dynamic forced state) or manually constrained by user (blocked or forwarding forced
state). The ST-termination port forced state can be configured acting on the ST-link, that
means, configuring both end-points with one single operation.
Port configuration

On a per-STI basis, configuring the port forced state to forced blocking. One or more
ST-links can be manually excluded from the data forwarding process. On the other hand,
configuring the port forced state to forced forwarding implies that the ST-link is
constrained to participate to packet forwarding.
In both cases, either configuring the port forced state to forced blocking or forwarding,
the ST-links are manually excluded from the network computation: these links belong or
not to a static tree topology due to the constraints of the user. A failure on forced
forwarding links is not recovered by the spanning tree protocol.

....................................................................................................................................................................................................................................
1350 OMS
19-8
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Spanning Tree Instance Management

....................................................................................................................................................................................................................................

The active STI is constituted by NE, ENE and Ports carrying both BPDU and customer
data frames. The Ports belonging to the spanning tree instance (STI) are NNI interfaces
carrying control frames (BPDU): the active NNI interfaces carry both customer data
frames and control frames. A distributed computation (control frame forwarding)
determines dynamically which interfaces must actually forward data frames. The active
spanning tree is a dynamic snapshot of the network status.
Static tree topology

A static tree topology is a subset of the active STI, built by user forcing manually the
control plane port forced state to forwarding for all ST-Terminations in the tree. The user
can statically determine part or all of the STI active topology. A static tree topology can
introduce loops in the network.
The number of spanning tree instances for a domain depends on the associated STP type:

None - no spanning tree instance.


STP/RSTP - only one spanning tree instance for all VLAN.
PVSTP - one spanning tree instance per-VLAN.

MSTP - one spanning tree instance per set of VLAN.

Each STI represents a control plane, namely a virtual infrastructure dedicated to the
transport of control frames (that is, the BPDU carrying the spanning tree computation). A
dedicated set of BPDU is exchanged for each STI.
By design choice, the EVC is always associated to a single spanning tree instance (STI),
whatever STP type is running. to have a service exploiting different spanning tree
instances, we must define different EVC for that service. The associated STI can be
shared with other EVC. As a consequence, in case of PVSTP, the EVC must be
characterized by a single VLAN.

....................................................................................................................................................................................................................................
1350 OMS
19-9
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

VLAN management

....................................................................................................................................................................................................................................

VLAN management
Overview

Virtual LANs are introduced for segmenting the network into different broadcast (or
multicast) domains. The VLAN-Id is used to forward Ethernet traffic only toward those
Ethernet ports (UNI) that are members of a given VLAN, ensuring that the tagged frames
are only accessible by the proper end-user and therefore realizing traffic segregation.
4096 different VLAN can be used in one Ethernet network.
VLAN management helps solving security and privacy, bandwidth management, and
increasing the performance.
The use of VLAN

VLAN can be used anyway to switch traffic in different contexts:

Defining Ethernet VPNs (EVPLAN service in Connection Less networks).


Switching broadband access traffic to the selected ISP. For instance, the use of
customer-based VLAN for routing purposes in the network couples the operational
aspects of the customer and network user domain.
Allowing inter-working the provider network characterized by its own VLAN tag
with the network of another provider using not standard VLAN tag. This
inter-working is achieved by means of VLAN push and pop operations. Provider
network inter-working at the Layer-2 control protocol level can follow a transit model
(tunneling) or a peer-to-peer model (mapping mode).
In the scope of Virtual Bridge management, the VLAN assume the meaning of
Customer VLAN (C-VLAN).
In the scope of Provider Bridge management, the VLAN assume the meaning of
Provider VLAN (P-VLAN). A scalable solution design can be designed mapping the
received Customer VLAN on one internally defined P-VLAN.
Both in case of Virtual and Provider Bridge management, Ethernet frames can flow in
the network only after having properly provisioned the required VLAN inside the
network (C-VLAN for Virtual and P-VLAN for Provider).

....................................................................................................................................................................................................................................
1350 OMS
19-10
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

EVC Data Plane

....................................................................................................................................................................................................................................

EVC Data Plane


Overview

Each EVC spanning the scope of a bridge domain has an associated data plane and active
topology. The EVC data plane is the set of NE, ENE and Ports enabled to carry user data
frames belonging to that EVC. It contains the set of NE and Ports where the set of VLAN
characterizing the EVC has to be distributed.
The EVC active topology is the set of NE, ENE and Ports belonging to the same Domain
and actually carrying user data frames. For example, the active topology differs from the
data plane when a link is blocked by the spanning tree computation to avoid loops. In
fact, the EVC active topology is actually the projection of the EVC data plane onto the
active topology of the STI supporting the EVC: the data path for the EVC is therefore
obtained keeping into account both the VLAN distribution and the dynamic computation
of the associated STI.
The EVC data plane and active topology are also virtual entities since they are specific
for the VLAN bundle characterizing the EVC and, therefore, are specific for that EVC.
Data frames characterized by different VLAN Id can generally follow different data paths
across the bridge network, but data frames belonging to same EVC are constrained, by
design choice, to follow the same data path to allow QoS management on a per-EVC
basis.
When edge ports (that is, UNI or IWI interfaces) are associated to the EVC, they belong
to the EVC data plane but not to the active STI topology, since control frames coming
from CE or from another domain must be filtered or tunneled. UNI and IWI interfaces are
not allowed to enter the active STI topology.
On the other hand, NNI Transport Links can belong to both EVC data plane and active
STI topology: they can carry both data frames and control frames.
Active topology

The Ports belonging to the EVC active topology are therefore characterized by:

The VLAN characterizing the EVC are in the Port member set.
Forced port state equal to forced forwarding (namely they are part of the STI static
active Topology) or.

Forced port state equal to dynamic and port state equal to forwarding (namely, they
are part of the STI dynamic active topology).

Following table summarizes the port forced-state relation with EVC active topology.
Forced-state/ Plane.

Control frame
forwarding.

Data frame
forwarding.

EVC Active
Topology.

Forced-blocking.

No.

No.

No.

Forced-forwarding.

No.

Yes.

Yes.

....................................................................................................................................................................................................................................
1350 OMS
19-11
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

EVC Data Plane

....................................................................................................................................................................................................................................

Forced-state/ Plane.

Control frame
forwarding.

Dynamic.

Yes.

Data frame
forwarding.
Decided by network
computation.

EVC Active
Topology.
Decided by network
computation.

....................................................................................................................................................................................................................................
1350 OMS
19-12
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

The EVC life cycle

....................................................................................................................................................................................................................................

The EVC life cycle


Overview

The EVC life cycle is tightly related to the life cycle of the associated EVC data plane
and that of the supporting STI.
At Domain activation time, the default STP protocol type is enabled on all NE and also
the NNI Ports are activated. This activations implies that control frames are allowed to
flow in the network. In case of STP/RSTP/MSTP, the default STI is therefore
implemented in the network. The default STI is referred as the CIST (Common Instance
Spanning Tree) in case of MSTP. We extend this terminology also to the case of
STP/RSTP, where it represents the only instance available.
In case of MAC Domain, only one EVC is created automatically by the system at Domain
activation time. In case of Virtual or Provider Domain, the EVC must be explicitly
created by user and more than one EVC can insist on the same Domain.
EVC creation or modification

At creation/modification time, the EVC is associated to a set of edge ports and, in case of
Virtual or Provider Domain, to a set of VLAN. Association to edge ports implies the
automatic association with the underlying Domain. The EVC is characterized by a
full-mesh/ not full-mesh attribute used to drive the VLAN distribution inside 1350 OMS
PKT resources (at EVC data plane allocation time). In case of Provider Bridge, user must
specify a C-VLAN/P-VLAN mapping.
At EVC Termination creation/modification time, user can optionally specify a default
user priority on a per-Port basis (in case of MAC Bridge or Virtual Bridge edge port). In
case of Virtual Bridge only, the user can also specify an 801.2p priority bit regeneration
table.
The EVC data plane is one-to-one with the EVC and is automatically defined at EVC
creation time. Similarly, the EVC data plane is automatically deleted at EVC deletion
time. to allow EVC allocation, the EVC data plane must be allocated first. EVC data
plane allocation means defining the physical infrastructure for the data plane. The system
must include the VLAN in the EVC bundle in the VLAN member set of the ports that are
part of the virtual data plane specific for that EVC. All VLANs in the EVC share the same
virtual data plane.
EVC data plane allocation implies VLAN distribution to Edge Ports, corresponding to the
VLAN distributed on EVC Terminations. The UNI/IWI association to EVC data plane is
therefore automatically established by the system. The VLAN of each EVC Termination
is allocated on the respective UNI/IWI.
The VLAN in the EVC bundle have to be uniformly allocated to the NNI. The NNI
association is performed either manually (not full-mesh case) or automatically (full-mesh
case).

....................................................................................................................................................................................................................................
1350 OMS
19-13
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

The EVC life cycle

....................................................................................................................................................................................................................................

In case of full-mesh, the association is performed at EVC data plane allocation-time: the
system automatically distributes the VLAN in 1350 OMS PKT MIB to all Transport
Links (that is, NNI Ports) in the Domain. In case of not full-mesh, the user must use a
specific function to add/remove a set of Transport Links to the allocated EVC data plane.
EVC allocation

To summarize, when a full-mesh EVC Data Plane is allocated, all VLAN in the bundle
are distributed to all edge ports and Transport Links in the domain. In case of not
full-mesh, the allocation operates only on edge ports, while the user has to add the
selected set of Transport Links; then the system automatically and uniformly distributes
all VLAN in the bundle to the selected Transport Links. to perform a non-uniform VLAN
allocation over the Transport Links used by a service, the user is therefore required to use
different EVC.
EVC allocation means to select a supporting STI and to associate the selected STI to the
set of VLAN characterizing the EVC. The way to select a STI for the EVC depends on
the domain STP type:

None: spanning tree instance is not supported and the infrastructure must be a tree
topology. The user must ensure that the topology is loop-free.
STP/RSTP: the default spanning tree instance (the CIST) is implicitly selected by the
system. The CIST is automatically implemented at domain activation time.
PVSTP: for the single VLAN characterizing the EVC, a new STI is automatically
allocated by the system at EVC allocation time.
MSTP.
In this case, the user has two possibilities:

Allocate the EVC over an existing STI (the CIST by default).


Require to allocate the EVC over a new STI to be automatically created and
allocated by the system.

Provisioning details

EVC de-allocation implies losing the relation with the supporting STI. If the STI is not
the CIST, at de-allocation time of the last EVC, the supporting STI is automatically
deleted. The CIST is automatically de-implemented at bridge domain deactivation time.
The EVC Data Plane de-allocation can be performed individually or cascaded
automatically after EVC de-allocation.
The EVC Data Plane de-allocation is a pre-condition for EVC deletion. The EVC Data
Plane de-allocation consists in removing of the VLAN characterizing the EVC from the
Edge Ports (that is, UNI/IWI Ports) and from all associated Transport Links (that is, NNI
Ports). Therefore, the EVC data plane de-allocation behaves in the same way both in case
of full-mesh and not full-mesh EVC. In case of not full-mesh EVC, the user can remove
one or more Transport Links from the allocated EVC data plane, before implementing it.
To allow EVC implementation, the supporting STI and the EVC data plane must be
implemented first.
....................................................................................................................................................................................................................................
1350 OMS
19-14
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

The EVC life cycle

....................................................................................................................................................................................................................................

STI implementation means that any new STI is instantiated on the ISA NE (only in case
of MSTI) and that the STP parameters are provisioned on the ISA NE (only NNI Ports).
The CIST is automatically implemented at bridge domain activation time.

....................................................................................................................................................................................................................................
1350 OMS
19-15
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Layer-2 Control Protocol Processing

....................................................................................................................................................................................................................................

Layer-2 Control Protocol Processing


Overview

The user optionally defines, on EVC basis, which control Protocol must be tunneled or
discarded. Such configuration must be propagated to all EVC terminations to ensure that
all EVC terminations use the same Tunneling criteria. A check is needed also toward
Layer-2 Control Protocol Processing defined at UNI level. This check allows a congruent
management of Control protocols crossing the EVC.
In case of Connection Oriented EVC, the value defined for the EVC is predefined to
Tunnel for all L2 Control Protocols and this value is propagated to contained Ethernet
Segments.
In case of Provider Bridge based EVC, the value can be freely defined by the user for the
EVC. The value is propagated to all EVC Terminations.
In case of MAC Bridge or Virtual Bridge based EVC, the EVC is always tunneling (the
UNI setting is fully operative).
If the Layer-2 Protocol Processing is not defined at EVC level, then this definition is
delegated to each single EVC Termination (for Provider Bridge Based EVCs) while for
Ethernet Segment (Connection Oriented EVCs) is fixed to Tunnel for all L2 Protocols.
This way to operate is maintained as backward compatible with previous 1350 OMS PKT
releases but is not considered as MEF compliant because do not ensure that at EVC level
a common policy on Control Protocols is applied.
During EVC Definition, for each used UNI, a check is performed respect to the Max
Number of EVC defined on each UNI.
L2 Control Protocols

For the List of L2 Control Protocols, refer to the following table:


Table 19-1

L2 Control Protocols

Control Protocol.

Discard.

Tunnel
(default
for all
protocols).

Data Frames.

Yes.

Yes.

Customer BPDU (STP, RSTP,


MSTP).

Yes.

Yes.

Provider BPDU (STP, RSTP,


MSTP).

Yes.

Yes.

Slow Protocols.

Yes.

Yes.

802.1X PAE.

Yes.

Yes.

Notes.

At EVC level, it is allowed to


Tunnel or Discard also Data
Frames.

....................................................................................................................................................................................................................................
1350 OMS
19-16
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Layer-2 Control Protocol Processing

....................................................................................................................................................................................................................................

Table 19-1

L2 Control Protocols

Control Protocol.

(continued)

Discard.

Tunnel
(default
for all
protocols).

Provider GVRP.

Yes.

Yes.

Bridge Management.

Yes.

Yes.

Customer GMRP.

Yes.

Yes.

Customer GVRP.

Yes.

Yes.

Notes.

Bandwidth profiles

The bandwidth profiles defined for each EVC termination have to be intended in the
following way:

In case of Connection Less EVCs based on Provider Bridge, the bandwidth profiles
defined for each EVC termination represents the bandwidth profile for the traffic at
the ingress of that UNI (and it is immediately checked).

In case of Connection Less EVCs based on Virtual Bridge, the bandwidth profiles
defined for each EVC are automatically defined as Best Effort Class Of Service
having the PIR fully equal to the UNI rate.
In case of Connection Less EVCs based on MAC Bridge, the bandwidth profiles
defined for each EVC are automatically inherited from UNI characteristics (in fact all
UNI of a MAC Bridge supports only the Bandwidth Profile per UNI) and the traffic
parameters.

....................................................................................................................................................................................................................................
1350 OMS
19-17
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Bandwidth Profile per UNI

....................................................................................................................................................................................................................................

Bandwidth Profile per UNI


Overview

Each Bandwidth Profile configured on a given UNI represent the way the traffic entering
in ingress to that UNI is shaped and managed in term of Bandwidth. The following
possible values for Bandwidth Profile are manageable at UNI level:

Bandwidth Profile per UNI (p. 19-18). Bandwidth description is shared for all
connection starting from this ingress UNI.
Bandwidth Profile per EVC (p. 19-18). Bandwidth description is shared for all
connection starting from this UNI in the scope of this EVC. Each EVC has one or a
group of VLAN.
Bandwidth Profile per CoS (p. 19-18). The bandwidth applies to traffic defined by
one or a group of VLAN and one Priority bit.

Bandwidth Profile per UNI

The Bandwidth Profile is configured with a bandwidth description on the edge port before
having created any service on this port. In this case, all the services that start on this UNI
share this bandwidth (in the limits described in the profile). The provisioning is
accomplished by means of the management of the FlowGroup concept. For each EVC
Connection Oriented based starting from this UNI, the UNI Bandwidth profile is
propagated along the used route (the pseudo CAC implemented at 1350 OMS PKT level
takes into account either current per flow Traffic Descriptors and FlowGroup Traffic
Descriptor). In case of UNI belonging to MAC bridges, traffic parameters are
automatically defined as Best Effort CoS with the PIR value equal to the UNI rate.
Bandwidth Profile per EVC

The bandwidth profile is supplied during each termination addition describing the
bandwidth usable and shared for all the connection of the considered EVC. This setting
applies on the added termination only; that is, one port used by the EVC can work in per
EVC mode and another port used by the same EVC can work in per Cos mode. The
provisioning is accomplished by means of the management of the FlowGroup concept.
For each EVC Connection Oriented based starting from this UNI, the UNI Bandwidth
profile is propagated along the used route (the pseudo CAC implemented at 1350 OMS
PKT level takes into account either current per flow Traffic Descriptors and FlowGroup
Traffic Descriptor).
Bandwidth Profile per CoS

The bandwidth profile is described by one VLAN or group and one Priority bit or set of
bits. This profile is applicable for one EVC termination: so the EVC termination is used
per Cos or is used per EVC. The description of the bandwidth profile is done by the way
of one Traffic Descriptor composed of Bandwidth profile attributes (CIR, PIR, CBS,
PBS) and also one QoS attribute, standing for the description of the PHB (Per Hop

....................................................................................................................................................................................................................................
1350 OMS
19-18
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Bandwidth Profile per UNI

....................................................................................................................................................................................................................................

Behavior), that is, the internal NE mode for managing the traffic. The PHB (Per Hop
Behavior), represents, on equipment base, the QoS expected by a Customer at EVC level
(that is, on Per Network Behavior).
The QoS definition

The QoS attribute can be automatically determined by the 1350 OMS PKT from the
bandwidth parameter values supplied in the profile. This behavior is the default behavior
but, to remain as flexible as the equipment (introducing 8 QoS following the same
formula for the profile values), the user can force this value to a specific one according to
the equipment formula.
In addition to the Traffic Descriptor, two other concepts complete the QoS definition:

the Policy mode: such management is today aligned with IETF and whose extension
in the scope of MEF compliancy is in the scope of 1350 OMS PKT.
The Color Profile: such management is aligned with IETF concepts for Color Aware
traffic management. This management is not considered MEF. The Color Profile
management, is maintained unchanged in respect to previous 1350 OMS PKT
releases. The user must plan the usage or not.

Bandwidth Profile Per UNI attributes

The Bandwidth Profile per UNI is one of the possible management definable on UNI
basis relatively to MEF compliancy.
The Bandwidth Profile Per UNI is described by the following attributes:

Committed Information Rate (CIR).


Excess Information Rate (EIR).
Committed Burst Size (CBS).
Excess Burst Size (EBS).

Color Mode (CM).


Coupling Flag (CF).

Manual and default operations

This management is mutually exclusive with the two other possible management
(Bandwidth Profile per EVC and Bandwidth Profile per EVC per Cos). The Bandwidth
Profile per UNI must be defined on a given UNI in two ways:

By the user through a manual operation before the port is used.


Automatically as the default value for a given UNI depending on restrictions existing
on specific NE configurations.

....................................................................................................................................................................................................................................
1350 OMS
19-19
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Bandwidth Profile per UNI

....................................................................................................................................................................................................................................

The following table reports the known operations at NE configuration or at Port upload.
Table specify the manual operation needed or the predefined default operation.
UNI Configuration.

Bandwidth (BWD)
Profile allowed.

Default Value.

Modification
Allowed.

ETS.

Per UNI, Per EVC,


Per CoS.

/.

Yes, Bwd Per UNI only


before UNI usage.

ETS (Provider
Bridge).

Per UNI, Per EVC,


Per CoS.

/.

Yes, Bwd Per UNI only


before UNI usage.

ETB (MAC Bridge).

Per UNI.

CIR=PIR=Port
Rate.

NO.

ETB (Virtual Bridge).

Per UNI.

CIR=PIR=Port
Rate.

NO.

After having configured a UNI supporting a Bandwidth Profile per UNI, each EVC using
that port inherits, from that UNI the same Bandwidth profile for traffic entering from that
UNI. All the EVCs instantiated as entering from that UNI use the same Bandwidth
profile).
From the traffic point of view, all traffic entering in a UNI (from a CE) is in competition
with other traffics for the probability to be transmitted in the transport network.
An EVC using a UNI being configured with a Bandwidth Profile per UNI can use other
UNIs having different Bandwidth Profiles configured (either per UNI, Per EVC, Per
CoS).
EVC provisioning

It is important to differentiate the expected management behavior (particularly for


allocation and provisioning steps) in the various cases of Connection Oriented (ETS) or
Connection Less (ETB) management.
ETS Case:

When an EVC lying on an ETS domain uses a UNI defined to support a Bandwidth
Profile per UNI, the Ethernet Segment starting from that UNI inherits (as Traffic
Descriptor Definition) the information defined in that Bandwidth profile.
When the EVC is allocated, this implying the allocation of contained Ethernet Segments,
that TD (reflecting the BwdProfilePerUNI) is propagated along the route of the Ethernet
Segment.
When the EVC is Implemented, this implying the implementation of contained Ethernet
Segments, that TD (reflecting the BwdProfilePerUNI) is provisioned on all affected NEs
along the route of the Ethernet Segment.
In terms of Provisioning, the SNMP objects to be provisioned is a FlowGroup (reflecting
that EVC on the UNI) with associated a Traffic Descriptor.

....................................................................................................................................................................................................................................
1350 OMS
19-20
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Bandwidth Profile per UNI

....................................................................................................................................................................................................................................

ETB Provider Bridge Case:

When an EVC lying on an ETB Provider Bridge domain uses a UNI defined to support a
Bandwidth Profile per UNI, the EVC Termination (reflecting the traffic entering from that
UNI) inherits (as Traffic Descriptor Definition) the information defined in that Bandwidth
profile.
This inheritance can happen both at EVC Definition and during EVC Termination
Adding.
The Traffic Descriptor reflecting the BwdProfilePerUNI is defined and associated to the
EVC Termination.
When the EVC is Implemented, this implying the implementation of EVC Termination,
the TD that reflects the BwdProfilePerUNI, is provisioned on the affected NEs.
ETB Virtual and MAC Bridge Case:

When an EVC lying on an ETB Virtual or MAC Bridge domain uses a UNI defined to
support a Bandwidth Profile per UNI, the EVC Termination (reflecting the traffic entering
from that UNI) inherits (as Traffic Descriptor Definition) the information defined in that
Bandwidth profile.
This inheritance can happen both at EVC Definition and during EVC Termination
Adding.
The TD reflecting the BwdProfilePerUNI is defined and associated to that EVC
Termination.
When the EVC is Implemented, nothing happens on NEs, because in the scope of Virtual
and MAC bridge no provisioning is possible in terms of Traffic Descriptors.

....................................................................................................................................................................................................................................
1350 OMS
19-21
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

View the list of bridge NEs

....................................................................................................................................................................................................................................

View the list of bridge NEs


When to use

This function lists the Network Elements of connection less type.


Related Information

For information, see: Overview about Workflow (p. 19-88).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge).
Result: The Connection Less menu is shown.
...................................................................................................................................................................................................

Bridge NEs
Result: The list window is displayed.

See the following topic in this document: Description of the list of Bridge NEs
(p. 19-23)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-22
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Description of the list of Bridge NEs

....................................................................................................................................................................................................................................

Description of the list of Bridge NEs


Attributes of a Bridge NE

The attributes displayed for each Bridge (Connection less) NE are:

User Label.

Working State (Normal, Configuring, Removing).

STP Type(MSTP, RSTP).

Domain.

MAC Address.

Network Element.

Spanning Tree Instance.

Provider Bridge Operation Mode(Not Meaningful, 5P3D).

PTM Name.

....................................................................................................................................................................................................................................
1350 OMS
19-23
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

View the list of bridge ENEs

....................................................................................................................................................................................................................................

View the list of bridge ENEs


When to use

This function lists the External Network Elements of connection less type.
Related Information

For information, see: Overview about Workflow (p. 19-88).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge).
Result: The Connection Less menu is shown.
...................................................................................................................................................................................................

Bridge External NEs


Result: The list window is displayed.

See the following topic in this document: Description of the list of Bridge ENEs
(p. 19-25)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-24
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

Description of the list of Bridge ENEs

....................................................................................................................................................................................................................................

Description of the list of Bridge ENEs


Attributes of an ENE

The attributes displayed for each Bridge (Connection less) ENE are:

User Label.

Working State (Normal, Configuring, Removing).

STP Type(MSTP, RSTP).

Domain.

MAC Address.

Network Element.

Spanning Tree Instance.

Provider Bridge Operation Mode(Not Meaningful, 5P3D).

PTM Name.

....................................................................................................................................................................................................................................
1350 OMS
19-25
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Networks

View the Provider Bridge Flows of an EVC

....................................................................................................................................................................................................................................

View the Provider Bridge Flows of an EVC


When to use

This function shows the provider bridge Flows of an EVC.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The EVC list is shown.
...................................................................................................................................................................................................

Select the Bridge EVC and select the path Search > Bridge EVC > Provider bridge
Flows.
Result: The list shows the flows belonging to the selected EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-26
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Display the Ethernet Bridge Transport Link list

....................................................................................................................................................................................................................................

Connection Less Transport Link Management


Display the Ethernet Bridge Transport Link list
When to use

The Ethernet Transport Link List window presents all the Ethernet Transport Links and
their attributes.
Related Information

If this list is required from the VLAN type list, only Transport Links whose edge ports are
associated to the selected VLAN type, are displayed.
For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Transport Link must not be in use by an Ethernet Segment (Its usage state must
be Idle).

The Transport Link must have an SDH or Cable technology.

Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Connection Less > Transport Link.

....................................................................................................................................................................................................................................
1350 OMS
19-27
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Display the Ethernet Bridge Transport Link list

....................................................................................................................................................................................................................................

Result: The list window is displayed.

See the following topic in this document: Description of the list of Bridge Transport
Links (p. 19-29)
Figure 19-1 Connection Less Transport Link List

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-28
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Description of the list of Bridge Transport Links

....................................................................................................................................................................................................................................

Description of the list of Bridge Transport Links


Attributes of a Bridge Transport Link

The attributes displayed for each Bridge (Connection less) Transport Link are:

User Label.

Subnetwork.

Technology (MPLS, SDH, Cable).

Total Bandwidth.

Usage State (Idle, Busy, Reserved, Not Meaningful).

Working State (Normal, Configuring, Removing).

Configuration State (Configured, Partially Configured, Not Configured).

Domain.

Domain Type.

....................................................................................................................................................................................................................................
1350 OMS
19-29
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Configure a transport Link

....................................................................................................................................................................................................................................

Configure a transport Link


When to use

This function permits to change the VLAN Protocol Type of Transport Link extremities.
Related Information

For information about Transport Link management, see: Overview about Transport links
(p. 14-4).
The VLAN Type is not an attribute of the Transport Link. The VLAN Type is an attribute
of its extremities (that is, Transport Link terminations). So, VLAN Type is displayed in
the extremity window of the Transport Link.
For these reasons, while the Edge port modification command acts on one Edge port (and
its attributes), the Transport Link configuration command acts only on the Transport Link
terminations. The command is a shortcut for the user, not to configure separately the two
terminations.
The ports at the extremities of the Transport Link are active and configured with the
VLAN Type and, hence:

They recognize as tagged only the Ethernet frames that are tagged with this VLAN
type.

Any push operation (that is, VLAN constraint of type "Push") defined on them uses
the specified VLAN type to create (and push) new VLAN tags.

PCP Table Profile compliant with NE

PCP Table Profile possible values are As Container, 5P3D, 6P2D, 7P1D, 8P0D; to be
assigned in compliance with the NE, as listed:

On node basis, ES1/4 admits the values: 5P3D (default on node basis), 8P0D.
On node basis, ES16 admits the values: 5P3D (default on node basis), 8P0D.
On port basis, ES1/4 does not admit any PCP Port table profile.
On port basis, ES16 admits the values: as Container (This value is the default on Port
Basis [default=0] mirroring the value defined on Node basis), 5P3D, 6P2D, 7P1D,
8P0D.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS
19-30
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Configure a transport Link

....................................................................................................................................................................................................................................

Conditions

To get a positive result:

The Transport Link must not be in use by an Ethernet Segment (Its usage state must
be Idle).
The Transport Link must have an SDH or Cable technology.

Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

follow the path Search > Packet > Services > Connection Less > Transport Link.
...................................................................................................................................................................................................

Select the Transport Link in the list.


...................................................................................................................................................................................................

Follow the path Action > Configure..

....................................................................................................................................................................................................................................
1350 OMS
19-31
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Configure a transport Link

....................................................................................................................................................................................................................................

Result: The configuration window is displayed.


Figure 19-2 Transport Link Configuration window

...................................................................................................................................................................................................

To configure a Transport Link:

Acceptable Frame Type (All, ONLY VLAN tagged):

PVID.

Enable Ingress Filtering.

Priority bit mapping.

Default User Priority.

....................................................................................................................................................................................................................................
1350 OMS
19-32
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Configure a transport Link

....................................................................................................................................................................................................................................

PCP Table Profile. See PCP Table Profile compliant with NE (p. 19-30).

Select a VLAN Type (by using the sensitive help) or set the Set standard VLAN Type
(8100) value to true.

...................................................................................................................................................................................................

Click Ok button.
Result: After confirmation, the Configuration state of the Transport Link is

recalculated and set to:

Configured: if both extremities are active and are configured with the same

VLAN Tag Protocol Type.


Partially Configured: if only one extremity is active (while the other is not active)
or when both extremities are active but are configured with two different VLAN
Tag Protocol Types.
Not Configured: if both extremities are not active.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-33
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Get the Transport Link extremities

....................................................................................................................................................................................................................................

Get the Transport Link extremities


When to use

This function gets information about the extremities of a Transport Link.


This function permits optionally to modify extremity characteristics.
Related Information

For information about Transport Link management, see: Overview about Transport links
(p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path: Search > Packet > Services > Connection Less > Transport Link.
...................................................................................................................................................................................................

Select the Transport Link in the list.


...................................................................................................................................................................................................

Follow the path Search > Inventory from Transport Link > Extremities.

....................................................................................................................................................................................................................................
1350 OMS
19-34
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Get the Transport Link extremities

....................................................................................................................................................................................................................................

Result: The extremities window is displayed.

See the following topic in this document: Description of the list of Transport Link
extremities (p. 19-37)
Figure 19-3 Transport Link Extremities window

...................................................................................................................................................................................................

Change parameters.

....................................................................................................................................................................................................................................
1350 OMS
19-35
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Get the Transport Link extremities

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok button.
Result: The Transport Link extremities attributes are changed consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-36
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Description of the list of Transport Link extremities

....................................................................................................................................................................................................................................

Description of the list of Transport Link extremities


Attributes of a Transport Link extremity

The attributes shown are:

Network Element.

Network Element type.

Termination user label.

Activation State.

VLAN Type.

Acceptable Frame Type.

PVID.

Enable Ingress Filtering.

Default User Priority.

PCP Table Profile.

Priority bit mapping.

....................................................................................................................................................................................................................................
1350 OMS
19-37
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Get the Transport Link properties

....................................................................................................................................................................................................................................

Get the Transport Link properties


When to use

This function gets information about the properties of a Transport Link.


Related Information

For information about Transport Link management, see: Overview about Transport links
(p. 14-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less > Transport Link.
...................................................................................................................................................................................................

Select the Transport Link in the list.


...................................................................................................................................................................................................

Follow the path Action > Properties.

....................................................................................................................................................................................................................................
1350 OMS
19-38
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Get the Transport Link properties

....................................................................................................................................................................................................................................

Result: The properties window is displayed.

See the following topic in this document: Details of an ETB Transport Link
(p. 19-40)
Figure 19-4 Transport Link Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-39
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Details of an ETB Transport Link

....................................................................................................................................................................................................................................

Details of an ETB Transport Link


Attributes of an ETB Transport Link

The attributes displayed for each Transport Link are:

Id.

User Label.

Subnetwork Id Label.

Subnetwork.

Technology (MPLS, SDH, Cable).

Usage State (Idle, Busy, Reserved, Not Meaningful).

Working State (Normal, Configuring, Removing).

A END Id label.

Z END Id label.

Z END Type label.

Transport Link Label.

Configuration State (Configured, Partially Configured, Not Configured).

VLAN Id.

VLAN Type.

Domain Id.

Domain.

Domain Type.

STI Id label.

STI User Label.

EVC Id.

EVC User Label.

Total Bandwidth.

NAD.

A END Type label.

....................................................................................................................................................................................................................................
1350 OMS
19-40
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Activate a Bridge Transport Link

....................................................................................................................................................................................................................................

Activate a Bridge Transport Link


When to use

This function activates a Bridge Transport Link.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge
Transport Links.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select the Transport Links in the list.


...................................................................................................................................................................................................

Select Action > Bridge Transport Link > Activate.


Result: The Transport Link is activated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-41
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Deactivate a Bridge Transport Link

....................................................................................................................................................................................................................................

Deactivate a Bridge Transport Link


When to use

This function deactivates a Bridge Transport Link.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge
Transport Links.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select the Transport Links in the list.


...................................................................................................................................................................................................

Select Action > Bridge Transport Link > Deactivate.


Result: The Transport Link is deactivated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-42
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

View the list of Bridge Edge Ports

....................................................................................................................................................................................................................................

View the list of Bridge Edge Ports


When to use

This function lists Bridge Edge Ports.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge).
Result: The Bridge menu is displayed.
...................................................................................................................................................................................................

Select Bridge Edge Port.


Result: The list window is displayed.

See the following topic in this document: Description of the list of Bridge Edge
Ports (p. 19-44)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-43
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Description of the list of Bridge Edge Ports

....................................................................................................................................................................................................................................

Description of the list of Bridge Edge Ports


Attributes of a Bridge Edge Port

The attributes displayed for each Bridge Edge Port are:

User Label.

Rate.

Network Element.

EVC User Label.

Role (Root, Leaf, Both).

Usage State.

VLAN Type.

....................................................................................................................................................................................................................................
1350 OMS
19-44
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Activate a Bridge Edge Port

....................................................................................................................................................................................................................................

Activate a Bridge Edge Port


When to use

This function activates a Bridge Edge Port.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge Edge
Ports.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select the Edge Port in the list.


...................................................................................................................................................................................................

Select Action > Bridge Edge Port > Activate.


Result: The Port is activated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-45
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less Transport Link Management

Deactivate a Bridge Edge Port

....................................................................................................................................................................................................................................

Deactivate a Bridge Edge Port


When to use

This function deactivates a Bridge Edge Port.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge Edge
Ports.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select the Edge Port in the list.


...................................................................................................................................................................................................

Select Action > Bridge Edge Port > Deactivate.


Result: The Port is deactivated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-46
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

View the Connection Less EVC list

....................................................................................................................................................................................................................................

Connection Less EVC Management


View the Connection Less EVC list
When to use

The Ethernet Virtual Connection List window presents all the EVCs and their attributes.
Related Information

If this list is required from the Ethernet Service List (or from the Ethernet Segment List or
from the Ethernet Transport Link List), only the EVCs associated to the selected service
(or Ethernet Segment or Ethernet Transport Link) are displayed.
For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Connection Less > Bridge EVCs.


Result: The list window is displayed.

See the following topic in this document: Description of the list of Bridge EVCs
(p. 19-48)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-47
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Description of the list of Bridge EVCs

....................................................................................................................................................................................................................................

Description of the list of Bridge EVCs


Attributes of a Bridge EVC

The attributes displayed for each EVC are:

User Label.

Ethernet Service User Label.

Type (Point to point, Routed multi-point, Any to any).

Service Type.

Traffic Type (Unicast, Multicast).

Domain.

Bridge Type.

Working State (Normal, Configuring, Allocating, De-allocating, Implementing,


De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, removing).

Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,


Implemented, Commissioned).

Service State.

Availability Status (Normal, Degraded, In Failure, Not Meaningful).

Domain.

For more attributes, refer to EVC attributes to support ELP (p. 28-36).

....................................................................................................................................................................................................................................
1350 OMS
19-48
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Create a Bridge EVC

....................................................................................................................................................................................................................................

Create a Bridge EVC


When to use

This function consists in creating a Connection Less Ethernet Virtual Connection.


Related Information

If this action is required from the Service List, the Ethernet Service field of the EVC
Creation window, is filled with the service selected in the Service List.
For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Service Type, Type, Resource Sharing relations
Table 19-2

Service Type, Type, Resource Sharing relations

Service Type.

Type.

Traffic Type.

Resource Sharing.

EVPL.

Point-to-Point.

Unicast.

Full.

EPTL.

Point-to-Point.

Unicast.

Private UNI and Link.

EPL.

Point-to-Point.

Unicast.

Private UNI.

EVPLAN.

Any-to-Any.

Unicast.

Full.
Private UNI.
Private Link.
Private UNI and Link.
1

Extended EVPL.

Point-to-Point.

Unicast.

Full.
Private UNI.
Private Link.
Private UNI and Link.
1

Extended
EVPLAN.

Any-to-Any.

Unicast.

Full.

Rooted
Multipoint.

Multicast.

Private UNI.

Private Link.

Private UNI and Link.


1

HSI.

Rooted
Multipoint.

Unicast.

Rooted
Multipoint.

Full.

Multicast.
1

BTV.

Unicast.

Full.

Multicast.
1

....................................................................................................................................................................................................................................
1350 OMS
19-49
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Create a Bridge EVC

....................................................................................................................................................................................................................................

Table 19-2

Service Type, Type, Resource Sharing relations

Service Type.
Broadcast.

Type.
Rooted
Multipoint.

Traffic Type.
Unicast.

(continued)

Resource Sharing.
Full.
Private UNI.
Private Link.
Private UNI and Link.
1

Notes:

1.

This case allows a selection of the parameters.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The User Label must be different from any in use by another EVC.
Only one Root termination is authorized.
The EVC Type must be compatible with the service type of the associated Ethernet
Service.

The EVC Type must be compatible with the selected Traffic Type.
The role of each EVC termination must be compatible with the EVC Type.

Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path Action > Packet > Services > Connection Less (Bridge) > Create
Bridge EVC.
Result: The creation window is displayed.
...................................................................................................................................................................................................

General Panel.

Following data can be filled in the General Panel:

Enter an EVC User Label.

Service:

....................................................................................................................................................................................................................................
1350 OMS
19-50
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Create a Bridge EVC

....................................................................................................................................................................................................................................

Two different choices are possible:


Choose an already created Ethernet Service by using the sensitive help (this field
is automatically filled if this window is required from the Service List).
Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL,
Extended EVPLAN, HSI, BTV, Broadcast).
The parameters: Type and Resource Sharing are assigned according to the chosen
Service Type as indicated in: Table 19-2, Service Type, Type, Resource Sharing
relations (p. 19-49).
Select a Type (Point to Point, Routed Multipoint, Any to Any (=Multipoint to
multipoint)). if allowed.
Select a Traffic Type (Unicast, Multicast), the selection of the parameter depends on
the selected type.
Select a Service Level (Premium, Gold, Silver, Bronze).
Resource Sharing: to manage the issue related to Shared or Dedicated Transport Link
usage, the Resource Sharing attribute at EVC Level can assume following values.
Full: the EVC Service under definition can use every resource without any
restriction.
Private UNI: the EVC Service under definition must use Private UNI, that is, the
UNI is uniquely used by the EVC Service.
Private Link: The EVC Service under definition must use Private Links, that is,
Transport Links uniquely used by the EVC Service.
Private UNI and LINK: The EVC Service under definition must use Private UNI
and Private Links, that is, chosen Transport Links and UNIs are uniquely used by
that EVC Service.
Select a Domain Label.
Select a Service Level (Premium, Gold, Silver, Bronze).

C-VLAN Preservation: check it to keep the VLAN Id through the EVC.

(see: C-VLAN and CoS Preservation (p. 18-41)).

C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.

(see: C-VLAN and CoS Preservation (p. 18-41)).

NAD: select a NAD value from the list.

Enter a Comment (optional).

Enter an External Mark (optional). It can be used to identify external systems having
relations with the EVC (for example an ownership).

...................................................................................................................................................................................................

Detail Panel.

Following data can be filled in the Detail Panel:

Enter Vlan Distribution (Full mesh, Not full mesh).

Enter s-Vlan Id the range of the VLAN over SDH path, an equal value can go on the
same domain.
Define IGMP Snooping State (Not Meaningful, Enabled, Disabled).

....................................................................................................................................................................................................................................
1350 OMS
19-51
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Create a Bridge EVC

....................................................................................................................................................................................................................................

This option is available only for EVPLAN, Extended EVPLAN and BTV EVC types
and can optionally be defined as:
Enabled: to remind that the IGMP snooping protocol is used on top of the created
EVC. The IGMP is enabled immediately after the implementation of the EVC and
the IGMP is disabled immediately before the de-implementation the EVC.
Disabled: to remind that the IGMP snooping protocol is not used on the created
EVC.
Select the Frame Delivery parameters (see Frame delivery (p. 18-41))
Unicast Service Frame Delivery.

Multicast Service Frame Delivery.

Broadcast Service Frame Delivery.


Select the standard Vlan Type (8100).

Enter a Vlan Bundle in the range of the local Vlan.

...................................................................................................................................................................................................

Layer-2 Control Protocol Panel.

If the entire set has the same value, then select the first parameter Put entire set to

Default, all the set is put to Tunnel.


Not Meaningful, all the set is put to Not Meaningful.
Free, every value can be different.

Select which control Protocol must be tunneled or discarded. Such configuration is


propagated to all EVC terminations (this configuration ensures that all EVC terminations
use the same Tunneling criteria). A check is needed also toward Layer-2 Control Protocol
Processing defined at UNI level. This check allows a congruent management of Control
protocols crossing the EVC.
The default value is Tunnel. Checking the Set to Default box all values are set to Tunnel.
Checking the Set to Not Meaningful box all values are set to Not Meaningful.
The single L2 protocol can have different values, select a value for each protocol
selecting between Tunnel, Not Meaningful, and Discard.
...................................................................................................................................................................................................

Confirm the EVC creation with OK button.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-52
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Modify a Bridge EVC

....................................................................................................................................................................................................................................

Modify a Bridge EVC


When to use

The EVC modification gives the possibility to modify parameters and relative values.
Related Information

If the User Label is modified, the new User Label must be different from the one which
is already used by another EVC.
For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The Connection Less EVC list window is displayed.
...................................................................................................................................................................................................

Select the element to modify in the list.


...................................................................................................................................................................................................

Click the right mouse button and select Modify from the popup menu.
...................................................................................................................................................................................................

To modify an EVC (Ingress Flow):

Enter a new User Label (optional).

C-VLAN Preservation: check it to keep the VLAN Id through the EVC.

(see: C-VLAN and CoS Preservation (p. 18-41)).

C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.

(see: C-VLAN and CoS Preservation (p. 18-41)).

....................................................................................................................................................................................................................................
1350 OMS
19-53
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Modify a Bridge EVC

....................................................................................................................................................................................................................................

Modify the Comment (optional).


Modify the External Mark (optional).

Figure 19-5 EVC Modification window (Details)

To modify an EVC (Details Panel):

Modify VLAN distribution (optional).

Modify S-Vlan Id value (optional).

Modify Unicast Service Frame Delivery (optional).

Modify Multicast Service Frame Delivery (optional).

Modify Broadcast Service Frame Delivery (optional).


Modify VLAN Type (optional).

Modify VLAN Bundle (optional).

....................................................................................................................................................................................................................................
1350 OMS
19-54
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Modify a Bridge EVC

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok button to confirm the changes.


Result: Then, the EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-55
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Delete a Bridge EVC

....................................................................................................................................................................................................................................

Delete a Bridge EVC


When to use

This function consists in deleting an EVC from the 1350 OMS PKT supervision.
Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
After confirmation, the following checks are performed:

the 1350 OMS PKT checks that no Ethernet Segment is referring the EVCs.
the EVCs are dissociated from the related service (if no more EVC are associated to
the service, the service is also removed).
the EVCs are removed.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The provisioning state of the EVC must be defined.


No Ethernet Segment is referring the EVC.
No operation is pending on the EVC.

Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

On the Bridge EVCsr List Window, select the EVC to delete. Select Action > Bridge EVC
> Delete from the Action menu.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS
19-56
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Delete a Bridge EVC

....................................................................................................................................................................................................................................

Result: The EVC is deleted.

The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-57
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Get the EVC properties

....................................................................................................................................................................................................................................

Get the EVC properties


When to use

This function gets information about an Ethernet Virtual Connection.


Related Information

For general information about Transport Links, see: Transport link management
(p. 11-50).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The Bridge EVC list is displayed.
...................................................................................................................................................................................................

Select a Bridge EVC element from the list.


...................................................................................................................................................................................................

From the Main Menu follow the path Action > Properties.

....................................................................................................................................................................................................................................
1350 OMS
19-58
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Get the EVC properties

....................................................................................................................................................................................................................................

Result: The Bridge EVC Properties window is displayed.

See the following topic in this document: Details of a Bridge EVC (p. 19-60)
Figure 19-6 EVC Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-59
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Details of a Bridge EVC

....................................................................................................................................................................................................................................

Details of a Bridge EVC


Attributes of a Bridge EVC

The attributes displayed for each EVC are:

Id.

User Label.

Service Id Label.

Ethernet Service User Label.

Type (Point to point, Routed multi-point, Any to any).

Traffic Type (Unicast, Multicast).

Directionality.

Service Level.

Comment.

Action Type.

Action Date.

Working State (Normal, Configuring, Allocating, De-allocating, Implementing,


De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, removing).

Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,


Implemented, Commissioned).

Service State (Not in Service, In Service).

Availability Status (Normal, Degraded, In Failure, Not Meaningful).

ETS Id Label.

ETS LABEL label.

Vlan Type.

Resource sharing.

Domain Id.

VLAN distribution.

S-VLAN Id.

External Mark.

Domain.

....................................................................................................................................................................................................................................
1350 OMS
19-60
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Configure a Bridge or an ETS EVC

....................................................................................................................................................................................................................................

Configure a Bridge or an ETS EVC


When to use

The configuration of an EVC consists in associating a Traffic Descriptor to the EVC. This
function is available for Connection Oriented and Connection Less EVCs.
Related Information

See EVC Management (p. 11-53).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Select one the following commands:

Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs

Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs
Result: The EVC list window is displayed.

...................................................................................................................................................................................................

Select the EVC in the list.


...................................................................................................................................................................................................

Follow the path Action > Bridge EVC > EVC Configuration.
Result: The EVC Configuration window is displayed.
...................................................................................................................................................................................................

Select a Traffic Descriptor using the sensitive help.


...................................................................................................................................................................................................

Click Ok.
Result: The Traffic Descriptor is assigned to the EVC.

A correlation with the EVC is created.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-61
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Add bridge Transport Link to EVC

....................................................................................................................................................................................................................................

Add bridge Transport Link to EVC


When to use

This function adds a Transport Link to a Connection Less EVC.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The EVC provisioning state must be set to Defined.


No operation is pending on the selected EVC.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select the Bridge EVC.


...................................................................................................................................................................................................

Select the path Action > Bridge EVC > Add Transport Link to EVC.
...................................................................................................................................................................................................

Click Ok button to save the operation.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-62
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Remove bridge Transport Link to EVC

....................................................................................................................................................................................................................................

Remove bridge Transport Link to EVC


When to use

This function disassociates a Transport Link from a Connection Less EVC.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The EVC provisioning state must be set to Defined.


No operation is pending on the selected EVC.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The EVC list is shown.
...................................................................................................................................................................................................

Select the Bridge EVC and select the path Search > Bridge EVC > Transport Link.
Result: The list shows the Transport Links belonging to the selected EVC.
...................................................................................................................................................................................................

Select a Transport Link.


...................................................................................................................................................................................................

Select the path Action > Transport Link > Remove Transport Link from EVC.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: If the command is confirmed, The Transport Link is disassociated from EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-63
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Inventory of bridge Transport Links of an EVC

....................................................................................................................................................................................................................................

Inventory of bridge Transport Links of an EVC


When to use

This function shows a Transport Links from a Connection Less EVC.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The EVC provisioning state must be set to Defined.


No operation is pending on the selected EVC.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The EVC list is shown.
...................................................................................................................................................................................................

Select the Bridge EVC and select the path Search > Bridge EVC > Transport Link.
Result: The list shows the Transport Links belonging to the selected EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-64
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

EVC Fault Localization

....................................................................................................................................................................................................................................

EVC Fault Localization


When to use

This function allows the user to display the localization of alarms on an EVC.
Related Information

The function is available for implemented EVCs.


For more information about EVC, refer to EVC description (p. 18-37).
For details about Fault Localization, see: Fault Localization (p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select the EVC in the list.


...................................................................................................................................................................................................

Follow the path Search > Fault Localization.

....................................................................................................................................................................................................................................
1350 OMS
19-65
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

EVC Fault Localization

....................................................................................................................................................................................................................................

Result: The Bridge EVC Fault Localization window is displayed.

See the following topic in this document: Description of the list of Fault
Localization (p. 19-68)
Figure 19-7 EVC Fault Localization window

...................................................................................................................................................................................................

Select an alarmed port on the list, navigate to the Equipment View of the NE by issuing
Search > External Navigation to > USM.

....................................................................................................................................................................................................................................
1350 OMS
19-66
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

EVC Fault Localization

....................................................................................................................................................................................................................................

Result: The NE User Interface window is displayed.


Figure 19-8 Show Equipment from EVC Fault Localization

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-67
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Description of the list of Fault Localization

....................................................................................................................................................................................................................................

Description of the list of Fault Localization


Attributes of a Fault Localization

The Fault Localization window displays:

The User Label of the alarmed entity.

The Entity Type of the alarmed entity.

The Alarm /Availability State.

The Specific Fault Date.

The Probable Cause.

The Operator Label.

The NE User Label

The Global Alarm Date.


Note: The list is not refreshed automatically, click Actualize button to refresh it.

....................................................................................................................................................................................................................................
1350 OMS
19-68
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Description of the list of Alarms

....................................................................................................................................................................................................................................

Description of the list of Alarms


Attributes of an Alarm

The alarm list window displays:

The Perceived Severity.

The Event Date & Time.

The Friendly Name.

The Alarm Type.

The Probable Cause.

....................................................................................................................................................................................................................................
1350 OMS
19-69
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Navigation to AS

....................................................................................................................................................................................................................................

Navigation to AS
When to use

Starting from an implemented EVC, the corresponding alarm list can be displayed in AS
window.
Related Information

The function is available for implemented EVCs.


For general information about Fault Localization, see: Fault Localization (p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select the EVC in the list.


...................................................................................................................................................................................................

Follow the path from the popup menu Search > External Navigation to > AS.

....................................................................................................................................................................................................................................
1350 OMS
19-70
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Connection Less EVC Management

Navigation to AS

....................................................................................................................................................................................................................................

Result: The Fault Management window is displayed with the alarms concerning the
selected EVC.
Figure 19-9 AS window for EVC Alarms

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-71
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

View the list of EVC terminations

....................................................................................................................................................................................................................................

Bridge EVC Termination Management


View the list of EVC terminations
When to use

The EVC Termination List window presents all the terminations of the selected EVC and
their attributes.
Related Information

From list, the user displays the extremity of an EVC or deletes EVC.
If the list is required from the Ethernet Service List (or from the EVC List), only the EVC
terminations associated to the selected service (or EVC) are displayed.
For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select the bridge EVC in the list.


...................................................................................................................................................................................................

Select the path Search > Inventory from Bridge EVC > List EVC Terminations.
Result: The list window is displayed.

See the following topic in this document: Description of the list of EVC
Terminations (p. 19-73)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-72
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Description of the list of EVC Terminations

....................................................................................................................................................................................................................................

Description of the list of EVC Terminations


Attributes of a EVC Termination

The attributes displayed for each EVC termination are:

EVC Termination User Label.

Rate.

Network Element.

EVC User Label.

Role (Root, Leaf, Both).

Usage State.

VLAN Type.

....................................................................................................................................................................................................................................
1350 OMS
19-73
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Add Connection Less EVC Termination

....................................................................................................................................................................................................................................

Add Connection Less EVC Termination


When to use

This function consists in adding terminations to a Connection Less EVC.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The EVC provisioning state must be set to Defined.


Only one termination can have "Root" role.
EVC Termination Role must be congruent with the EVC topology.
No operation is pending on the selected EVC.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select the Bridge EVC in the list where the termination must be added.
...................................................................................................................................................................................................

Select the path Action > Bridge EVC > Add Connection Less EVC Termination.

....................................................................................................................................................................................................................................
1350 OMS
19-74
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Add Connection Less EVC Termination

....................................................................................................................................................................................................................................

Result: The Add Termination window is displayed.


Figure 19-10 Add EVC termination window (General Panel)

...................................................................................................................................................................................................

The Add Termination window has four different panels: General, Ingress Flow, Egress
Flow, and Layer-2 Control Protocol.

....................................................................................................................................................................................................................................
1350 OMS
19-75
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Add Connection Less EVC Termination

....................................................................................................................................................................................................................................

On the General Panel, insert following data:

Select a NE or ENE using the popup list window with available NEs.

Select an Edge Port using the popup list window with available Edge Ports.

Select the termination Role (Root, Leaf, Both).

...................................................................................................................................................................................................

On the Ingress Flow panel insert following data:


At least one Input Ethernet Flow OR at least one Output Ethernet Flow must be defined:
this allowing to cover following cases:

To define some Source EVC Termination point in Broadcasting Topologies only


Input Ethernet Flows are defined.
To define some Sink EVC Termination point in Broadcasting Topologies only Output
Ethernet Flows are defined.
To define some Bidirectional EVC Termination point in PTP, Rooted MultiPoint or
Multi Point To Multi Point topologies, Input Ethernet Flows, and Output Ethernet
Flows are defined; such point can be either balanced (that is, having equal I/O
characteristics) or Unbalanced (that is, having Input characteristics different from
output characteristics both in term of classification, bandwidth, Qos, and so forth).

Execute the following steps:

Select a Traffic Descriptor.


Select Color Profile and Policy Mode (optional).

Check or clear the Vlan Pop Enabled.

....................................................................................................................................................................................................................................
1350 OMS
19-76
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Add Connection Less EVC Termination

....................................................................................................................................................................................................................................

Select the Classification Mode (Priority, DSCP).


Select a Traffic Classifier clicking the button that displays the available Traffic
Classifier list.

...................................................................................................................................................................................................

On the Egress Flow panel insert following data:

....................................................................................................................................................................................................................................
1350 OMS
19-77
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Add Connection Less EVC Termination

....................................................................................................................................................................................................................................

Execute following steps:

Select the Class of Service (if Same as Ingress Flow not selected).
Insert the VLAN and Priority for the Push operation.

Figure 19-11 Add EVC termination window (Egress Flow)

....................................................................................................................................................................................................................................
1350 OMS
19-78
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Add Connection Less EVC Termination

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

On the Layer-2 Control Protocol Panel the control protocol is set for the termination. The
selection which control Protocol must be tunneled or discarded can be made also at
termination level.
If the entire set has the same value, then select the first parameter Put entire set to

Default, all the set is put to Tunnel.


Not Meaningful, all the set is put to Not Meaningful.
Free, every value can be different.

A check is needed also toward Layer-2 Control Protocol Processing defined at UNI level.
This check allows a congruent management of Control protocols crossing the EVC.

....................................................................................................................................................................................................................................
1350 OMS
19-79
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Add Connection Less EVC Termination

....................................................................................................................................................................................................................................

The single L2 protocol can have different values. Select a value for each protocol
selecting between Tunnel, Not Meaningful, and Discard.
Figure 19-12 Add EVC termination window (L2 Control Protocol Panel)

...................................................................................................................................................................................................

Click Ok button to save the operation.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-80
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Delete a Bridge EVC Termination

....................................................................................................................................................................................................................................

Delete a Bridge EVC Termination


When to use

This function consists in deleting an EVC termination from the 1350 OMS PKT
supervision.
Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The specified EVC termination is not used as Ethernet Segment extremity.


No operation is pending on the selected EVC termination.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The bridge EVC list window is displayed.
...................................................................................................................................................................................................

Select the bridge EVC in the list where the termination is to delete.
...................................................................................................................................................................................................

Select the path Search > Inventory from Bridge EVC > List EVC Terminations.
Result: The EVC termination list window is displayed.
...................................................................................................................................................................................................

On the Bridge EVCs termination List Window, select the EVC termination to delete.
Select Action > EVC Port > Delete from the Action menu.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS
19-81
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Delete a Bridge EVC Termination

....................................................................................................................................................................................................................................

Result: The EVC termination is deleted.

After confirmation:
the EVC terminations are dissociated from the related EVC.
the EVC terminations are removed.
The EVC Termination list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-82
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Configure a Bridge EVC Termination

....................................................................................................................................................................................................................................

Configure a Bridge EVC Termination


When to use

This function consists in configuring an Ethernet Virtual Connection termination.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The EVC list window is displayed.
...................................................................................................................................................................................................

Select the EVC in the list.


...................................................................................................................................................................................................

Select the path Search > Inventory from Bridge EVC > List EVC Terminations.
Result: The EVC Termination list window is displayed.
...................................................................................................................................................................................................

Select the termination to configure in the list and follow the path Action > EVC Port >
EVC Termination Configuration.

....................................................................................................................................................................................................................................
1350 OMS
19-83
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Configure a Bridge EVC Termination

....................................................................................................................................................................................................................................

Result: The EVC Port Configuration window is displayed.


Figure 19-13 EVC Termination Configuration window

...................................................................................................................................................................................................

On the Configuration Window.


To configure the EVC termination:

Select a Traffic Descriptor using the list of the available Traffic Descriptors
displayed.

...................................................................................................................................................................................................

Click Ok.
Result: The Traffic Descriptor is assigned to the EVC termination.

A correlation with the EVC is created.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-84
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Get the EVC termination properties

....................................................................................................................................................................................................................................

Get the EVC termination properties


When to use

This function gets information about an Ethernet Virtual Connection termination.


Related Information

For information about Connection Less EVC, see: Bridge Traffic Management
(p. 19-6).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The Bridge EVC list is displayed.
...................................................................................................................................................................................................

Select a Bridge EVC element from the list.


...................................................................................................................................................................................................

To display the EVC terminations, select the path Search > Inventory from Bridge EVC >
List EVC Terminations.
Result: The EVC Termination list window is displayed.
...................................................................................................................................................................................................

From the Main Menu follow the path Action > Properties.

....................................................................................................................................................................................................................................
1350 OMS
19-85
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Get the EVC termination properties

....................................................................................................................................................................................................................................

Result: The Bridge EVC termination Properties window is displayed.

See the following topic in this document: Details of an EVC Termination (p. 19-87)
Figure 19-14 EVC Termination Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-86
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Bridge EVC Termination Management

Details of an EVC Termination

....................................................................................................................................................................................................................................

Details of an EVC Termination


Attributes of an EVC Termination

The attributes displayed for each EVC termination are:

Id.

EVC Termination User Label.

Rate.

NE Id Label

Network Element.

EVC User Label.

Usage State.

Service Id Label

Ethernet Service

VLAN Id

VLAN Type.

VLAN Bundle

Policy Mode

Traffic Descriptor

Color Profile

VLAN Pop

Class Of Service

VLAN Id

Green Priority

Yellow Priority

EVC Id
Role (Root, Leaf, Both).
Type

VLAN Protocol Type

....................................................................................................................................................................................................................................
1350 OMS
19-87
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Overview about Workflow

....................................................................................................................................................................................................................................

Workflow for Bridge Management


Overview about Workflow
Description

The workflow to manage bridge is part of the more general workflow for the Ethernet
Service management.
For information about bridge network, see: Bridge Network Management (p. 19-4).
Spanning Tree Protocol is a control protocol running inside a Bridge Network able to
build tree based Active Topologies. The following Spanning Tree Protocols are available:
STP, RSTP, PVSTP, MISTP.
For information about Spanning Tree, see: Spanning Tree Instance Management
(p. 19-8).
Domain definition

A Domain is a distributed infrastructure made of NE, ENE, Transport Links and Edge
Ports managed together to supply a Connection Less infrastructure. Its main properties
are the bridge type (MAC, Virtual or Provider) and the STP type (STP, RSTP, PVSTP,
MSTP or none). For Connection Oriented infrastructures, a default domain encompassing
all such entities is considered existing by definition.
There can be two ways of defining a domain:

Define a unique domain that includes all the NE and ENE that supplies the same
service or.
Define more domains that includes NE and ENE that supplies the same service, but
are subdivided for example by customer.

The ETS domain is the default domain and is equal to the MAC domain.
The Domain List window presents all the domains and their attributes.
The domain ETS is created by defaults and cannot be deleted.
Domain configuration

The Provider Bridge operation Mode allows to define the global QoS policy to be applied
to all Ethernet Ports of a given Provider Bridge. Such value is mirrored on all Ports when
each Port has configured the PCP Port Table Profile with its default value (that is, 0).
The Provider Bridge Operation Mode can be configured on NE basis.
The new attribute Provider Bridge Operation Mode (5P3D, 8P0D, 7P1D, 6P2D,
CustomerDefined) is added to the Domain.

....................................................................................................................................................................................................................................
1350 OMS
19-88
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Overview about Workflow

....................................................................................................................................................................................................................................

The value is derived from the corresponding value set at NE level, from all NEs contained
in the Provider Bridge Domain. In particular, if all NEs have a homogeneous
configuration of Provider Bridge Operation Mode, then the Domain reflects a real value,
in all other cases, the value for the domain is set to "None".
The Attribute can be configured at any time, this implying the automatic provisioning of
the chosen value on all NEs contained in the Provider Bridge Domain. This operation
forces all the ETB ports present in each Provider Bridge to be reset at the same Bridge
NE PbOperationMode value and must be made paying attention.
This attribute is meaningful only in case of Domain configured as Provider Bridge.
The management performed at Domain level, ensures that all NEs contained inside the
Provider Bridge domain really use the same QoS management. In fact, when all NEs are
defined to use the same Priority Code Point All incoming Ethernet frames are interpreted
in the same way: a defined meaning is assigned to each received sequence of Priority bits
and such meaning/behavior is made common to a whole domain.
NE configuration

The Provider Bridge operation Mode allows to define the global QoS policy to be applied
to all Ethernet Ports of a given Provider Bridge. Such value is mirrored on all Ports when
each Port has configured the PCP (priority code point) Port Table Profile with its default
value (that is, 0).
The Provider Bridge Operation Mode can be configured on NE basis.
The configuration of the Provider Bridge Operation Mode on a Network Element is
possible as described in the procedureConfigure a Network Element (p. 19-98).

....................................................................................................................................................................................................................................
1350 OMS
19-89
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Create a Domain

....................................................................................................................................................................................................................................

Create a Domain
When to use

This function allows the operator to define a domain in the managed network.
Related Information

For information, see: Overview about Workflow (p. 19-88).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The maximum number of domains must not be reached.

The User Label must be not in use by another domain.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Action > Packet > Construction > Create Domain.
...................................................................................................................................................................................................

On the Create Domain Window.


To create a domain:

Enter a User Label.

Enter a Bridge Type (None, MAC, Virtual, Provider, Not Meaningful, No Bridge).

Enter an STP Type (None, MSTP, PVSTP, RSTP, STP, Disabled).

Enter a Comment (optional).

...................................................................................................................................................................................................

Click Ok.
Result: The domain is created.

The Domain list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-90
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Add NE to a Domain

....................................................................................................................................................................................................................................

Add NE to a Domain
When to use

The user adds a NE to a domain to manage the NE in that domain.


Related Information

For information, see: Overview about Workflow (p. 19-88).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Construction > Network Elements > Defined NEs.
...................................................................................................................................................................................................

Select the NE in the list.


...................................................................................................................................................................................................

Follow the path Action > Network Element > Assign Network Element to Domain.

....................................................................................................................................................................................................................................
1350 OMS
19-91
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Add NE to a Domain

....................................................................................................................................................................................................................................

Result: The assign window is displayed.

...................................................................................................................................................................................................

Click the Bridge Domain field.

....................................................................................................................................................................................................................................
1350 OMS
19-92
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Add NE to a Domain

....................................................................................................................................................................................................................................

Result: The list of available bridge domain is displayed.

...................................................................................................................................................................................................

Select the desired domain and Click the check sign to confirm it.
...................................................................................................................................................................................................

Click Ok.
Result: The NE is assigned to the Domain previously created. This operation is

repeated for all the NEs that must be assigned to a domain. The domain must be the
same or a different domain as explained in previous paragraph.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-93
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Domain Configuration

....................................................................................................................................................................................................................................

Domain Configuration
When to use

This function allows the configuration of the Provider Bridge Operation mode of a
provider domain.
Related Information

For information, see: Domain configuration (p. 19-88).


For information, see: Overview about Workflow (p. 19-88).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge
Domains.
...................................................................................................................................................................................................

Select the Domain in the list.


...................................................................................................................................................................................................

Follow the path Action > Domain > Configure Domain.

....................................................................................................................................................................................................................................
1350 OMS
19-94
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Domain Configuration

....................................................................................................................................................................................................................................

Result: The configuration window is displayed.


Figure 19-15 Provider Domain Configuration window

...................................................................................................................................................................................................

Select the Provider Bridge Operation Mode from the list.


...................................................................................................................................................................................................

If the Operation mode must be propagated to NEs belonging to the domain, select true;
otherwise, select false.
...................................................................................................................................................................................................

Click Ok.
Result: The Domain is configured consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-95
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Domain Modification

....................................................................................................................................................................................................................................

Domain Modification
When to use

This function modifies the VLAN Type for the domain.


Related Information

For information, see: Overview about Workflow (p. 19-88).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge
Domains.
...................................................................................................................................................................................................

Select the Domain in the list.


...................................................................................................................................................................................................

Follow the path Action > Modify.

....................................................................................................................................................................................................................................
1350 OMS
19-96
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Domain Modification

....................................................................................................................................................................................................................................

Result: The modification window is displayed.


Figure 19-16 Domain Modification window

...................................................................................................................................................................................................

If the Set Standard VLAN Type (8100) is set to False, select the VLAN TYPE from the list
of defined VLAN Types.
...................................................................................................................................................................................................

If the Set Standard VLAN Type (8100) is set to True, the VLAN TYPE is already set.
...................................................................................................................................................................................................

Click Ok.
Result: The Domain is modified consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-97
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Configure a Network Element

....................................................................................................................................................................................................................................

Configure a Network Element


When to use

Configure the Provider Bridge Operation Mode on NE basis.


Related Information

For information, see: Overview about Workflow (p. 19-88).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge NEs.
...................................................................................................................................................................................................

Select the Network Element in the list.


...................................................................................................................................................................................................

Follow the path Action > Network Element > Configure.

....................................................................................................................................................................................................................................
1350 OMS
19-98
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Configure a Network Element

....................................................................................................................................................................................................................................

Result: The configuration window is displayed.


Figure 19-17 Network Element Configure window

...................................................................................................................................................................................................

To configure a Network Element:

Choose the Provider Bridge Operation Mode (As Container, 5P3D, 8P0D).
If the operation mode must be propagated to the edge ports associated to NE, choose
True for Propagate to Edge Ports parameter; in any other case, choose False.

...................................................................................................................................................................................................

Click Ok.
Result: The Network Element is configured consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-99
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Link Over TDM configuration

....................................................................................................................................................................................................................................

Link Over TDM configuration


When to use

Configure the Link Over TDM.


Related Information

For information, see: Overview about Workflow (p. 19-88).


For Link Over TDM, see: Managing Links Over TDM (p. 14-17).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Construction > Link Over TDM.
...................................................................................................................................................................................................

Select the Link Over TDM in the list.


...................................................................................................................................................................................................

Follow the path Action > Link Over TDM > Configure.

....................................................................................................................................................................................................................................
1350 OMS
19-100
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Link Over TDM configuration

....................................................................................................................................................................................................................................

Result: The configuration window is displayed.


Figure 19-18 Client Type Selection

...................................................................................................................................................................................................

Select the Client Type ETB in the Configuration window.


...................................................................................................................................................................................................

Click Ok.
Result: The Link Over TDM is configured consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-101
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

NE Ethernet Physical Port Configuration

....................................................................................................................................................................................................................................

NE Ethernet Physical Port Configuration


When to use

The NE Ethernet physical ports (local ports) are configured as ETS-P in a provider bridge
configuration.
Related Information

For information, see: Overview about Workflow (p. 19-88).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Construction > Network Elements > Defined NEs.
...................................................................................................................................................................................................

Select the Network Element in the list.


...................................................................................................................................................................................................

Follow the path Search > Inventory from Network Element > Ethernet Physical Port
List.
Result: The Ethernet Physical port list window is displayed.
Figure 19-19 Ethernet Physical Port

....................................................................................................................................................................................................................................
1350 OMS
19-102
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

NE Ethernet Physical Port Configuration

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Ethernet Physical Port list of the selected Network Element is displayed, select the
port to configure and from the popup menu the item Configure.
Result: The configuration window is displayed.
Figure 19-20 Ethernet Physical Port Configuration window

...................................................................................................................................................................................................

Select the Client Type ETS-P and confirm with OK Button.


Result: The Ethernet Physical Port is configured consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-103
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Create a Customer

....................................................................................................................................................................................................................................

Create a Customer
When to use

This function allows the user to define the characteristics of the owner (=customer) of one
or more NE(s) to allow the usage of services defined across the boundaries of the
managed network.
Related Information

The first step to perform in EOT User Interface is the Customer creation to be able to
create the desired Ethernet Service.
For information, see: Overview about Workflow (p. 19-88).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The maximum number of customers must not be reached.

The User Label must be not in use by another customer.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Action > Packet > Services > Create Customer.

....................................................................................................................................................................................................................................
1350 OMS
19-104
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Create a Customer

....................................................................................................................................................................................................................................

Result: The customer creation window opens.


Figure 19-21 Customer Creation window

...................................................................................................................................................................................................

On the Create Customer Window insert the required data.

....................................................................................................................................................................................................................................
1350 OMS
19-105
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Create a Customer

....................................................................................................................................................................................................................................

To create a customer:

Enter a User Label.

Enter a Company (optional).

Enter an Address (optional).

Enter a Comment (optional).

...................................................................................................................................................................................................

Click Ok.
Result: The customer is created.

The tree area and the Customer list are updated.


The user can define services related to this customer.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-106
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Create an Ethernet Service

....................................................................................................................................................................................................................................

Create an Ethernet Service


When to use

This function allows creating an Ethernet Service (related to a selected customer).


Related Information

If this list is required from the Customer List, the Customer field of this creation window
is automatically filled with the customer value selected in the Customer List.
For general information, see: Overview about Workflow (p. 19-88).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

Before the action, define one customer at least.


The User Label must be not in use by another service.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Action > Packet > Services > Create Ethernet Service.
...................................................................................................................................................................................................

On the Create Service Window.


Execute the following steps:

Enter a Service User label.

Select the Customer from the available customer list, which opens when you enter the
Customer field.
Select the Service Type Extended EVPL.
No other data are required.
Click Ok.

...................................................................................................................................................................................................

Click Ok.
Result: The service is created.

A correlation with the selected customer is created.


....................................................................................................................................................................................................................................
1350 OMS
19-107
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Create an Ethernet Service

....................................................................................................................................................................................................................................

Then, the tree area and the Ethernet Service List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-108
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Traffic Descriptor Definition

....................................................................................................................................................................................................................................

Traffic Descriptor Definition


When to use

Creation of the Traffic Descriptor.


Related Information

For information, see: Overview about Workflow (p. 19-88).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Action > Packet > Services > Create Traffic Descriptor.
Result: The creation window is displayed.
...................................................................................................................................................................................................

On the Create Traffic Descriptor Window.


To create a Traffic Descriptor:

Enter a User Label.

Select the Class of Service (Best Effort, Guaranteed, Regulated, Regulated1,


Regulated3, Regulated4, Guaranteed2, Background).
Enter a CIR value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
Enter a PIR value.
Enter a CBS value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
Enter a PBS value (if the selected Class of Service is 'Guaranteed', PBS value is
automatically set to CBS value - but could be modified).

...................................................................................................................................................................................................

Click Ok.
Result: The Traffic Descriptor is created.

A correlation with the selected customer is created.

....................................................................................................................................................................................................................................
1350 OMS
19-109
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

Traffic Descriptor Definition

....................................................................................................................................................................................................................................

Then, the tree area and the Ethernet Service List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-110
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Workflow for Bridge Management

EVC Allocation and Implementation

....................................................................................................................................................................................................................................

EVC Allocation and Implementation


When to use

To complete the Provider Bridge Workflow: create a Connection Less EVC, allocate, and
implement it.
Related Information

For information, see: Overview about Workflow (p. 19-88).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > Bridge EVC > Allocate.
Result: The allocation window is displayed.
...................................................................................................................................................................................................

Click Ok.
Result: The EVC is allocated.

The Provisioning State is changed to Allocated.


...................................................................................................................................................................................................

Select again the EVC in the list and follow the path Action > Bridge EVC > Implement.
Result: The implementation window is displayed.
...................................................................................................................................................................................................

Click Ok.
Result: The EVC is implemented.

The Provisioning State is changed to Implemented.


E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
19-111
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management

Dynamic change capability

....................................................................................................................................................................................................................................

EVC Bandwidth Management


Dynamic change capability
Object applicability

The possibility to change dynamically the bandwidth assigned to an active (that is,
implemented) Ethernet connectivity is one of the most important capabilities in the scope
of Data Network Management.
The dynamic change (increment/decrement) of bandwidth is possible for:

Connection Oriented EVC:


for Connection Oriented Networks, in the following cases:
The EVC is multicast, the traffic is broadcasted from one source UNI to leaves
UNI.
All contained Ethernet Segment are balanced that is, have the same bandwidth
parameters definitions.
All contained Ethernet Segment are not balanced that is, have different bandwidth
parameters definitions; new parameters can cause the increment for one or more
Ethernet Segment and the reduction for others.

Connection Less EVC:


for Networks based on Provider Bridge, in the following cases:

All EVC Terminations are balanced that is, have the same bandwidth parameters
definitions.
All EVC Terminations are not balanced that is, have different bandwidth
parameters definitions; in this case it is possible that new parameters cause the
bandwidth increment for some EVC termination and the reduction for some other.
Ethernet Segments for Connection Oriented Networks, when the bandwidth of a
single specific flow is changed.

EVC Terminations for Connection Less Networks, Provider Bridge based when the
bandwidth of a specific EVC termination is changed.
LSP Tunnel for MPLS networks, when the LSP Tunnel bandwidth is changed.

VC-LSP for MPLS networks, when the VC-LSP bandwidth is changed.

....................................................................................................................................................................................................................................
1350 OMS
19-112
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


EVC Bandwidth Management

Function Description

....................................................................................................................................................................................................................................

Function Description
Object status applicability

The applicability of the Bandwidth management is restricted to the following cases:

Implemented and allocated EVC (Connection Oriented Networks) which


automatically affects all contained Ethernet Segments.
Implemented and allocated EVC (Connection Less Networks) which automatically
affects all contained EVC Terminations.
Implemented and allocated Ethernet Segments (Connection Oriented Networks).
EVC Terminations of Implemented and allocated EVCs (Connection Less Networks,
Provider Bridge based).
Implemented and Allocated LSP Tunnels.
Implemented and Allocated VC-LSPs.

The Bandwidth management can also be requested on Allocated resources.


Implemented Object applicability

Consider the following cases:

EVC Connection Oriented Based (Implemented) (p. 19-113).

EVC Connection Oriented Based (Allocated) (p. 19-114).

EVC Connection Less Based (Implemented or Allocated) (p. 19-114).

Ethernet Segments (Implemented) (p. 19-115).

Ethernet Segments (Allocated) (p. 19-116).

EVC Connection Oriented Based (Implemented)

When all contained Ethernet Segments are implemented, acting at EVC level significantly
simplifies the effort for the user that is requested to provide only once the new bandwidth
parameters, either to enlarge or to reduce current values.
Acting at EVC level, the bandwidth change is propagated to all contained Ethernet
Segments; in particular:

The EVC must be implemented, all Ethernet Segments must be implemented.


The bandwidth change is applied on each Ethernet Segment.
When the bandwidth change is successfully propagated to all Ethernet Segments, the
EVC continue to be Implemented.
The new Class of Service must be compliant with the one in use by contained
Ethernet Segments (in particular, if the EVC is realized by non homogeneous Class
Of Services, then to avoid errors, the user must proceed on Ethernet Segment basis).

....................................................................................................................................................................................................................................
1350 OMS
19-113
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


EVC Bandwidth Management

Function Description

....................................................................................................................................................................................................................................

In case of errors, the procedure is immediately stopped and one of the following
situation are identified:
the EVC provisioning state is put in partially Implemented: this case occurs when
at least one Ethernet Segment become partially Implemented because of
unrecoverable errors during provisioning.
The EVC provisioning state remain as implemented: this case occurs when an
Ethernet Segment has no room to allocate new bandwidth parameters. In this case
the Ethernet Segment remain implemented with old bandwidth parameters.

EVC Connection Oriented Based (Allocated)

When all contained Ethernet Segments are Allocated, acting at EVC level significantly
simplifies the effort for the user that is requested to provide only once the new bandwidth
parameters, either to enlarge or to reduce current values.
Acting at EVC level, the bandwidth change is propagated to all contained Ethernet
Segments; in particular:

The EVC must be Allocated (this implying that all Ethernet Segments are allocated).
The bandwidth change is applied on each Ethernet Segment.

EVC Connection Less Based (Implemented or Allocated)

Acting at EVC level significantly simplifies the effort for the user that is requested to
provide only once the new bandwidth parameters, either to enlarge or to reduce current
values.
Acting at EVC level, the bandwidth change is propagated to all contained EVC
Terminations; in particular:

Care must be taken about the new Class of Service that must be compliant with the
one in use by contained EVC Terminations. If the EVC is realized by non
homogeneous Class Of Services, then to avoid errors, the user must proceed on EVC
Termination basis.
The EVC can be implemented, if all EVC Terminations are activated, or allocated, if
the bandwidth change for EVC Terminations is accomplished only inside 1350 OMS
PKT database.
The bandwidth change is applied on each contained EVC Termination.
In case of errors, the procedure is immediately stopped. The EVC provisioning state
remain with the previous provisioning state. The following situation is identified:
if provisioning state was implemented, it remains implemented. This case occurs
when the provisioning for an EVC termination fails (that is the EVC termination
remain active with old bandwidth parameters).
In this case the EVC become made by non homogeneous (in terms of
bandwidth) EVC Termination.

if provisioning state was allocated, it remains allocated. The EVC become made
with non homogeneous EVC terminations Bandwidth characteristics.

....................................................................................................................................................................................................................................
1350 OMS
19-114
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


EVC Bandwidth Management

Function Description

....................................................................................................................................................................................................................................

Ethernet Segments (Implemented)

This case covers Implemented Ethernet Segments on Connection Oriented Networks;

The bandwidth change is only admitted in the scope of the same QoS (for example:
change from BE to Guaranteed is not allowed as well as other mixed possibilities).
The bandwidth change is performed through the Ethernet Segment modification: the
parameter modified is the Traffic Descriptor reference, so allowing the Ethernet
Segment to point toward another TD.
The bandwidth change is allowed, without restrictions, on all Transport Links types
(that is Link Over TDM, Link Over Cable and Link Over MPLS).
In case of increment, an internal check is performed along the Ethernet Segment
following the current routing verifying that enough bandwidth is available. In
particular:
In case of positive check,.
- The Ethernet Segments starts pointing to another TD that reflects the new
bandwidth parameters.
- The values of used/available bandwidth values must be updated on used
Transport Links and Edge Ports if an increment on Guaranteed parameter is
required.
- The behavior for bandwidth increment is performed on the Network, starting
from last NE and proceeding in reverse way along the Ethernet Segment routing.
- In case of error during provisioning operation, the global operation is stopped
and the Provisioning state is set to partially implemented.

In case of Negative check:


The operation is stopped, a specific error message is displayed indicating the error
reason. The Provisioning state remains set to implemented.

In case of reduction, no internal checks are needed and the operation is accepted; In
particular:

The Ethernet Segments starts pointing to another Traffic Descriptor, that reflects
the new bandwidth parameters.
If a reduction on Guaranteed parameter is required, the values of used/available
bandwidth values are updated on used Transport Links and Edge Ports.
The behavior for bandwidth reduction is performed on the Network, starting from
first NE and proceeding in forward way along the Ethernet Segment routing.
In case of error during provisioning operation, the global operation is stopped and
the Provisioning state is set to partially implemented.

....................................................................................................................................................................................................................................
1350 OMS
19-115
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


EVC Bandwidth Management

Function Description

....................................................................................................................................................................................................................................

Ethernet Segments (Allocated)

The bandwidth change is:

only admitted in the scope of the same QoS (for example: change from BE to
Guaranteed is not allowed as well as other mixed possibilities).
performed through the Ethernet Segment modification: the parameter modified is the
Traffic Descriptor reference, so allowing the Ethernet Segment to point toward
another Traffic Descriptor.
allowed, without restrictions, on all Transport Links types (that is Link Over TDM,
Link Over Cable and Link Over MPLS).
In case of increment, an internal check is performed along the Ethernet Segment
following the current routing, verifying that enough bandwidth is available. In
particular:
In case of positive check,.
- The Ethernet Segments starts pointing to a Traffic Descriptor that reflects the
new bandwidth parameters.
- The values of used/available bandwidth values must be updated on used
Transport Links and Edge Ports if an increment on Guaranteed parameter is
required.

In case of reduction, no internal checks are needed and the operation is accepted; In
particular:
The Ethernet Segments starts pointing to a Traffic Descriptor that reflects the new
bandwidth parameters.
The values of used/available bandwidth values must be updated on used Transport
Links and Edge Ports if a reduction on Guaranteed parameter is required.

EVC Terminations

The terminations are Activated EVC Terminations belonging to Implemented or Allocated


EVCs based on Connection Less Networks.
The same behavior is performed both for bandwidth increments and for bandwidth
reduction, no internal checks are needed and the operation is accepted; In particular:

The EVC Termination starts pointing to another Traffic Descriptor that reflects the
new bandwidth parameters.
Only in case of Implemented EVCs, a specific behavior is started to propagate the
modification toward NEs.
The behavior for bandwidth change is performed on the Network, acting on the NE
containing the EVC Termination.
On NEs, a specific Traffic Descriptor creation is needed if a reusable one compliant
with new bandwidth characteristics not exist.
In case of error during provisioning operation, the global operation is stopped and the
Provisioning state of the EVC does not change.

....................................................................................................................................................................................................................................
1350 OMS
19-116
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Service Delimiting

Vlan Push/Pop On Provider Bridge UNI/IWI Management

....................................................................................................................................................................................................................................

Service Delimiting
Vlan Push/Pop On Provider Bridge UNI/IWI Management
Definition

The Service Delimiting allows the finalization of Vlan Push/Pop operations also at EVCs
UNI/IWI based on Provider Bridge technology.
This function enhances EVC Termination characteristics definition. For this reason, all
the following consideration must be taken into account:

For each EVC termination, the user can define, in addition to existing characteristics,
an optional POP operation to be performed on Ethernet Traffic in the Provider Bridge
Domain at ingress (that is, at UNI/IWI).
For each EVC termination, the user can define, for traffic egress the Provider Bridge
domain (that is, at UNI/IWI):
Define in following way:
One or more Cos.
A PUSH operation for a given Cos.
For each EVC termination, the user must define at least one Input Ethernet Flow or at
least one Output Ethernet Flow.
This operation allowing to cover all following cases:
Definition of "Source" EVC Termination point in Broadcasting Topologies in case
that only Input Ethernet Flows are defined.

Definition of "Sink" EVC Termination point in Broadcasting Topologies, in case


that only Output Ethernet Flows are defined.
Definition of Bidirectional EVC Termination point in Point-to-point,
Rooted-MultiPoint, or MultiPoint-To-MultiPoint topologies. In case that both
Input Ethernet Flows and Output Ethernet Flows are defined, Termination point
can be either balanced or unbalanced. Balanced means having equal I/O
characteristics. Unbalanced means having Input characteristics different from
output characteristics. Characteristics are classification, bandwidth, Qos, and so
forth.

Operation and expected behavior

Operation and expected behavior in service delimiting are:

EVC Definition (Provider Bridge).


At EVC definition, EVC Terminations can optionally be supplied. For each EVC
Termination, the user can define Input or Output Ethernet Flows characteristics.
If the created EVC is empty, then all EVC Termination characteristics definition is
delegated to the operation: Add EVC Termination.

Add EVC Termination (Provider Bridge).

....................................................................................................................................................................................................................................
1350 OMS
19-117
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Service Delimiting

Vlan Push/Pop On Provider Bridge UNI/IWI Management

....................................................................................................................................................................................................................................

When the user wants to add a new EVC Termination to an existing EVC, for each
EVC Termination the user must define Input or Output Ethernet Flows characteristics.

Get EVC Extremities (Provider Bridge).


For the selected EVC, this inventory must report the generic characteristics of all
EVC Terminations, Input Ethernet Flows, and Output Ethernet Flows included.

Modify EVC Termination (Provider Bridge).


After having defined the characteristics of an EVC termination, the user can change
such characteristics for example adding or removing a POP or a PUSH.

Get Properties - EVC Termination (Provider Bridge).


For the selected EVC Termination, this inventory must report the relevant
characteristics, Input and Output Characteristics included.

....................................................................................................................................................................................................................................
1350 OMS
19-118
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Spanning Tree

Overview

....................................................................................................................................................................................................................................

Spanning Tree
Show the Spanning Tree Instance of EVC
When to use

This function shows Spanning Tree Instance of a Connection Less EVC.


Related Information

For information, see: Spanning Tree Instance Management (p. 19-8).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The EVC provisioning state must be set to Defined.


No operation is pending on the selected EVC.

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The EVC list is shown.
...................................................................................................................................................................................................

Select the Bridge EVC and select the path Search > Bridge EVC > Show Spanning Tree
Instance.
Result: The Spanning Tree Instance belonging to the selected EVC is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-119
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Spanning Tree

Show the Spanning Tree Instance

....................................................................................................................................................................................................................................

Show the Spanning Tree Instance


When to use

This function shows Spanning Tree Instances.


Related Information

For information about STI, see: Spanning Tree Instance Management (p. 19-8).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge).
Result: The Connection Less menu is shown.
...................................................................................................................................................................................................

Select Show Spanning Tree Instance.


Result: The Spanning Tree Instance belonging is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-120
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Spanning Tree

Spanning Tree Instance configuration

....................................................................................................................................................................................................................................

Spanning Tree Instance configuration


When to use

This function configures a Spanning Tree Instance.


Related Information

For information, see: Spanning Tree Instance Management (p. 19-8).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Less (Bridge) >
Spanning Tree Instance.
Result: The Spanning Tree Instance list window is displayed.
...................................................................................................................................................................................................

Select the Spanning Tree Instance in the list and follow the path Action > Spanning Tree
Instance > Configure.

....................................................................................................................................................................................................................................
1350 OMS
19-121
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Spanning Tree

Spanning Tree Instance configuration

....................................................................................................................................................................................................................................

Result: The Spanning Tree configuration window is displayed.


Figure 19-22 Spanning Tree Instance Configuration window

...................................................................................................................................................................................................

Select one of the options then click OK.


Result: The Spanning Tree Instance is configured.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-122
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Spanning Tree

Spanning Tree Instance Implementation

....................................................................................................................................................................................................................................

Spanning Tree Instance Implementation


When to use

This function Implement a Spanning Tree Instance.


Related Information

For information, see: Spanning Tree Instance Management (p. 19-8).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Less (Bridge) >
Spanning Tree Instance.
Result: The Spanning Tree Instance list window is displayed.
...................................................................................................................................................................................................

Select the Spanning Tree Instance in the list and follow the path Action > Spanning Tree
Instance > Implement.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: If the command is confirmed, the Spanning Tree Instance is Implemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-123
8DG42227DAAA 9.6
Issue 3 December 2012

Bridge Network Management


Spanning Tree

Spanning Tree Instance Deimplementation

....................................................................................................................................................................................................................................

Spanning Tree Instance Deimplementation


When to use

This function Deimplement a Spanning Tree Instance .


Related Information

For information, see: Spanning Tree Instance Management (p. 19-8).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Less (Bridge) >
Spanning Tree Instance .
Result: The Spanning Tree Instance list window is displayed.
...................................................................................................................................................................................................

Select the Spanning Tree Instance in the list and follow the path Action > Spanning Tree
Instance > Deimplement.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: If the command is confirmed, the Spanning Tree Instance is Deimplemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
19-124
8DG42227DAAA 9.6
Issue 3 December 2012

20

20
Provider
Backbone Bridge
Network Management

Overview
Purpose

This chapter describes how to set up a Provider Backbone Bridge (PBB) network.
Contents
Provider Backbone Bridge (PBB) Networks

20-5

Provider Backbone Bridge Management

20-5

PBB EVC provisioning

20-8

Ethernet Ring Protocol (ERP)


Network Configuration

20-10
20-11

Network Configuration

20-11

PBB Domain Create

20-12

Define NE

20-14

Provisioning

20-17

Provisioning hardware reference

20-17

Transport link

20-20

Create Ethernet Physical Connection

20-21

Assign Link over Cable to PBB domain

20-24

ERP configuration

20-30

Create ERP Ring

20-30

Create an ERP Instance

20-38

Backbone VLAN ID

20-46

B-VID configuration

20-46

EVC-EVPLAN Service in PBB/ERP

20-52

Additional Info on PBB/ERP Service

20-52

PBB EVC Termination Management

20-56

...................................................................................................................................................................................................................................
1350 OMS
20-1
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management

Overview

....................................................................................................................................................................................................................................

Add PBB EVC Termination

20-56

Remove PBB EVC Termination

20-59

Provider Backbone Bridge EVC Management

20-60

View the PBB EVC list

20-61

Description of the list of PBB EVCs

20-62

Create PBB EVC

20-63

Allocate PBB EVC

20-65

Deallocate PBB EVC

20-67

Implement PBB EVC

20-68

Deimplement PBB EVC

20-70

Add Termination on implemented PBB EVC

20-71

Remove Termination on implemented EVC

20-72

Configure PBB EVC

20-73

Bridge Flows of PBB EVC

20-74

PBB EVC Broadcast Domain Containment

20-76

Enable Broadcast Domain Containment

20-77

Disable Broadcast Domain Containment

20-78

Automatic association UNI port - default VT

20-79

Manual association UNI port - user VT

20-80

Configuration of the DEI bit

20-81

B-VID Management

20-82

View the B-VID list

20-83

Create PBB B-VID

20-84

Delete PBB B-VID

20-86

Allocate PBB B-VID

20-87

Deallocate PBB B-VID

20-88

Implement PBB B-VID

20-89

Deimplement PBB B-VID

20-91

Domain Wide VID distribution

20-93

Ring Association to a B-VID

20-95

Ring Dissociation from B-VID

20-97

Change ERP of a B-VID

20-99

List ERP instances of a B-VID

20-101

Association of Transport Link to B-VID

20-102

Dissociation of Transport Link to B-VID

20-104

....................................................................................................................................................................................................................................
1350 OMS
20-2
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management

Overview

....................................................................................................................................................................................................................................

Ethernet Ring Protection (ERP) Management

20-107

View the ERP ring list

20-108

Description of the list of ERP

20-109

Create/delete ERP Ring

20-110

Implement/deimplement the ERP

20-112

ERP Switch Command

20-113

ERP Switch Command From Port

20-114

Add/remove Transport Link in a Ring

20-115

Add/remove Node in a Ring

20-116

Create/delete ERP Ring bundle

20-117

Add/remove ERP Ring in a bundle

20-118

ERP Instance Management

20-120

View the ERP instance list

20-121

Description of the list of ERP instances

20-122

Create/delete ERP instance

20-123

Implement/deimplement the ERP instance

20-125

Associate OAM to the ERP instance

20-126

Get a graphical view of the ERP instance

20-127

Modify Defined ERP instance

20-129

Modify implemented ERP instance

20-131

PBB Fault Management


PBB Fault Localization and navigation to AS
Workflow for PBB Management

20-133
20-134
20-135

Overview about Workflow

20-135

Create a PBB Domain

20-137

Add NE to a Domain

20-138

Add Transport Link to a Domain

20-139

ERP provisioning

20-141

Configure B-VID

20-143

Create a PBB EVC

20-144

PBB EVC traffic classification

20-153

Traffic Descriptor Definition

20-154

EVC Allocation and Implementation

20-155

In Band Management
Address Configuration of the Network Elements

20-156
20-157

....................................................................................................................................................................................................................................
1350 OMS
20-3
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management

Overview

....................................................................................................................................................................................................................................

Lag Port Creation (Via Zic)

20-165

NMS Start Supervision (NE Not Defined On NMS)

20-183

....................................................................................................................................................................................................................................
1350 OMS
20-4
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge (PBB) Networks

Provider Backbone Bridge Management

....................................................................................................................................................................................................................................

Provider Backbone Bridge (PBB) Networks


Provider Backbone Bridge Management
PBB description

Provider Backbone Bridges (PBB) is a networking standard approved by IEEE as 802.1ah


standard.
Provider Backbone Bridges is a set of architecture and protocols for routing of a customer
network over a provider's network
Provider Backbone Bridges allows interconnection of multiple Provider Bridge Networks
without losing each customer's individually defined VLANs.
Provider Backbone Bridges offers a complete separation of customer and provider
domains.
Objectives of Provider Backbone Bridging

PBB is designed to address limitations of Provider Bridge:

VID-space scalability. A 24-bit field is added to each frame to contain an enlarged


space for customer service identification. 16 M services.

FDB-size scalability. The MAC addresses of all customer equipment that passes
through a core node must be learned and/or looked-up in the FDB. If FDB is full,
addresses cannot be learned, so return traffic is flooded and not unicasted: Bandwidth
inefficiency. A backbone MAC destination and source address pair is added to each
frame for forwarding between PBB Nodes. This header hides the Customer
Destination Address and Customer Source Address fields.

PBB frames

The PBB header may take multiple different forms, but the main components of the
header are:

Backbone component:
Backbone destination address (B-DA) (six bytes).
Backbone source address (B-SA) (six bytes).
EtherType 0x88A8 (two bytes).
B-TAG/B-VID (two bytes), this is the backbone VLAN indicator.
Service encapsulation:
EtherType 0x88E7 (two bytes).
Flags that contain priority, DEI and indication, if there are no customer addresses
present (e.g. OAM frames).
I-SID, the service identifier (three bytes).

....................................................................................................................................................................................................................................
1350 OMS
20-5
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge (PBB) Networks

Provider Backbone Bridge Management

....................................................................................................................................................................................................................................

Original customer frame:


Customer source address (six bytes).

Customer destination address (six bytes).


EtherType 0x8100 (two bytes).
Customer VLAN identifier (two bytes).
EtherType (e.g. 0x0800).
Customer payload.

Bridges learn based on the B-SA and ingress port value and hence is completely unaware
of the customer MAC addresses. I-SID allows to distinguish the services within a PBB
domain.
PBB Services Types

A service is identified by a Backbone Service Instance Identifier (I-SID).


The Service Type is determined by the mapping of Customer Network Port traffic to a
particular I-SID. Service Types (IEEE 802.1ah):

Port based: All untagged and priority tagged frames I-SID. This service type can be
used to connect 802.1Q or 802.1D bridges to a CNP. All S-Tagged frames are
dropped.

S-tagged one-to-one: Frames with a single specific S-VID I-SID.


S-tagged bundled many-to-one: Frames with an S-VID in a specific set of N values
I-SID.
S-tagged bundled all-to-one: Frames with any non-zero S-VID I-SIDcomplement
of Port Based service.

Note: 1350 OMS implementation of some service types is less rigid. For example
Port-based does not necessarily discard all S-tagged frames.
PBB Services Multiplexing

The frames are split in more than one service, each mapped to its own I-SID.
Service Types that are incompatible with Service Multiplexing:

Port Based Service


S-Tagged Service All-to-One

Service Types that can be used with Service Multiplexing

S-Tagged Service 1:1.


S-Tagged Service N:1
Note: A given S-VID can map to only a single I-SID.

Mapping single S-VID to multiple I-SIDs is not allowed:

Can create an unintentional loop in the PBB network.


Loop cannot be guarded by xSTP: PIP-CBP barrier for STPDUs

....................................................................................................................................................................................................................................
1350 OMS
20-6
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge (PBB) Networks

Provider Backbone Bridge Management

....................................................................................................................................................................................................................................

PBB Ethernet Virtual Connection

MEF defines Ethernet Virtual Connection (EVC) services:

EVC: Transparent connection service between a set of UNIs

In a PBB context the UNI is a CNP port

The EVCs have been classified in three Service Types:

E-Line: Point-to-point EVC. Connects 2 UNIs bi-directionally.


E-LAN: Multipoint EVC. Connects more than 2 UNIs bi-directionally.

E-Tree: Rooted-multipoint EVC. Connects at least one Root UNI and at least two
Leaf UNIs bi-directionally, but blocking direct traffic between Leaf UNIs

The following Service Types are supported:

E-Line: Any Port-based or S-tagged service can be supported over E-LINE.


E-LAN: Any Port-based or S-tagged service can be supported over E-LAN.

E-Tree: Not supported within PBB: Requires non-standard additions to PBB toolset.
E-TREE service requires that traffic between Leaves is blocked.
Service Multiplexing: E-LINE and E-LAN services can be multiplexed on same CNP
port. Restriction: S-VID to I-SID mapping constraints.

....................................................................................................................................................................................................................................
1350 OMS
20-7
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge (PBB) Networks

PBB EVC provisioning

....................................................................................................................................................................................................................................

PBB EVC provisioning


PBB EVC provisioning description
Figure 20-1 PBB EVC provisioning

....................................................................................................................................................................................................................................
1350 OMS
20-8
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge (PBB) Networks

PBB EVC provisioning

....................................................................................................................................................................................................................................

The figure shows that the only provisioning needed to implement an EVC over PBB is
the one done at its EVC Terminations (both the one directly related to the EVC
Termination itself and the one related to the association of the I-SID to the B-VID that is
perfomed on the NNIs of the B-VID in the same NE of the EVC Termination).
Ethernet Ring Protocol (ERP) (p. 20-10)
To implement an EVC over PBB, the system only perform provisioning on the NEs that
host EVC Terminations for that EVC.
This is true only if the EVC is not under OAM.
If the EVC is under OAM, things are different.
In general, OAM is possible for the I-SID (to monitor the single EVC) and for the B-VID
(in order to monitor the virtual infrastructure common to more EVCs).
I-SID monitoring, as for the standard, only takes into account the points where the EVC is
provisioned. This means that internal points are not taken into consideration: link trace is
not so meaningful in that case.
The choice done for PKT is a bit different: we choose to monitor only the I-SID (so, no
B-VID monitoring) but, willing to see also the intermediate points in the network, we
provision the I-SID also wherever the B-VID is, so that a link trace, for example, will
report all the NEs crossed by the traffic.
The provisioning of an EVC under OAM requires the distribution of the I-SID to all the
places wherever the B-VID is distributed (for example: to all the NNIs in the network that
are in NEs that do not host any Termination of the monitored EVC). The distribution of
the I-SID is done in addition to any other I-SID distribution.

....................................................................................................................................................................................................................................
1350 OMS
20-9
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge (PBB) Networks

Ethernet Ring Protocol (ERP)

....................................................................................................................................................................................................................................

Ethernet Ring Protocol (ERP)


ERP Objectives

Suitable to operate in the Ethernet transport plane, which implies Connectionless


forwarding Automatic address learning Ageing and flushing mechanisms
Ethernet Ring Protection (Switching) ERP(S) is standardized by ITU-T to establish a
Carrier Class protection switching mechanism in the Ethernet transport plane. Main
objectives:

Protect single ring and more complicated topologies.


Fast: 50 ms traffic restoration time (Compared with multiple seconds for xSTP).
Suitable to operate in the Ethernet transport plane.
Operate in the Ethernet transport plane implies:
Connection less forwarding.
Automatic address learning.
Ageing and flushing mechanisms.

ERP Protocol Tuning

ERP Protocol Tuning parameters explanation:

Switch behavior [Revertive/Not Revertive]: revert or not to the main resource when
failure clears.

Wait Time to Restore [0..12 Minutes in step of 1 minute]: meaningful only in case the
swicthing behavior is revertive, is the time the main resource must be free of failures
before reverting to.
Hold-Off time [0..1000 millisec in step of 10 millisec]: time to wait, after failure
detection, before starting protection in order to see if other protection recovers the
failure
Guard Time [10..2000 millisec in step of 10 millisec]: during guard time RPL owner
discards the received R-APS OAM frames. It s started according to the ERP state
machine specifications (see ERP specifications for more details)

....................................................................................................................................................................................................................................
1350 OMS
20-10
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Network Configuration

Network Configuration

....................................................................................................................................................................................................................................

Network Configuration
Network Configuration
PBB Introduction

PBB is a type of Bridge domain:


No specific PBB provisioning attributes is necessary. Control protocol is ERP.
Inside PBB domain there are no Provider Bridge NEs. Control protocol is based on ERP
only. In theory there could be a mix of xSTP (Spanning Tree Protocol) and ERP.

....................................................................................................................................................................................................................................
1350 OMS
20-11
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Network Configuration

PBB Domain Create

....................................................................................................................................................................................................................................

PBB Domain Create


When to use

The scope of this procedure is to create a PBB Domain. In Connection Less Networks,
the Domain represents an homogeneous set of Network Elements dedicated to MAC,
Virtual Provider or Provider Backbone Bridging.
Related Information

A Domain is a distributed infrastructure made of NE, External-Network (aka virtual NE),


Transport Links and Edge Ports managed together to supply a Connection Less
infrastructure.
Its main properties are the domain type (ETS, Bridge, T-MPLS), bridge type (MAC,
Virtual, Provider or Provider Backbone Bridge) and the Control Plane Type (ERP, STP,
RSTP, PVSTP, MSTP or none)
The list of possible Control protocols depends on the selected Bridge Type.
In case of PBB the only possible choice for Control Protocol is ERP.
Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Construction > Create Domain.
Figure 20-2 Actions>Packet>Construction>Create Domain

....................................................................................................................................................................................................................................
1350 OMS
20-12
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Network Configuration

PBB Domain Create

....................................................................................................................................................................................................................................

Result: The Create PBB Domain window is displayed.


...................................................................................................................................................................................................

In the Create PBB Domain window enter following data:

User Label : a friendly name identifying the Domain

Domain Type: select the value Bridge

Bridge Type: select the value PBB

Control Protocol Type: select the value ERP

Reserved B-VIDs for ERP: insert a range

Click Apply or OK button to confirm the operation.


Figure 20-3 Create PBB Domain

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-13
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Network Configuration

Define NE

....................................................................................................................................................................................................................................

Define NE
When to use

The scope of this procedure is to assign a Network Element to PBB domain.


Related Information

This procedure applies to all NEs belonging to PBB domain.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

Issue a search of the NEs available following the path Search > Packet > Construction
> Network Elements > Available NEs.
Figure 20-4 Search>Packet>Construction>Network Elements>Available NEs

...................................................................................................................................................................................................

The list of the available NEs is displayed.

....................................................................................................................................................................................................................................
1350 OMS
20-14
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Network Configuration

Define NE

....................................................................................................................................................................................................................................

Select the involved Network Element and follow the path Actions > Define Network
Element from the popup menu.
Figure 20-5 Available NE: Actions>Define Network Element

Result: The Define Network Element window is displayed.


...................................................................................................................................................................................................

Enter or select following data:

User Label: a friendly name for the Network Element to be defined.

Working Mode: select PBB

STP type: select disabled

Click Apply or OK to confirm the operation.


Figure 20-6 Define Network Element dialog box

...................................................................................................................................................................................................

From the main menu bar select Search> Packet > Construction > Network Elements >
Defined NEs.

....................................................................................................................................................................................................................................
1350 OMS
20-15
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Network Configuration

Define NE

....................................................................................................................................................................................................................................

The list of the defined NEs is displayed.


Figure 20-7 Defined NE list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-16
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Provisioning hardware reference

....................................................................................................................................................................................................................................

Provisioning
Provisioning hardware reference
When to use

The scope of this procedure is to give a reference for port create. For more detail refer to
the equipment User Provisioning Guide
Related Information

The involved NEs are defined in PBB domain.


Before you begin

Insert the port terminations in the correct position.


Task
...................................................................................................................................................................................................

Once 1850 TSS is supervised, navigation to the ZIC GUI management application is
allowed selecting the TSS Network Element in the list and from the popup menu Search
> Show Equipment

Access the Show Equipment view of the originating NE.


Figure 20-8 Show Equipment view

....................................................................................................................................................................................................................................
1350 OMS
20-17
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Provisioning hardware reference

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In the Show Equipment, navigate the left-h-side tree and select the termination.
The physical real image is shown in the right-h-side after bar down scrolling.
Figure 20-9 Show Equipment: select the termination

...................................................................................................................................................................................................

Click twice on the termination. In the right-hand box click Save to confirm.
Figure 20-10 Module setting

....................................................................................................................................................................................................................................
1350 OMS
20-18
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Provisioning hardware reference

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Access the Show Equipment view of the terminating NE.


The module setting is the same as above described for the originating NE.
Figure 20-11 Show Equipment view of the terminating NE

...................................................................................................................................................................................................

From the Node list select the node involved in hardware recent change and follow the
path Actions > Physical > Synchronize > Synchronize NE
Figure 20-12 Node: Actions>Physical>Synchronize>Synchronize NE

E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
20-19
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Transport link

....................................................................................................................................................................................................................................

Transport link
Transport link introduction

The transport infrastructure is named Transport Link.


The Transport Link can be supported by:

A TDM path. The link is called Link Over TDM. It carries directly Ethernet
Segments, Tunnels or PWs.
A Tunnel/PW. The link is called Link Over (T-)MPLS. A Link Over TDM or a Link
Over Cable (Martini) carries it.
An Ethernet cable. The link is called Link Over Cable.

A WDM link. The link is called Link Over WDM.

....................................................................................................................................................................................................................................
1350 OMS
20-20
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Create Ethernet Physical Connection

....................................................................................................................................................................................................................................

Create Ethernet Physical Connection


When to use

The scope of this procedure is to create an Ethernet Physical Connection


Related Information

The involved ports have already been provisioned.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

From the map view, select the nodes to connect and follow the path Actions > Physical >
Create Physical Connection
Figure 20-13 Actions>Physical>Create Physical Connection

Result: The Create Physical connection window is displayed.


...................................................................................................................................................................................................

Set the following attributes:

Enter a User Label to identify the transport link.

Select Connection type equal to Ethernet

Choose the Transport Alarm Enabling Rule (On Definition)

Only for TDM, select Implement rule

Only for TDM, select allocation cost

....................................................................................................................................................................................................................................
1350 OMS
20-21
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Create Ethernet Physical Connection

....................................................................................................................................................................................................................................

Click Next button.


Figure 20-14 Create Physical Connection

...................................................................................................................................................................................................

The second step is customized according to the Connection Type selected (here below
Ethernet physical link creation window is shown):
Only NEs with Ethernet Ports are proposed as possible choices to user.

....................................................................................................................................................................................................................................
1350 OMS
20-22
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Create Ethernet Physical Connection

....................................................................................................................................................................................................................................

Only free ports of selected NE and with rate compatible with the link rate are proposed as
possible choices to user.

Select the Physical Connection Rate of Ethernet link

Select the end nodes, if not already selected, click on A-node and Z-node empty box,
then select the node from the selection list.

Select the end ports, by means of the usual selection mechanism.

Figure 20-15 Create> Physical Connection step2

...................................................................................................................................................................................................

Click OK or Apply to confirm the creation.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-23
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Assign Link over Cable to PBB domain

....................................................................................................................................................................................................................................

Assign Link over Cable to PBB domain


When to use

The scope of this procedure is to assign a Link over Cable to PBB domain.
Related Information

The involved ports have already been provisioned.


Before you begin

The Physical connection to assign has been created.


Task
...................................................................................................................................................................................................

From the main menu bar follow the path Search > Packet > Construction > Transport
Links > Links over Cable
Figure 20-16 Search>Packet>Construction>Transport Links>Links over Cable

....................................................................................................................................................................................................................................
1350 OMS
20-24
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Assign Link over Cable to PBB domain

....................................................................................................................................................................................................................................

Result: The Links over Cable list is displayed.


Figure 20-17 Links over Cable list

...................................................................................................................................................................................................

Select the Link over Cable to assign and follow the path Actions > Assign Resources to
Domain
Figure 20-18 Link over Cable: Actions>Assign Resources to Domain

Result: The Assign Resources to Domain window is displayed.


...................................................................................................................................................................................................

Click the selection list icon (right side of the window).


From the list select the relevant PBB domain.

....................................................................................................................................................................................................................................
1350 OMS
20-25
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Assign Link over Cable to PBB domain

....................................................................................................................................................................................................................................

Click Apply or OK to confirm.


Figure 20-19 Assign Resources to Domain

....................................................................................................................................................................................................................................
1350 OMS
20-26
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Assign Link over Cable to PBB domain

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In the Link over Cable list you can verify that the relevant Link over Cable has the
domain attribute accordingly.
Figure 20-20 Link over Cable list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-27
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Assign Link over Cable to PBB domain

....................................................................................................................................................................................................................................

Delete Transport Link


...................................................................................................................................................................................................

Select the Link over Cable to delete in the list and follow the path from the popup menu
Actions > Delete.
Figure 20-21 Link over Cable:Actions>Delete

...................................................................................................................................................................................................

Select the related Physical Connection and follow the path from the popup menu Actions
> Remove.
Figure 20-22 Physical Connection:Actions>Remove

....................................................................................................................................................................................................................................
1350 OMS
20-28
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provisioning

Assign Link over Cable to PBB domain

....................................................................................................................................................................................................................................

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-29
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create ERP Ring

....................................................................................................................................................................................................................................

ERP configuration
Create ERP Ring
When to use

The scope of this procedure is to configure major ring and sub-rings by selecting the links
in the map.
Related Information

This task does not have any related information.


Before you begin

From the physical topology view (physical map) the user configures major ring and
sub-rings by selecting the links in the map.
Task
...................................................................................................................................................................................................

From the main menu bar follow the path Actions > Packet > ERP > Create ERP Ring.
Figure 20-23 Actions>Packet>ERP>Create ERP Ring

...................................................................................................................................................................................................

In the Create ERP window enter or select following data:

ERP User Label


Ring type : select Major or Subring

Activation status [active/not active] : this value is used to enable or disable the ERP
protocol.

....................................................................................................................................................................................................................................
1350 OMS
20-30
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create ERP Ring

....................................................................................................................................................................................................................................

With the usual selection mechanism, select the PBB domain.


Figure 20-24 Create ERP Ring

...................................................................................................................................................................................................

Select the Transport Links to associate to ERP ring. Click the selection icon, the
following list is displayed.
Select all Transport Links.

....................................................................................................................................................................................................................................
1350 OMS
20-31
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create ERP Ring

....................................................................................................................................................................................................................................

Note: The multiple selection is allowed by means of the mouse small wheel.
Figure 20-25 Bridge Transport Links

Click OK to confirm the selection.


...................................................................................................................................................................................................

The selected Transport Links are now displayed in the Create ERP Ring main window.

....................................................................................................................................................................................................................................
1350 OMS
20-32
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create ERP Ring

....................................................................................................................................................................................................................................

Click OK to confirm the creation.


Figure 20-26 Create ERP Ring

....................................................................................................................................................................................................................................
1350 OMS
20-33
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create ERP Ring

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

To verify the successful creation follow the path Search > Packet > ERP > Rings
Figure 20-27 Search>Packet>ERP>Rings

...................................................................................................................................................................................................

The list of the ERP Rings is shown below, containing the ERP ring which has been just
created.
Figure 20-28 List of ERP Rings

....................................................................................................................................................................................................................................
1350 OMS
20-34
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create ERP Ring

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the ring which has just been created and follow the path from the popup menu
Actions > Implement ERP Ring
Figure 20-29 ERP ring: Actions>Implement ERP Ring

...................................................................................................................................................................................................

The ERP Ring has been implemented.


Figure 20-30 ERP Ring implemented

....................................................................................................................................................................................................................................
1350 OMS
20-35
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create ERP Ring

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the ERP Ring you can search the nodes on the ring.
Figure 20-31 ERP Ring:Search>Nodes

...................................................................................................................................................................................................

10

The list of the nodes belonging to the ring is displayed.


Figure 20-32 Nodes belonging to the ring

...................................................................................................................................................................................................

11

From the ERP Ring you can search the physical links belonging to the ring.
Figure 20-33 ERP Ring:Search>Physical Links

....................................................................................................................................................................................................................................
1350 OMS
20-36
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create ERP Ring

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12

The list of the physical connections belonging to the ring is displayed.


Figure 20-34 Physcons belonging to the ring

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-37
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create an ERP Instance

....................................................................................................................................................................................................................................

Create an ERP Instance


When to use

The scope of this procedure is to create an ERP instance.


Related Information

The ERP ring has been configured and implemented.


Before you begin

The ERP ring has been configured and implemented


Task
...................................................................................................................................................................................................

Before creating a new instance, it is opportune to search the existing instances on the
involved ring.
On the same ERP ring many instances can be created, according to the customer traffic
needs.
Select the ERP ring in the list and follow the path on the popup menu Search > ERP
Instances.
Figure 20-35 ERP ring: Search>ERP Instances

...................................................................................................................................................................................................

A search of the ERP instances can be done also fro Show Equipment of an involved NE.

....................................................................................................................................................................................................................................
1350 OMS
20-38
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create an ERP Instance

....................................................................................................................................................................................................................................

Select folder Ethernet Ring protection.


Figure 20-36 Search of the ERP instances

ERP 1 has 2 instances, one per port and one per VLAN.
ERP2 has no instance.
...................................................................................................................................................................................................

The user can display the ERP Instances for a PBB domain.
Select the PBB domain in the domain list and follow the path on the popup menu Search
> ERP Instances.
Figure 20-37 PBB domain:Search>ERP Instances

....................................................................................................................................................................................................................................
1350 OMS
20-39
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create an ERP Instance

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the main menu bar follow the path Actions > Packet > ERP > Create ERP
Instance
Figure 20-38 Actions>Packet>ERP>Create ERP Instance

...................................................................................................................................................................................................

The Create ERP Instance window is displayed.


Folder General is already selected.
Enter instance User Label and select the following attributes:

R-APS VLAN ID Insert a value between 1 and 4093, the value is unique per ring or

group of interconnected rings


R-APS PCP [0..7] this is the priority bits value for R-APS.
Maintenance Entity Level [0..7] this is an integer value indicating the OAM level

assigned to R-APS- ring autoprotection switch.


Scope of ERP instance . You can select per port or per VLAN
PBB domain. Select the target PBB domain.
ERP Ring: the ring to which the instance will be applied.

....................................................................................................................................................................................................................................
1350 OMS
20-40
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create an ERP Instance

....................................................................................................................................................................................................................................

RPL (ring protection link) Owner It is the NE that has the master role on ERP instance
RPL (East/west link that is Blocked by RPL owner in nominal conditions)

Figure 20-39 Create ERP Instance: General

...................................................................................................................................................................................................

Select folder Timers and proceed with Protocol Tuning:

Switch behavior [Revertive/Not Revertive] : revert or not to the main resource


when failure clears
Wait Time to Restore [0..12 Minutes,steps of 1] : meaningful only in case the
swicthing behavior is revertiv. It is the time the main resource must be free of failures
before reverting to.

....................................................................................................................................................................................................................................
1350 OMS
20-41
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create an ERP Instance

....................................................................................................................................................................................................................................

Hold-Off time [0..1000 millisec, steps of 10]: time to wait, after failure detection,
before starting protection in order to see if other protection recovers the failure.
Guard Time [10..2000 millisec, steps of 10] : during guard time RPL owner discards
the received R-APS OAM frames. It is started according to the ERP status state.

Figure 20-40 Create ERP Instance: Timers

...................................................................................................................................................................................................

Select folder Failures


Optional Alarms that can be included/excluded in the list of Switch Criteria:

Signal Degrade
Partial Loss of Capacity (if ring ports are LAG)
Loss Of Continuity (CCM) defect
Link OAM Critical Events

....................................................................................................................................................................................................................................
1350 OMS
20-42
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create an ERP Instance

....................................................................................................................................................................................................................................

Note: If Loss of Continuity defect or Link OAM Critical Events are used as Switch
Criteria it is necessary to assign Down MEPs to Ring Ports (on all the NEs inside the
ring)
Figure 20-41 Create ERP Instance: Failures

....................................................................................................................................................................................................................................
1350 OMS
20-43
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create an ERP Instance

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In the Create ERP Instance wizard, click Apply or OK to confirm the creation.
Figure 20-42 Create ERP Instance

...................................................................................................................................................................................................

Select the ERP Instance and follow the path on the popup menu Actions > Implement
ERP Instance
Figure 20-43 ERP Instance: Actions>Implement ERP Instance

....................................................................................................................................................................................................................................
1350 OMS
20-44
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP configuration

Create an ERP Instance

....................................................................................................................................................................................................................................

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-45
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Backbone VLAN ID

B-VID configuration

....................................................................................................................................................................................................................................

Backbone VLAN ID
B-VID configuration
When to use

The scope of this procedure is to define a B-VID in a PBB domain and to associate it to
the ERP instance:
The B-VID is the VLAN.
Related Information

The related descriptions are contained in the previous procedures.


Before you begin

The configuration of NEs, Transport Links, ERP ring, ERP Instance has been previously
completed with success.
Task
...................................................................................................................................................................................................

From the main menu bar follow the path Actions > Packet > Services >
ConnectionLess(Bridge) > Create B-VID
Figure 20-44 Actions>Packet>Services>ConnectionLess(Bridge)>Create B-VID

...................................................................................................................................................................................................

In the B-VID creation wizard window enter or select following data:

User Label. Enter the userlabel to identify the B-VID.

Domain. Select the domain.

....................................................................................................................................................................................................................................
1350 OMS
20-46
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Backbone VLAN ID

B-VID configuration

....................................................................................................................................................................................................................................

VLAN ID. Select a unique number.

VLAN distribution
You can select:
Manual. In this case the user will specify all relevant Transports Links.
Domain Wide. In this case the VLAN is distributed over all Transport Links of all
rings belonging to the Domain.
Select Manual.

Click ERP. Select the ERP ring to which the B-VID is to be assigned.
Select the ERP instance. The selected ERP instance is now contained in the bottom box.
Figure 20-45 Create B-VID wizard step1

...................................................................................................................................................................................................

Click Transport Links.

....................................................................................................................................................................................................................................
1350 OMS
20-47
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Backbone VLAN ID

B-VID configuration

....................................................................................................................................................................................................................................

Select the Transport/s to which the B-VID is assigned


Figure 20-46 B-VID:Transport Links selection

....................................................................................................................................................................................................................................
1350 OMS
20-48
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Backbone VLAN ID

B-VID configuration

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

After selecting all ERP and Transport Links, click Apply or OK to confirm the creation.
Figure 20-47 Create B-VID

...................................................................................................................................................................................................

To verify the successful creation, from the main menu bar follow the path Search >
Packet > Services > Connection Less(Bridge) > B-VIDs
...................................................................................................................................................................................................

The B-VID list is displayed, containing the B-VID which has been just created (status =
defined).

....................................................................................................................................................................................................................................
1350 OMS
20-49
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Backbone VLAN ID

B-VID configuration

....................................................................................................................................................................................................................................

Select the B-VID which has been just created and follow the path from the popup menu
Actions > Allocate.
Figure 20-48 B-VID list

...................................................................................................................................................................................................

The B-VID Provisioning State changes to allocated.


Select the B-VID from the list and follow the path from the popup menu Actions >
Implement..
Figure 20-49 B-VID: Actions>Implement

....................................................................................................................................................................................................................................
1350 OMS
20-50
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Backbone VLAN ID

B-VID configuration

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The B-VID Provisioning State changes to implemented passing thorough intermediate


status partially implemented.
Figure 20-50 B-VID partially implemented (few secs)

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-51
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


EVC-EVPLAN Service in PBB/ERP

Additional Info on PBB/ERP Service

....................................................................................................................................................................................................................................

EVC-EVPLAN Service in PBB/ERP


Additional Info on PBB/ERP Service
When to use

The scope of this procedure is to define Additional Info on PM, QoS and Managing
Traffic Descriptor.
Related Information

Refer toPBB Ethernet Virtual Connection (p. 20-7)


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Additional Info on PM
...................................................................................................................................................................................................

MEG (maint-entity-grp) is characterized by:

MEG Identifier: made by a Format and a Name. Format can be (to be confirmed by
NE which will be implemented).

String
Dns-Like Name
MAC Address
integer
Associated Maintenance Domain

MIP creation policy [none, All points, Lower-level MEP exists]: which policy is used
inside MEG for MIP Creation. Default is inherited from Maintenance Domain. See
next step.
CC Interval [1 sec(Default), 10 sec, 1 min, 10 min] (interval between CCM PDUs)
CC Priority [0..7]( Class-of-Service to be used for CCM PDU).
The Monitored Resource is automatically determined by NMS from domain type: in
case of PBB.

S-VLAN in case of Provider Bridge.


C-VLAN in case of Virtual Bridge.

....................................................................................................................................................................................................................................
1350 OMS
20-52
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


EVC-EVPLAN Service in PBB/ERP

Additional Info on PBB/ERP Service

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

MIP creation policy can be illustrated by an example:

MEG#1, MEG#2, MEG#3 all refers to a given EVC.

MEG#3 is created with none, so no MIPs are created.


MEG#2 is created with All points, so MIPs are created in all the points (ports)
where the EVC is passing through.
MEG#1 is created with Lower-level MEP exists, so MIPs are present only where
MEP of MEG#2 and MEG#3 are present.

Figure 20-51 MIP creation policy

...................................................................................................................................................................................................

For each EVC termination the user defines the traffic classification rules by associating a
Traffic Classifier and QoS attributes.
Traffic Classifier allows to specify classification rules based on:

VLAN (single or range)

Priority bit (single or range)


IP DSCP (single or range)
Payload type

QoS attributes are: Policing mode [color blind, color aware, none]
Colour profile (applicable if policing mode is color blind or color aware)
CoS and bandwidth profile are specified associating a Traffic Descriptor

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-53
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


EVC-EVPLAN Service in PBB/ERP

Additional Info on PBB/ERP Service

....................................................................................................................................................................................................................................

QoS Managing Traffic Descriptor

The Traffic Descriptor describes the characteristics of an Ethernet segment in term of


Class of Service (CoS) and bandwidth.
...................................................................................................................................................................................................

Another step towards the MEF alignment is provided by possibility to display bandwidth
parameters following both IETF definitions (as already available) and MEF definitions.
For reminder, the following definitions are applicable for IETF: CIR, PIR, PBS, CBS
while the following one are applicable for MEF: CIR, EIR, CBS, EBS.
The existing relationships are described as in the following:

EIR = PIR CIR.


EBS = PBS CBS.

Figure 20-52 Traffic Descriptor create step1

...................................................................................................................................................................................................

The range of the supported classes of service (CoS, also named forwarding classes) is
extended from the basic set (best effort, regulated and guaranteed) to the enhanced set
(best effort and background, four types of regulated, two types of guaranteed).

....................................................................................................................................................................................................................................
1350 OMS
20-54
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


EVC-EVPLAN Service in PBB/ERP

Additional Info on PBB/ERP Service

....................................................................................................................................................................................................................................

The frame association to a CoS is performed at the ingress port.


Differentiated quality of service (QoS) management is implemented mapping each CoS to
a specific output queue at the egress port.
Color management allows also frame prioritization within a given forwarding class.
The frame per hop behavior (PHB) is therefore implemented by CoS and color
management.
Figure 20-53 Traffic Descriptor create step2

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-55
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


PBB EVC Termination Management

Add PBB EVC Termination

....................................................................................................................................................................................................................................

PBB EVC Termination Management


Add PBB EVC Termination
When to use

This function consists in adding terminations to a implemented PBB EVC.


Related Information

For information about PBB EVC, Refer to


PBB Ethernet Virtual Connection (p. 20-7)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the Bridge EVC list select the EVC to which a termination must be added and
follow the path on the popup menu Search > EVC Termination..
The list of the terminations is displayed.
Figure 20-54 EVC Termination list

....................................................................................................................................................................................................................................
1350 OMS
20-56
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


PBB EVC Termination Management

Add PBB EVC Termination

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the Bridge EVC list select the EVC to which a termination must be added and
follow the path on the popup menu Actions > Add Connection Less EVC Termination..
Figure 20-55 Actions> Add Connection Less EVC Termination

...................................................................................................................................................................................................

In the Add Connection Less EVC Termination window the EVC is already selected.

....................................................................................................................................................................................................................................
1350 OMS
20-57
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


PBB EVC Termination Management

Add PBB EVC Termination

....................................................................................................................................................................................................................................

By means of the usual selection mechanism select the Network Element and the Edge
Port to add.
Figure 20-56 Add Connection Less EVC Termination dialog box

Click OK/Apply to confirm.


...................................................................................................................................................................................................

To verify that the new termination has been added successfully, refresh the EVC
Terminations list. The new termination is displayed.
Figure 20-57 The new termination has been added

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-58
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


PBB EVC Termination Management

Remove PBB EVC Termination

....................................................................................................................................................................................................................................

Remove PBB EVC Termination


When to use

This function consists in removing terminations to a implemented PBB EVC.


Related Information

For information about PBB EVC, Refer toPBB Ethernet Virtual Connection (p. 20-7)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the EVC Termination list select the termination to remove and issue the pop-up
menu Actions> Delete.
...................................................................................................................................................................................................

A confirmation box is presented. Click OK to confirm the delete operation.


Result: The termination is removed and no longer present.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-59
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Overview

....................................................................................................................................................................................................................................

Provider Backbone Bridge EVC Management


Overview
Purpose

This section describes how to manage Provider Backbone Bridge EVC.


Contents
View the PBB EVC list

20-61

Description of the list of PBB EVCs

20-62

Create PBB EVC

20-63

Allocate PBB EVC

20-65

Deallocate PBB EVC

20-67

Implement PBB EVC

20-68

Deimplement PBB EVC

20-70

Add Termination on implemented PBB EVC

20-71

Remove Termination on implemented EVC

20-72

Configure PBB EVC

20-73

Bridge Flows of PBB EVC

20-74

PBB EVC Broadcast Domain Containment

20-76

Enable Broadcast Domain Containment

20-77

Disable Broadcast Domain Containment

20-78

Automatic association UNI port - default VT

20-79

Manual association UNI port - user VT

20-80

Configuration of the DEI bit

20-81

....................................................................................................................................................................................................................................
1350 OMS
20-60
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

View the PBB EVC list

....................................................................................................................................................................................................................................

View the PBB EVC list


When to use

The PBB Ethernet Virtual Connection List window presents all the PBB EVCs and their
attributes.
Related Information

For information about PBB EVC, Refer to


PBB Ethernet Virtual Connection (p. 20-7)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Connection Less (Bridge) > Bridge EVCs.


Result: The list window is displayed.

See the following topic in this document: Description of the list of PBB EVCs
(p. 20-62)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-61
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Description of the list of PBB EVCs

....................................................................................................................................................................................................................................

Description of the list of PBB EVCs


Attributes of a PBB EVC

The attributes displayed for each EVC are:

User Label.

Ethernet Service User Label.

Topology (Point to point, Routed multi-point, Any to any).

Service Type.(EVPL, EPL, EVPLAN, Broadcast).

Traffic Type (Unicast, Multicast).

Domain Type.(Backbone)

Working State (Normal, Configuring, Allocating, De-allocating, Implementing,


De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, removing).

Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,


Implemented, Commissioned).

Service State.(In Service, Not In service)

Availability Status (Normal, Degraded, In Failure, Not Meaningful).

B-VID

Broadcast Domain Containment (Enabled, Disabled)

....................................................................................................................................................................................................................................
1350 OMS
20-62
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Create PBB EVC

....................................................................................................................................................................................................................................

Create PBB EVC


When to use

The function creates a PBB Ethernet Virtual Connection.


Related Information

The user specifies the characteristics of the EVC (userlabel, type, terminations, flows,
etc.) and, in addition:

I-VID
I-SID
Broadcast Domain Containment. (Enabled, Disabled). Refer to PBB EVC Broadcast
Domain Containment (p. 20-76)

The specified B-VID must:

exist;

be in the Domain specified for the EVC;


have been created by the operator (B-VIDs created by ERP BB are not allowed).

The I-SID must not have been already used by another EVC in the same Domain.
The allowed values for the Resource Sharing attribute are FULL or PRIVATE UNI.
The allowed types for a PBB EVC are:

EPL

EVPL

EPLAN

EVPLAN

BROADCAST

If the specified B-VID has a non empty I-SID Bundle, the I-SID specified for the EVC
must be within that bundle.
The creation of the EVC is similar to the creation of PB EVC, except for the fact that the
association between the EVC, I-SID and B-VID is stored.
For information about PBB EVC, Refer toPBB Ethernet Virtual Connection (p. 20-7).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS
20-63
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Create PBB EVC

....................................................................................................................................................................................................................................

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Action > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Connection Less (Bridge) > Create PBB EVC. See workflow Create a PBB EVC
(p. 20-144)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-64
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Allocate PBB EVC

....................................................................................................................................................................................................................................

Allocate PBB EVC


When to use

To allocate a PBB EVC


Related Information

The allocation of a PBB EVC is possible only if the B-VID is at least allocated and is
rejected in all other cases (i.e. when the B-VID is defined).
In no case, a PBB EVC can have an EVC Termination on one NE that is not embraced by
it's B-VID (either through a TL or through a ring). In other words: if no TL or ring
associated to a B-VID reaches/crosses a NE, the latter can't host any EVC Termination
served by that B-VID.
Since no private use of Transport Links is allowed (Resource Sharing only admitted
values are FULL and PRIVATE UNI), no check on Transport Links sharing is performed.
The allocation, that for the most part (EVC Terminations and Flows) is identical to the
one of a PB EVC, specifically concerns:

the allocation of the association between each Port supporting an EVC Termination
and the I-SID

the allocation of the association between the B-VID, the I-SID and all the NNIs,
belonging to NEs where there are EVC Terminations, associated to the B-VID of the
EVC;
for each flow, the allocation of a cross connection that has, as a server at one side, the
I-SID;
if the EVC is under OAM, the I-SID has to be distributed also in all the places where
the B-VID is.

For information, Refer toPBB Ethernet Virtual Connection (p. 20-7).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.

....................................................................................................................................................................................................................................
1350 OMS
20-65
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Allocate PBB EVC

....................................................................................................................................................................................................................................

Result: The Bridge EVC list window is displayed.


...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > Bridge EVC > Allocate.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The EVC is allocated.

The Provisioning State is changed to Allocated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-66
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Deallocate PBB EVC

....................................................................................................................................................................................................................................

Deallocate PBB EVC


When to use

To deallocate PBB EVC.


Related Information

The deallocation, that for the most part (EVC Terminations and Flows) is identical to the
one of a PB EVC, specifically concerns:

the deallocation of the associations between the Ports of the EVC Terminations and
the I-SID;
the deallocation of the associations between the B-VID, the I-SID and the NNIs
associated to the B-VID of the EVC;
if the EVC is under OAM, its I-SID has to be un-distributed also in all the places
where the B-VID has been.

For information, Refer toPBB Ethernet Virtual Connection (p. 20-7).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > Bridge EVC > Deallocate.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The EVC is deallocated.

The Provisioning State is changed to Defined.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-67
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Implement PBB EVC

....................................................................................................................................................................................................................................

Implement PBB EVC


When to use

To implement PBB EVC.


Related Information

The implementation of a PBB EVC is possible only if the B-VID is implemented and is
rejected in all other cases (included partially implemented B-VID).
The implementation, that for the most part (EVC Terminations and Flows) is identical to
the one of a PB EVC, specifically concerns:

the implementation of the association between each Port supporting an EVC


Termination and the I-SID (opticsIMPbbInstanceTable);
the implementation of the association between the B-VID, the I-SID and all the NNIs,
belonging to NEs where there are EVC Terminations, associated to the B-VID of the
EVC (opticsIMPbbInstanceTable);
for each flow, the implementation of a cross connection that has as a server at one side
the I-SID (i.e. opticsIMETSInFlowServiceType = PBB and opticsIMETSInFlowServiceID = index of row of opticsIMPbbInstanceTable for the I-SID, for either
opticsIMETSInFlowTable or opticsIMETSOutFlowTable);
if the EVC is under OAM, the I-SID has to be distributed also in all the places where
the B-VID is.

For information:
Refer toPBB Ethernet Virtual Connection (p. 20-7).
Refer to PBB EVC provisioning (p. 20-8).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > Bridge EVC > Implement.

....................................................................................................................................................................................................................................
1350 OMS
20-68
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Implement PBB EVC

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The EVC is implemented.

The Provisioning State is changed to Implemented.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-69
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Deimplement PBB EVC

....................................................................................................................................................................................................................................

Deimplement PBB EVC


When to use

To deimplement PBB EVC.


Related Information

The deimplementation, that for the most part (EVC Terminations and Flows) is identical
to the one of a PB EVC, specifically concerns:

the deimplementation of the association between each Port supporting an EVC


Termination and the I-SID (opticsIMPbbInstanceTable);
the deimplementation of the association between the B-VID, the I-SID and all the
NNIs, belonging to NEs where there are EVC Terminations, associated to the B-VID
of the EVC (opticsIMPbbInstanceTable);
if the EVC is under OAM, its I-SID has to be un-distributed also in all the places
where the B-VID has been.

For information, Refer toPBB Ethernet Virtual Connection (p. 20-7).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > Bridge EVC > deimplement.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The EVC is deimplemented.

The Provisioning State is changed to Allocated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-70
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Add Termination on implemented PBB EVC

....................................................................................................................................................................................................................................

Add Termination on implemented PBB EVC


When to use

This function consists in adding terminations to a implemented PBB EVC.


Related Information

Termination addition means I-SID distribution.


In no case an EVC Termination can be added on a NE that is not used by the EVC's
B-VID. In particular:

implementation of the association between the Termination's Port supporting and the
I-SID (opticsIMPbbInstanceTable);
(only if does not exist an implemented Termination of the same EVC in the same NE)
implementation of the association between the B-VID, the I-SID and all the NNIs,
belonging to the Termination's NE, associated to the B-VID of the EVC
(opticsIMPbbInstanceTable).

For information, Refer toPBB Ethernet Virtual Connection (p. 20-7).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select the EVC in the list where the termination must be added.
...................................................................................................................................................................................................

Select the path Action > Bridge EVC > Add Connection Less EVC Termination.
Result: The Add Termination window is displayed.
...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-71
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Remove Termination on implemented EVC

....................................................................................................................................................................................................................................

Remove Termination on implemented EVC


When to use

This function consists in removing terminations to an implemented PBB EVC.


Related Information

Termination removal means undo of I-SID distribution.


In no case an EVC Termination can be added on a NE that is not used by the EVC's
B-VID. In particular:

deimplementation of the association between the Termination's Port supporting and


the I-SID (opticsIMPbbInstanceTable);
(only if this is the last implemented Termination of the same EVC in the same NE)
deimplementation of the association between the B-VID, the I-SID and all the NNIs,
belonging to the Termination's NE, associated to the B-VID of the EVC
(opticsIMPbbInstanceTable).

For information about PBB EVC, Refer toPBB Ethernet Virtual Connection (p. 20-7).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select the EVC in the list where the termination must be removed.
...................................................................................................................................................................................................

Select the path Action > Bridge EVC > Remove Connection Less EVC Termination.
...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-72
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Configure PBB EVC

....................................................................................................................................................................................................................................

Configure PBB EVC


When to use

This function changes attributes of PBB EVC.


Related Information

For information, Refer toPBB Ethernet Virtual Connection (p. 20-7).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select the PBB EVC in the list .


...................................................................................................................................................................................................

Select the path Action > Bridge EVC > Configure PBB EVC.
Result: The Configuration window is displayed. The user can change:

EVC.
Traffic descriptor.

...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-73
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Bridge Flows of PBB EVC

....................................................................................................................................................................................................................................

Bridge Flows of PBB EVC


When to use

This function shows bridge flows of a PBB EVC.


Related Information

For information, Refer toPBB Ethernet Virtual Connection (p. 20-7).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select the PBB EVC in the list .


...................................................................................................................................................................................................

Select the path Action > Bridge EVC > Bridge Flows.
Result: The List Bridge Flow is displayed.

EVC
Bridge Ingress Flows
Id
Network Element
Edge Port

Policy Mode
Traffic Descriptor
Color Profile

VLAN Pop
Classification
Bridge Egress Flows

Id
Network Element
Edge Port

....................................................................................................................................................................................................................................
1350 OMS
20-74
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Bridge Flows of PBB EVC

....................................................................................................................................................................................................................................

Class Of Service
VLAN Id

Priority Mode
Green Priority
Yellow Priority

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-75
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

PBB EVC Broadcast Domain Containment

....................................................................................................................................................................................................................................

PBB EVC Broadcast Domain Containment


Definition

Broadcast domain containment is implemented through the provisioning of I-SID


instances also in intermediate nodes.
Algorithm to determine the involved NEs and ports in a broadcast domain containment
for an EVC:

get all the EVC Terminations and determine the paths between each pair of them (in
other words: given a pair of EVC Terminations, determine a path between them
(inside the involved B-VID, of course), in terms of the rings and/or single TLs that
must be crossed to reach one from the other);
enrich the set of rings and TLs, determined at the previous step, by adding all the
main rings for any sub-ring that is already included in the set;
take all the NEs of the rings and TLs of the set and provision the I-SID there (if not
yet provisioned because of an EVC Termination) associating to it the NNI ports of the
involved B-VID in that NE that are linked to another NE of the set.

Broadcast domain containment provisioning is alternative to I-SID for OAM


provisioning: if broadcast domain containment is enabled no I-SID for OAM is
provisioned.

....................................................................................................................................................................................................................................
1350 OMS
20-76
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Enable Broadcast Domain Containment

....................................................................................................................................................................................................................................

Enable Broadcast Domain Containment


When to use

This function activates the broadcast domain containment on an EVC , regardless of EVC
Provisioning State.
Related Information

The operator may enable the broadcast domain containment on an EVC by simply
invoking the modify (in case of defined or allocated EVC) or the configure (in all other
cases) of the EVC.
Within the form of modify/configure the operator is able to change the Broadcast Domain
Containment attribute from "Disabled" to "Enabled".
If the EVC is in defined or allocated state, the impacts are only within the PKT (i.e. DB).
If the EVC is in implemented state, the impacts are both on DB and on the involved NEs.
Refer toPBB EVC Broadcast Domain Containment (p. 20-76).
If the EVC is under OAM, the I-SID modifications/provisioning for broadcast domain
containment replace the ones existing for OAM.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select The EVC in the list


...................................................................................................................................................................................................

Select the path Action > Bridge EVC> Modify.


...................................................................................................................................................................................................

Select the tab Details and set Enable Broadcast Domain Containment to Enabled.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-77
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Disable Broadcast Domain Containment

....................................................................................................................................................................................................................................

Disable Broadcast Domain Containment


When to use

This function deactivates the broadcast domain containment on an EVC , regardless of


EVC Provisioning State.
Related Information

The operator may disable the broadcast domain containment on an EVC by simply
invoking the modify (in case of defined or allocated EVC) or the configure (in all other
cases) of the EVC.
Within the form of modify/configure the operator is able to change the Broadcast Domain
Containment attribute from "Enabled" to "Disabled".
If the EVC is in defined or allocated state, the impacts are only within the PKT (i.e. DB).
If the EVC is in implemented state, the impacts are both on DB and on the involved NEs.
Refer to PBB EVC Broadcast Domain Containment (p. 20-76).
If the EVC is under OAM, the I-SID situation on DB/NE is restored as if on the EVC was
just put under OAM. This is needed since previous broadcast domain containment
enabling could have removed some of the I-SID instances on some NE and modified
other ones.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select The EVC in the list


...................................................................................................................................................................................................

Select the path Action > Bridge EVC> Modify.


...................................................................................................................................................................................................

Select the tab Details and set Enable Broadcast Domain Containment to Disabled.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-78
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Automatic association UNI port - default VT

....................................................................................................................................................................................................................................

Automatic association UNI port - default VT


Automatic association of the default VT to an EVC Termination

At EVC definition time, by default, the EVC termination is associated to the default VT,
only for those cards that support VT management.
The operator can specify at EVC definition time or modify at EVC configuration time,
the reserved bandwidth (ISID-CIR/ISID-PIR) associated to a given EVC termination.
If the reserved bandwidth (ISID-CIR/ISID-PIR) has been not specified by operator at
EVC definition time, then the system assumes:

ISID-CIR = 0

ISID-PIR = VT-PR

At allocation time, each egress I-SID is automatically associated to the default VT of the
ETS-P UNI interface.
When a PBB EVC is allocated, the reserved VT-CR of the default VT is automatically
increased by an amount equal to: ISID-CIR
The reserved VT-PR of the default VT is automatically updated to take into account the
contribution of: ISID-PIR
For the default VT, VT-CR, VT-Reserved-CR, VT-PR and VT-Reserved-PR are
automatically computed according to ANY aggregation criterion in Table 2 of PKT 9.1
QOS Management Technical Functional Specification.

....................................................................................................................................................................................................................................
1350 OMS
20-79
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Manual association UNI port - user VT

....................................................................................................................................................................................................................................

Manual association UNI port - user VT


Manual association of the user VT to an EVC Termination

The operator is allowed to manually define (during EVC definition) or modify (during
EVC configuration) the association between the I-SID and the VT at the ETS-P UNI (i.e.
the association between an EVC Termination and a VT).
The operator has to specify at EVC definition time and can modify at EVC configuration
time, the reserved bandwidth (ISID-CIR/ISID-PIR) associated to a given EVC
termination. By default, the system assumes that:

ISID-CIR = 0

ISID-PIR = VT-PR

The system checks that the required bandwidth is available on the user VT.
When a PBB EVC is allocated, the reserved VT-CR of the user VT is automatically
increased by an amount equal to:

ISID-CIR

The reserved VT-PR of the user VT is automatically updated to take into account the
contribution of:

ISID-PIR

For the user VT, VT-Reserved-CR and VT-Reserved-PR are automatically computed
according to the following parameters checks:

VT-CR >= VT-Reserved-CR = Fixed-VT ISID-CIRi , over all ISID using the VT.

VT-PR>= VT-Reserved-PR = Max (ISID-PIRi) , over all ISID using the VT.

....................................................................................................................................................................................................................................
1350 OMS
20-80
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Provider Backbone Bridge EVC Management

Configuration of the DEI bit

....................................................................................................................................................................................................................................

Configuration of the DEI bit


Configuration of the DEI bit support on PBB NNI ports

The operator specifies a PBB NNI port (PNP client type) and tells whether he wants to
activate or deactivate the DEI bit support.
The system configures the port accordingly.
Activating the DEI bit support means that from that port will be possible to manage 8
CoS each with two colors (green and yellow), thus giving a different meaning to the PCP
attribute on the same port: 8P0D means, in fact, 8P8D.
Activating the DEI bit is meaningful (and useful) only for PCP = 8P0D .

....................................................................................................................................................................................................................................
1350 OMS
20-81
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Overview

....................................................................................................................................................................................................................................

B-VID Management
Overview
Purpose

This section describes how to manage B-VID.


Contents
View the B-VID list

20-83

Create PBB B-VID

20-84

Delete PBB B-VID

20-86

Allocate PBB B-VID

20-87

Deallocate PBB B-VID

20-88

Implement PBB B-VID

20-89

Deimplement PBB B-VID

20-91

Domain Wide VID distribution

20-93

Ring Association to a B-VID

20-95

Ring Dissociation from B-VID

20-97

Change ERP of a B-VID

20-99

List ERP instances of a B-VID

20-101

Association of Transport Link to B-VID

20-102

Dissociation of Transport Link to B-VID

20-104

....................................................................................................................................................................................................................................
1350 OMS
20-82
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

View the B-VID list

....................................................................................................................................................................................................................................

View the B-VID list


When to use

The PBB B-VID List window presents all the B-VIDand their attributes.
Related Information

For information about PBB EVC, Refer toPBB Ethernet Virtual Connection (p. 20-7).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Connection Less (Bridge) > B-VIDs.


Result: The list window is displayed.

The attributes displayed for each B-VID are:


User Label.
Domain (must be a PBB Domain).
VLAN Id

Provisioning state.(Defined, Allocated, Partially implemented, Implemented, )


Availability State(Normal)

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-83
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Create PBB B-VID

....................................................................................................................................................................................................................................

Create PBB B-VID


When to use

The function creates a PBB B-VID. B-VID is used as an infrastructure for EVCs.
Related Information

About the parameters:

Domain must be PBB Domain.

I-SID spcify the bundle of I-SIDs allowed to be supported by this B-VID. An empty

set means no restrictions apply.


VLAN ID must not be already assigned to another B-VID in the Domain.
Specified VID must be:
If the request is from ERP BB: specified VID must be in the R-APS B-VID
VLAN Bundle of the Domain.
If the request is not from ERP BB: specified VID must not be in the R-APS
B-VID VLAN Bundle of the Domain.
VLAN Distribution is Manual means the Rings and the Transport Links to be
associated to the B-VID must be explicitly chosen by the operator. Optionally the
operator can choose the ERP instance of each chosen Ring to be associated to the
B-VID. For each chosen Ring for which no ERP instance has been specified the
per-Port ERP instance is automatically chosen. If no ERP instance is specified for a
ring and that ring has no per-Port ERP instance, the creation of the B-VID fails and a
detailed error is reported to the operator.
If VLAN distribution is Manual, the user specify:
a subset of the Rings of the Domain and for each Ring, optionally, the ERP
instance to be used;
a subset of the Transport Links of the Domain that do not already belong to a Ring
VLAN Distribution is Domain Wide means that, once created, the B-VID will have all
the Rings and the Transport Links of the Domain associated to it. In this case the
per-Port ERP of each chosen ring is automatically associated to the B-VID. If no
per-Port ERP exists for at least one ring of the Domain, the creation of the B-VID
fails and a detailed error is reported to the operator.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS
20-84
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Create PBB B-VID

....................................................................................................................................................................................................................................

Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Action > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

Select Connection Less (Bridge) > Create B-VID.


...................................................................................................................................................................................................

Enter the following parameters:

Enter a Userlabel.

Select a Domain from list. Must be aPBB Domain.

Enter VLAN ID. (A value from 1 to 4094, a unique value in the Domain).

VLAN distribution. (Manual, Domain Wide)

Click ERP and select one or more rings from list.

For each ring, select one or more ERP instances from list.

Click Transport link and select one or more Transport links from list.

...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-85
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Delete PBB B-VID

....................................................................................................................................................................................................................................

Delete PBB B-VID


When to use

The function deletes a PBB B-VID. B-VID is used as an infrastructure for EVCs.
Related Information

A B-VID can only be deleted when is in Defined state and does not support any EVC.
A B-VID created by ERP BB can only be deleted by ERP BB.
A B-VID created by the USM can only be deleted by the USM.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Delete.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-86
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Allocate PBB B-VID

....................................................................................................................................................................................................................................

Allocate PBB B-VID


When to use

The function allocates resources for a PBB B-VID.


Related Information

This phase consists in the creation, on DB, of the VLAN Distribution information (for
each NE on which terminates/passes a TL/Ring associated to the B-VID).
A B-VID created by ERP BB can only be allocated by ERP BB.
A B-VID created by the USM can only be allocated by the USM.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Allocate.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-87
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Deallocate PBB B-VID

....................................................................................................................................................................................................................................

Deallocate PBB B-VID


When to use

The function de-allocates resources for a PBB B-VID.


Related Information

This phase consists in the removal of the DB objects created during the allocation .
A B-VID can't be de-allocated if it supports one or more EVCs that are allocated: all the
EVCs supported by a B-VID (if any) must be all in defined state in order for the B-VID to
be deallocated.
A B-VID created by ERP BB can only be de-allocated by ERP BB.
A B-VID created by the USM can only be de-allocated by the USM.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Deallocate.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-88
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Implement PBB B-VID

....................................................................................................................................................................................................................................

Implement PBB B-VID


When to use

The function provisions the elementary objects involved with a PBB B-VID.
Related Information

Provisioning on the involved NEs (i.e. the ones identified during the allocation phase) of
the (in this order):
1. creation of the B-VID instance and of the associations B-VID - Port;
2. associations B-VID - ERP (for any non-per-Port ERP).
Step 1 involves the creation of a row in the opticsIMPbbInstanceTable, in each involved
NE, that contains among the other things the ports to be associated to the B-VID instance
(i.e. the ports, in that NE, belonging to TLs or Rings associated to the B-VID). This
provisioning is requested by EoT to Adaptation.
Step 2 involves the request to ERP BB to perform the association for each involved ERP
(only in case of per-VLAN ERP). Step 2 is not performed for B-VIDs created by ERP BB
(the association, in fact, is provisioned by the ERP BB before invoking the B-VID
implementation; This avoids deadlocks between ERP BB and EoT BB (both being single
threaded processes).
A complete failure on step 1 causes the B-VID to remain in Allocated state.
A partial failure on step 1 or a failure during step 2 causes the B-VID to go in Partially
Implemented state.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Implement.

....................................................................................................................................................................................................................................
1350 OMS
20-89
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Implement PBB B-VID

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-90
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Deimplement PBB B-VID

....................................................................................................................................................................................................................................

Deimplement PBB B-VID


When to use

The function releses the elementary objects involved with a PBB B-VID.
Related Information

Un-provisioning on the involved NEs (i.e. the ones identified during the allocation phase)
of the objects provisioned during the implementation with the same interactions of EoT
with other BBs.
This means:
1. removal of associations B-VID - ERP (for any non-per-Port ERP), requested to ERP
BB by EoT BB;
2. removal of the B-VID instance (with automatic removal of B-VID - Port associations)
performed by Adaption on behalf of EoT.
Step 1 is not performed for B-VIDs created by ERP BB (the association, in fact, is
un-provisioned by the ERP BB after invoking the B-VID de-implementation; This avoids
deadlocks between ERP BB and EoT BB (both being single threaded processes).
A complete failure on step 1 causes the B-VID to remain in Implemented state.
A partial failure on step 1 or a failure during step 2 causes the B-VID to go in Partially
Implemented state.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Deimplement.

....................................................................................................................................................................................................................................
1350 OMS
20-91
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Deimplement PBB B-VID

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-92
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Domain Wide VID distribution

....................................................................................................................................................................................................................................

Domain Wide VID distribution


When to use

The function associates all the Rings and Transport Links of a Domain to a B-VID.
Related Information

This procedure applies to any provisioning state.


Defined case

This procedure applies when the operator requires an existing B-VID in Defined state to
be Domain-Wide distributed.
This operation causes the B-VID to be associated to all the Rings and TLs of the Domain,
as if it was been created with VLAN Distribution = "Domain Wide".
Allocated case

This procedure applies when the operator requires an existing B-VID in Allocated or
Partially Implemented state (in any case, no provisioning is performed) to be
Domain-Wide distributed.
This operation causes the B-VID to be associated to all the Rings and TLs of the Domain,
as if it was created with VLAN Distribution = "Domain Wide" and then immediately
allocated.
This operation could also be seen as an equivalent of a series of ring association
(allocated case) and transport link association (allocated case) in order to associate all TLs
and Rings (only one Ring per Bundle) not associated to the B-VID.
Implemented case

This procedure applies when the operator requires an existing B-VID in Implemented
state to be Domain-Wide distributed.
This operation causes the B-VID to be associated to all the Rings and TLs of the Domain,
as if it was been created with VLAN Distribution = "Domain Wide" and then immediately
allocated and implemented.
This operation could also be seen as an equivalent of a series of ring association
(implemented case) and transport link association (implemented case) in order to
associate all TLs and Rings (only one Ring per Bundle) not associated to the B-VID.
As a result of this operation the B-VID can be either in Implemented (if each TL/Ring
association either failed completely or succeeded) or Partially Implemented (if at least
one TL/Ring association failed half-way) and can be associated to all Rings and TLs of
the Domains or not (in case at least one TL/Ring associated failed completely).
In case of unsuccessful operation the operator is informed of which TLs/Rings where not
associated properly or not associated at all.

....................................................................................................................................................................................................................................
1350 OMS
20-93
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Domain Wide VID distribution

....................................................................................................................................................................................................................................

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Distribute VID domain-wide.
Result: VLAN ID is distributed in the domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-94
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Ring Association to a B-VID

....................................................................................................................................................................................................................................

Ring Association to a B-VID


When to use

The function associates a Ring and an ERP instance to a B-VID.


Related Information

This function applies to any provisioning state.


Defined case

To add a Ring to a B-VID, the operator must specify:

the B-VID
the Ring
an ERP instance on that Ring

For a Ring to be associated to a B-VID, the following must be true:

no other Ring of the same Bundle is already associated to the B-VID (a Ring can't be
associated to a B-VID if another Ring of the same Bundle is already associated to it:
only one ring per bundle can be associate to a B-VID)
B-VID and Ring must belong to the same Domain
B-VID and Ring must not be already associated

If all checks are ok the B-VID is associated to the specified Ring and ERP instance.
Allocated case

This is almost the same case of ring association defined case, in addition the allocation of
the B-VID - Ring association is performed:

allocation on DB of the VLAN Distribution information (for each NE involved, the


two involved Ports are associated to the B-VID)
allocation on DB of the I-SID Distribution information, for each allocated EVC that is
supported by the B-VID:
in case the EVC is not under OAM: the I-SID must be distributed in all the NEs,
of the newly associated ring, that contain at least one EVC Termination
in case the EVC is under OAM: the I-SID must be distributed in all the NEs of the
newly associated ring.

This case applies both to allocated and partially implemented B-VIDs (in any case, no
provisioning is performed).
Implemented case

This is almost the same case of ring association in allocated case, in addition part of the
implementation of the B-VID and of all the implemented EVCs that the former supports
is performed:

for each NE of the Ring in which the B-VID instance has not yet been provisioned:
creation of the B-VID instance and of the associations B-VID - Port
for each NE of the Ring in which the B-VID instance already exists: modification of
the member set of the B-VID instance to include the two ports of the Ring for that NE

....................................................................................................................................................................................................................................
1350 OMS
20-95
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Ring Association to a B-VID

....................................................................................................................................................................................................................................

request to ERP BB to provision the association between the B-VID and the specified
ERP (only in case of per-VLAN ERP);
for each EVC supported by the B-VID:

for each implemented EVC Termination residing on a NE crossed by the Ring:


provisioning of the association Port - B-VID - I-SID, that can either mean creation
of a row in opticsIMPbbInstanceTable (if the row did not existed) or modification
of a row in opticsIMPbbInstanceTable (if the row did existed)

if the EVC is implemented and under OAM: the I-SID of the EVC has to be
provisioned also in all the NEs of the newly added ring that do not contain an
implemented EVC Termination.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Associate/Disassociate Ring.


...................................................................................................................................................................................................

In the Associate/Dissociate window:

Select Select Operation (Associate).

Select B-VID from list.

Select Erp Ring from list.

Select Erp Instance from list.

...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-96
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Ring Dissociation from B-VID

....................................................................................................................................................................................................................................

Ring Dissociation from B-VID


When to use

The function dissociates a Ring from a B-VID.


Related Information

This function applies to any provisioning state.


Defined case

The operator specifies the B-VID and the Ring.


B-VID and Ring must be associated.
PKT dissociates the B-VID and the Ring (together with the associated ERP instance).
Allocated case

This is almost the same case of ring dissociation (defined case); in addition, before the
removal of the B-VID - Ring association, its de-allocation is performed:

de-allocation of the I-SID Distribution information, for each allocated EVC supported
by the B-VID in all the NEs that will no longer belong to the B-VID once the ring is
removed

de-allocation of the VLAN Distribution information (for each NE involved, the two
involved Ports are dissociated from the B-VID).

In no case a ring can be dissociated from a B-VID if this action leaves an EVC of the
B-VID with an EVC Termination on a NE that is no more used by the B-VID.
In other words: if an EVC Termination belonging to the involved B-VID, is on one of the
NEs of the ring, and, on that NE, there are no other Transport Links or rings associated to
the involved B-VID, the latter can't be dissociated from the ring.
Implemented case

This is almost the same case of ring dissociation (allocated case), in addition, before the
de-allocation of the B-VID - Ring association, its de-implementation and the
de-implementation of the involved part of implemented and partially implemented EVCs
supported by that B-VID is performed:

for each EVC supported by the B-VID:


for each implemented or partially implemented EVC Termination residing on a
NE crossed by the Ring: un-provisioning of the association Port - B-VID - I-SID,
that means modification of a row in opticsIMPbbInstanceTable
if the EVC is implemented or partially implemented, removal of all the I-SID
instances in all the NEs that will no longer belong to the B-VID once the ring is
removed (that means deletion of a row in opticsIMPbbInstanceTable). This also
covers the case of EVC under OAM
un-provision the association between the B-VID and the associated ERP on that Ring
(only in case of per-VLAN ERP)

....................................................................................................................................................................................................................................
1350 OMS
20-97
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Ring Dissociation from B-VID

....................................................................................................................................................................................................................................

for each NE of the Ring in which there are no other NNIs not belonging to the Ring
but associated to the B-VID instance: deletion of the B-VID instance and of the
associations B-VID - Port
for each NE of the Ring in which there's at least another NNI not belonging to the
Ring but associated to the B-VID instance: modification of the member set of the
B-VID instance to remove the two ports of the Ring for that NE

This case applies both implemented and partially implemented B-VIDs.


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Associate/Disassociate Ring.


...................................................................................................................................................................................................

In the Associate/Dissociate window:

Select Select Operation (Dissociate).

Select B-VID from list.

Select Erp Ring from list.

Select Erp Instance from list.

...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-98
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Change ERP of a B-VID

....................................................................................................................................................................................................................................

Change ERP of a B-VID


When to use

The function moves a defined B-VID from a ring of a bundle to another ring of the same
bundle.
Related Information

This function applies to any provisioning state.


The operator specifies:

the B-VID
the associated Ring
the Ring to be associated

The system checks that:

the B-VID and the first Ring are associated

the two Rings belong to the same Ring Bundle

This procedure is functionally equivalent to a Ring dissociation followed by a Ring


association.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Change ERP instance.
...................................................................................................................................................................................................

In the Change ERP window:

Select B-VID from list.

Select Erp Ring from list.

Select Erp Instance from list.

....................................................................................................................................................................................................................................
1350 OMS
20-99
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Change ERP of a B-VID

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-100
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

List ERP instances of a B-VID

....................................................................................................................................................................................................................................

List ERP instances of a B-VID


When to use

The function lists all the ERP instances belonging to a B-VID.


Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > List ERP instances from B-VID.
Result: The list window is displayed.

See the following topic in this document: Description of the list of ERP (p. 20-109).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-101
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Association of Transport Link to B-VID

....................................................................................................................................................................................................................................

Association of Transport Link to B-VID


When to use

The function adds a Transport Link to a B-VID.


Related Information

This function applies to any provisioning state.


Defined case

The operator specifies:

the B-VID
the Transport Link

For a Transport Link to be associated to a B-VID, the following must be true:

the TL must not belong to a Ring


B-VID and TL must belong to the same Domain

B-VID and TL must not be already associated

If all checks are ok the B-VID is associated to the specified Transport Link.
Allocated case

This is almost the same case of transport link association (defined case), in addition:

the allocation of the B-VID - TL association is performed: allocation on DB of the


VLAN Distribution information (the two involved Ports of the TL are associated to
the B-VID)

the allocation on DB of the I-SID Distribution information is performed for each


allocated EVC that is supported by the B-VID:
in case the EVC is not under OAM: the I-SID must be distributed at each
extremity of the TL that contain at least one EVC Termination
in case the EVC is under OAM: the I-SID must be distributed at each extremity of
the TL

This case applies both to allocated and partially implemented B-VIDs (in any case, no
provisioning is performed).
Implemented case

This is almost the same case of transport link association (allocated case), in addition part
of the implementation of the B-VID and of all the implemented EVCs that the former
supports is performed:

for each NE at the extremities of the TL in which the B-VID instance has not yet been
provisioned: creation of the B-VID instance and of the associations B-VID - Port
for each NE at the extremities of the TL in which the B-VID instance already exists:
modification of the member set of the B-VID instance to include the extremity of the
TL in that NE;

....................................................................................................................................................................................................................................
1350 OMS
20-102
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Association of Transport Link to B-VID

....................................................................................................................................................................................................................................

for each EVC supported by the B-VID:


for each implemented EVC Termination residing on a NE at the extremities of the
TL: provisioning of the association Port - B-VID - I-SID, that can either mean
creation of a row in opticsIMPbbInstanceTable (if the row did not existed) or
modification of a row in opticsIMPbbInstanceTable (if the row did existed)
if the EVC is implemented and under OAM: the I-SID of the EVC has to be
provisioned also in all the NEs at the extremities of the TL that do not contain an
implemented EVC Termination.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Associate/Disassociate Transport Link.
...................................................................................................................................................................................................

In the Associate/Dissociate window:

Select Select Operation (Associate, Dissociate)

Select B-VID from list

Select Transport Link from list

...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-103
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Dissociation of Transport Link to B-VID

....................................................................................................................................................................................................................................

Dissociation of Transport Link to B-VID


When to use

The function removes a Transport Link from a B-VID.


Related Information

This function applies to any provisioning state.


Defined case

The operator specifies:

the B-VID
the Transport Link

For a Transport Link to be dissociated from a B-VID, the following must be true:

the TL must not belong to a Ring


B-VID and TL must be associated

If all checks are ok the B-VID is dissociated to the specified Transport Link.
Allocated case

This is almost the same case of transport link dissociation (defined case), in addition,
before the B-VID - TL association is removed, its de-allocation is performed:

de-allocation on DB of the I-SID Distribution information, for each allocated EVC


supported by the B-VID in all the NEs that will no longer belong to the B-VID once
the TL is removed
de-allocation on DB of the VLAN Distribution information (for each NE involved,
the involved Port is dissociated from the B-VID).

In no case a TL can be dissociated from a B-VID if this action leaves an EVC of the
B-VID with an EVC Termination on a NE that is no more used by the B-VID.
In other words: if an EVC Termination ,of an EVC belonging to the involved B-VID, is
on one of the NEs at the extremity of the TL, and, on that NE, there are no other
Transport Links or rings associated to the involved B-VID, the latter can't be dissociated
from the Transport Link.

....................................................................................................................................................................................................................................
1350 OMS
20-104
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Dissociation of Transport Link to B-VID

....................................................................................................................................................................................................................................

Implemented case

This is almost the same case of transport link dissociation (allocated case), in addition,
before the B-VID - TL association is de-allocated, part of the de-implementation of the
B-VID and of all the implemented or partially implemented EVCs that the former
supports is performed:

for each EVC supported by the B-VID:


for each implemented or partially implemented EVC Termination residing on a
NE at the extremities of the TL: un-provisioning of the association Port - B-VID I-SID, that means modification of a row in opticsIMPbbInstanceTable
if the EVC is implemented or partially implemented, removal of all the I-SID
instances in all the NEs that will no longer belong to the B-VID once the TL is
removed (that means deletion of a row in opticsIMPbbInstanceTable). This also
covers the case of EVC under OAM.
for each NE at the extremities of the TL in which there are no other NNIs associated
to the B-VID instance: deletion of the B-VID instance and of the associations B-VID Port
for each NE at the extremities of the TL in which there's at least another NNI
associated to the B-VID instance: modification of the member set of the B-VID
instance to remove the port of the TL for that NE.

This case applies both implemented and partially implemented B-VIDs.


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Select the path Action > B-VIDs > Associate/Disassociate Transport Link.

....................................................................................................................................................................................................................................
1350 OMS
20-105
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


B-VID Management

Dissociation of Transport Link to B-VID

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In the Associate/Dissociate window:

Select Select Operation (Associate, Dissociate)

Select B-VID from list

Select Transport Link from list

...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-106
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

Overview

....................................................................................................................................................................................................................................

Ethernet Ring Protection (ERP) Management


Overview
Purpose

This document describes the functionality needed to manage ITU-T G.8032 Ethernet
Ring Protection v2 (ERP) protocol inside 1350 OMS PKT product.
Contents
View the ERP ring list

20-108

Description of the list of ERP

20-109

Create/delete ERP Ring

20-110

Implement/deimplement the ERP

20-112

ERP Switch Command

20-113

ERP Switch Command From Port

20-114

Add/remove Transport Link in a Ring

20-115

Add/remove Node in a Ring

20-116

Create/delete ERP Ring bundle

20-117

Add/remove ERP Ring in a bundle

20-118

....................................................................................................................................................................................................................................
1350 OMS
20-107
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

View the ERP ring list

....................................................................................................................................................................................................................................

View the ERP ring list


When to use

The ERP List window presents all the rings and their attributes.
Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet.


Result: The menu of the Packet is shown.
...................................................................................................................................................................................................

Select ERP > Rings.


Result: The list window is displayed.

See the following topic in this document: Description of the list of ERP (p. 20-109).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-108
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

Description of the list of ERP

....................................................................................................................................................................................................................................

Description of the list of ERP


Attributes of a Ring

The attributes displayed for each Ring are:

User Label.

Ring Type (Major, Sub-ring).

Closure (Closed, Open).

Provisioning State (Defined, Allocated, Implemented).

Def.Time.

Working State (Normal).

Last Operation (None, Allocation, Deallocation, Implementation,


Deimplementation).

Availability Status. (Normal).

....................................................................................................................................................................................................................................
1350 OMS
20-109
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

Create/delete ERP Ring

....................................................................................................................................................................................................................................

Create/delete ERP Ring


When to use

The function creates ERP Rings.


Related Information

Ring Types:

A major ring is a ring that is self-containing, i.e. it has no need to use tunneling of
R-APS through other rings.
A sub-ring is a ring that is closed by a tunnel connectivity provided by other rings
(either major rings or sub-ring).

A Ring can be created from:

Links list

Topological view
Common Map

A ring can be done by transport link of one only domain.


It is possible that the links assigned to a ring are not implementing a closed ring: in this
case a warning should be raised to operator.
For PKT 9.3 only PBB domains are foreseen.
More then one major ring per domain is allowed.
A physical ring can be created also if the transport link is already used by traffic.
A physical ring can be deleted only when it is not-implemented. No check is done respect
to the usage of the links for traffic.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Action > Packet > ERP > Create ERP Ring.

....................................................................................................................................................................................................................................
1350 OMS
20-110
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

Create/delete ERP Ring

....................................................................................................................................................................................................................................

Result: The creation window is shown.


...................................................................................................................................................................................................

Enter:

Enter the User Label

Select the Ring Type. (Major, Sub)


Select the Activation Status

Select the PBB Domain from list


Select the Transport Linksfrom list

...................................................................................................................................................................................................

Click OK
Result: The ring is created
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-111
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

Implement/deimplement the ERP

....................................................................................................................................................................................................................................

Implement/deimplement the ERP


When to use

The function implements major ring or sub-ring.


Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10).
A physical ring can be deimplemented only if no ERP instances are active on it. No check
is done respect to the usage of the links for traffic.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > ERP > Rings.


Result: The list is shown.
...................................................................................................................................................................................................

Select the ring and select Implement or Deimplement.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-112
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

ERP Switch Command

....................................................................................................................................................................................................................................

ERP Switch Command


When to use

The function set ERP Switch Command.


Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the menu item:

Search > Packet > ERP > Rings

Search > Packet > ERP > ERP Instances


Result: The list window is shown.

...................................................................................................................................................................................................

Select an item in the list and select Action > ERP Switch Command.
...................................................................................................................................................................................................

Select the following attributes:

Select ERP Ring from list.

Select ERP Instance from list.

Select Target node of command from list.

Select Adjacent node from list.

Select Operator Command (Clear, Manual Switch, Force Switch).

Select or unselect Force without Check ring status.

...................................................................................................................................................................................................

Click OK
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-113
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

ERP Switch Command From Port

....................................................................................................................................................................................................................................

ERP Switch Command From Port


When to use

The function set ERP Switch Command from ERP Port.


Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select the menu item:

Search > Packet > ERP > ERP Instances


Result: The list window is shown.

...................................................................................................................................................................................................

Select an item in the list and select Search > ERP Port Inst on NE.
Result: The Port list window is shown.
...................................................................................................................................................................................................

Right Click the mouse and select the menu item:

Action > Clear

Action > Manual Switch

Action > Force Switch

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-114
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

Add/remove Transport Link in a Ring

....................................................................................................................................................................................................................................

Add/remove Transport Link in a Ring


When to use

The function add a Transport Link in major ring or sub-ring.


Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10)
The function applies to both defined or implemented ring.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > ERP > Rings.


Result: The list is shown.
...................................................................................................................................................................................................

Select the ring and select Add link.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-115
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

Add/remove Node in a Ring

....................................................................................................................................................................................................................................

Add/remove Node in a Ring


When to use

The function add a Node in major ring or sub-ring.


Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10).
The function applies to both defined or implemented ring.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > ERP > Rings.


Result: The list is shown.
...................................................................................................................................................................................................

Select the ring and select Add Node.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-116
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

Create/delete ERP Ring bundle

....................................................................................................................................................................................................................................

Create/delete ERP Ring bundle


When to use

The function creates ERP Rings bundle.


Related Information

When more rings are present on a given set of NEs, it is necessary to define the stacked
ring bundle (bundle).
Bundle can be composed by major rings or sub-rings (no mix of major and sub ring is
possible).
PKT automatically creates a bundle of rings as soon as two rings are created on the same
set of NEs. Name of the bundle is assigned by default to Bundle x where x is a number
that univocally identifies the bundle.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Action > Packet > ERP > Create ERP Ring bundle.
Result: The creation window is shown.
...................................................................................................................................................................................................

Enter:

Enter the Bundle name

Select the ERP Rings

...................................................................................................................................................................................................

Click OK
Result: The bundle is created
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-117
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

Add/remove ERP Ring in a bundle

....................................................................................................................................................................................................................................

Add/remove ERP Ring in a bundle


When to use

The function adds/remove ERP Ring in a bundle.


Related Information

Operator can add a new ring to a bundle, given that:

Ring is on the same set of NEs of already grouped ring(s)


Ring is of the same type (major/sub) of already grouped rings (this condition is
automatically verified if the previous condition is true, but can be useful to filter the
list of rings to be proposed to operator)
VLANs registered on the ring cannot be assigned to ring already grouped in the
bundle.

Removal of a ring from a bundle is always possible: operator has to take care of avoiding
registering VLAN on the ring after the removal: PKT cannot perform consistency checks
to avoid traffic loop.
PKT automatically add a ring to an existing bundle created on the same set of NEs.
PKT automatically remove a ring from an existing bundle when ring is deleted. This is
true independently from the way the ring has been assigned to the bundle (i.e. either
manually or automatically).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > ERP > ERP Ring bundle.
Result: The creation window is shown.
...................................................................................................................................................................................................

Select the Bundle name


Select the Action > ERP Bundle > Add Ring
...................................................................................................................................................................................................

Click OK

....................................................................................................................................................................................................................................
1350 OMS
20-118
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Ethernet Ring Protection (ERP) Management

Add/remove ERP Ring in a bundle

....................................................................................................................................................................................................................................

Result: The ring is added.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-119
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Overview

....................................................................................................................................................................................................................................

ERP Instance Management


Overview
Purpose

This document describes how to manage ITU-T G.8032 Ethernet Ring Protection v2
(ERP) instances inside 1350 OMS PKT product.
Contents
View the ERP instance list

20-121

Description of the list of ERP instances

20-122

Create/delete ERP instance

20-123

Implement/deimplement the ERP instance

20-125

Associate OAM to the ERP instance

20-126

Get a graphical view of the ERP instance

20-127

Modify Defined ERP instance

20-129

Modify implemented ERP instance

20-131

....................................................................................................................................................................................................................................
1350 OMS
20-120
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

View the ERP instance list

....................................................................................................................................................................................................................................

View the ERP instance list


When to use

The ERP Instance List window presents all the rings and their attributes.
Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet.


Result: The menu of the Packet is shown.
...................................................................................................................................................................................................

Select ERP > ERP intances.


Result: The list window is displayed.

See the following topic in this document: Description of the list of ERP instances
(p. 20-122).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-121
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Description of the list of ERP instances

....................................................................................................................................................................................................................................

Description of the list of ERP instances


Attributes of an ERP instances

The attributes displayed for each ERP instance are:

User Label.

ERP Scope (Per Port, Per VLAN).

VLAN Id. VLAN used to tag R-APS PDU for this ERP instance.

VLAN Priority. Priority of R-APS PDU for this ERP instance.

Hold Off Time. Time to wait, after failure detection, before starting ERP protection.

WTR Time. Wait time to restore (minutes) in case of switch mode is revertive. If

Switch behavior is revertive default is 5; If Switch behavior is not revertive


default is not meaningful and not modifiable.
Guard Time. During guard time RPL owner discards the received R-APS OAM
frames.
Switch Behaviour(Revertive, Non Revertive). Behavior of switch following clear of
failure.
ERP State. (deactivated, idle, protection, manualSwitch, forcedSwitch, pending).
Status of the ERP protection.
Maintenance Entity Level. Maintenance Entity Level of the ERP instance.
Switch On Ploc. (False, True). Include/exclude Partial loss of capacity (LAG) alarm

in the list of ERP Switch Criteria


Switch On Cfm Alarm. (False, True). Include/exclude ETH OAM CFM alarms (AIS,
Loss Of Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM),
UNexpected Level (UNL) in the list of ERP Switch Criteria
Provisioning State (Defined, Allocated, Implemented).
Ring Userlabel.

Def.Time.

Working State (Normal).

Last Operation (None, Allocation, Deallocation, Implementation,


Deimplementation).

Switch On Anm. (False, True). Include/exclude auto-negotiation mismatch alarm in

the list of ERP Switch Criteria.

Comment
Availability Status. (Normal, Degraded, Failure).

....................................................................................................................................................................................................................................
1350 OMS
20-122
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Create/delete ERP instance

....................................................................................................................................................................................................................................

Create/delete ERP instance


When to use

The function creates ERP instances.


Related Information

Definition is always possible. Checks to be done:

ERP instance user label has to be unique in the system


R-APS VLAN Id must be inside the bundle of VLAN assigned to ERP for the domain
ERP instance is defined
R-APS VLAN id must not be used for in-fiber/in-band management channel: this
check could be implicitly passed if management VLAN is not part of bundle of
VLAN reserved for ERP.
R-APS VLAN Id cannot have already been assigned to other ERP instances on the
same ERP physical ring or by ERP instance on sub-rings that uses the current ring to
close the virtual channel for R-APS
Just one per-port ERP can be defined on a given physical ring
If ring Id is different from default it must be unique inside the ERP instances of a
given physical ring.

Deletion of ERP instance is possible only after de-implementation.


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Action > Packet > ERP > Create ERP instances.
Result: The creation window is shown.
...................................................................................................................................................................................................

In the General panel:

Enter the User Label. Unique identifier of ERP instance inside PKT.

Enter a Comment. (optional)

Select the Activation Status. Enable/disable implementation of ERP instance.

Enter theR-APS VLAN Id. VLAN used to tag R-APS PDU for this ERP instance.

Enter the R-APS PCP. Priority of R-APS PDU for this ERP instance.

....................................................................................................................................................................................................................................
1350 OMS
20-123
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Create/delete ERP instance

....................................................................................................................................................................................................................................

Enter the Maintenance Entity Level. Maintenance Entity Level of the ERP instance.
Select the Scope. (Per Port, Per VLAN)
Select the PBB Domain from list. Domain where ERP instance is defined.
Select the ERP Ring from list. Ring to be controlled by ERP instance.

Select the RPL Owner from list. NE having the RPL-owner role.

Select the RPL from list. Link/Port blocked by the ERP instance in nominal condition.

In the Timers panel:

Select the Switch Behaviour. (Revertive, Non Revertive). Behavior of switch


following clear of failure.
Enter theWait Time To Restore (min). Wait time to restore (minutes) in case of
switch mode is revertive. If Switch behavior is revertive default is 5; If Switch
behavior is not revertive default is not meaningful and not modifiable.
Enter the Hold Off Time (msec). Time to wait, after failure detection, before starting
ERP protection.
Enter the Guard Time (msec). Range from 10 to 2000 ms, with step of 10 ms. During
guard time RPL owner discards the received R-APS OAM frames.

In the Failures panel select or deselect:

Auto-Negotiation Mismatch. Include/exclude auto-negotiation mismatch alarm in the

list of ERP Switch Criteria. (Enabled by default).


Partial loss of capacity. Include/exclude Partial loss of capacity (LAG) alarm in the
list of ERP Switch Criteria.
Signal Degrade. Include/exclude Signal Degrade alarm in the list of ERP Switch
Criteria.
ETH OAM CFM Alarms. Include/exclude ETH OAM CFM alarms (AIS, Loss Of
Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM), UNexpected Level
(UNL) in the list of ERP Switch Criteria.
Link OAM Critical link Events. Include/exclude link OAM critical link events alarm
in the list of ERP Switch Criteria

...................................................................................................................................................................................................

Click OK
Result: The ring is created
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-124
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Implement/deimplement the ERP instance

....................................................................................................................................................................................................................................

Implement/deimplement the ERP instance


When to use

The function implements ERP instance.


Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > ERP > ERP Instances.


Result: The list is shown.
...................................................................................................................................................................................................

Select the ring and select Implement.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-125
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Associate OAM to the ERP instance

....................................................................................................................................................................................................................................

Associate OAM to the ERP instance


When to use

The function associates OAM to ERP instance.


Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > ERP > ERP Instances.


Result: The list is shown.
...................................................................................................................................................................................................

Select the ERP Instance and select Associate OAM to ERP Instance.
...................................................................................................................................................................................................

For each item in the ERP Link List, select the following attributes:

Select ERP Link from list.

Select OAM MA from list.

Click Associate.

...................................................................................................................................................................................................

Click OK
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-126
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Get a graphical view of the ERP instance

....................................................................................................................................................................................................................................

Get a graphical view of the ERP instance


When to use

The function show a graphical view of the ERP instance.


Related Information

For information about ERP , see: Ethernet Ring Protocol (ERP) (p. 20-10).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > ERP > ERP Instances.


Result: The list is shown.
...................................................................................................................................................................................................

Select the ERP Instance and select ERP Graphical View.

....................................................................................................................................................................................................................................
1350 OMS
20-127
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Get a graphical view of the ERP instance

....................................................................................................................................................................................................................................

Result:
Figure 20-58 ERP Graphical View example

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-128
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Modify Defined ERP instance

....................................................................................................................................................................................................................................

Modify Defined ERP instance


When to use

The function permit to modify attributes of a defined ERP instance.


Related Information

In case the Ring or the scope has to be changed it is necessary to delete the ERP instance
and create a new one.
As a particular case the modification of RPL Owner requires to reset the RPL, so operator
has to select RPL again.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > ERP > ERP instance.


Result: The list is shown.
...................................................................................................................................................................................................

Select the object and select Modify.


...................................................................................................................................................................................................

In the General panel:

Enter the User Label. Unique identifier of ERP instance inside PKT.

Enter a Comment. (optional)

Select the Activation Status. Enable/disable implementation of ERP instance.

Enter theR-APS VLAN Id. VLAN used to tag R-APS PDU for this ERP instance.

Enter the R-APS PCP. Priority of R-APS PDU for this ERP instance.
Enter the Maintenance Entity Level. Maintenance Entity Level of the ERP instance.

Select the RPL Owner from list. NE having the RPL-owner role.

Select the RPL from list. Link/Port blocked by the ERP instance in nominal condition.

....................................................................................................................................................................................................................................
1350 OMS
20-129
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Modify Defined ERP instance

....................................................................................................................................................................................................................................

In the Timers panel:

Select the Switch Behaviour. (Revertive, Non Revertive). Behavior of switch


following clear of failure.
Enter theWait Time To Restore (min). Wait time to restore (minutes) in case of
switch mode is revertive. If Switch behavior is revertive default is 5; If Switch
behavior is not revertive default is not meaningful and not modifiable.
Enter the Hold Off Time (msec). Time to wait, after failure detection, before starting
ERP protection.
Enter the Guard Time (msec). Range from 10 to 2000 ms, with step of 10 ms. During
guard time RPL owner discards the received R-APS OAM frames.

In the Failures panel select or deselect:

Auto-Negotiation Mismatch. Include/exclude auto-negotiation mismatch alarm in the

list of ERP Switch Criteria.


Partial loss of capacity. Include/exclude Partial loss of capacity (LAG) alarm in the
list of ERP Switch Criteria.
Signal Degrade. Include/exclude Signal Degrade alarm in the list of ERP Switch
Criteria.
ETH OAM CFM Alarms. Include/exclude ETH OAM CFM alarms (AIS, Loss Of
Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM), UNexpected Level
(UNL) in the list of ERP Switch Criteria.
Link OAM Critical link Events. Include/exclude link OAM critical link events alarm
in the list of ERP Switch Criteria

...................................................................................................................................................................................................

Click OK
Result: The ring is created
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-130
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Modify implemented ERP instance

....................................................................................................................................................................................................................................

Modify implemented ERP instance


When to use

The function permit to modify attributes of an implemented ERP instance.


Related Information

Attributes that can be modified for an implemented ERP instance are attributes that can be
changed on the NE with no need to deactivate the ERP instance.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Select Search > Packet > ERP > ERP instance.


Result: The list is shown.
...................................................................................................................................................................................................

Select the object and select Modify.


...................................................................................................................................................................................................

In the General panel:

Enter the User Label. Unique identifier of ERP instance inside PKT.

Enter a Comment. (optional)

Select the Activation Status. Enable/disable implementation of ERP instance.

Enter the R-APS PCP. Priority of R-APS PDU for this ERP instance.

Select the RPL Owner from list. NE having the RPL-owner role.

Select the RPL from list. Link/Port blocked by the ERP instance in nominal condition.

In the Timers panel:

Select the Switch Behaviour. (Revertive, Non Revertive). Behavior of switch


following clear of failure.
Enter theWait Time To Restore (min). Wait time to restore (minutes) in case of
switch mode is revertive. If Switch behavior is revertive default is 5; If Switch
behavior is not revertive default is not meaningful and not modifiable.

....................................................................................................................................................................................................................................
1350 OMS
20-131
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


ERP Instance Management

Modify implemented ERP instance

....................................................................................................................................................................................................................................

Enter the Hold Off Time (msec). Time to wait, after failure detection, before starting
ERP protection.
Enter the Guard Time (msec). Range from 10 to 2000 ms, with step of 10 ms. During
guard time RPL owner discards the received R-APS OAM frames.

In the Failures panel select or deselect:

Auto-Negotiation Mismatch. Include/exclude auto-negotiation mismatch alarm in the

list of ERP Switch Criteria.


Partial loss of capacity. Include/exclude Partial loss of capacity (LAG) alarm in the
list of ERP Switch Criteria.
Signal Degrade. Include/exclude Signal Degrade alarm in the list of ERP Switch
Criteria.
ETH OAM CFM Alarms. Include/exclude ETH OAM CFM alarms (AIS, Loss Of
Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM), UNexpected Level
(UNL) in the list of ERP Switch Criteria.
Link OAM Critical link Events. Include/exclude link OAM critical link events alarm
in the list of ERP Switch Criteria

...................................................................................................................................................................................................

Click OK
Result: The ring is created
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-132
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


PBB Fault Management

Overview

....................................................................................................................................................................................................................................

PBB Fault Management


Overview
Purpose

The Fault Localization allows the user to determine the list of elementary alarms affecting
a managed resource.
Contents
PBB Fault Localization and navigation to AS

20-134

....................................................................................................................................................................................................................................
1350 OMS
20-133
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


PBB Fault Management

PBB Fault Localization and navigation to AS

....................................................................................................................................................................................................................................

PBB Fault Localization and navigation to AS


When to use

This function displays information about the fault present on the selected object.
Related Information

The function is available for alarmed objects.


For more information about Fault Localization, see: Fault Localization (p. 11-69).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Show the list of the objects. Select one of the following paths:

Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Select

backbone EVCs.

Search > Packet > Services > Connection Less (Bridge) > B-VIDs

Search > Packet > ERP > ERP Rings

Search > Packet > ERP > ERP Instances

...................................................................................................................................................................................................

Select an item in the list and select Search > Fault Localization.
Result: The Fault Localization list window is displayed.

See the following topic in this document: Fault Localization (p. 11-69).
The list is not refreshed automatically, click Actualize button to refresh it.
...................................................................................................................................................................................................

Select an item in the list and click Search > External Navigation to > AS .
Result: The Fault Management window is displayed with the alarm list.

See the following topic in this document: Description of the list of Alarms
(p. 19-69)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-134
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management

Overview about Workflow

....................................................................................................................................................................................................................................

Workflow for PBB Management


Overview about Workflow
Workflow description

The workflow to manage PBB is part of the more general workflow for the Ethernet
Service management.
Transport Link Overwiew

1350OMS does support the provisioning of the infrastructure in term of TDM Links,
WDM and Ethernet cables and (T-)MPLS links.
The infrastructure is used for different supported layer (T-)MPLS or Ethernet.
The infrastructure is named Transport Link.
The Transport Link can be supported by:

A TDM path. The link is called Link Over TDM. It carries directly Ethernet
Segments, Tunnels or PWs.
A Tunnel/PW. The link is called Link Over (T-)MPLS. A Link Over TDM or a Link
Over Cable (Martini) carries it.
An Ethernet cable or a Martini cable. The link is called Link Over Cable.
A WDM link. The link is called Link Over WDM.

Domain overview

In Connection Less Networks, the Domain represents an homogeneous set of Network


Elements dedicated to MAC, Virtual, Provider or Provider Backbone Bridging.
A Domain infrastructure is made of NE, ENE, Transport Links and Edge Ports managed
together to supply a Connection Less infrastructure.
The user is requested to assign the NE to a specific domain. The NE related resources are
automatically uploaded and associated to it.
The user is requested to assign the Transport Link to a specific domain. The NE related
resources are automatically uploaded and associated to it.
Domain main properties are:

the Domain Type:


ETS
Bridge
T-MPLS
the Bridge Type:
MAC

Virtual

....................................................................................................................................................................................................................................
1350 OMS
20-135
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Overview about Workflow

....................................................................................................................................................................................................................................

Provider
Provider backbone Bridge

the Control Plane type:


ERP
STP
RSTP
PVSTP

MSTP
none

Domain attribute dependencies:

The list of possible Bridge types depends on the selected Domain type
The list of possible Control protocols depends on the selected Bridge type

In case of PBB the only possible choice for Control Protocol is ERP

....................................................................................................................................................................................................................................
1350 OMS
20-136
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Create a PBB Domain

....................................................................................................................................................................................................................................

Create a PBB Domain


When to use

This function allows the user to define a domain in the managed network.
Related Information

For information, see: Overview about Workflow (p. 20-135).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Action > Packet > Construction > Create Domain.
...................................................................................................................................................................................................

On the Create Window.


To create a customer:

Enter a User Label.

Enter a Domain Type: Bridge.

Enter an Bridge Type: PBB.

Enter a Control Protocol Type: ERP.

...................................................................................................................................................................................................

Click Ok.
Result: The domain is created.

The Domain list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-137
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Add NE to a Domain

....................................................................................................................................................................................................................................

Add NE to a Domain
When to use

The user assign a NE to a domain.


Related Information

It is possible to assign a group of NE in a single operation. See Action > Packet >
Construction > Assign Resources to Domain

For information, see: Overview about Workflow (p. 20-135).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Construction > Network Elements > Defined NEs.
...................................................................................................................................................................................................

Select the NE in the list.


...................................................................................................................................................................................................

Follow the path Action > Network Element > Assign Network Element to Domain.
Result: The assign window is displayed.
...................................................................................................................................................................................................

Click the Bridge Domain field.


Result: The list of available bridge domain is displayed.
...................................................................................................................................................................................................

Select the PBB domain and Click the check sign to confirm it.
...................................................................................................................................................................................................

Click Ok.
Result: The NE is assigned to the Domain previously created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-138
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Add Transport Link to a Domain

....................................................................................................................................................................................................................................

Add Transport Link to a Domain


When to use

The user assign a Transport Link to a domain.


Related Information

It is possible to assign a group of Transport Link in a single operation. See also Action >
Packet > Construction > Assign Resources to Domain

When the user assigns Transport Links, the related NE are automatically uploaded and
associated to the domain.
For information, see: Overview about Workflow (p. 20-135).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Search > Packet > Construction > Transport Link.
...................................................................................................................................................................................................

Select the object in the list.


...................................................................................................................................................................................................

Follow the path Action >Transport Link> Assign Transport Link to Domain.
Result: The assign window is displayed.
...................................................................................................................................................................................................

Click the Bridge Domain field.


Result: The list of available bridge domain is displayed.
...................................................................................................................................................................................................

Select the PBB domain and Click the check sign to confirm it.
...................................................................................................................................................................................................

Click Ok.

....................................................................................................................................................................................................................................
1350 OMS
20-139
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Add Transport Link to a Domain

....................................................................................................................................................................................................................................

Result: The NE is assigned to the Domain previously created.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-140
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

ERP provisioning

....................................................................................................................................................................................................................................

ERP provisioning
When to use

The function defines an ERP instance.


Related Information

For information, see: Ethernet Ring Protocol (ERP) (p. 20-10).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Action > ... > Create ERP.


...................................................................................................................................................................................................

Provisioning of ERP INSTANCE properties in the General tab:

ERP instance User label.

comment.

Activation status [active/not active] (used to enable/disable the ERP protocol).

RING VLAN Tag (used to tag R-APS OAM protocol frames):


R-APS VLAN ID [1..4093] (unique per ring or group of interconnected rings).

R-APS PCP [0..7] (priority bits value for R-APS).

Maintenance Entity Level [0..7] (OAM level assigned to R-APS).

Scope of ERP instance [port/VLAN].

RPL Owner (NE that has the master role on ERP instance).

RPL (East/west link that is Blocked by RPL owner in nominal conditions).

...................................................................................................................................................................................................

Provide the Protocol Tuning in the Detail tab:

Switch behavior [Revertive/Not Revertive].

Wait Time to Restore [0..12 Minutes,steps of 1].

Hold-Off time [0..1000 millisec, steps of 10].

Guard Time [10..2000 millisec, steps of 10].

....................................................................................................................................................................................................................................
1350 OMS
20-141
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

ERP provisioning

....................................................................................................................................................................................................................................

Optional Alarms that can be included/excluded in the list of Switch Criteria:


Signal Degrade.
Partial Loss of Capacity (if ring ports are LAG).
Loss Of Continuity (CCM) defect.

Link OAM Critical Events.

Ring Port.

MEP.

Note: If Loss of Continuity defect or Link OAM Critical Events are used as Switch
Criteria it is necessary to assign Down MEPs to Ring Ports (on all the NEs inside the
ring).
...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-142
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Configure B-VID

....................................................................................................................................................................................................................................

Configure B-VID
When to use

The function allows to define a B-VID in a PBB domain and to associate it to the ERP
instance.
Related Information

For information, see: Ethernet Ring Protocol (ERP) (p. 20-10).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Action > Packet > ... > Configure B_VID.
Result: The configuration window is displayed.
...................................................................................................................................................................................................

Insert the following information:

B-VID [1..4094]: service group identifier, unique network wide.

B-VID distribution:

Network-wide: B-VID is distributed on all the NEs in the PBB domain.

Crossed rings: B-VID is distributed on all the NEs of rings selected by user.

ERP instance, used to protect B-VID, is assigned for each crossed ring.

...................................................................................................................................................................................................

Click OK.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-143
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Create a PBB EVC

....................................................................................................................................................................................................................................

Create a PBB EVC


When to use

This function consists in creating a PBB Ethernet Virtual Connection.


Related Information

For information about PBB EVC, see: PBB Ethernet Virtual Connection (p. 20-7).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the Multi Service GUI Main view:


...................................................................................................................................................................................................

Follow the path Action > Packet > Services > Connection Less (Bridge) > Create
Bridge EVC.
Result: The creation window is displayed.
...................................................................................................................................................................................................

Fill the following data in the Specific panel:

User label.

Service Type [EVPL, EPTL, EPL, EPLAN, EVPLAN, HSI, BTV, Broadcast].

Ethernet Service (optional): it is used to group together EVCs according to a


user-selected criteria.
Domain (PBB).

Network Access Domain (optional): Network Access Domain (NAD) can be used to

partition the network into different administrative domains. A possible use is to limit
the user to use only a set the of the networks resources (NEs, ports, links).
...................................................................................................................................................................................................

Fill the following data in the Detail panel:

I-SID [integer] (identifier of service, unique network wide).

B-VID [1-4094] (service group identifier, unique network wide).

Broadcast Domain Containment (Enabled, Disabled)

Set Standard VLAN type (0x8100) [True, False] (identifier for VLAN tagged frames
at UNI).

....................................................................................................................................................................................................................................
1350 OMS
20-144
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Create a PBB EVC

....................................................................................................................................................................................................................................

IGMP Snooping State [Not Meaningful, Enabled, Disabled] (to mark if IGMP

snooping is enabled/disabled on the EVC).


Configure the Storm Control:
Service frame delivery assumes one of the following values: Deliver
unconditionally, Deliver conditionally, Discard. Fill the following fields:
Unicast Service Frame Delivery.

Multicast Service Frame Delivery.

Broadcast Service Frame Delivery.

If selected values is Deliver Conditionally it is possible to specify the Limitation of


rate (per service).
...................................................................................................................................................................................................

Select info panel.

The user can use the fields in the info panel to enter comments or other information.

...................................................................................................................................................................................................

Select PM panel.

Set or unset PM enabled

Select Granularity (24 h, 15 min)


Select Involved TPs (All Points)

Select CSV Reporting (No Report, 24 h, 2 h)

Select purge Policy (Keep, On stop, On delete)

...................................................................................................................................................................................................

Select OAM panel.

Set OAM Enabled. (Enable, Disable).


The enabling of Eth OAM:
creates a MA with identifier equal to the EVC user label with MA_ prefix.
enables CC with default period of 1 second, no intermediate points (MIP).

Select Priority.

Select Maintenance Domain.

...................................................................................................................................................................................................

Select Miscellaneous panel.

Select C-VLAN Preservation.

Select C-VLAN COS Preservation.

When checked, it ensures that each packet exiting the EVC (at some egress UNI) has the
same VLAN Id & Priority Bits information that it had when it entered the EVC (at some
ingress UNI).
This Attribute must be defined at EVC definition and is modifiable before EVC
allocation.

....................................................................................................................................................................................................................................
1350 OMS
20-145
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Create a PBB EVC

....................................................................................................................................................................................................................................

These two attributes are not meaningful for the relevant NEs. C-VLAN push/pop is
configured on flow level.
...................................................................................................................................................................................................

Click Next
Result:
Figure 20-59 Create PBB EVC: Termination Selection

...................................................................................................................................................................................................

Select node and port for both originating and terminating sides.
Click Next

....................................................................................................................................................................................................................................
1350 OMS
20-146
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Create a PBB EVC

....................................................................................................................................................................................................................................

Result:
Figure 20-60 Create PBB EVC: Termination Settings

...................................................................................................................................................................................................

10

The folderTermination Setting defines the traffic flows.


Select the first termination from the upper selection box.

Click traffic descriptor button. Select the traffic descriptor from the selection box
and confirm.
Select the policy mode. If you select color aware, you will select color profile.
Select the classification priority-code 0-7 / DSCP code 0-63.

Select VLAN POP disabled.

Folder traffic classifier deals on VLAN id.

....................................................................................................................................................................................................................................
1350 OMS
20-147
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Create a PBB EVC

....................................................................................................................................................................................................................................

Folder Leaf Term deals on HSI.


Folder Reuse Flows allows to copy and reuse flow characteristics.

...................................................................................................................................................................................................

11

Optionally you can setup Layer 2 Control Protocol.


Figure 20-61 Ingress flow create

....................................................................................................................................................................................................................................
1350 OMS
20-148
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Create a PBB EVC

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12

You can monitor that the Ingress flow has been created: the relevant traffic descriptor is
displayed in the bottom of the window
Figure 20-62 Ingress Flow: create monitoring

...................................................................................................................................................................................................

13

Select button Egress Flow, folder Push


Select following data:

Class of service (guaranteed/best effort/regulated,...)


If you select clear all fields, subsequent fields can be ignored.
VLAN ID. It is an additional ID added to the stack.

....................................................................................................................................................................................................................................
1350 OMS
20-149
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Create a PBB EVC

....................................................................................................................................................................................................................................

Priority mode. If set to color aware fields green and yellow are active.
Click Create Egress

You can monitor that the Egress flow has been created: the relevant traffic descriptor is
displayed in the bottom of the window
Figure 20-63 Egress Flow: Push

...................................................................................................................................................................................................

14

Create Ingress and Egress flows for the second termination.


Click Next.
...................................................................................................................................................................................................

15

Select EVC state (implemented in this example).

....................................................................................................................................................................................................................................
1350 OMS
20-150
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Create a PBB EVC

....................................................................................................................................................................................................................................

Click OK to confirm EVC creation.


Figure 20-64 EVC Allocate and Implement

....................................................................................................................................................................................................................................
1350 OMS
20-151
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Create a PBB EVC

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

16

To verify the successful creation, follow the path Search > Packet > Connection
Less(Bridge) > Bridge EVC
Figure 20-65 Search>Packet>Connection Less(Bridge)>Bridge EVC

Result: The Bridge EVC list is shown.


Figure 20-66 Bridge EVC list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-152
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

PBB EVC traffic classification

....................................................................................................................................................................................................................................

PBB EVC traffic classification


When to use

For each EVC termination, user defines the traffic classification rules by associating a
Traffic Classifier and QoS attributes.
Related Information

For information, see: PBB Ethernet Virtual Connection (p. 20-7).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Action > Packet > Services > Create Traffic Classifier.
...................................................................................................................................................................................................

Specify classification rules based on:

VLAN (single or range)

Priority bit (single or range)

IP DSCP (single or range)

Payload type

...................................................................................................................................................................................................

Specify QoS attributes:

Policing mode [color blind, color aware, none]

Color profile (applicable if policing mode is color blind or color aware)

CoS and bandwidth profile are specified associating a Traffic Descriptor. See Traffic
Descriptor Definition (p. 20-154)

...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-153
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

Traffic Descriptor Definition

....................................................................................................................................................................................................................................

Traffic Descriptor Definition


When to use

The Traffic Descriptors describes the characteristics of an Ethernet segment in term of


Class of Service (CoS) and bandwidth.
Related Information

For information, see: Overview about Workflow (p. 20-135).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the path Action > Packet > Services > Create Traffic Descriptor.
Result: The creation window is displayed.
...................................................................................................................................................................................................

On the Create Traffic Descriptor Window.


To create a Traffic Descriptor:

Enter a User Label.

Select the Class of Service (Best Effort, Guaranteed, Regulated, Regulated1,


Regulated3, Regulated4, Guaranteed2, Background).
Enter a CIR value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
Enter a PIR value.
Enter a CBS value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
Enter a PBS value (if the selected Class of Service is 'Guaranteed', PBS value is
automatically set to CBS value - but could be modified).

...................................................................................................................................................................................................

Click Ok.
Result: The Traffic Descriptor is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-154
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


Workflow for PBB Management

EVC Allocation and Implementation

....................................................................................................................................................................................................................................

EVC Allocation and Implementation


When to use

To complete the Provider Bridge Workflow: create a Connection Less EVC, allocate, and
implement it.
Related Information

For information, see: PBB Ethernet Virtual Connection (p. 20-7).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main view:


...................................................................................................................................................................................................

Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

Select the EVC in the list and follow the path Action > Bridge EVC > Allocate.
Result: The allocation window is displayed.
...................................................................................................................................................................................................

Click Ok.
Result: The EVC is allocated.

The Provisioning State is changed to Allocated.


...................................................................................................................................................................................................

Select again the EVC in the list and follow the path Action > Bridge EVC > Implement.
Result: The implementation window is displayed.
...................................................................................................................................................................................................

Click Ok.
Result: The EVC is implemented.

The Provisioning State is changed to Implemented.


E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
20-155
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management

Overview

....................................................................................................................................................................................................................................

In Band Management
Overview
Purpose

This section describes the procedure for the configuration of the In Band Management for
the TSS160C and TSS10 Network Element in the PBB (Provider Backbone Bridge)
Network when protected using the ERP protection schema.
Contents
Address Configuration of the Network Elements

20-157

Lag Port Creation (Via Zic)

20-165

NMS Start Supervision (NE Not Defined On NMS)

20-183

....................................................................................................................................................................................................................................
1350 OMS
20-156
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Address Configuration of the Network Elements

....................................................................................................................................................................................................................................

Address Configuration of the Network Elements


When to use

This function configures IP Address in the NE.


Related Information
Before you begin

The Network Element is correctly provisioned with the full set of boards required for the
configuration of the PBB Core Network.
Task

Using the ZIC configure the System ID, the LAN interface (if the NE is a Gateway NE)
and (for TSS160C) enable the OSPF for the node.
...................................................................................................................................................................................................

1
Figure 20-67 TSS160C System ID Configuration

....................................................................................................................................................................................................................................
1350 OMS
20-157
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Address Configuration of the Network Elements

....................................................................................................................................................................................................................................

From Communication > DCN Phys. If > IP Address menu open the view for the
configuration of the System ID.
...................................................................................................................................................................................................

2
Figure 20-68 TSS160C System ID Configuration form

In the form fill the IP address field and the Subnet mask field.

....................................................................................................................................................................................................................................
1350 OMS
20-158
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Address Configuration of the Network Elements

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3
Figure 20-69 TSS160C Q LAN Configuration (Gateway NE)

If the TSS160C is a Gateway NE, configure and enable also the Q LAN Interface.
From Communication > DCN Phys. If > LAN menu open the view and configure the Q
LAN.
Note the configuration:

OSI Protocol (Disabled) (N)

Internet Protocol (Enabled) (Y)

Integrated ISIS (Disabled) (N)

Proxy Address Resolution Protocol (Enabled) (Y)

Channel (MNGPLANE)

OSPF (Disabled) (N) (This parameter refers to the enabling of the OSPF protocol on
the LAN interface and as far as we know no OSPF should be configured on that
network)

....................................................................................................................................................................................................................................
1350 OMS
20-159
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Address Configuration of the Network Elements

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4
Figure 20-70 TSS160C Export of the Route

Some network topologies could require the export of routes (or static route) between
routing protocols. For example, may need to export the static route to OSPF.
To enable the reporting of the routes between different protocol open the ULC view from
Communication > OSI ULC Report menu.

....................................................................................................................................................................................................................................
1350 OMS
20-160
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Address Configuration of the Network Elements

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5
Figure 20-71 Tss160C OSI Routing Configuration

Once the view is opened enable the reporting you need.


If no reporting is required set the parameters in the view as here depicted.

....................................................................................................................................................................................................................................
1350 OMS
20-161
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Address Configuration of the Network Elements

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6
Figure 20-72 TSS10 System ID Configuration

....................................................................................................................................................................................................................................
1350 OMS
20-162
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Address Configuration of the Network Elements

....................................................................................................................................................................................................................................

From Communication > System IP Address menu, configure the System IP Address
Figure 20-73 TSS10 System IP Address

....................................................................................................................................................................................................................................
1350 OMS
20-163
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Address Configuration of the Network Elements

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7
Figure 20-74 Tss10 LAN Interface Details

If the TSS10 is a Gateway NE, configure and enable also the Q LAN (LAN1) Interface.
From Communication > DCN LAN Interface menu open the view and configure the
LAN1.
Note the configuration:

Proxy Address Resolution Protocol (ARP) (Enabled) (Flagged on)

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-164
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................

Lag Port Creation (Via Zic)


When to use

This function creates a LAG port.


Related Information

For the NNI ports that are designed to carry on also the management frame, the LAG port
(normally used NNI side to close the Ethernet Ring), must be configured by ZIC
(enabling the In Band Management) and uploaded by the NMS once the NE is reachable
(the upload is automatically performed during the NE Define action performed by PKT).
Refer to the following procedures:

Task for TSS160C (p. 20-166)

Task for TSS160C V1.12.04 (p. 20-174)

Before you begin

The Network Element is correctly provisioned with the full set of boards required for the
configuration of the PBB Core Network.

....................................................................................................................................................................................................................................
1350 OMS
20-165
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................

Task for TSS160C

TSS160C LAG Port Creation and Configuration:


...................................................................................................................................................................................................

1
Figure 20-75 TSS160C Link Aggregation Group Management

From the Link Aggregation Group Management tab, go to the bottom of the page and fill
the fields related to:

Size (e.g. 2)

Name (just the LAG ID, i.e. the numerical identifier) (e.g. 1)

Actor Admin Key (e.g. 1)

....................................................................................................................................................................................................................................
1350 OMS
20-166
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Once the LAG has been created, select the LAG port and set the Client Type as NNI:
Figure 20-76 Tss160C LAG Configuration (Client Type)

....................................................................................................................................................................................................................................
1350 OMS
20-167
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................

Set the Admin State of the port to enable.


Figure 20-77 Tss160C LAG Configuration (Administration State)

....................................................................................................................................................................................................................................
1350 OMS
20-168
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Once the port has been enabled configure the In Band Management selecting the In Fiber
In Band tab:
Figure 20-78 Tss160C In Fiber In Band

....................................................................................................................................................................................................................................
1350 OMS
20-169
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select Routing Protocol as ospf.


Figure 20-79 Tss160C In Fiber In Band (OSPF)

....................................................................................................................................................................................................................................
1350 OMS
20-170
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Complete the configuration activating the interface


Figure 20-80 Tss160C In Fiber In Band Activate

...................................................................................................................................................................................................

Bind the ports in the LAG repeating the following steps for each port that is designed to
be member of the LAG:

....................................................................................................................................................................................................................................
1350 OMS
20-171
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................

Select the local port and set the Client Type as linkagg.
Figure 20-81 Tss160C port member of LAG

....................................................................................................................................................................................................................................
1350 OMS
20-172
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click on Configure LAG link in order to open the view for the aggregation of the port to
the LAG created before:
Figure 20-82 Tss160C port member of LAG configuration

....................................................................................................................................................................................................................................
1350 OMS
20-173
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Once the view is opened select the Actor Admin Key of the LAG you want to associate:
Figure 20-83 Tss160C port member of LAG Actor

Note: For the TSS160C V1.12.04, note the following: In that release the bind of the
port (the action before) fails. In order to bind the ports with the LAG follows the
special procedure provided by NE team. See Task for TSS160C V1.12.04
(p. 20-174)
E...................................................................................................................................................................................................
N D O F S T E P S

Task for TSS160C V1.12.04

For the TSS160C V1.12.04 note the following: In that release the bind of the port (the
action described in Task for TSS160C (p. 20-166)) fails. In order to bind the ports with
the LAG follows the special procedure provided by NE team.
...................................................................................................................................................................................................

Connect to the CLI of the NE using the following command (by an PC or UNIX station
that is able to reach the NE):

....................................................................................................................................................................................................................................
1350 OMS
20-174
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................

telnet ip address of ne 1123


...................................................................................................................................................................................................

Get the physical interface:


Cli:admin > int sh
Result:

Port
InterfaceType
ClientType
ServiceStatus
AdminStatus
Traffic
===========================================================================
r1sr1sl13d0p1
eth (6)
linkagg (3)
0
down
(2)
down (2)
r1sr1sl13d0p2
eth (6)
ets (1)
0
down
(2)
down (2)
r1sr1sl13d0p3
eth (6)
linkagg (3)
0
up
(1)
up (1)
r1sr1sl13d0p4
eth (6)
linkagg (3)
0
up
(1)
up (1)
r1sr1sl13d0p6
eth (6)
pnp (5)
0
up
(1)
up (1)
r1sr1sl13d0p7
eth (6)
linkagg (3)
0
up
(1)
up (1)
r1sr1sl13d0p8
eth (6)
ets (1)
0
down
(2)
down (2)
r1sr1sl13d0p9
eth (6)
ets (1)
0
down
(2)
down (2)
r1sr1sl13d0p10 eth (6)
ets (1)
0
down
(2)
down (2)
...................................................................................................................................................................................................

Get the lag ports:


Cli:admin > linkagg sh
Result:
lag
AdminKey
LAG User Label
LAG
Size Admin State
------- ----------- ---------------------------------------- -------1
1
''
2
enable (1)
2
2
''
2
enable (1)
3
3
''
1
enable (1)
...................................................................................................................................................................................................

Bind the port (e.g. r1sr1sl13d0p1 with lag1):


Cli:admin > linkagg port r1sr1sl13d0p1 bind lag1
Result: .. message: waiting - other CLI command in progress
.. message: successful completed command
...................................................................................................................................................................................................

Logout from CLI:

....................................................................................................................................................................................................................................
1350 OMS
20-175
8DG42227DAAA 9.6
Issue 3 December 2012

----

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................

Cli:admin > logout


E...................................................................................................................................................................................................
N D O F S T E P S

Task for TSS10

TSS10 LAG Port Creation and Configuration:


...................................................................................................................................................................................................

1
Figure 20-84 TSS10 Link Aggregation Group Management

From the Link Aggregation Group Management tab, go to the bottom of the page and fill
the fields related to:

Size (e.g. 2)

Name (just the LAG ID, i.e. the numerical identifier) (e.g. 1)

Actor Admin Key (e.g. 1)

Admin State to enable

EthClient Type to NNI

....................................................................................................................................................................................................................................
1350 OMS
20-176
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Once the port has been created enable the In Band Management:
Figure 20-85 Tss10 Enable the In Band Management

....................................................................................................................................................................................................................................
1350 OMS
20-177
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the In-band Management tab and check the configuration (click on save if you
need to modify the Management Plan Label)
Figure 20-86 TSS60 In Fiber In Band Configuration

...................................................................................................................................................................................................

Bind the ports in the LAG repeating the following steps for each port that is designed to
be member of the LAG:

....................................................................................................................................................................................................................................
1350 OMS
20-178
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................

Select the local port and set the Client Type as LAG:
Figure 20-87 Tss10 portInLAG

....................................................................................................................................................................................................................................
1350 OMS
20-179
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click on Configure LAG link in order to open the view for the aggregation of the port to
the LAG created before:
Figure 20-88 Tss10 port member of LAG configuration

....................................................................................................................................................................................................................................
1350 OMS
20-180
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Once the view is opened select the Actor Admin Key of the LAG you want to associate:
Figure 20-89 Tss10_portInLAGconfigActor

....................................................................................................................................................................................................................................
1350 OMS
20-181
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

Lag Port Creation (Via Zic)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Complete the configuration enablig the Admin State of the member port.
Figure 20-90 Tss10_portInLAGadminState

Result: The configuration of the Network Element is now complete.

In order to reach the nodes from the NMS it is now required to configure the ip
network in the middle (between node and NMS) according to the DCN topology and
the addresses plan.
For a simple test, if the NMS is in the same sub network of the Q LAN interface of a
gateway NE (e.g. a TSS160C), is possible to configure a static route on the NE (as
explained before) and a static route on the NMS and verify if the node inside the ring
are reachable from the NMS (ping).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-182
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

NMS Start Supervision (NE Not Defined On NMS)

....................................................................................................................................................................................................................................

NMS Start Supervision (NE Not Defined On NMS)


When to use

Use this function to start the Supervision on a Network Element.


Related Information

This task does not have any related information.


Before you begin

Create the Network Elements NE Manager side, set the right addresses and verify that
NMS is able to reach the nodes in the ring.
Task

Once the Network Elements are reachable via NMS, it is possible to start the Supervision.
...................................................................................................................................................................................................

1
Figure 20-91 NMS Start Supervision

....................................................................................................................................................................................................................................
1350 OMS
20-183
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

NMS Start Supervision (NE Not Defined On NMS)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Once the supervision starts, select the Nodes Physical Manager side and ask for
Synchronize NE.
Figure 20-92 NMS Synchronize NE

....................................................................................................................................................................................................................................
1350 OMS
20-184
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

NMS Start Supervision (NE Not Defined On NMS)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the Physical Manager, if you need, you can add the node in the MAPs.
Figure 20-93 NMS add Node In Map

....................................................................................................................................................................................................................................
1350 OMS
20-185
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

NMS Start Supervision (NE Not Defined On NMS)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the Physical Manager, create the Physical Connections, one for each Link Member
of the LAG.
Figure 20-94 NMS Create Physical Connection

....................................................................................................................................................................................................................................
1350 OMS
20-186
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

NMS Start Supervision (NE Not Defined On NMS)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Here the Physical Connection Creation wizard of the Physical Manager:


Figure 20-95 NMS Create Physical Connection wizard

Once the full set of Physical Connections related to the Links composing the LAG has
been created, the next step is the definition of the nodes PKT side.

....................................................................................................................................................................................................................................
1350 OMS
20-187
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

NMS Start Supervision (NE Not Defined On NMS)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the node you need to define from the Available NE list of the PKT and ask for
Define NE.
Figure 20-96 NMS Define NE

....................................................................................................................................................................................................................................
1350 OMS
20-188
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

NMS Start Supervision (NE Not Defined On NMS)

....................................................................................................................................................................................................................................

Result: During the Define NE operation the Ethernet Local Ports, the LAG Ports, and

the Physical Links (defined from the Physical Manager on the ports member of the
LAGs) will be automatically uploaded.
...................................................................................................................................................................................................

For each node, ask for Ethernet Local Ports and verify the presence of the LAG port
defined before via ZIC:
Figure 20-97 NMS Ethernet Physical Port list

....................................................................................................................................................................................................................................
1350 OMS
20-189
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

NMS Start Supervision (NE Not Defined On NMS)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In order to build the Link Over LAG, select Action > Packet > Construction > Transport
Link > Create LAG Link Over Cable From Ports as depicted in the snapshot:
Figure 20-98 Create LAG Link over Cable

....................................................................................................................................................................................................................................
1350 OMS
20-190
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

NMS Start Supervision (NE Not Defined On NMS)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the nodes in the wizard, and the LAG ports extremities of the Link Over LAG and
commit the creation:
Figure 20-99 Create Link Over Cable

...................................................................................................................................................................................................

10

The Link Over LAG will be created using the LAG ports created before via ZIC and
uploaded NMS side.

....................................................................................................................................................................................................................................
1350 OMS
20-191
8DG42227DAAA 9.6
Issue 3 December 2012

Provider Backbone Bridge Network Management


In Band Management

NMS Start Supervision (NE Not Defined On NMS)

....................................................................................................................................................................................................................................

Moreover it will refer to the Links built before using the Physical Manager (the links
using as extremities the ports member of the LAG).
Figure 20-100 NMS Link Over LAG list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
20-192
8DG42227DAAA 9.6
Issue 3 December 2012

21

21
Broadcast
TV Service
Management

Overview
Purpose

This chapter describes the BTV service emulation in the scope of Ethernet Connection
Oriented and Connection Less management.
Contents
Section I: Introduction

21-3

Overview about Broadcast TV

21-4

Managing Broadcast TV Elements

21-5

View the list of Broadcast TV Elements

21-6

Create a BTV Element

21-8

Modify a BTV Element

21-11

Delete a BTV Element

21-14

View the details of the BTV Elements

21-16

Details of a BTV Elements

21-17

View the list of ETPs belonging to a BTV Element

21-18

Description of the list of BTV ENE inventory

21-19

Create an ETP in a BTV Element

21-20

Delete an ETP in a BTV Element

21-22

Section II: Workflow for BTV construction

21-24

Create path on 1350 OMS SDH application

21-25

Create Broadcast TV Element

21-26

Create Link Broadcast TV

21-29

Section III: Workflow for BTV Service Management

21-33

Create a Customer

21-34

Create Ethernet Service

21-35

Create a Connection Oriented EVC

21-37

...................................................................................................................................................................................................................................
1350 OMS
21-1
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management

Overview

....................................................................................................................................................................................................................................

Section IV: Bridge Based BTV Service

21-40

Overview about the Services

21-41

IGMP Snooping Management

21-42

IGMP Snooping State Management

21-44

....................................................................................................................................................................................................................................
1350 OMS
21-2
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Overview

....................................................................................................................................................................................................................................

Section I: Introduction
Overview
Purpose

This section describes the BTV service emulation in the scope of Ethernet Connection
Oriented management.
Contents
Overview about Broadcast TV

21-4

Managing Broadcast TV Elements

21-5

View the list of Broadcast TV Elements

21-6

Create a BTV Element

21-8

Modify a BTV Element

21-11

Delete a BTV Element

21-14

View the details of the BTV Elements

21-16

Details of a BTV Elements

21-17

View the list of ETPs belonging to a BTV Element

21-18

Description of the list of BTV ENE inventory

21-19

Create an ETP in a BTV Element

21-20

Delete an ETP in a BTV Element

21-22

....................................................................................................................................................................................................................................
1350 OMS
21-3
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Overview about Broadcast TV

....................................................................................................................................................................................................................................

Overview about Broadcast TV


Broadcast TV description

The user defines an EPLAN or an EVPLAN service. The choice depends on whether the
SDH partially terminated path is shared or not with other services. The user is suggested
to use the comment field to state that the service is a BTV service.
The 1350 OMS PKT user defines an EVC belonging to an EPLAN or an EVPLAN
service with the following characteristics:

Multipoint to multipoint.
Unicast.

The EVC termination is chosen among the Ethernet Physical ports available on real
NEs ending the SDH broadcast path.

The 1350 OMS PKT user defines a set of Ethernet Segments having common TD, TC,
and Color Profile (if needed).
The user is requested to define one Ethernet Segment for each Link Over TDM taking
care about the assigned directionality:

For SDH broadcast path sources: each Ethernet Segment must start from a real NE
and must end on the ENE playing the BTV role.
For SDH broadcast path sinks: each Ethernet Segment must start from the ENE
playing the BTV role and must end on a real NE.

Then, all built Ethernet Segments can be Allocated and Implemented, allowing the
Broadcast traffic flowing.
Note: Operations are in users hands. No specific congruence checks are performed by
1350 OMS PKT for EPLINE or EVPLINE services emulating BTV services.

....................................................................................................................................................................................................................................
1350 OMS
21-4
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Managing Broadcast TV Elements

....................................................................................................................................................................................................................................

Managing Broadcast TV Elements


Overview

The BTV Element management, part of the network construction, consists in:

performing actions such as:

creating, modifying, deleting BTV Elements.


creating, deleting ETPs.
displaying BTV Element information such as:

BTV Element list.


ETP list.
properties.

The BTV Element management chain gives the order in which the available actions can
be performed.
Figure 21-1 BTV Element management chain

....................................................................................................................................................................................................................................
1350 OMS
21-5
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

View the list of Broadcast TV Elements

....................................................................................................................................................................................................................................

View the list of Broadcast TV Elements


When to use

The Broadcast TV Element list presents all the ENEs managed (that is, already defined)
by the 1350 OMS PKT, and their attributes.
Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Set the filter condition to Role=BTV and click Filter.

....................................................................................................................................................................................................................................
1350 OMS
21-6
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

View the list of Broadcast TV Elements

....................................................................................................................................................................................................................................

Result: The list window is shows all the available ENEs and their attributes according
to the filter condition.
Figure 21-2 Broadcast TV Element List window

The attributes displayed for each ENE are:


User Label.

Parent Subnetwork.
ENE Role: BTV.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-7
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Create a BTV Element

....................................................................................................................................................................................................................................

Create a BTV Element


When to use

This function consists in making visible for the 1350 OMS PKT a NE or a set of NEs not
managed by the 1350 OMS PKT.
Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
The user is authorized to create a BTV Element in the main parent subnetwork (called
MEN by default).
Not managed NE are NE contained in an adjacent subnetwork not accessible for the 1350
OMS PKT.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

Note: It is authorized to create BTV Element, as an ENE, in the main parent


subnetwork (called MEN by default).
To get a positive result:

The parent subnetwork must exist.


The Table B-1, Limits for Subnetworks (p. B-1) in the selected subnetwork must
not be reached.
The Table B-5, Limits for ENEs (p. B-2) must not be reached.
The User Label must be different as one which is already used by another ENE.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create External Network Element.

....................................................................................................................................................................................................................................
1350 OMS
21-8
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Create a BTV Element

....................................................................................................................................................................................................................................

Result:
Figure 21-3 Broadcast TV Element Creation window

...................................................................................................................................................................................................

To create an ENE:

Enter a BTV Element User Label.

Choose the Parent Subnetwork by using the sensitive help.


Enter a Domain: choose a Provider Domain for BTV Service on Provider Bridge in
Connection Less networks.
Choose the ENE Role: BTV.
Enter a Comment (optional).

...................................................................................................................................................................................................

Click Ok.

....................................................................................................................................................................................................................................
1350 OMS
21-9
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Create a BTV Element

....................................................................................................................................................................................................................................

Result: The BTV Element is created with an amount of ETPs, which are
automatically created. See Table B-6, Limits for ETPs in an ENE (p. B-2)

The tree area, the BTV Element list and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-10
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Modify a BTV Element

....................................................................................................................................................................................................................................

Modify a BTV Element


When to use

The function modifies BTV Element characteristics.


Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
The BTV Element modification gives the possibility to modify:

BTV Element User Label.


Comment.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

If the User Label is modified, the new User Label must be different as one which is
already used by another ENE.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according

to the filter condition.


...................................................................................................................................................................................................

Select an item in the list.

....................................................................................................................................................................................................................................
1350 OMS
21-11
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Modify a BTV Element

....................................................................................................................................................................................................................................

Result:
Figure 21-4 External Network Element Modification window

...................................................................................................................................................................................................

To modify BTV Element:

Enter a New User Label (optional).

Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS
21-12
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Modify a BTV Element

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok.
Result: Then, the Broadcast TV Element list, the tree area, and the opened graphical

views are updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-13
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Delete a BTV Element

....................................................................................................................................................................................................................................

Delete a BTV Element


When to use

This function consists in deleting a BTV Element and its ETPs from the 1350 OMS PKT
supervision.
Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The usage state of the ETPs belonging to the BTV Element must be idle.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according

to the filter condition.


...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > from External Network Element > Delete or right-click the mouse and
Select Delete.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS
21-14
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Delete a BTV Element

....................................................................................................................................................................................................................................

Result: After confirmation, the BTV Elements and their ETPs are removed.

The Broadcast TV Element list, the tree area, and the opened graphical views are
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-15
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

View the details of the BTV Elements

....................................................................................................................................................................................................................................

View the details of the BTV Elements


When to use

This function gets information about a BTV Element.


Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according

to the filter condition.


...................................................................................................................................................................................................

Select the ENE in the list.


...................................................................................................................................................................................................

Select Search > Properties.


Result: The ENE properties window is displayed.

See the following topic in this document: Details of a BTV Elements (p. 21-17)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-16
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Details of a BTV Elements

....................................................................................................................................................................................................................................

Details of a BTV Elements


Attributes of a BTV Element

The attributes displayed for each ENE are:

User Label.

Parent Subnetwork.

Domain.

ENE Role: BTV.

Comment.

....................................................................................................................................................................................................................................
1350 OMS
21-17
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

View the list of ETPs belonging to a BTV Element

....................................................................................................................................................................................................................................

View the list of ETPs belonging to a BTV Element


When to use

This function consists in displaying the External Termination Ports of a previously


selected BTV Element and their attributes.
Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according

to the filter condition.


...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from External Network Element > ETP List.
Result: The broadcast TV NE ETP list is displayed.

See the following topic in this document: Description of the list of BTV ENE
inventory (p. 21-19)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-18
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Description of the list of BTV ENE inventory

....................................................................................................................................................................................................................................

Description of the list of BTV ENE inventory


Attributes of an ETP

The attributes displayed for each ETP are:

Identifier.

Transport Link.

Supported Layer (None, Ethernet, MPLS).

Interface Rate.

Usage State (Not meaningful, Idle, Busy).

Manager Control.

Client Type (ETS, ETB, ETS-P).

NAD.

....................................................................................................................................................................................................................................
1350 OMS
21-19
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Create an ETP in a BTV Element

....................................................................................................................................................................................................................................

Create an ETP in a BTV Element


When to use

This function consists in creating ETPs that represent Ethernet ports located in the
selected BTV Element.
Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

In the ENE, the amount of ETPs must not exceed the maximum. See Table B-6,
Limits for ETPs in an ENE (p. B-2)
Note: When the BTV Element is created, the ETP is created by default.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according

to the filter condition.


...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Action > External TP > Create ETP.

....................................................................................................................................................................................................................................
1350 OMS
21-20
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Create an ETP in a BTV Element

....................................................................................................................................................................................................................................

Result: The ETP creation window is displayed.


Figure 21-5 ETP Creation window

To create ETPs:
Enter the first ETP to create (That is a numerical value corresponding to the first
ETP number to be used).
Enter the Number of ETP to create. Valid numerical value is between 1 and the
Table B-6, Limits for ETPs in an ENE (p. B-2) which can be created on a ENE.
See Table B-6, Limits for ETPs in an ENE (p. B-2)
...................................................................................................................................................................................................

Click Ok button.
Result: The ETPs (added after the first ones automatically created at the ENE
creation) are always created with Manager Control set to Disabled.

The ETPs are automatically generated by the 1350 OMS PKT and the ETP List is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-21
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Delete an ETP in a BTV Element

....................................................................................................................................................................................................................................

Delete an ETP in a BTV Element


When to use

This function consists in deleting ETPs from a previously selected BTV Element.
Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The usage state of the ETPs belonging to the ENE must be idle.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according
to the filter condition.
...................................................................................................................................................................................................

Select an item in the list.


...................................................................................................................................................................................................

Select Search > Inventory from External Network Element > ETP List.
Result: The ETP list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > External TP > Delete or right-click the mouse and Select Delete.

....................................................................................................................................................................................................................................
1350 OMS
21-22
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section I: Introduction

Delete an ETP in a BTV Element

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: After confirmation, the ETPs are removed from BTV Element.

The ETP Inventory list is updated.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-23
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section II: Workflow for BTV construction

Overview

....................................................................................................................................................................................................................................

Section II: Workflow for BTV construction


Overview
Purpose

This section provides information about the workflow that is required for the BTV
construction.
Contents
Create path on 1350 OMS SDH application

21-25

Create Broadcast TV Element

21-26

Create Link Broadcast TV

21-29

....................................................................................................................................................................................................................................
1350 OMS
21-24
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section II: Workflow for BTV construction

Create path on 1350 OMS SDH application

....................................................................................................................................................................................................................................

Create path on 1350 OMS SDH application


Overview

The first operation for BTV Service Management is the path creation on 1350 OMS SDH
application.

The Service Type is Ethernet.

The Service Rate is 1-Gb Rate Adaptive.

The Transport Rate is AU4-nV.

Figure 21-6 Path on 1350 OMS SDH

....................................................................................................................................................................................................................................
1350 OMS
21-25
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section II: Workflow for BTV construction

Create Broadcast TV Element

....................................................................................................................................................................................................................................

Create Broadcast TV Element


When to use

This function consists in making visible for the 1350 OMS PKT a NE or a set of NEs not
managed by the 1350 OMS PKT.
Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
Not managed NE are NE contained in an adjacent subnetwork not accessible for the 1350
OMS PKT.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

Note: It is authorized to create an ENE in the main parent subnetwork (called by


default).
To get a positive result:

The parent subnetwork must exist.


The Table B-1, Limits for Subnetworks (p. B-1)in the selected subnetwork must not
be reached.
The Table B-5, Limits for ENEs (p. B-2) must not be reached.
The User Label must be different as one which is already used by another ENE.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create External Network Element.

....................................................................................................................................................................................................................................
1350 OMS
21-26
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section II: Workflow for BTV construction

Create Broadcast TV Element

....................................................................................................................................................................................................................................

Result:
Figure 21-7 Broadcast TV Element Creation window

...................................................................................................................................................................................................

To create an ENE:

Enter a BTV Element User Label.

Enter a Domain: choose a Provider Domain for BTV Service on Provider Bridge in
Connection Less networks.
Choose the ENE Role: Broadcast TV.
Enter a Comment (optional).

...................................................................................................................................................................................................

Click Ok.

....................................................................................................................................................................................................................................
1350 OMS
21-27
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section II: Workflow for BTV construction

Create Broadcast TV Element

....................................................................................................................................................................................................................................

Result: The BTV Element is created with an amount of ETPs, which are
automatically created. See Table B-6, Limits for ETPs in an ENE (p. B-2)

The tree area, the BTV Element list and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-28
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section II: Workflow for BTV construction

Create Link Broadcast TV

....................................................................................................................................................................................................................................

Create Link Broadcast TV


When to use

This function consists in defining a Link Over TDM for BTV.


Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create Link Broadcast TV.

....................................................................................................................................................................................................................................
1350 OMS
21-29
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section II: Workflow for BTV construction

Create Link Broadcast TV

....................................................................................................................................................................................................................................

Result: The Link Over Broadcast TV creation window is displayed.


Figure 21-8 Link Over TDM Broadcast TV Creation window

....................................................................................................................................................................................................................................
1350 OMS
21-30
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section II: Workflow for BTV construction

Create Link Broadcast TV

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

To create a Link Over TDM Broadcast TV:

Enter a Link User Label.

Enter a Comment (optional).

Select the Extremity A by using the sensitive help.

Select the Extremity A Termination by using the sensitive help (only the terminations
with usage state equal to Idle are proposed).
Select the Extremity Z by using the sensitive help.
Select the Extremity Z Termination by using the sensitive help (only the terminations
with usage state equal to Idle are proposed).
Choose the Supported Layer: Ethernet.
Choose the Transport Concatenation Rate: VC_4.

Enter the Concatenation level (priority which allows to increase the flexibility of
SDH bandwidth management from 0 to 63).
Insert the 1350 OMS SDH Path Id.
Choose the Client Type: ETS.
The 1350 OMS SDH Path Id is read from 1350 OMS SDH path window selecting the
path > Show set attributes > Miscellaneous.

Figure 21-9 1350 OMS SDH Path Id

....................................................................................................................................................................................................................................
1350 OMS
21-31
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section II: Workflow for BTV construction

Create Link Broadcast TV

....................................................................................................................................................................................................................................

The 1350 OMS SDH Path Id is assigned to every Link Over TDM created for the
BTV Service.
...................................................................................................................................................................................................

Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-32
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section III: Workflow for BTV Service Management

Overview

....................................................................................................................................................................................................................................

Section III: Workflow for BTV Service Management


Overview
Purpose

This section provides information about the workflow for BTV service management.
Contents
Create a Customer

21-34

Create Ethernet Service

21-35

Create a Connection Oriented EVC

21-37

....................................................................................................................................................................................................................................
1350 OMS
21-33
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section III: Workflow for BTV Service Management

Create a Customer

....................................................................................................................................................................................................................................

Create a Customer
When to use

This function allows the user to define the characteristics of the owner of one or more
BTV Elements.
Related information

After definition, the owner is permitted to use the services that are defined across the
boundaries of the managed network.
For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
For a description about customers, refer to the topic Customer description (p. 18-8).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The User Label must be different from the existing ones.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Services > Create Customer.


Result: The Customer creation window is displayed.

To create a customer:
Enter a User Label.
Enter a Company (optional).
Enter an Address (optional).

Enter a Comment (optional).

...................................................................................................................................................................................................

Click Ok button.
Result: The customer is created.

The tree area and the Customer list are updated.


E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
21-34
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section III: Workflow for BTV Service Management

Create Ethernet Service

....................................................................................................................................................................................................................................

Create Ethernet Service


When to use

This function consists in creating an Ethernet Service related to a selected customer.


Related information

For a description about BTV Elements, refer to the topic Managing Broadcast TV
Elements (p. 21-5).
For a description about customers, refer to the topic Ethernet Service description
(p. 18-17).
If the creation action is required from the Customer List, the Customer field of this
creation window is automatically filled with the selected Customer.
The Ethernet Service can also be created using the wizard. The wizard automatically
create the Connection Oriented EVC associated to the service.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

A customer must exist.

The User Label must be different from the existing.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Services > Ethernet Service Creation.

....................................................................................................................................................................................................................................
1350 OMS
21-35
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section III: Workflow for BTV Service Management

Create Ethernet Service

....................................................................................................................................................................................................................................

Result: The Ethernet Service creation window is displayed.


Figure 21-10 Create Ethernet Service

Execute the following steps:


Enter a Service User label.

Select the Customer.

Select the Service Type: EVPLINE.

In the Comment field, the user indicates that the service is a BTV Service.

...................................................................................................................................................................................................

Click Ok button.
Result: The Ethernet Service is created.

The tree area and the Ethernet Service list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-36
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section III: Workflow for BTV Service Management

Create a Connection Oriented EVC

....................................................................................................................................................................................................................................

Create a Connection Oriented EVC


When to use

This function consists in creating an Ethernet Virtual Connection.


Related information

For a description about BTV Elements, refer to the topic: Managing Broadcast TV
Elements (p. 21-5).
For a description about the Connection Oriented EVC, refer to the topic: Overview about
ETS Ethernet Virtual Connections (p. 18-37).
If this action is required from the Service List, the Ethernet Service field of the EVC
Creation window, is filled with the service selected Service.
To select the right Ethernet Service and EVC Type fields, report you to the Error!
Reference source not found.
If Termination part is not or partially filled, the user has the possibility to add EVC
terminations from the Add EVC Termination menu.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

At least, one Ethernet Service must exist.

The User Label must be not in use.

Only one Root termination is authorized.


The EVC Type must be compatible with the service type of the associated Ethernet
Service.
The EVC Type must be compatible with the selected Traffic Type.
The role of each EVC termination must be compatible with the EVC Type.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Services > Connection Oriented (ETS) > Create EVC.

....................................................................................................................................................................................................................................
1350 OMS
21-37
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section III: Workflow for BTV Service Management

Create a Connection Oriented EVC

....................................................................................................................................................................................................................................

Result: The Connection Oriented EVC creation window is displayed.


Figure 21-11 EVC Any to any Creation window

....................................................................................................................................................................................................................................
1350 OMS
21-38
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section III: Workflow for BTV Service Management

Create a Connection Oriented EVC

....................................................................................................................................................................................................................................

Execute the following steps:


Enter an EVC User Label.
Enter Ethernet Service.
Select a Type: Any to any.

Select a Traffic Type: Unicast.

Select a Service Level (Premium, Gold, Silver, Bronze).

Enter a Comment (optional).

Enter an External Mark (optional). It can be used to identify external systems


having relations with the EVC (for example an ownership).
In Termination part, enter a list of EVC terminations by using Add EVC
Termination button.
Execute the following steps:
Select the NE or ENE user label by using the sensitive help.

Select an Edge Port user label by using also the sensitive help.

Select the Role of the termination (Root, Leaf, or Both).

...................................................................................................................................................................................................

Click Ok button.
Result: The EVC is created.
...................................................................................................................................................................................................

If EVC Type is Point to multipoint or Any to any, Ethernet Segments could be


automatically created:
In Ethernet part, if Create Ethernet box is selected, select a VLAN Model (Mapping or
Tunneling).
...................................................................................................................................................................................................

Choose a Traffic Descriptor (by using the sensitive help).


...................................................................................................................................................................................................

If the chosen Traffic Descriptor is Regulated, choose a Color Profile (by using the
sensitive help) which is associated to each Ethernet Segment.
...................................................................................................................................................................................................

Taking into account the EVC Type, the Traffic Type, the directionality, and the number of
terminations provided, all the needed Ethernet Segments are automatically created.
Result: The Connection Oriented EVC is created and the EVC list consequently

updated.
The Ethernet Segment created directly from EVC must be allocated and implemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-39
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management

Overview

....................................................................................................................................................................................................................................

Section IV: Bridge Based BTV Service


Overview
Purpose

This section provides information about the Bridge based BTV Service.
Contents
Overview about the Services

21-41

IGMP Snooping Management

21-42

IGMP Snooping State Management

21-44

....................................................................................................................................................................................................................................
1350 OMS
21-40
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section IV: Bridge Based BTV Service

Overview about the Services

....................................................................................................................................................................................................................................

Overview about the Services


Workflow description

The management of Broadcast TV services, when the network is Connection Less based,
is achieved by means of following steps: the building of Ethernet connectivity on the top
of Provider Bridge and the optional configuration of IGMP Snooping on the desired
Network Elements.
The Workflow is the same as that explained in previous paragraphs Section II: Workflow
for BTV construction (p. 21-24) and Section III: Workflow for BTV Service
Management (p. 21-33) with following differences:

the BTV Element is assigned to the domain created as provider.


the EVC created is of type Connection Less.
optionally the IGMP protocol can be configured as explained in following paragraph.

....................................................................................................................................................................................................................................
1350 OMS
21-41
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section IV: Bridge Based BTV Service

IGMP Snooping Management

....................................................................................................................................................................................................................................

IGMP Snooping Management


When to use

This procedure explains how to manage IGMP Snooping.


Related information

The Internet Group Management Protocol (IGMP) is a protocol designed to connect users
to a multicast tree for multimedia applications. IGMP is carried over IP. The IGMP
Snooping is only supported on Domain where the Bridge Type of contained NEs is
Provider, Virtual, or MAC Bridge.
The IGMP Snooping is managed through navigation toward 1350 OMS EML. Each
broadcast-channel supplier has one C-VLAN and one S-VLAN.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

The user workflow to manage IGMP snooping is:


...................................................................................................................................................................................................

Define the bridge domain and assign the 1850 TSS 320 equipment to the domain.
...................................................................................................................................................................................................

Choose one S-VLAN for each video-service supplier (the C-VLAN is chosen by the
router).
...................................................................................................................................................................................................

Create the EVC for the video-service supplier. The EVC characteristics are:

Virtual resource sharing.


Full-meshed VLAN distribution.

The S-VLAN identifying the video supplier.


C-VLAN preservation is not mandatory (because of POP operation).
The C-VLAN identifying the video supplier.

....................................................................................................................................................................................................................................
1350 OMS
21-42
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section IV: Bridge Based BTV Service

IGMP Snooping Management

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Add one EVC termination for each host or DSLAM served by the video supplier

Associate to the termination a Traffic Descriptor that selects the C-VLAN


corresponding to the video supplier which the host is subscribed to.
For each defined DSLAM, EVC termination can optionally provide the PUSH
operation.

...................................................................................................................................................................................................

Add one EVC termination for the BSR

Associate to the termination a Traffic Descriptor that selects the C-VLAN of the video
supplier3.
For the defined BSR, EVC termination Must provide the POP operation.

...................................................................................................................................................................................................

Allocate and implement the EVC.


...................................................................................................................................................................................................

For each 1850 TSS 320 , start the navigation toward 1350 OMS EML:

Enable the IGMP snooping for the video supplier S-VLAN.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
21-43
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section IV: Bridge Based BTV Service

IGMP Snooping State Management

....................................................................................................................................................................................................................................

IGMP Snooping State Management


IGMP Snooping reminder

This function is evolved to provide a reminder helping the management of services to


enable the IGMP Snooping Protocol.
This reminder is important to reach two main goals:

To remind the user to perform Navigation toward NEs only after having implemented
the EVC supporting the IGMP Snooping.
To remind the user to perform Navigation toward NEs before De-Implementing an
EVC supporting the IGMP Snooping. This action also prevents errors during the
de-implementation phase.

EVC Definition

At EVC definition level, the user can optionally define the value of igmpSnooping
attribute. This operation is available only for EVPLAN, Extended EVPLAN, and BTV
EVC types.
In these cases, the possible values are:

Enabled. Just to remind that the user has the intention to use the IGMP snooping

protocol on top of such EVC.


Possible scenarios:

To enable the IGMP snooping immediately after having implemented the EVC.
To disable the IGMP snooping immediately before de-implemented the EVC.

Disabled. Just to remind that the user does not want to use the IGMP on that EVC.

EVC Implementation

When the user starts the EVC Implementation operation, and the attribute igmpEnabled is
set to Enabled, a pop-up window is raised to remind the user to perform a navigation
toward affected NE.
This operation is available only for Extended EVPLAN and BTV EVCs.
The pop-up window must be acknowledged by the user without further affect the
implementation procedure.
EVC De-Implementation

When the user starts the EVC De-Implementation operation and the attribute
igmpEnabled is set to Enabled, a pop-up window is raised to remind the user to perform a
navigation toward affected NE.
This operation is available only for Extended EVPLAN and BTV EVC types.

....................................................................................................................................................................................................................................
1350 OMS
21-44
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management


Section IV: Bridge Based BTV Service

IGMP Snooping State Management

....................................................................................................................................................................................................................................

The pop-up window can be:

Acknowledged by the user with the option STOP the de-implementation procedure,
letting the user complete all the needed navigation.
Acknowledged by the user with the option CONTINUE the de-implementation
procedure, when the user is aware that all Navigation Issues are already
accomplished.

EVC Modification

The Attribute igmpEnabled can be modified in the following cases:

The EVC ServiceType is EVPLAN, extended EVPLAN or BTV.

The EVC provisioningState can have any value.


The following situations must be managed:
If the EVC is Implemented, the transition from Disable to Enable triggers the
pop-up window.
If the EVC is Implemented, the transition from Enable to Disable triggers the
second pop-up window.
In all other cases, the modification of the igmpEnabled attribute is not allowed
and an explicit exception is returned.

....................................................................................................................................................................................................................................
1350 OMS
21-45
8DG42227DAAA 9.6
Issue 3 December 2012

Broadcast TV Service Management

IGMP Snooping State Management

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
21-46
8DG42227DAAA 9.6
Issue 3 December 2012

22

Network Supervision
22

Overview
Purpose

This chapter describes how to manage alarms and performance monitoring.


Contents
Managing alarms

22-2

Overview about alarms

22-2

Alarms from ISA E/FE/GE board

22-3

Alarms from ISA ES1/4 board

22-4

Alarms from ISA ES16 board

22-6

Alarms or Events on SDH paths from 1350 OMS SDH

22-8

Alarm status management

22-9

Alarm correlation and generation toward AS


Managing Fault Localization

22-11
22-12

Display the Fault Localization list

22-12

Description of Fault Localization

22-14

Manual Synchronization of Alarms on NE

22-15

Specific Behavior
Client Signal Fail Alarm Management

22-16
22-16

...................................................................................................................................................................................................................................
1350 OMS
22-1
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing alarms

Overview about alarms

....................................................................................................................................................................................................................................

Managing alarms
Overview about alarms
Manage elementary alarms

1350 OMS PKT provides the following services to manage elementary alarms (see
Management Layers (p. 11-5) and Network architecture overview (p. 11-7)):

Current alarm management (with the history).

Fault Localization.

For every alarm raised, a specific clear is sent.


In case of packet concatenation, only Packet GFP interface can generate alarms on TDM
termination.
Alarm probable cause

In the following, is given information about the probable cause of the alarm to understand
their meaning and origin:

LOS (Loss of Signal) alarm covers the defects that occur in the following cases:
Loss of electrical or optical power,.
Failed Auto-negotiation process (LOS defect),.
No synchronization (LOS defect),.

No comma detection (LOF defect),.


Card failure or card missing (ISA ES16),.
URU alarm in case of incorrect manual provisioning of Ethernet accesses (ISA
ES16).
ISA NE raises a TSF (Trail Signal Failed) or DEG (trail signal Degraded) alarm after
detecting a defect due to failed SDH VCs (TSF or TSD).
ISA NE raises a PLM (Pay Load Mismatch) alarm after detecting an SDH VC
problem (related to packet or virtual concatenation).
ISA NE raises a GTM (GFP Type Mismatch) alarm after detecting a GFP format
mismatch.
ISA NE raises a LOF (Loss of Frame) alarm after detecting an Ethernet defect.
ISA NE raises a CSF (Client Signal Failure) alarm when a failure is detected on one
Customer Edge.

....................................................................................................................................................................................................................................
1350 OMS
22-2
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing alarms

Alarms from ISA E/FE/GE board

....................................................................................................................................................................................................................................

Alarms from ISA E/FE/GE board


Overview

In the following table is given the list of elementary alarms generated by ISA E/FE/GE
boards and the mapping with elementary objects inside 1350 OMS SDH and 1350 OMS
PKT.
Such alarms must be managed through 1350 OMS SDH.
Table 22-1

ISA E/FE/GE alarms

Alarm [Default
severity = Path
alarm ASAP].
Loss of GFP[MAJ].

Probable Cause.

Loss of frame.

NE object [1350 OMS


PKT object].
GDataTransportCTPbid.

1350 OMS SDH


Object.
NAP.

[TDM termination].
AIS Alarm Indication
Signal[NAL].

AIS.

GDataTransportCTPbid.

NAP.

SignalLabelMismatch[MAJ].

SignalLabelMismatch.

GDataTransportCTPbid.

Loss of Signal[MAJ].

Loss of Signal.

GMauTTP[Ethernet Port].

PORT.

URU on Physical
Interface[MAJ].

Underlying Resource
Unavailable.

GMauTTP[Ethernet Port].

PORT.

[TDM termination].
NAP.

[TDM termination].

....................................................................................................................................................................................................................................
1350 OMS
22-3
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing alarms

Alarms from ISA ES1/4 board

....................................................................................................................................................................................................................................

Alarms from ISA ES1/4 board


Overview

In the following table, the list of elementary alarms is given. These alarms are generated
by ISA ES1/4 boards. The mapping with elementary objects inside 1350 OMS PKTis also
given in the table.
Such alarms must be managed directly from NE through SNMP.
Table 22-2

ISA ES1/4 alarms or events

Alarm/Notif.
[Default
severity =
Path alarm
ASAP].

Board
Release.

Loss of
GFP[MAJ].

1.0.

TSF[MAJ].

1.0.

Probable
Cause.

Loss of frame.

NE object.
[1350 OMS
PKT object].

GFP interface.
[TDM
termination].

Trail Signal Fail.

GFP interface.
[TDM
termination].

TSF[MAJ].

1.0.

Trail Signal Fail.

LAPS interface.
[TDM
termination].

Loss of Signal.

1.0.

Loss of Signal.

[MAJ].

ETHERNET
Local.
[Ethernet port].

GTM[MIN].

PLM[MAJ].

PLM[MAJ].

Notes.

1.0.

1.0.

1.0.

GFP Type
Mismatch.

GFP interface.

Payload
Mismatch.

GFP interface.

Payload
Mismatch.

LAPS interface.

When the GFP interface is


connected to an SDH Path,
a correspondent alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
When the LAPS interface
is connected to an SDH
Path, a correspondent
alarm exists on SDH Path
(NB: no SDH path alarm
in case of SDH
independence).
It summarizes also URU
(until URU is explicitly
managed).

[TDM
termination].
[TDM
termination].
[TDM
termination].

....................................................................................................................................................................................................................................
1350 OMS
22-4
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing alarms

Alarms from ISA ES1/4 board

....................................................................................................................................................................................................................................

Table 22-2

ISA ES1/4 alarms or events

Alarm/Notif.
[Default
severity =
Path alarm
ASAP].
DEG[NAL].

Board
Release.

1.0.

Probable
Cause.

Degrade.

(continued)
NE object.
[1350 OMS
PKT object].

GFP interface.
[TDM
termination].

DEG[NAL].

1.0.

Degrade.

LAPS interface.
[TDM
termination].

CSF.

1.2.

Client Signal
Fail.

GFP interface.
[TDM
termination].

Notes.

When the GFP interface is


connected to an SDH Path,
a correspondent
Bandwidth Reduced alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
When the LAPS interface
is connected to an SDH
Path, a correspondent
Bandwidth Reduced alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
The CSF have to be
always managed as it
highlight problems in case
of NE isolation and in case
of SDH independence.

....................................................................................................................................................................................................................................
1350 OMS
22-5
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing alarms

Alarms from ISA ES16 board

....................................................................................................................................................................................................................................

Alarms from ISA ES16 board


Overview

In the following table is given the list of elementary alarms generated by ISA ES16 board
and the mapping with elementary objects inside 1350 OMS PKT.
Such alarms must be managed directly from NE (through SNMP).
Table 22-3

ISA ES16 alarms or events

Alarm/Notif.
[Default
severity =
Path alarm
ASAP].

Board
Release.

Loss of
GFP[MAJ].

2.0.

TSF[MAJ].

2.0.

Probable
Cause.

Loss of frame.

NE object.
[1350 OMS
PKT object].

GFP interface.
[TDM
termination].

Trail Signal Fail.

GFP interface.
[TDM
termination].

TSF[MAJ].

2.0.

Trail Signal Fail.

HDLC interface.
[TDM
termination].

TSF[MAJ].

2.0.

Trail Signal Fail.

LAPS interface.
[TDM
termination].

Loss of Signal.

2.0.

Loss of Signal.

[MAJ].

ETHERNET
Local.
[Ethernet port].

GTM[MIN].

Notes.

2.0.

GFP Type
Mismatch.

When the GFP interface is


connected to an SDH Path,
a correspondent alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
When the HDLC interface
is connected to an SDH
Path, a correspondent
alarm exists on SDH Path
(NB: no SDH path alarm
in case of SDH
independence).
When the LAPS interface
is connected to an SDH
Path, a correspondent
alarm exists on SDH Path
(NB: no SDH path alarm
in case of SDH
independence).
It summarizes also URU
(until URU is explicitly
managed).

GFP interface.
[TDM
termination].

....................................................................................................................................................................................................................................
1350 OMS
22-6
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing alarms

Alarms from ISA ES16 board

....................................................................................................................................................................................................................................

Table 22-3

ISA ES16 alarms or events

Alarm/Notif.
[Default
severity =
Path alarm
ASAP].
PLM[MAJ].

PLM[MAJ].

PLM[MAJ].

DEG[NAL].

Board
Release.

2.0.

2.0.

2.0.

2.0.

Probable
Cause.

(continued)
NE object.
[1350 OMS
PKT object].

Payload
Mismatch.

GFP interface.

Payload
Mismatch.

HDLC interface.

Payload
Mismatch.

LAPS interface.

Degrade.

GFP interface.

[TDM
termination].
[TDM
termination].
[TDM
termination].
[TDM
termination].

DEG[NAL].

2.0.

Degrade.

HDLC interface.
[TDM
termination].

DEG[NAL].

2.0.

Degrade.

LAPS interface.
[TDM
termination].

CSF.

2.1.

Client Signal
Fail.

Notes.

GFP interface.
[TDM
termination].

When the GFP interface is


connected to an SDH Path,
a correspondent
Bandwidth Reduced alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
When the HDLC interface
is connected to an SDH
Path, a correspondent
Bandwidth Reduced alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence.
When the LAPS interface
is connected to an SDH
Path, a correspondent
Bandwidth Reduced alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
The CSF have to be
always managed as it
highlight problems in case
of NE isolation and in case
of SDH independence.

....................................................................................................................................................................................................................................
1350 OMS
22-7
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing alarms

Alarms or Events on SDH paths from 1350 OMS SDH

....................................................................................................................................................................................................................................

Alarms or Events on SDH paths from 1350 OMS SDH


Overview

All SDH paths alarms are available on 1350 OMS SDH.


Objects directly affected on 1350 OMS PKT are:

SDH Path,.
Link Over TDM.

Table 22-4

SDH Path Alarm management

Alarm.

1350
OMS
SDH
Object.

Major.

Path.

Probable Cause.

TransportFailure.

Derived from
alarms on
1350 OMS SDH
element
object.
NAP,.
Boundary CTP,.
DATA PORT.

Major.

Path.

TransportIncomingFailure.

Boundary CTP.

Major.

Path.

ExBer.

NAP.

Major.

Path.

TransportOutgoingFailure.

Boundary CTP,.

Notes.

These three alarms


contribute to the
management of 1350
OMS SDH operational
State.

DATA NAP.
Minor.

Path.

BandwidthReduced.

DATA NAP.

Major.

PAth.

LCASProtocolError.

DATA NAP.

Useful to catch bandwidth


reduction for path with
packet concatenation.

....................................................................................................................................................................................................................................
1350 OMS
22-8
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing alarms

Alarm status management

....................................................................................................................................................................................................................................

Alarm status management


Overview

The following figure shows the 1350 OMS PKT entities affected by NE or 1350 OMS
SDH alarms.

....................................................................................................................................................................................................................................
1350 OMS
22-9
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing alarms

Alarm status management

....................................................................................................................................................................................................................................

Figure 22-1 Alarm status management

....................................................................................................................................................................................................................................
1350 OMS
22-10
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing alarms

Alarm correlation and generation toward AS

....................................................................................................................................................................................................................................

Alarm correlation and generation toward AS


Overview

The following figure is entirely related to 1350 OMS PKT and shows:

how alarms or events are internally propagated,.

which are the affected entities,.


which objects generate alarms toward AS component.

Figure 22-2 Alarm correlation

....................................................................................................................................................................................................................................
1350 OMS
22-11
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision

Display the Fault Localization list

....................................................................................................................................................................................................................................

Managing Fault Localization


Display the Fault Localization list
When to use

This function consists in displaying alarms for a Link Over TDM, a Link Over Cable, an
Ethernet Segment or an LSP Tunnel.
Related information

See the following topic in this document:Fault Localization (p. 11-69).


If the Entity Type is equal to TDM termination (Ethernet Port,Edge Port), Show Alarms
command is not available.
The 1350 OMS PKT displays up to 100 alarms. When the number of alarms is superior to
100, a confirmation box is displayed. After confirmation, the truncated list is displayed.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions

To get a positive result:

The Availability status of the entity must be either Degraded or In Failure.

Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select one of the following menus:

Search > Packet > Construction > Transport Links > Links Over TDM (Sdh/Sonet).

Search > Packet > Construction > Transport Links > Links Over Cable.

Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments.

Search > Packet > MPLS > LSP Tunnels.


Result: The list window is shown.

...................................................................................................................................................................................................

Select an item in the list.

....................................................................................................................................................................................................................................
1350 OMS
22-12
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing Fault Localization

Display the Fault Localization list

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select Search > Fault Localization.


Result: The list window is displayed.

See the following topic in this document: Description of Fault Localization


(p. 22-14)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
22-13
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing Fault Localization

Description of Fault Localization

....................................................................................................................................................................................................................................

Description of Fault Localization


Attributes of Fault Localization

The attributes displayed for each entity are:

User Label.

Entity type.

Alarm / Availability State.

Specific Fault Date.

Probable Cause.

Operator Label

NE User Label

Global Alarm Date

....................................................................................................................................................................................................................................
1350 OMS
22-14
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Managing Fault Localization

Manual Synchronization of Alarms on NE

....................................................................................................................................................................................................................................

Manual Synchronization of Alarms on NE


When to use

This function allows the user to re-synchronize, on NE basis, all alarms currently existing
on a given NE. The operation can be started by the user.
Related information

See the following topic in this document:Fault Localization (p. 11-69).


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select the NE and issue Action > Network Elements > Alarm Synchronization.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: If the operation is confirmed, all existing alarms for the selected NE are

resynchronized toward Fault Management application and inside 1350 OMS PKT
application.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
22-15
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Specific Behavior

Overview

....................................................................................................................................................................................................................................

Specific Behavior
Client Signal Fail Alarm Management
When to use

This procedure explains how to manage Client Signal Fail.


Related Information

Following conditions must be verified when the CSF alarm feature is activated:

Service is EPLINE, built upon a single SDH path with transparent GFP or EPLAN
emulating BTV services.
ISA NE at extremities supports CSF alarms and consequent actions (ES1/4 1.2, ES16
2.1).
Autonegotiation must be enabled on local ports (Reminder: Autonegotiation is not
supported on GE interfaces. In consequence, CSF cannot be enabled if GE is
involved).
Note: No check is done by the 1350 OMS PKT from this point of view because
everything is managed by the user during Navigation.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

The global scenario is in the following provided:


...................................................................................................................................................................................................

Select an Ethernet Service.


...................................................................................................................................................................................................

Retrieve Edge Ports terminating the Ethernet Service.


Result: For each retrieved Edge Port, a Navigation toward 1350 OMS EML is started

to configure the CSF consequent Action (laser shut down enabled).


...................................................................................................................................................................................................

Retrieve the Transport Link used by the service.

....................................................................................................................................................................................................................................
1350 OMS
22-16
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision
Specific Behavior

Client Signal Fail Alarm Management

....................................................................................................................................................................................................................................

Result: TDM terminations are retrieved.

For each retrieved TDM termination, a Navigation toward 1350 OMS EML is started
to configure the CSF Capability Support (CSF bidirectional propagation).
In case of BTV service emulation, the TDM termination interested to VC-AIS
propagation are connected to Broadcast SDH path acting as Sources.
After this scenario, GFP-CSF frame insertion (or VC-AIS propagation) and
consequent actions are automatically configured on the PEs accordingly.
...................................................................................................................................................................................................

If the service is implemented or commissioned, the CSF feature and consequently action
can be enabled or disabled.
Service implementation.
Result: CSF consequent action disabling (Mandatory for resetting the possible CSF

configuration, already present on the NE).


CSF consequent action enabling.
...................................................................................................................................................................................................

If the service is de-implemented, the CSF feature and consequently action can be
disabled.
Result: CSF consequent action disabling.

Service de-implementation.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
22-17
8DG42227DAAA 9.6
Issue 3 December 2012

Network Supervision

Client Signal Fail Alarm Management

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
22-18
8DG42227DAAA 9.6
Issue 3 December 2012

23

Network Utilities
23

Overview
Purpose

This chapter describes how to use NE audit, alignment, force alignment, reservation, and
recovery.
Contents
Audit, Alignment, Reservation, Recovery

23-2

The AAR procedure

23-3

NE Audit tool

23-6

Results of Audit

23-8

Reservation tool

23-13

Align Up of Ethernet Domain Data

23-15

Start the audit, alignment, reserve procedure

23-16

Stop the audit, alignment, reserve procedure

23-17

View the list of auditable NEs

23-18

Description of the list of auditable NEs

23-19

Perform an audit on a NE

23-20

View the list of Audited NEs

23-22

Description of the list of Audited NEs

23-23

View the results of an audit

23-24

Perform an alignment on a NE

23-26

NE Alignment tool

23-27

Workflow to align up Ethernet Data

23-28

ISA Board Replacement Procedure

23-30

Perform a reservation on a NE

23-32

Restore procedure for ISA board

23-33

...................................................................................................................................................................................................................................
1350 OMS
23-1
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Overview

....................................................................................................................................................................................................................................

Audit, Alignment, Reservation, Recovery


Overview
Purpose

This section provides information about the Audit, Alignment, Reservation, and
Recovery.
Contents
The AAR procedure

23-3

NE Audit tool

23-6

Results of Audit

23-8

Reservation tool

23-13

Align Up of Ethernet Domain Data

23-15

Start the audit, alignment, reserve procedure

23-16

Stop the audit, alignment, reserve procedure

23-17

View the list of auditable NEs

23-18

Description of the list of auditable NEs

23-19

Perform an audit on a NE

23-20

View the list of Audited NEs

23-22

Description of the list of Audited NEs

23-23

View the results of an audit

23-24

Perform an alignment on a NE

23-26

....................................................................................................................................................................................................................................
1350 OMS
23-2
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

The AAR procedure

....................................................................................................................................................................................................................................

The AAR procedure


Maintain the consistency of the image of the network

The aim of these tools is to check and maintain the consistency between the network and
the 1350 OMS PKT database.
The utilities supplied are Audit, Alignment, and Force Alignment, and Reserve and
Recovery.

Audit (p. 23-3) is in charge of detecting the differences between the network and
the databases.
Alignment (p. 23-4) and Force Alignment (p. 23-4) are in charge to fix
discrepancies between the network and the databases.
Reservation (p. 23-4) and Recovery (p. 23-5) are in charge to re build in the
database, objects created without 1350 OMS PKT or before 1350 OMS PKT
installation.

The utilities apply on all the network, one or a set of subnetworks, one or a set of NE.
The tools works into a session. The session begins with the Start command and ends with
the Stop command.
Start procedure: The user has the possibility to start an audit, an alignment, or a

reservation on one or more NEs.


At the beginning of an audit, the selected NEs are locked. Locked entities are not
modifiable. All the read-only operations are available.
Stop procedure: At any time of the audit, alignment, reserve session, the user can close

the session. An unlock of the locked NEs is done.


Audit

The Audit identify the differences between the NE MIB in the network and the database
of the PKT. The Audit reports differences in a text file.
The Audit performs comparison on a per-functional domain basis. For each domain
comparison is done on a per-elementary object basis.
The Audit applies on a NE or list of NEs. Only SNMP board can be Audited.
The Audit builds a file that contains all managed entities presenting differences between
the network and the database. Differences are detected by NE. The audit file contains:

The objects that exist in the database but not in the NE.

The objects that exist in NE but not in database.


The objects present both in the database and in the NE but having different setting.

The result of the audit procedure is stored in a text file available to the user. The user is in
charge to display the results and proceed with the operations of align, force align, reserve,
or recovery.
For details on Audit tool, refer to NE Audit tool (p. 23-6).
....................................................................................................................................................................................................................................
1350 OMS
23-3
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

The AAR procedure

....................................................................................................................................................................................................................................

Alignment

The user can activate the Alignment on the audited NEs.


The Alignment procedure does not affect the traffic existing on the network.
The alignment procedure downloads to the network the entities contained in 1350 OMS
PKT database and not contained in the NE.
Force Alignment

The user can activate the Force Alignment on the audited NEs.
The Force Alignment procedure affect the traffic existing on the network.
The Force Alignment:

Adds to NE the entities contained in 1350 OMS PKT database and not contained in
the NE.
Deletes the objects in the NE not contained in 1350 OMS PKT.
Updates in the NE the objects presenting discrepancies in respect to the 1350 OMS
PKT setting.

The Force Alignment aligns the characteristics of Transport Link, Traffic Descriptors,
Traffic Classifiers, cross connections, LERconnections, and LSR connections. The
specific data, like indexes, related to the NE and stored only in the 1350 OMS PKT
database are update in the database.
Reservation

The user can activate the Reservation on the audited NEs.


Objects created without 1350 OMS PKT are not in the database, however they exist in the
network and have resources associated.
Reservation prevents the user from using network resources that are in-use but not
already known by the 1350 OMS PKT.
The network resources (terminations, MPLS labels, Transport Link bandwidth) are
reserved. This reservation is visible by the operator by the fact that one or more
terminations are no more available for creating new paths (Ethernet Segments, LSPs), and
by a portion of reserved bandwidth consumed on the Transport Links. The associated
objects are created inside the database (Traffic descriptors (MPLS and Ethernet), Traffic
Classifier, Colour Profiles, Ethernet cross connections, LSR connections, and LER
connections). A part from the connections, those objects are visible and usable by the
operator after the reservation phase.
The Reserve provides the discovery of an existing Ethernet network:

NE and Ethernet physical ports.

Link Over TDM (supporting directly Ethernet or MPLS) and TDM termination
points.

The NEs are retrieved defining the EML to which 1350 OMS PKT is connected and by
1350 OMS SDH (for E/FE/GE Q3 boards).
....................................................................................................................................................................................................................................
1350 OMS
23-4
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

The AAR procedure

....................................................................................................................................................................................................................................

This information is stored in 1350 OMS PKT database. This information is available for
MPLS infrastructure or directly for Ethernet Service usage (Link Over TDM for Ethernet
Segments and Ethernet physical ports). MPLS infrastructure is Link Over TDM devoted
to MPLS. Ethernet Service usage involves Link Over TDM, Ethernet Segments, and
Ethernet physical ports.
Note: The Ethernet physical port can be used also to build the cable (or Martini cable
or Ethernet cable).
For details on Reservation tool, refer to Reservation tool (p. 23-13).
Recovery

The user ask the Recovery on the reserved NE.


The connectivity entities (like Ethernet Segments or MPLS LSP Tunnel) are built and
then the discovered connectivity entities are stored in 1350 OMS PKT database.
The LSP tunnel and VC-LSP are defined and allocated. The Ethernet Segments and EVCs
are defined and allocated.
The abstract objects are recovered inside the database. The paths are automatically
created. Final provisioning state of LSPs and Ethernet Segment is commissioned. A
minimum EVC, Ethernet services and Customers are created for holding the recovered
Ethernet Segments.
The user can be asked to help the system to recover managed connectivity when complex
objects are not automatically recoverable by the system.

....................................................................................................................................................................................................................................
1350 OMS
23-5
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

NE Audit tool

....................................................................................................................................................................................................................................

NE Audit tool
Overview

The NE MIB Audit function available from 1350 OMS PKT can basically detect and then
report two categories of misalignments:

Delta+ misalignments.
Delta+ misalignments refer to resources existing in 1350 OMS PKT DB but not in
the NE MIB.
The case occurs when 1350 OMS PKT implements Ethernet Services on a given ISA
Board and then the Board itself must be replaced. The case occurs also when a MIB
restore is launched to recover a previously stored MIB Backup. Alternatively, the case
occurs when 1320CT and 1350 OMS EML users remove services or resources
previously provisioned by 1350 OMS PKT.

Delta- misalignments.
Delta- misalignments refer to resources existing in the NE MIB but not in 1350
OMS PKT DB.
The case occurs when 1350 OMS PKT de-implements Ethernet Services on a given
ISA Board and then the Board itself is replaced. The case occurs also when a MIB
restore is launched to recover a previously stored MIB Backup. Alternatively, the case
occurs the case when 1320CT and 1350 OMS EML users create new services or
resources (bypassing security controls).

Delta misalignments.
Delta misalignments refer to resources existing in both NE MIB and 1350 OMS
PKT DB, but with different attribute values.
The case occurs when 1320CT and 1350 OMS EML modify directly services or
resources in the NE MIB bypassing security mechanism.

Recovery of the misalignments

If a misalignment exists between the 1350 OMS PKT and NEs, the audit feature provides
the user with a means to detect. This situation happens in different cases:

At installation time of the 1350 OMS PKT upon an existing network.

After a long period during which the 1350 OMS PKT has been disconnected from the
network.
After the local access control (LAC) has been granted on a NE.
If the network has been configured without using the 1350 OMS PKT, operating the
1350 OMS EML or the Craft Terminal directly.

The Audit operation consists in comparing the content of the NE MIB with the content of
the 1350 OMS PKT database.
The user selects one or more NEs and requests the audit.
....................................................................................................................................................................................................................................
1350 OMS
23-6
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

NE Audit tool

....................................................................................................................................................................................................................................

On the basis of the NE data uploaded from the NE MIB and the NE data stored in the
database, the 1350 OMS PKT performs a comparison. The differences are classified as
follow:
1. Data existing in the NE and missing in 1350 OMS PKT.
2. Data missing in the NE and existing in 1350 OMS PKT.
3. Different data using the same resources in NE and 1350 OMS PKT.
The result of the audit procedure is stored in a text file that is made available to the user.
On the basis of the information provided in the text file, the user can proceed with one of
the following operations:

Display the audit result.


Reservation-Recovery to resume the situation described in 1.

Alignment to resume the situation described in 2.

Forced alignment to resume the situation described 3. Alternatively the situation can
be resumed as follow: the user can directly manage the conflict operating the 1350
OMS EML or the Craft Terminal.

When an audit is started on a NE, this NE is locked to avoid any modification of its MIB
during the procedure life time. On a locked NE:

It is impossible for any user to delete this NE.


Another audit session cannot work with this NE. One NE can be locked only by one
audit.
From outside the audit, alignment, reserve procedure is impossible to download or
upload information into or from the NE MIB.
from any session is possible to do any other operation (for example: display
properties, allocate Ethernet Segment, create traffic profile ).

The locked NE information is stored in database. At the end of the procedure, the NEs
locked in this procedure are unlocked.
The audit result is stored in a text file in XML format.

....................................................................................................................................................................................................................................
1350 OMS
23-7
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Results of Audit

....................................................................................................................................................................................................................................

Results of Audit
Per domain comparison

Here are the domains compared during an audit (and for each domain, a list of concerned
entities and their compared attributes):

Construction domain (p. 23-8).

Ethernet domain (p. 23-8).

MPLS domain (p. 23-10).

T-MPLS domain (p. 23-11).

Construction domain

Attributes for Construction domain:

Attributes of TDM terminations entities:


TDM termination User Label.

Protocol type.

Supported layer.

Attributes of Ethernet Physical Ports entities:


Port User Label.

Interface type.

Interface rate.

Duplex mode.

Auto Negotiation State.

Supported layer.

Aggregation Id.

Aggregation Ports.
Client type .

Attributes of Network Element entity


Bridge type.

Ethernet domain

Attributes for Ethernet domain:

Attributes of interfaces entities for Edge ports and Ethernet end points:
Interface MIB index.

Effective bandwidth.

Activation status (interface status).

VLAN Tag Protocol Type .

Attributes of Traffic Descriptors:

Identifier.

COS.

....................................................................................................................................................................................................................................
1350 OMS
23-8
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Results of Audit

....................................................................................................................................................................................................................................

CIR.

CBS.
PBS.

Attributes of Traffic Classifiers entities:


Inflow Identifier.

Classifier Identifier.

VLAN Identifier.

VLAN Max.

Priority.

Priority MAX.
Color Profiles entities
Color Profile MIB index.

PIR.

Color for priority 0 to 7.

Attributes of Connections, for Inflow:

Inflow Identifier.

Inflow Service type.

Inflow Interface index (only if In Service type equal to Ethernet),.

Inflow MPLS Tunnel index (only if In Service Type equal to MPLS),.


Inflow MPLS Tunnel instance (only if In Service Type equal to MPLS).
Attributes of Traffic entities for Inflow:
Traffic Descriptor Identifier.

Connection cast type.

Policy Mode.

Color Profile Identifier.

VLAN Pop,.

VLAN push (VLAN Id, Priority mode, Green priority, Yellow priority),.
the In and Out connection extremities information couple attributes.
Attributes of Connections, for Outflow:

Outflow Identifier.

Outflow Service type.

Outflow Interface index (only if Out Service type equal to Ethernet).


Outflow MPLS Tunnel index (only if Out Service Type equal to MPLS).
in MPLS Tunnel instance (only if Out Service Type equal to MPLS).
Attributes of Connections entities for Traffic Descriptor

Traffic Descriptor MIB index.

Traffic type (cast type).

Policy mode.

Color Profile.

....................................................................................................................................................................................................................................
1350 OMS
23-9
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Results of Audit

....................................................................................................................................................................................................................................

VLAN Pop.

the In and Out connection extremities information couple attributes.

VLAN push (VLAN Id, Priority mode, Green priority, Yellow priority).

MPLS domain

Attributes of MPLS domain:

Attributes of MPLS Interfaces entities

Interface identifier.

Label.

Service Type.

Effective bandwidth.

Static MPLS label range (min and max integers).

Activation status (up or down).

Attributes of Traffic Descriptors entities


Traffic Descriptor MIB index.

Traffic type or Qos (BE, EF, AF, traffic parameters (PIR, CIR, PBS, CBS).

Activation status (up or down).

Attributes of LSP tunnel cross connections entities


LSP tunnel identifier.

MIB indexes (tunnel index and tunnel instance).

Type (LSR,LER Ingress, LER Egress).

Connection role.

Traffic Descriptor MIB index.

Cast type.

Policy mode (enabled, disabled).

Ingress lower MPLS label.

Egress termination identifier.

Egress lower MPLS label.

Activation status (up or down).

Ingress termination identifier.

For VC-LSP LER connections, the entities are:


VC-LSP identifier.

MIB indexes (tunnel index and tunnel instance).


Type (LER Ingress or LER Egress).
Traffic Descriptor MIB index.
Cast type.
Policy mode (enabled, disabled).

....................................................................................................................................................................................................................................
1350 OMS
23-10
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Results of Audit

....................................................................................................................................................................................................................................

LER connection (termination identifier, Lower PLS label, Upper MPLS label).
Activation status (up or down) attributes.

T-MPLS domain

Attributes of T-MPLS domain:

Attributes of Nodes:

Egressing PHB profile.

Five Classes.

Attributes of Ports:

Access ID.

Administrative State.

Attributes of T-MPLS Segments:

Access ID.

Administrative State.

Segment Dir.

Trail Layer.

Traffic Descriptor MIB index.

In Label.

Out Label.

Mep Enabling.

Attributes of Cross Connections:

Access ID.

Administrative state.

Segment Dir.

Trail Layer.
Attributes of Node TD:

Access Id.

COS.

CIR.

PIR.

CBS.

PBS.

Attributes of Mep:

Access ID.

Cv TX.

Cv RX.

....................................................................................................................................................................................................................................
1350 OMS
23-11
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Results of Audit

....................................................................................................................................................................................................................................

Attributes of Protection Groups:


Access ID.
HoldOffTime.
RevertTime.

....................................................................................................................................................................................................................................
1350 OMS
23-12
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Reservation tool

....................................................................................................................................................................................................................................

Reservation tool
Overview

The reservation operation prevent the use of resources and allow the Recovery tool to
insert in the 1350 OMS PKT database the resources discovered in the NE MIB and not
present in the 1350 OMS PKT database:

Traffic Descriptors.
Traffic Classifiers.

Color Profiles.
Ethernet connections.
MPLS connections.

Reservation for Ethernet domain

Reservation operation is in charge of reserving Traffic Descriptors, Color Profiles, Traffic


Classifiers, and Ethernet cross connections. Entities present in the NE MIB but not known
by 1350 OMS PKT, are imported into the 1350 OMS PKT with the special status of
reserved.
The status of reserved is used in the Recovery phase to rebuild Ethernet flows and
services.
All the entities marked as reserved are not visible to the user, except for Traffic
Descriptors, Color Profiles, and Traffic Classifiers. They are immediately available to the
user that can use them.
The recovered entities, even if they are associated to flow on the NE (that is not
provisioned by the 1350 OMS PKT), are not considered in use.
For example, they can be deleted from the 1350 OMS PKT without affecting the NE.
For Traffic Descriptors, Color Profiles, and Traffic Classifiers no duplicates are created. If
a Traffic Descriptor recovered has the same of a Traffic Descriptor that exists into the
1350 OMS PKT, the latter entity is reused. The former one is associated to it. Traffic
Descriptor attributes are CoS, CIR, PIR, CBS, PBS.
Reservation for MPLS domain

Reservation operation is in charge of reserving MPLS Traffic Descriptors, LSP Tunnels


connections, and VC-LSP connections.
The NE MIB resources which have not been uploaded, are stored in the 1350 OMS PKT
database. The 1350 OMS PKT resources are affected with the consumption of these
resources.
The user can recover and use the Traffic Descriptor used or not used by connections. The
deletion of the Traffic Descriptor removes it from the 1350 OMS PKT database but leave
it in the NE. A default user label is generated by the MPLS recovery component.

....................................................................................................................................................................................................................................
1350 OMS
23-13
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Reservation tool

....................................................................................................................................................................................................................................

In the LSP Tunnel connections, the used MPLS labels are marked reserved for the
Transport Link in the 1350 OMS PKT database.
If two connections at the extremities of the path share the same MPLS label, the MPLS
label consumed only once.
The consuming bandwidth is affected on the corresponding Transport Links. For an LSR,
the Transport Links affected are two. For a LER, the Transport Link affected is one.
If two connections at the extremities of the path concern the same Transport Link
bandwidth is consumed only once.
In the VC-LSP connections, the used MPLS labels are marked reserved for the
Transport Link in the 1350 OMS PKT database.
If two connections at the extremities of the same LSP tunnel share the same MPLS label,
the MPLS label is consumed only once.
The consuming bandwidth is affected on the corresponding LSP tunnel or Transport Link.
If two connections at the extremities of the same LSP tunnel share the same Transport
Link, the bandwidth is consumed only once.

....................................................................................................................................................................................................................................
1350 OMS
23-14
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Align Up of Ethernet Domain Data

....................................................................................................................................................................................................................................

Align Up of Ethernet Domain Data


Overview

The Align Up function allows a selective (user driven) realignment between 1350 OMS
PKT and NE content.
The scope of this function is generic and can be applied in the contexts:

after a Network Manager migration to import from NE (overwriting data in the 1350
OMS PKT) the running value of the introduced Attribute.
on user demand.

In both cases, the Audit function invocation is a necessary precondition.


The function must carefully handle mismatch case. The updating inside 1350 OMS PKT
forces the recomputation of EVC, Ethernet Segment, STI provisioning state, and the
Transport Link Configuration State.
The Align Up operation does not create nor delete new entities inside the 1350 OMS PKT
Ethernet database but is only aimed to align attributes.
As example see the following case. Suppose that the Activation state of an Edge Port is
UP inside 1350 OMS PKT and the same port is DOWN inside the NE. After the Align
Up, the Edge Port results with Activation State equal to DOWN also inside 1350 OMS
PKT. This status change must be propagated also toward Ethernet connections which are
using such Edge Ports (that is Ethernet Segments and/or EVCs).
The Align Up function is only applicable on a NE after having performed an Audit on that
NE. In particular, the Align Up function can be invoked only inside an AAR context (that
is with the corresponding NE locked).
After the Audit execution, the Audit result reports to the user all the differences existing
between the NE image and the 1350 OMS PKT image. The user can then start the Align
Up operation and can decide which objects must be aligned inside 1350 OMS PKT.

....................................................................................................................................................................................................................................
1350 OMS
23-15
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Start the audit, alignment, reserve procedure

....................................................................................................................................................................................................................................

Start the audit, alignment, reserve procedure


When to use

This function consists in preparing the 1350 OMS PKT to perform audit, alignment,
reserve actions.
Related information

For a description about Audit, Alignment, and Reservation, refer to the topic The AAR
procedure (p. 23-3).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Audit Align Reserve > Start AAR Procedure.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: If the operation is confirmed, a lock of NEs is done just before starting the

audit procedure until the end of audit, alignment, reserve procedure.


Once the audit, alignment, reserve procedure is started, in Action > Packet > Audit Align
Reserve menu, the following commands are available:

Network Elements for Audit.

Audited Network Elements.

Stop Procedure.

All the other 1350 OMS PKT functions are available.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
23-16
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Stop the audit, alignment, reserve procedure

....................................................................................................................................................................................................................................

Stop the audit, alignment, reserve procedure


When to use

This function consists in ending the audit, alignment, reserve procedure.


Related information

For a description about Audit, Alignment and, Reservation, refer to the topic The AAR
procedure (p. 23-3).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started Start the audit, alignment, reserve procedure
(p. 23-16).
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Audit Align Reserve > Stop AAR Procedure.
...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: If the operation is confirmed, the audited NEs are unlocked.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
23-17
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

View the list of auditable NEs

....................................................................................................................................................................................................................................

View the list of auditable NEs


When to use

The function presents all the NEs that are available for audit.
Related information

For a description about Audit, Alignment and, Reservation, refer to the topic The AAR
procedure (p. 23-3).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Audit Align Reserve.


Result: The Audit Align Reserve menu is displayed.
...................................................................................................................................................................................................

Select NE for Audit.


Result: The Auditable Network Element list window is displayed.

See the following topic in this document: Description of the list of auditable NEs
(p. 23-19)
Note: If a NE is already locked by another user, it does not appears in this list.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
23-18
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Description of the list of auditable NEs

....................................................................................................................................................................................................................................

Description of the list of auditable NEs


Attributes of a auditable NE

The attributes displayed for each NE are:

User Label.

Node User Label.

LAC State.

Lcation Name.

Type.

Operational State.

Working State.

Consistency State.

Bridge Type.

Version.

IP Address.

ACCESS Module Label.

Comment.

....................................................................................................................................................................................................................................
1350 OMS
23-19
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Perform an audit on a NE

....................................................................................................................................................................................................................................

Perform an audit on a NE
When to use

This function consists in starting the audit on the previously selected NEs.
Related information

For a description about Audit, Alignment and, Reservation, refer to the topic The AAR
procedure (p. 23-3).
For more details about audit on a NE, see: NE Audit tool (p. 23-6).
For information about attributes compared in an Audit, see Results of Audit (p. 23-8).
After confirmation, NE per NE, the 1350 OMS PKT uploads the NE MIB content and
compares it with the 1350 OMS PKT database.
In each domain, if an error occurs, the audit is stopped in this domain nevertheless the
audit in the other domains goes on.
If an audit is Partially done, the actions alignment and reservation are not available. Only
a new audit is possible.
During the same session, the user can audit again the same NE; In this case, only the
latest audit result is at the user disposal. This new audit allows the user to target a new
alignment (the alignment is allowed only once after an audit).
The audit results are temporally stored into audit files. They are automatically deleted
when the user stops the audit, alignment, reserve procedure.
One file per audited NE is stored. The file contains the compared domains.
When the audit is completed on all selected NEs, a message is displayed in the status bar.
The main steps of the audit are listed into the 1350 OMS PKT Log file. If errors or
warning occur, they are listed in this file too and in an error message window.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started Start the audit, alignment, reserve procedure
(p. 23-16).
Conditions

To get a positive result:

The NE must not be an E/FE board or a GE board.


The NE LAC state must not be granted.

....................................................................................................................................................................................................................................
1350 OMS
23-20
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Perform an audit on a NE

....................................................................................................................................................................................................................................

The NE operational state must be enable.


Lock state of selected NEs must be:

Unlocked.
Locked (due to an audit, alignment, reserve procedure launched on the NEs by the

user himself).
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Network Element > Network Element > NE for Audit.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Network Element > Start NE Audit.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: When the audit is in progress on a selected NE, the NE is locked. Operations

that affect the NE are not authorized (For example: delete the NE, delete the
transmission paths that has at least one NE concerned by audit, alignment session,
).
When the audit is completed on all selected NEs, a message is displayed in the status
bar.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
23-21
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

View the list of Audited NEs

....................................................................................................................................................................................................................................

View the list of Audited NEs


When to use

After having performed an audit, this function displays the result of this audit.
Related information

For a description about Audit, Alignment and, Reservation, refer to the topic The AAR
procedure (p. 23-3).
When the AAR procedure is stopped, the information about audited NEs is lost.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started Start the audit, alignment, reserve procedure
(p. 23-16).
The AAR session must be open.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Audit Align Reserve.


Result: The Audit Align Reserve menu is displayed.
...................................................................................................................................................................................................

Select Audited NEs.


Result: The Audited Network Element list window is displayed.

See the following topic in this document: Description of the list of Audited NEs
(p. 23-23)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
23-22
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Description of the list of Audited NEs

....................................................................................................................................................................................................................................

Description of the list of Audited NEs


Attributes of Audited NE

The attributes displayed for each audited network element are:

User Label.

Creation Date.

Audit (Done, Partially Done, Not Done).

Alignment (Done, Partially Done, Not Done).

Reservation (Done, Partially Done, Not Done).

Forced Alignment (Done, Partially Done, Not Done).

Preparation (Done, Partially Done, Not Done).

....................................................................................................................................................................................................................................
1350 OMS
23-23
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

View the results of an audit

....................................................................................................................................................................................................................................

View the results of an audit


When to use

This function consists in starting the audit on the previously selected NEs.
Related information

For a description about Audit, Alignment and, Reservation, refer to the topic The AAR
procedure (p. 23-3).
For information about attributes compared in an Audit, see Results of Audit (p. 23-8).
When the AAR procedure is stopped, the information about audit results is lost.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started Start the audit, alignment, reserve procedure
(p. 23-16).
The AAR session must be open.
Conditions

To get a positive result:

The NE must not be an E/FE board or a GE board.


The NE LAC state must not be granted.

The NE operational state must be enable.

Lock state of selected NEs must be:

Unlocked.

Locked (due to an audit, alignment, reserve procedure launched on the NEs by the

user himself).
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Network Elements > Network Element.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.

....................................................................................................................................................................................................................................
1350 OMS
23-24
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

View the results of an audit

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select Action > Audited NE > Display Audit File.


Result: The Audit NE file is displayed.

The files are automatically deleted when the user stops the audit, alignment, reserve
procedure.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
23-25
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
Audit, Alignment, Reservation, Recovery

Perform an alignment on a NE

....................................................................................................................................................................................................................................

Perform an alignment on a NE
When to use

This function consists in starting the alignment on the previously audited NEs.
Related information

For a description about Audit, Alignment and, Reservation, refer to the topic The AAR
procedure (p. 23-3).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started Start the audit, alignment, reserve procedure
(p. 23-16).
The AAR session must be open.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Audited NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Audited NE > Align Down.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
23-26
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
NE Alignment tool

Overview

....................................................................................................................................................................................................................................

NE Alignment tool
Overview
Purpose

This section provides information about the NE alignment tool.


Contents
Workflow to align up Ethernet Data

23-28

ISA Board Replacement Procedure

23-30

Perform a reservation on a NE

23-32

Restore procedure for ISA board

23-33

....................................................................................................................................................................................................................................
1350 OMS
23-27
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
NE Alignment tool

Workflow to align up Ethernet Data

....................................................................................................................................................................................................................................

Workflow to align up Ethernet Data


When to use

This function consists in starting the alignment on the previously audited NEs.
Related information

For a description about Audit, Alignment and, Reservation, refer to the topic The AAR
procedure (p. 23-3).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Start the Audit, Align, Reserve session from the Construction GUI.
Select Action > Packet > Audit Align Reserve > Start Procedure.
...................................................................................................................................................................................................

Choose the NE (or the NEs) to be Audited from the Auditable Network Element List in
the Construction GUI and select Start NE Audit from the popup menu.
...................................................................................................................................................................................................

Read the differences displaying the Audit file content.


Select Search > Packet > Audit Align Reserve > Display Audit File.
Result: The audit results are shown.
...................................................................................................................................................................................................

If the need is to perform an Align Up operation on Ethernet objects, start the Align Up
operation from the Ethernet GUI.
Select Action > Packet > Audit Align Reserve > Align Up.
Result: The Align Up windows are shown.
...................................................................................................................................................................................................

On the Align Up windows, select one or more objects that must be realigned and confirm
the choice with OK button.

....................................................................................................................................................................................................................................
1350 OMS
23-28
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
NE Alignment tool

Workflow to align up Ethernet Data

....................................................................................................................................................................................................................................

Result: At that moment the Align Up function realign the 1350 OMS PKT database to
the NE image.
...................................................................................................................................................................................................

After having realigned all needed objects, close the Align Up Window from Ethernet
GUI.
...................................................................................................................................................................................................

End the Audit, Alignment, Reserve session from the Construction GUI.
Select Action > Packet > Audit Align Reserve > Stop Procedure.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
23-29
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
NE Alignment tool

ISA Board Replacement Procedure

....................................................................................................................................................................................................................................

ISA Board Replacement Procedure


When to use

The procedure describes the main steps needed to replace an ISA board that supports
customer service or traffic under the supervision of 1350 OMS EML and 1350 OMS PKT
systems.
Related information

For a description about Audit, Alignment and, Reservation, refer to the topic The AAR
procedure (p. 23-3).
For more details, refer to the topic Align Up of Ethernet Domain Data (p. 23-15).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

The faulty ISA Board has been replaced with a new one, the MIB is void in the new
Board.
...................................................................................................................................................................................................

ISA MIB is restored on the new Board through NE. The MIB stored at 1350 OMS EML
is not fully aligned with the current status of 1350 OMS PKT DB.
...................................................................................................................................................................................................

1350 OMS PKT launches the Audit operation against the involved ISA. The Audit report
identifies a set of mismatches.
...................................................................................................................................................................................................

Per each D- difference detected in the Audit report the user can:
1. Reserve the resource in the 1350 OMS PKT DB, acknowledging the NE configuration
is OK.
2. Remove the resource from NE MIB through NE, acknowledging the NE configuration
is not OK.

....................................................................................................................................................................................................................................
1350 OMS
23-30
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
NE Alignment tool

ISA Board Replacement Procedure

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Per each D difference detected in the Audit report the user can:
1. Perform 1350 OMS PKT operations to realign 1350 OMS PKT to NE, acknowledging
the NE configuration is OK.
2. Perform 1350 OMS EML operations to realign NE to 1350 OMS PKT,
acknowledging the NE configuration is not OK.
...................................................................................................................................................................................................

Per all D+ difference detected in the Audit report the user can:
1. Align Down the 1350 OMS PKT configurations to the NE, acknowledging the 1350
OMS PKT configuration is OK.
2. Remove the resources from 1350 OMS PKT DB (through GUI or DB access),
acknowledging the 1350 OMS PKT configuration is not OK.
...................................................................................................................................................................................................

Perform a final audit for a further alignment check. If any difference (D+ or D-) is found
again, repeat the steps from Step 4 to Step 6 until a full alignment is obtained.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
23-31
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
NE Alignment tool

Perform a reservation on a NE

....................................................................................................................................................................................................................................

Perform a reservation on a NE
When to use

This function consists in starting the reservation on the previously selected NEs.
Related information

For a description about Audit, Alignment and, Reservation, refer to the topic The AAR
procedure (p. 23-3).
For more details about the reservation, refer to chapter Reservation tool (p. 23-13).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started Start the audit, alignment, reserve procedure
(p. 23-16).
The AAR session must be open.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Network Elements > Audited Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

Select one or more items in the list.


...................................................................................................................................................................................................

Select Action > Audit NE > NE Resource Reservation.


...................................................................................................................................................................................................

Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
Result: The Resources are reserved.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
23-32
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities
NE Alignment tool

Restore procedure for ISA board

....................................................................................................................................................................................................................................

Restore procedure for ISA board


Overview

The procedure describes the main steps to Restore the MIB for an ISA board that supports
customer services or traffic. The board is supposed to be under the supervision of 1350
OMS EML and 1350 OMS PKT systems. The MIB is supposed to be saved in 1350 OMS
EML repository.
All the actions described in the previous ISA Board Replacement Procedure
(p. 23-30) are still applicable, except the point Step 1 associated to the physical
replacement of the ISA Board.

....................................................................................................................................................................................................................................
1350 OMS
23-33
8DG42227DAAA 9.6
Issue 3 December 2012

Network Utilities

Restore procedure for ISA board

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
23-34
8DG42227DAAA 9.6
Issue 3 December 2012

24

24
Operation,
Administration, and
Maintenance (OAM)
Management

Overview
Purpose

This chapter describes how to manage Ethernet Operations, Administration, and


Maintenance (OAM).
Contents
Ethernet OAM

24-3

OAM main functions

24-3

Create OAM Domain

24-7

List OAM Domains

24-8

Description of the list of OAM MD

24-9

OAM Domain Properties

24-10

Details of OAM MD

24-11

Modify OAM Domain

24-12

Configure OAM Domain

24-13

Deimplement OAM Domain

24-14

Inventory of OAM items from MD

24-15

Inventory of OAM monitored objects from MD

24-16

Maintenance Association (MA)

24-17

Maintenance Associations

24-17

List Maintenance Association (MA)

24-18

Description of the list of OAM MA

24-19

Properties of Maintenance Association (MA)

24-20

Details of the OAM MA

24-21

Modify Maintenance Association (MA)

24-22

Configure Maintenance Association (MA)

24-23

Enable/Disable Continuity Check (CC)

24-24

...................................................................................................................................................................................................................................
1350 OMS
24-1
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Management

Overview

....................................................................................................................................................................................................................................

Deimplement OAM MA

24-25

Inventory of OAM items from MA

24-26

Inventory of OAM monitored objects from MA

24-27

Maintenance Activation
Maintenance Activation on EVC
Loopback
Loopback activation
Linktrace
Linktrace activation
Delay measurement and Loss measurement

24-28
24-28
24-29
24-29
24-31
24-31
24-33

Packet Delay measurement

24-34

Packet Loss measurement

24-35

Configure Maintenance End Points

24-36

List the OAM ETH DM Tool

24-38

List the OAM ETH SLM Tool

24-40

Create ETH DM Tool

24-42

Create ETH SLM Tool

24-44

Activate/Deactivate OAM ETH DM Tool

24-46

Activate/Deactivate OAM ETH SLM Tool

24-47

Inventory from OAM ETH DM Tool

24-48

Inventory from OAM ETH SLM Tool

24-49

Configure OAM ETH DM Tool

24-50

Configure OAM ETH SLM Tool

24-52

....................................................................................................................................................................................................................................
1350 OMS
24-2
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


OAM main functions
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Ethernet OAM
OAM main functions
OAM Introduction

The ETH OAM allows the user to manage:

Maintenance Domains: Creation/modification/deletion.


Maintenance Associations: Modification Creation/deletion are done automatically
when ETH OAM is enabled on EVC, links, ports.
Loopback.
Linktrace.

List/inventories of related objects.

OAM Continuity Check

The Ethernet OAM Continuity Check (OAM CC) allows determining the reachability
between groups of associated Ethernet Resources.
The Ethernet OAM CC is a tool for pro-active maintenance; in fact as soon as the OAM
CC tool is set up over Ethernet resources, such Ethernet Resources start exchanging
autonomously OAM Continuity Check Messages (OAM CC PDU) and specific Alarms
are sent by NEs whenever the reach ability between that Ethernet Resources is
interrupted.
Ethernet OAM Continuity Check is the base for other OAM activities:

Link Trace Management


Loop Back Management

Ethernet MEF Performance management (Jitter and Delay evaluation).

The Set up of Ethernet OAM Continuity Check tool can be done on top of the following
Technologies:

Provider Bridge Domains


ETS domain for EPTL services.
T-MPLS Domains.

a combination of the above (E2E)

OAM Continuity Check terminology

The Ethernet OAM CC is realized according to ITU Y.1731 and IEEE 802.1ag Standards.

....................................................................................................................................................................................................................................
1350 OMS
24-3
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


OAM main functions
Management
Ethernet OAM
....................................................................................................................................................................................................................................

The terminologies adopted by the two Standards are slightly different, and the following
table reports a comparison between the two.
Table 24-1

Terminology Mapping

ITU Y.1731 Terminology

IEEE 802.1ag Terminology

MD

Maintenance
Domain

MD

Maintenance Domain

MEG

Maintenance Entity
Group

MA

Maintenance
Association

MEG Level

Maintenance Entity
Group Level

MA Level

Maintenance
Association Level

MEP

MEG End Point

MEP

MA End Point

OAM Continuity Check model

Ethernet OAM CC objects:

Maintenance Domain (MD) (p. 24-4).

Maintenance Association (MA) or Maintenance Entity Group (MEG) (p. 24-5).

Maintenance Edge Point (MEP) (p. 24-5).

Intermediate Maintenance Entity Point (MIP) (p. 24-6).

Maintenance Domain (MD)

MD is the Network or a Network Portion where Fault on Connectivity is managed.


....................................................................................................................................................................................................................................
1350 OMS
24-4
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


OAM main functions
Management
Ethernet OAM
....................................................................................................................................................................................................................................

MD can be mapped as STP domain, or ETS domain (PortToPort and EPTL), or T-MPLS
domain.
For a given Domain it is possible to display all MDs existing in that domain.
From a given MD it is possible to retrieve all the contained MA (Connectivity) and
related configured MEPs (Connectivity extremities).
Maintenance Association (MA) or Maintenance Entity Group (MEG)

MA realizes the association between Maintenance Entities (Maintenance Points) and


Maintenance Domain.
MA determines also the relationship existing among Maintenance Points
The life cycle of MA (Creation/Deletion) is always linked to corresponding Connectivity
object (EVC, Transport Link or Edge Port).
MA Parameters are visible always contextually to the corresponding Connectivity object.
MA Modification/Configuration is always possible from the corresponding Connectivity
object.
MA is defined by the following main attributes:

MA name: made by a Format and a Name.

Monitored object.
Monitored object can be one of the following:
(only for Virtual Bridge, Provider Bridge and ETS) VLAN: it can be the CVLAN
in case of Virtual Bridge or the SVLAN in case of Provider Bridge

(only for T-MPLS) Pseudo-Wire or VSI


MHF policy: which automatic policy is defined inside the MA for MIP Creation
(default=inherited from MD)
CCM Interval: delay between sending of CC PDU
MEP List Table : list of Maintenance Points making part to the association and their
Activation status
Row Status: Activation status for the MA entry

Maintenance Edge Point (MEP)

MEP is a Maintenance Point located at the Edge of the Monitored Network.


MEP can initiate and terminate OAMPDU frames.
OAM activities can be started from MEP
MEPs are explicitly created on Operator DemandEach MEP is always linked with PORT
or, depending on involved technology, VLANID, PWID.
The life cycle of MEP (Creation/Deletion) is always linked to corresponding Connectivity
object extremity (or to the Connectivity object itself in the special case of the Edge Port).
MEP Parameters are visible always contextually to corresponding Connectivity object
extremity.
....................................................................................................................................................................................................................................
1350 OMS
24-5
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


OAM main functions
Management
Ethernet OAM
....................................................................................................................................................................................................................................

MEP Modification/Configuration is always possible from corresponding Connectivity


object extremity.
Each MEP is defined by the following main attributes:

Identifier: unique in the MA, in the range 1-8191.


Interface Reference: Port identifier (the MAC address of the Port is inherited).
Direction : (UP, Down).

Priority: priority (0-7) to be used in CCM PDU messages.


Enable/Disable Flag : aimed to dynamically start/stop OAM CC.
Row Status: Activation status for the MEP entry.

Other attributes not connected to CC management are not included here and always
set to their default value.

Intermediate Maintenance Entity Point (MIP)

MIP is an Intermediate Maintenance Entity Point.


MIP can only react to OAMPDU frames (answering and/or forwarding).
OAM activities cannot be started from MIP.
Each MIP has a Direction concept (UP, Down).
MIPs are automatically created depending on criteria defined on MD/MA objects.
Monitored Objects

Objects monitored in a Maintenance Domain:

Ethernet Domain
NE
E2E EVC
EVC

EVC termination
Transport Link
Transport Link Termination
Edge Port

....................................................................................................................................................................................................................................
1350 OMS
24-6
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Create OAM Domain
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Create OAM Domain


When to use

The scope of this procedure is to define an OAM Domain.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
Maintenance domain can be defined by user:

To define a domain different from the default one used by all Maintenance
associations related to EVCs, links, ports
To define maintenance levels different from the one assigned by default (0 on links
and edge ports, 2 on EVC)

Maintenance domains provisioning state follows the evolutions of related MAs:

implemented in the NEs as soon as the first monitored object requires it.

Deimplemented when no more monitored object requires it.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > OAM CC> Create OAM MD.
Result: The creation window is displayed.
...................................................................................................................................................................................................

Define the following attributes:

Name.(User Label of Maintenance Domain, free text).

Level. (8 OAM Levels are standardized).


MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:
MIPs are created where a lower-level MEP exists; default: MIPs are created on all

intermediate points).
Click OK button to confirm the operation.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-7
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


List OAM Domains
Management
Ethernet OAM
....................................................................................................................................................................................................................................

List OAM Domains


When to use

The scope of this procedure is to list all the Maintenance Domains.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.

See the following topic in this document: Description of the list of OAM MD
(p. 24-9)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-8
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Description of the list of OAM MD
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Description of the list of OAM MD


Attributes of an OAM MD

The attributes displayed for each MD are:

Name.(User Label of Maintenance Domain, free text).

Format

Level. (8 OAM Levels are standardized).

MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:


MIPs are created where a lower-level MEP exists; default: MIPs are created on all

intermediate points).
Provisioning State (Defined, Implemented)

....................................................................................................................................................................................................................................
1350 OMS
24-9
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


OAM Domain Properties
Management
Ethernet OAM
....................................................................................................................................................................................................................................

OAM Domain Properties


When to use

The scope of this procedure is to list all the Maintenance Domains.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item in the list and select Actions > Properties.
Result: The Property window is displayed.

See the following topic in this document: Details of OAM MD (p. 24-11)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-10
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Details of OAM MD
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Details of OAM MD
Attributes of an OAM MD

The attributes displayed for each MD are:

Name.(User Label of Maintenance Domain, free text).

Format

Level. (8 OAM Levels are standardized).

MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:


MIPs are created where a lower-level MEP exists; default: MIPs are created on all

intermediate points).
Provisioning State (Defined, Implemented)
Id

....................................................................................................................................................................................................................................
1350 OMS
24-11
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Modify OAM Domain
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Modify OAM Domain


When to use

The scope of this procedure is to change attributes when MD is not implemented.


Related Information

The user can change attributes when MD is not implemented.


For more information, refer to: OAM main functions (p. 24-3)
See also: Configure OAM Domain (p. 24-13)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item in the list and select Actions > Modify.
Result: The modify window is displayed.
...................................................................................................................................................................................................

Modify one or more of the following attributes:

Name.(User Label of Maintenance Domain, free text).

Level. (8 OAM Levels are standardized).

MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:


MIPs are created where a lower-level MEP exists; default: MIPs are created on all

intermediate points).
Click OK button to confirm the operation.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-12
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Configure OAM Domain
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Configure OAM Domain


When to use

The scope of this procedure is to change attributes when MD is implemented.


Related Information

The user can change attributes when MD is implemented.


For more information, refer to: OAM main functions (p. 24-3)
See also: Modify OAM Domain (p. 24-12)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item in the list and select Actions > OAM MD > Configure.
Result: The configure window is displayed.
...................................................................................................................................................................................................

Modify one or more of the following attributes:

Maintenance Domain .

Level. (8 OAM Levels are standardized).

MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:


MIPs are created where a lower-level MEP exists; default: MIPs are created on all

intermediate points).
Click OK button to confirm the operation.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-13
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Deimplement OAM Domain
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Deimplement OAM Domain


When to use

The scope of this procedure is to deimplement MD.


Related Information

The user can change attributes when MD is implemented.


For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item in the list and select Actions > OAM MD > Deimplement.
Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-14
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Inventory of OAM items from MD
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Inventory of OAM items from MD


When to use

The scope of this procedure is to list OAM items related to a Maintenance Domain.
Related Information

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item in the list and select Search > OAM MD.
Result: The search menu is displayed.
...................................................................................................................................................................................................

Select one of OAM items related to a Maintenance Domain:

MA
MEP
MIP
Result: The list of the contained objects is displayed.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-15
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Inventory of OAM monitored objects from MD
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Inventory of OAM monitored objects from MD


When to use

The scope of this procedure is to list objects monitored in a Maintenance Domain.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item in the list and select Search > OAM MD.
Result: The search menu is displayed.
...................................................................................................................................................................................................

Select the list of the objects monitored in the Maintenance Domain:

List Bridge EVCs

List ETS EVCs

List E2E EVCs

List T-MPLS EVCs

List Bridge NEs


Result: The list of the contained objects is displayed.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-16
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Maintenance Associations
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

Maintenance Association (MA)


Maintenance Associations
When to use

Maintenance associations are created/deleted following the enabling/disabling of ETH


OAM on monitored resources
Related Information

For more information, refer to: OAM main functions (p. 24-3)
Monitored Association (MA) instances:

There is one MA instance for each monitored object.


The provisioning state of the MA instance follows the evolutions of related monitored
object:
Created/implemented in the NEs as soon as the monitoring is enabled and object
is implemented.

Deimplemented/deleted when monitoring is disabled or object is


deimplemented/deleted.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar, list the object to monitor:

EVC
Link

Edge Port

...................................................................................................................................................................................................

Select the object and enable/disable OAM.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-17
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


List Maintenance Association (MA)
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

List Maintenance Association (MA)


When to use

The scope of this procedure is to list all the Maintenance Associations.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Search > Packet > OAM MA
Result: The OAM MA list is displayed.

See the following topic in this document: Description of the list of OAM MA
(p. 24-19)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-18
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Description of the list of OAM MA
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

Description of the list of OAM MA


Attributes of an OAM MA

The attributes displayed for each MD are:

Name.(User Label of Maintenance Domain, free text).

OAM MD

Format

MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:


MIPs are created where a lower-level MEP exists; default: MIPs are created on all

intermediate points).
CCM Interval.
Priority.

Provisioning State (Defined, Implemented).

OAM Enabled.

....................................................................................................................................................................................................................................
1350 OMS
24-19
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Properties of Maintenance Association (MA)
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

Properties of Maintenance Association (MA)


When to use

The scope of this procedure is to list all the Maintenance Associations properties.
Related Information

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Search > Packet > OAM CC> OAM MAs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Action > Properties


Result: The OAM MA property window is displayed.

See the following topic in this document: Details of the OAM MA (p. 24-21)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-20
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Details of the OAM MA
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

Details of the OAM MA


Attributes of an OAM MA

The attributes displayed for each MD are:

Name.(User Label of Maintenance Domain, free text).

OAM MD

Format

MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:


MIPs are created where a lower-level MEP exists; default: MIPs are created on all

intermediate points).
CCM Interval.
Priority.

Provisioning State (Defined, Implemented).

OAM Enabled.

Id.

....................................................................................................................................................................................................................................
1350 OMS
24-21
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Modify Maintenance Association (MA)
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

Modify Maintenance Association (MA)


When to use

The scope of this procedure is to change MA attributes.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
See also: Configure Maintenance Association (MA) (p. 24-23)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Search > Packet > OAM CC> OAM MAs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Action > Modify


Result: The modification window is displayed.
...................................................................................................................................................................................................

Modify one or more attributes:

Name.(User Label of Maintenance Domain, free text).

MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:


MIPs are created where a lower-level MEP exists; default: MIPs are created on all

intermediate points).
CCM Interval.
Priority.

Click OK to confirm the operation.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-22
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Configure Maintenance Association (MA)
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

Configure Maintenance Association (MA)


When to use

The scope of this procedure is to change MA configuration.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
See also: Modify OAM Domain (p. 24-12)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Search > Packet > OAM CC> OAM MAs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Action > Configure


Result: The Configure OAM MA window is displayed.
...................................................................................................................................................................................................

Modify one or more attributes:

Maintenance Association.

VLAN Id (0-4095).

MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:


MIPs are created where a lower-level MEP exists; default: MIPs are created on all

intermediate points).
CCM Interval.

Click OK or Apply to confirm the operation.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-23
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Enable/Disable Continuity Check (CC)
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

Enable/Disable Continuity Check (CC)


When to use

The scope of this procedure is to Enable or Disable CC.


Related Information

The user can change attributes when MA is implemented.


For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Search > Packet > OAM CC> OAM MAs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Action > Enable or Action > Disable.
Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-24
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Deimplement OAM MA
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

Deimplement OAM MA
When to use

The scope of this procedure is to deimplement MA.


Related Information

The user can change attributes when MD is implemented.


For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Search > Packet > OAM CC> OAM MAs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item in the list and select Actions > OAM MA > Deimplement.
Select one of the options in the confirmation box. Refer to the procedure Confirm the
action (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-25
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Inventory of OAM items from MA
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

Inventory of OAM items from MA


When to use

The scope of this procedure is to list OAM items related to a MA.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Search > Packet > OAM CC> OAM MAs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item in the list and select Search > OAM MA.
Result: The search menu is displayed.
...................................................................................................................................................................................................

Select one of OAM items related to a MA:

MD

MEP
MIP
Result: The list of the contained objects is displayed.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-26
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Inventory of OAM monitored objects from MA
Management
Maintenance Association (MA)
....................................................................................................................................................................................................................................

Inventory of OAM monitored objects from MA


When to use

The scope of this procedure is to list objects monitored in a MA.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item then select Search > Packet > OAM CC> OAM MAs.
Result: The list window is displayed.
...................................................................................................................................................................................................

Select one item in the list and select Search > OAM MA.
Result: The search menu is displayed.
...................................................................................................................................................................................................

Select one of the objects monitored in the MA:

NEs

EVC

Edge Port

Link
Result: The list of the contained objects is displayed.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-27
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Management

Maintenance Activation on EVC

....................................................................................................................................................................................................................................

Maintenance Activation
Maintenance Activation on EVC
When to use

This function activates Ethernet OAM on the EVC.


Related Information

Ethernet OAM can be activated:

at EVC creation time

on an implemented EVC

Ethernet OAM can be activated on the following objects:

EVC

Link
Edge Port

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu select Search > Packet > Services > Connection Less EVC
(Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

Select the object and select Action > Start CC.


...................................................................................................................................................................................................

Insert the following parameters:

Priority. (from 0 to 7

Select Maintenance Domain

Click OK to confirm the action.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-28
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Management

Loopback activation

....................................................................................................................................................................................................................................

Loopback
Loopback activation
When to use

The scope of this procedure is to activate loopback.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet >
List one of the objects

EVC termination
Transport Link Termination

Edge Port

...................................................................................................................................................................................................

Select one item then select Actions > Activate Loopback.


Result: The Activate Loopback window is displayed.
...................................................................................................................................................................................................

Select the attributes:

Source EVC Termination.

Destination EVC Termination.

Use a Transport Link Termination.

Transport Link.

Transport Link Termination.

Priority.

Time out.

Click OK or Apply to confirm the operation.


....................................................................................................................................................................................................................................
1350 OMS
24-29
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Loopback activation
Management
Loopback
....................................................................................................................................................................................................................................

Result: Loopback report is shown.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-30
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Linktrace activation
Management
Linktrace
....................................................................................................................................................................................................................................

Linktrace
Linktrace activation
When to use

The scope of this procedure is to activate Linktrace.


Related Information

For more information, refer to: OAM main functions (p. 24-3)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet >
List one of the objects:

EVC termination

...................................................................................................................................................................................................

Select one item then select Actions > Activate Linktrace.


Result: The Activate Linktrace window is displayed.
...................................................................................................................................................................................................

Select the attributes:

Source EVC Termination.

Destination EVC Termination.

Use a Transport Link Termination.

Time to Live.

Click OK or Apply to confirm the operation.


Result: Linktrace report is shown.
Link Trace Report attributes:

Date

LtmSent

Priority

....................................................................................................................................................................................................................................
1350 OMS
24-31
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Linktrace activation
Management
Linktrace
....................................................................................................................................................................................................................................

NE UL

Port UL

MAC Address

Ltm Behaviour

Transport Link UL

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-32
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Overview
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Delay measurement and Loss measurement


Overview
Purpose

The tool measures the delay time and the packet loss on Ethernet and T-MPLS services.
Contents
Packet Delay measurement

24-34

Packet Loss measurement

24-35

Configure Maintenance End Points

24-36

List the OAM ETH DM Tool

24-38

List the OAM ETH SLM Tool

24-40

Create ETH DM Tool

24-42

Create ETH SLM Tool

24-44

Activate/Deactivate OAM ETH DM Tool

24-46

Activate/Deactivate OAM ETH SLM Tool

24-47

Inventory from OAM ETH DM Tool

24-48

Inventory from OAM ETH SLM Tool

24-49

Configure OAM ETH DM Tool

24-50

Configure OAM ETH SLM Tool

24-52

....................................................................................................................................................................................................................................
1350 OMS
24-33
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Packet Delay measurement
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Packet Delay measurement


Description

The tool counts the delivery time of packets.


For the measurement, the tool uses a specific packet.
Since delay depends on packet length, the user can set a packet length value or choose a
randomly generated value.
For measure accuracy, the Continuity Check (CC) periods must be less than 1 ms before
starting the Packet Delay tool.
The Packet Delay measurement applies on:

EVC
T-MPLS Tunnel

The Packet Delay measurement collect data on:

Forward, Backward, Round-trip time

Absolute and delay variation time

The tool uses Performance Monitoring counters.


The tool results are reported by CPM.
To use DM tool, execute the following main steps:

Activate the tool


Configure the board
Start PM on dedicated counters
Retrieve results by CPM

....................................................................................................................................................................................................................................
1350 OMS
24-34
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Packet Loss measurement
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Packet Loss measurement


Description

The Packet Loss tool counts lost packets.


For the measurement, the tool counts CC packets. Traffic loss is estimated from CC
packet loss.
For measure accuracy, the Continuity Check (CC) periods must be less than 1 ms before
starting the Packet Loss tool.
The Packet Loss measurement applies on:

Ethernet Services
Tunnel T-MPLS

The Packet Loss tool uses Performance Monitoring counters.


The Packet Loss tool results are reported by CPM.
To use SLM tool, execute the following main steps:

Activate the tool


Configure the board
Start PM on dedicated counters

Retrieve results by CPM

....................................................................................................................................................................................................................................
1350 OMS
24-35
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Configure Maintenance End Points
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Configure Maintenance End Points


When to use

This function Configure Maintenance End Points of T-MPLS Tunnels.


Related Information

For more information, refer to Packet Delay measurement (p. 24-34).


For more information, refer to Packet Loss measurement (p. 24-35).
For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > MPLS and T-MPLS > T-MPLS Tunnels.
Result: The tunnel list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Action > Configure Maintenance End Points.
Result: The Configure Maintenance End Points window is shown.
...................................................................................................................................................................................................

To Configure Tunnel for Connectivity Verification, Packet Loss measurement, set the
following attributes:

Click the box Enable MEPs

Select Enable CV/SLM; (none, CV, SLM)

Select CV/SLM Direction

Select CV/SLM Period

Select CV/SLM PHB

Select Packet Loss Probability

Select SLM PM Granularity

Select SLM PM Policy

Click the box OAM Signal Degraded

....................................................................................................................................................................................................................................
1350 OMS
24-36
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Configure Maintenance End Points
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

To Configure Tunnel for Delay measurement, set the following attributes:

Click the box Enable DM

Select DM Period

Select DM PHB

Packet Length:
Select one of the following options:
Click the box Random Packet Length

Select Packet Length value


Select DM Granularity

Select DM Policy

...................................................................................................................................................................................................

Click Ok button.
Result: Tunnel OAM parameters are configured.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-37
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


List the OAM ETH DM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

List the OAM ETH DM Tool


When to use

The List window shows all the ETH DM Tools and their attributes.
Related Information

For more information, refer to Packet Loss measurement (p. 24-35).


For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > OAM CC> OAM MDs.


Result: The list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Search > ETH DM Tools.
Result: The list window is displayed.

The attributes displayed for each DM Tool are:


User Label.
EVC.
MD Name

MA Name

CCM Priority

CCM Interval

Frame Size

PM 15M

PM 24H

PM Policy

....................................................................................................................................................................................................................................
1350 OMS
24-38
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


List the OAM ETH DM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Provisioning State

Availability State

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-39
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


List the OAM ETH SLM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

List the OAM ETH SLM Tool


When to use

The List window shows all the ETH SLM Tools and their attributes.
Related Information

For more information, refer to Packet Loss measurement (p. 24-35).


For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > OAM CC> OAM MDs.


Result: The list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Search > ETH SLM Tools.
Result: The list window is displayed.

The attributes displayed for each SLM Tool are:


Session Identifier.
EVC.
MD Name

MA Name

CCM Priority

CCM Interval

PM Unidir 15M

PM Unidir 24H

PM Bidir 15M

PM Bidir 24H

PM Frame Loss 15M

PM Frame Loss 24H

....................................................................................................................................................................................................................................
1350 OMS
24-40
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


List the OAM ETH SLM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

PM Policy

Provisioning State
Availability State

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-41
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Create ETH DM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Create ETH DM Tool


When to use

This function creates ETH DM Tool for ETH over T-MPLS EVC.
Related Information

For more information, refer to Packet Delay measurement (p. 24-34).


For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Ethernet over T-MPLS > T-MPLS EVCs.
Result: The EVC list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Action > Create ETH DM Tool.
Result: The Create ETH DM Tool window is shown.
...................................................................................................................................................................................................

To configure the tool creation, set the following attributes:

Select Source MEP from list

Select Destination MEP from list

Select Priority (Value: 0-7)

Select Interval (100 ms, 1 s, 10 s, 1 min, 10 min)

Frame Length:
Select one of the following options:

Click the box Random Frame Size

Select Frame Size value


Select PM 15Min

Select PM 24H

Select PM Policy (Keep, Purge on Stop, Purge on delete)

....................................................................................................................................................................................................................................
1350 OMS
24-42
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Create ETH DM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok button.
Result: DM Tool is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-43
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Create ETH SLM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Create ETH SLM Tool


When to use

This function creates ETH SLM Tool for ETH over T-MPLS EVC.
Related Information

For more information, refer to Packet Loss measurement (p. 24-35).


For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Ethernet over T-MPLS > T-MPLS EVCs.
Result: The EVC list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Action > Create ETH SLM Tool.
Result: The Create ETH DM Tool window is shown.
...................................................................................................................................................................................................

To Configure Tunnel for Connectivity Verification, Packet Loss measurement, set the
following attributes:

Select First MEP from list

Select Second MEP from list

Select Priority (Value: 0-7)

Insert Session Identifier

Select Interval (100 microsec, 500 microsec, 1 ms, 3.33 ms, 10 ms, 100 ms)
Click PM Unidir 15Min

Click PM Unidir 24H

Click PM Bidir 24H

Click PM Frame Loss 15Min

....................................................................................................................................................................................................................................
1350 OMS
24-44
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Create ETH SLM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Click PM Frame Loss 24H

Select PM Policy (Keep, Purge on Stop, Purge on delete)

...................................................................................................................................................................................................

Click Ok button.
Result: SLM Tool is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-45
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Activate/Deactivate OAM ETH DM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Activate/Deactivate OAM ETH DM Tool


When to use

This function activates or deactivates ETH DM Tool.


Related Information

For more information, refer to Packet Delay measurement (p. 24-34).


For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > OAM CC> ETH DM Tool.


Result: The list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Action > Activate.


or: Select Action > Deactivate.
Result: The DM Tool is activated/Deactivated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-46
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Activate/Deactivate OAM ETH SLM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Activate/Deactivate OAM ETH SLM Tool


When to use

This function activates or deactivates ETH SLM Tool.


Related Information

For more information, refer to Packet Loss measurement (p. 24-35).


For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > OAM CC> ETH SLM Tool.
Result: The list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Action > Activate.


or: Select Action > Deactivate.
Result: The SLM Tool is activated/Deactivated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-47
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Inventory from OAM ETH DM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Inventory from OAM ETH DM Tool


When to use

This function shows object related to an ETH DM Tool.


Related Information

For more information, refer to Packet Delay measurement (p. 24-34).


For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > OAM CC> ETH DM Tool.


Result: The list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Search > Inventory .


Result: The list of related resources is shown.
...................................................................................................................................................................................................

Select one type of object:

ETS EVC

Bridge EVC

T-MPLS EVC

EVC Terminations

OAM MA
OAM MEP
Result: The list of related object is shown

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-48
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Inventory from OAM ETH SLM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Inventory from OAM ETH SLM Tool


When to use

This function shows object related to an ETH SLM Tool.


Related Information

For more information, refer to Packet Loss measurement (p. 24-35).


For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > OAM CC> ETH SLM Tool.
Result: The list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Search > Inventory .


Result: The list of related resources is shown.
...................................................................................................................................................................................................

Select one type of object:

ETS EVC

Bridge EVC

T-MPLS EVC

EVC Terminations

OAM MA
OAM MEP
Result: The list of related object is shown

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-49
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Configure OAM ETH DM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Configure OAM ETH DM Tool


When to use

This function configures ETH DM Tool.


Related Information

For more information, refer to Packet Delay measurement (p. 24-34).


For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > OAM CC> ETH DM Tool.


Result: The list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Action > Configure.


Result: The Configure ETH DM Tool window is shown.
...................................................................................................................................................................................................

To configure the tool, set the following attributes:

The field ETH-DM Tool is not modifiable.

The field Source MEP is not modifiable.

Select Destination MEP from list

Select Interval (100 ms, 1 s, 10 s, 1 min, 10 min)

Frame Length:
Select one of the following options:

Click the box Random Frame Size

Select Frame Size value


Select PM 15Min

Select PM 24H

....................................................................................................................................................................................................................................
1350 OMS
24-50
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Configure OAM ETH DM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Click Ok button.
Result: DM Tool is modified.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-51
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Configure OAM ETH SLM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Configure OAM ETH SLM Tool


When to use

This function configures ETH SLM Tool.


Related Information

For more information, refer to Packet Loss measurement (p. 24-35).


For general information about DM/SLM Tool, refer to Delay measurement and Loss
measurement (p. 24-33).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > OAM CC> ETH SLM Tool.
Result: The list is shown.
...................................................................................................................................................................................................

Select one item in the list. Select Action > Configure.


Result: The Configure ETH SLM Tool window is shown.
...................................................................................................................................................................................................

To configure the tool, set the following attributes:

Select ETH-SLM Tool from list

The field Interval is not modifiable

The field Session Identifier is not modifiable

Click PM Unidir 15Min

Click PM Unidir 24H


Click PM Bidir 24H

Click PM Frame Loss 15Min

Click PM Frame Loss 24H

...................................................................................................................................................................................................

Click Ok button.

....................................................................................................................................................................................................................................
1350 OMS
24-52
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Configure OAM ETH SLM Tool
Management
Delay measurement and Loss measurement
....................................................................................................................................................................................................................................

Result: SLM Tool is modified.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
24-53
8DG42227DAAA 9.6
Issue 3 December 2012

Operation, Administration, and Maintenance (OAM)


Management

Configure OAM ETH SLM Tool

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
24-54
8DG42227DAAA 9.6
Issue 3 December 2012

25

25
Circuit
Emulation Service
Management

Overview
Purpose

This document describes the management of circuit emulation capable devices in the
scope of packet transport networks.
Contents
CES Overview

25-4

Circuit Emulation Services definition

25-4

TDM client synchronization

25-8

Protection setup after link creation

25-9

CAC tolerance and modulation mode

25-11

Resource assignment to Packet Radio domain

25-12

Resource assignment to T-MPLS domain

25-14

Packet Radio domain OAM and protections

25-17

Packet Radio performance monitoring

25-19

Packet Radio protection group

25-20

Loopback management

25-21

T-MPLS domain OAM and protections

25-22

Packet Radio domain QoS management

25-24

Packet Radio domain inter-working

25-25

T-MPLS domain inter-working

25-26

Circuit Emulation Service Management

25-27

MEF8 CES terminated service

25-33

Generic Circuit Emulation implementation

25-36

MEF8 Circuit Emulation Service implementation

25-38

SATOP Circuit Emulation Service implementation

25-43

Generic Circuit Emulation Service OAM and protections

25-45

...................................................................................................................................................................................................................................
1350 OMS
25-1
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management

Overview

....................................................................................................................................................................................................................................

MEF8 Circuit Emulation Service OAM and protections

25-46

SATOP Circuit Emulation Service OAM and protections

25-48

Circuit Emulation AAR Network Operation

25-50

CES Takeover description

25-52

CES Procedures

25-53

Circuit Emulation Service graphical inventory

25-55

View the list of CES Domains (Packet Radio)

25-58

View the details of CES Domain (Packet Radio)

25-59

Inventory from CES Domain (Packet Radio)

25-60

Create CES Domain (Packet Radio)

25-61

Assign/Deassign resources to Packet Radio Domain

25-62

Assign/Deassign resources to T-MPLS Domain

25-63

View the list of CES NEs

25-64

Description of the list of CES NEs

25-65

View the details of CES NE

25-66

Details of CES NE

25-67

Inventory from CES NE

25-68

Inventory from Protection Group

25-70

View the list of CES Transport Links

25-71

Description of the list of CES Transport Links

25-72

View the details of CES Transport Link

25-73

Details of the CES Transport Link

25-74

Inventory from CES Transport Link

25-75

Inventory from CES Transport Link extremity

25-76

View the list of CES PDH Ports

25-78

Description of the list of CES PDH Ports

25-79

View the details of CES PDH Port

25-82

Details of CES PDH Port

25-83

Inventory from CES PDH Port

25-84

List CES Edge Ports

25-85

Description of the list of CES Port

25-86

View the details of CES Edge Port

25-87

Details of CES Port

25-88

Inventory from CES Edge Port

25-89

View the list of CES Links Over Radio

25-90

....................................................................................................................................................................................................................................
1350 OMS
25-2
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management

Overview

....................................................................................................................................................................................................................................

Description of the list of CES Links Over Radio

25-91

View the details of CES Link Over Radio

25-92

Details of CES Link Over Radio

25-93

Inventory from CES Link Over Radio

25-94

Synchronization of CES Link Over Radio

25-96

View the list of CES Radio Ports

25-97

Description of the list of CES Radio Ports

25-98

View the details of CES Radio Port

25-99

Details of CES Radio Port

25-100

Inventory from CES Radio Port

25-101

View the list of CES VLAN Paths

25-102

Description of the list of CES VLAN Paths

25-103

Join CES tunnels

25-104

Stitch CES tunnels

25-105

View the list of Circuit Emulation Services

25-106

Description of the list of Circuit Emulation Services

25-107

View the list of CES Terminations

25-114

Description of the list of CES Terminations

25-115

Create Circuit Emulation Service

25-122

Inventory from CES

25-126

Configure CES

25-127

Routing display of CES

25-130

Configure CES terminations

25-131

Takeover procedure for MEF8 CES

25-132

Takeover procedure for SATOP CES

25-134

....................................................................................................................................................................................................................................
1350 OMS
25-3
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation Services definition

....................................................................................................................................................................................................................................

CES Overview
Circuit Emulation Services definition
Supported network scenarios

Circuit emulation services are typically deployed in the scope of mobile back-hauling
network scenarios.
Figure 25-1 Mobile back-hauling scenario

The packet radio domain covers the access network, while the aggregation network can
be:

an SDH/SONET network inter-working at TDM level

another packet domain (e.g. T-MPLS, ETS) inter-working at Ethernet level

Network layering

The circuit emulation layer is a service layer that uses the Ethernet layer as underlying
transport layer in the access network, where the physical transport is based on
microwaves.

....................................................................................................................................................................................................................................
1350 OMS
25-4
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation Services definition

....................................................................................................................................................................................................................................

Figure 25-2 Network layers in case of unterminated CE service

PKT manages both E1 terminated services covering the first scenario and also
unterminated services covering the latter.
When the access network does not need radio links, the T-MPLS domain may cover both
the access and the aggregation networks.
CES infrastructure

Circuit Emulation Services can be transported over Packet Radio technology or, over
T-MPLS technology. To prepare the transport infrastructure, the user has to assign the
transport resources (links or ports) to the relevant transport domain (Packet Radio or
T-MPLS). Then, the system automatically configures the resources for Circuit Emulation
Service support.
The resources available as infrastructure at the CES layer, are shown as follows:

the Packet Radio or T-MPLS domain is mirrored into CES domain


the Link over Radio/Link over Cable or Link over T-MPLS is mirrored into CES
transport link
the PDH or Ethernet Port is mirrored into CES port

....................................................................................................................................................................................................................................
1350 OMS
25-5
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation Services definition

....................................................................................................................................................................................................................................

Figure 25-3 Transport Layer representation

Supported External Products

Circuit Emulation Services supports the following products:

9500 MPR family products:


9500 MPR R1.3
9500 MPR R1.4
9500 MPR R2.1
TSS family products:

TSS-5C R1.0
TSS-5C R7.x
TSS-320 R4.0

....................................................................................................................................................................................................................................
1350 OMS
25-6
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation Services definition

....................................................................................................................................................................................................................................

External Interfaces

PKT handles the following management interfaces:

towards 9500 MPR

NMD-IM Q3 (for the NE equipment)


CSG IDL (for port synchronization, transmission alarms and service provisioning)
towards TSS

NMD-IM SNMP (for the equipment)


CSG IDL (for port synchronization, transmission alarms and service provisioning)

TDM traffic encapsulation

The packetized TDM traffic is encapsulated according to one of the following standards:

MEF 8
IETF SAToP

MEF 8 vs. SAToP encapsulation

Comparing MEF8 and SATOP encapsulation types, it is clear that - from the switching
point of view - the ECID label plays the role of the PW label, while the SVLAN plays the
role of the LSP tunnel label.
The transport of end-to-end TDM service in the Packet Radio network is based on MEF 8
encapsulation.
In case of MEF8 encapsulation, the ECID identifies the emulated circuit being carried.
This separates the identification of the emulated circuit from the Ethernet layer. ECID
have local significance only, and are associated with a specific MAC address.
In case of MEF8 over Packet Radio, the mapping between ECID and VLAN is 1:1.In
case of MEF8 over 802.1ad, the packet can have single or double VLAN tag
In case of MEF8 over T-MPLS, the packet can be untagged or single-tagged.

....................................................................................................................................................................................................................................
1350 OMS
25-7
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

TDM client synchronization

....................................................................................................................................................................................................................................

TDM client synchronization


Synchronization between CES terminations

Synchronization between CES terminations is needed at the termination where the TDM
signal is reconstructed from the packets, using the following alternative options:

clock recovered from the TDM network interface (TDM line timing)
external reference clock source (External timing)
recovering the clock from the packet network interface (Packet line timing). Timing
recovery from Packet line relies on Synchronous Ethernet boards

Timing information is extracted from:

the TDM network interface


we have synchronous timing, where TDM clients must be traceable to the same
synchronization source. In synchronous timing, synchronization network clock is
available at TDM client (TDM end systems), not from the packet transport network
(PTN). No TDM frequency transparency is required over the PTN

the packet network interface


we have:

differential timing, where the clock is recovered from a combination of data


contained in the frames, and knowledge of a reference clock common to both CES
edge nodes. In differential timing method, synchronization clock is available at
node edges of PTN (CES edge nodes) and requires TDM frequency transparency
through the PTN
adaptive timing, where the clock is recovered from data in the frames, and the
arrival time of the frames. The adaptive timing is required when no common clock
is available for CES edge nodes or TDM clients. This method relies on the
measuring the mean rate of packet arrivals to establish the rate of TDM interface
at egress and does not require network synchronization or timing protocols (i.e.
RTP), but requires TDM frequency transparency through the PTN

....................................................................................................................................................................................................................................
1350 OMS
25-8
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Protection setup after link creation

....................................................................................................................................................................................................................................

Protection setup after link creation


Workaround to setup the protection after link creation

Because of the change in the port naming rule, the user is recommended to avoid setting
up protections before the radio links are taken in charge by NMS. If it is required to setup
the protection after link creation in the NMS, the following user procedure must be used
as workaround:

Manually deassign the radio link from CE domain (automatic unlock sent to NPR)
Manually remove the radio link from NPR (object deletion sent by NPR to PKT) -> if
needed, PKT automatically deletes the radio link
Manually resynchronize ports from NPR: unprotected port is deleted and protecting
port is created
Manually resynchronize ports from PKT: unprotected port is deleted and protecting
port is created
Manually create radio link in NPR (object creation sent by NPR to PKT): PKT
automatically creates the protecting radio link (since it is a protecting one, assignment
to CE domain is forbidden)

Protection schemes

There are two protection schemes:

1+1 HSB (hot standby)


1+1 FD (frequency diversity)

....................................................................................................................................................................................................................................
1350 OMS
25-9
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Protection setup after link creation

....................................................................................................................................................................................................................................

Figure 25-4 CES 9500 MPR Protection schemes

....................................................................................................................................................................................................................................
1350 OMS
25-10
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

CAC tolerance and modulation mode

....................................................................................................................................................................................................................................

CAC tolerance and modulation mode


Relation between CAC tolerance and modulation mode

The modification of the CAC tolerance implies to update the homonymous attribute on all
domain nodes. The modification of the CAC tolerance impacts the way CAC checks are
performed on radio ports, in accordance with the modulation mode, as summarized by the
following picture.
Figure 25-5 CES Relation between CAC tolerance and modulation mode

The loose CAC tolerance is meaningful only in case of adaptive radio modulation mode.
In such case, CAC for TDM2TDM and TDM2ETH traffic is performed with respect to
the peak bandwidth.
In case of loose CAC tolerance, if the effective bandwidth is reduced to the minimum
capacity, all TDM2TDM and TDM2ETH traffic is disconnected and only ETH2ETH
traffic is preserved.
In case of adaptive modulation mode and strict CAC tolerance, CAC for TDM2TDM
and TDM2ETH traffic is performed with respect to the 4QAM bandwidth, while the peak
bandwidth is exploited only by ETH2ETH services.
In all cases, ifSpeed reports the correct capacity value for CAC.

....................................................................................................................................................................................................................................
1350 OMS
25-11
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Resource assignment to Packet Radio domain

....................................................................................................................................................................................................................................

Resource assignment to Packet Radio domain


Port assignment to Packet Radio domain

The user selects one MPR PDH or Ethernet port and assigns it to Packet Radio domain.
The assigned port is automatically inserted in the scope of the Packet Radio domain as
edge port. In case of Ethernet physical port, it is automatically activated by the system.
The following table summarizes the port technologies that can be assigned at the edge of
a Packet Radio domain.
Port technology

Can be assigned as edge port

Ethernet

Yes

Radio

No

PDH

Yes

Port deassignment from Packet Radio domain

The user selects one MPR PDH or Ethernet port and deassigns it from Packet Radio
domain. The deassigned port is automatically removed from the scope of the Packet
Radio domain as edge port. PKT checks that there are no supported services using that
port, i.e. that the used bandwidth is zero for this port. The used bandwidth is set by the
manager that is responsible for service provisioning on this port.
Transport Link assignment to Packet Radio domain

The user selects one link over radio or link over cable and assigns it to Packet Radio
domain. The assigned link is automatically inserted in the scope of the Packet Radio
domain as transport link. One protecting radio link (as recognized by means of the
naming rule) cannot be assigned to the Packet Radio domain.
In case of link over cable, its Ethernet terminations are automatically activated by the
system (if not already active).
When the manager allocates one service over the TL, it increments the link reserved CIR
in order to lock the link and prevent its deletion.
Transport Link deassignment from Packet Radio domain

The user selects one link over radio or link over cable and deassigns it from Packet Radio
domain. The deassigned link is automatically removed from the scope of the Packet
Radio domain as transport link. PKT checks that no services use that transport link. In
case of link over cable, its Ethernet terminations are not automatically deactivated by the
system, since it is not known if they support inband DCN.

....................................................................................................................................................................................................................................
1350 OMS
25-12
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Resource assignment to Packet Radio domain

....................................................................................................................................................................................................................................

Transport Link manual synchronization

PKT supports the manual synchronization of the CE transport link:

in case of cable transport technology, the synchronize command is disabled

in case of radio transport technology, the synchronize command is enabled and


uploads the available bandwidth from both radio ports: in case of mismatch, the
minimum value is reported on the transport link and a warning message is returned to
the user

DCN inband management

MPR does not manage opticsIMIfDataManagementPlaneLabel MIB object. Currently


inband DCN is configured at commissioning time via dedicated VLAN that MPR does
not recognizes as dedicated to DCN. The CPU is connected to one Ethernet physical port
that has been characterized as DCN port via proprietary tables

....................................................................................................................................................................................................................................
1350 OMS
25-13
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Resource assignment to T-MPLS domain

....................................................................................................................................................................................................................................

Resource assignment to T-MPLS domain


TSS-5C PDH Port assignment to T-MPLS domain

The user selects one TSS-5C PDH port and assigns it to T-MPLS domain; then it is
inserted as CES port under the T-MPLS domain. No change with respect to common TSS
behavior is foreseen about the assignment of TSS-5C Ethernet physical ports and SDH
terminations to T-MPLS domain.
TSS-5C ETH Port assignment to T-MPLS domain

In case of Ethernet physical port, it is a port shared for Ethernet and CE services and
therefore it is inserted both as ETH edge port and CES port under the T-MPLS domain.
PKT manages the reserved bandwidth for Ethernet and CE services:

CIR allocated for EVC


CIR allocated for CES

PKT sums up the reserved CIR allocated by each manager and locks the port preventing
deassignment from T-MPLS domain. It is up to the user to ensure that the bandwidth
reserved for EVC and for CES do not exceed the interface rate.
The following table summarizes the different services that are supported at the edge of a
T-MPLS domain
Port technology

When assigned to T-MPLS domain, it


must inserted into

Ethernet

T-MPLS edge port list, CES port list

PDH

CES port list

TSS-5C Port deassignment from T-MPLS domain

The user selects one TSS-5C PDH or Ethernet port and deassigns it from T-MPLS
domain. PKT checks that there are no supported services using that port.
The deassigned port is automatically removed from the scope of the T-MPLS domain as:

CES port and T-MPLS edge port, in case of Ethernet physical port

CES port, in case of PDH port

Link over T-MPLS reservation for CES

When one T-MPLS PW gets implemented, it is automatically inserted in the list of Links
over T-MPLS.
Each link over T-MPLS must be used alternatively either for EVC or for CES.
The management of the following attributes must be introduced in the Link over
T-MPLS:

Supported service: EVC, CES

....................................................................................................................................................................................................................................
1350 OMS
25-14
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Resource assignment to T-MPLS domain

....................................................................................................................................................................................................................................

The link over T-MPLS is inserted in:

when the supported service is EVC: it is inserted in the Ethernet transport link list
when the supported service is CES: it is inserted in the CES transport link list and
T-MPLS PW terminations are inserted into CES port list (with interface type =
T-MPLS)

When allocating the CES over the Link over T-MPLS, PKT updates the reserved
CIR/PIR/CBS/PBS as follows:

reserved PIR = reserved CIR = CES CIR , where the sum extends to all CES
allocated over this Link
reserved PBS = reserved CBS = CES CBS , where the sum extends to all CES
allocated over this Link

When the reserved bandwidth parameters are different from zero, the T-MPLS PW can
not be deimplemented, therefore preventing CES transport link removal.
Management of T-MPLS PW control word and supported service

The following attributes are introduced in the T-MPLS PW:

Supported service: EVC (default), CES


Control word: disabled (default), enabled

The supported service can be configured by user at any time, even when the T-MPLS PW
is implemented. The supported service is meaningful only inside PKT scope:

when the supported service is EVC, the corresponding Link over T-MPLS is notified
only to Ethernet manager

when the supported service is CES, the corresponding Link over T-MPLS is notified
only to CES manager

From PKT architecture point of view, changing the supported service implies to move the
Link over T-MPLS from one managers scope to the other. Therefore, the supported
service cannot be modified if any of the Link over T-MPLS bandwidth parameters
(reserved CIR, reserved PIR, reserved CBS, reserved PBS) is different from zero.
When the supported service is EVC, the user has the option to configure also the control
word enabling/disabling, independently of the T-MPLS PWs configuration status
(allocated or implemented).
When the supported service is CES, then:

the control word is automatically enabled by PKT


the PW bandwidth parameters are pre-filled by PW creation wizard with the following
default values (the user can modify them):

CIR = PIR = 2432 Kbit/s

CBS = PBS = 2900 bytes (2*MTU as suggested value)

The above values allow to support one CE service for all possible values of payload size
(independently from the underlying layer).

....................................................................................................................................................................................................................................
1350 OMS
25-15
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Resource assignment to T-MPLS domain

....................................................................................................................................................................................................................................

The control word is provisioned to the NE via TL1 only to the T-MPLS PW termination
segments.
TSS-5C NE configure timestamp frequency

The system supports the configuration of the RTP timestamp frequency, used by CE
services with differential timing mode and RTP enabled. The system checks that there are
no implemented CES on the TSS NE to be configured. The TSS-5C timestamp frequency
supported range is:

77.76 MHz
25 MHz (default)
16.384 MHz

....................................................................................................................................................................................................................................
1350 OMS
25-16
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Packet Radio domain OAM and protections

....................................................................................................................................................................................................................................

Packet Radio domain OAM and protections


Alarm correlation

PKT manages reports the elementary alarms generated by MPR and also correlates them
to transport resources. The alarm correlation can be:

horizontal: the originating alarmed resource is an elementary object and the correlated
resource is a transport object at the same layer
vertical: the originating alarmed is resource is a transport object and the correlated
resource is a transport object at the client layer

Figure 25-6 Horizontal and vertical alarm correlation in Packet Radio domain

Both horizontal and vertical correlation are always enabled on Packet Radio domain.
The availability status of the client transport object has the value:

transport failure, in case of horizontal correlation

server transport failure, in case of vertical correlation

....................................................................................................................................................................................................................................
1350 OMS
25-17
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Packet Radio domain OAM and protections

....................................................................................................................................................................................................................................

MPR R1.4 URU alarm management

Since R1.4 MPR sends URU in the following cases and on the following objects:

All E1 TTP in case of PDH card failure

All Radio TTP in case of Radio card failure


All E1 TTP, radio TTP and MAU entries in case of Core card failure (apart from radio
TTP involved only in MPT to MPT connections switched by the same RAD_ACC)
The involved MAU entry in case of SFP failure

PKT correlates the URU to the impacted CE services according to the following
propagation chain:

Horizontal: URU on PDH port (PDH card failure) -> CES transport failure

Vertical: URU on Radio/ETH port (Radio card failure or SFP failure) -> Radio/Cable
link transport failure -> VLAN tunnel server transport failure -> CES server transport
failure

Elementary alarms on 9500MPR PDH ports

PKT receives via CSG the elementary alarms on PDH ports and persists them in database.
At PKT startup the PDH elementary alarms are automatically resynchronized.
The Underlying Resource Unavailable (URU) alarm represents equipment failures (e.g.
card missing) that affect services.
Alarms on PDH ports are synchronized from active problem table
PKT correlates horizontally the PDH port failure to the impacted CES

LOS on PDH port -> CES transport failure

Since MPR R2.1, the LosCesFrame alarm is supported on PDH port. The LosCesFrame
alarm replaces the LOF alarm on CES termination supported by MPR R1.4.
Elementary alarms on 9500MPR radio ports

PKT receives via CSG the elementary alarms on radio ports and persists them in database.
At PKT startup the radio elementary alarms are automatically resynchronized.
PKT correlates vertically the Radio elementary alarms to the impacted CE services
according to the following propagation chain:

alarm (e.g. cableLoss) on Radio port -> Radio link transport failure -> VLAN tunnel
server transport failure -> CES server transport failure

....................................................................................................................................................................................................................................
1350 OMS
25-18
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Packet Radio performance monitoring

....................................................................................................................................................................................................................................

Packet Radio performance monitoring


9500MPR PDH port performance monitoring

The operator can enable PM on a given CES at creation time or manually later, specifying
the desired granularity: 15min or 24h. The enabling is performed via navigation to JUSM.
MPR supports current and historical counters on the PDH ports for monitoring both the
incoming and outgoing E1 signal. They are persisted in NE agent cache memory. The
management has to start/stop one counter for each direction. So PM counters are available
to monitor the signal in both directions at the edge of the MPR network in case of PDH
edge port.
PDH measures are currently stored by NMS in the same database as SDH measures,
different from the Ethernet database. An architectural evolution of the CPM component
for PKT is required to manage PDH PM.
9500MPR Radio port performance monitoring

Managed via navigation to JUSM.


MPR supports 15min/24h maintenance counters on radio ports. EMLIM elaborates
historical counters via periodic samples. At radio level it is possible to monitor both the
single radio link termination and the radio link protected termination.
It is also possible to monitor the Ethernet packets enqueued in the queues assigned to
pass-through Ethernet services. MPR supports only free running maintenance counters on
Ethernet queues of radio ports.
All these counters are available only in transmission. PKT is not requested to manage PM
counters on radio ports.
9500MPR Ethernet port performance monitoring

Managed via navigation to JUSM.


MPR supports only free running maintenance counters on Ethernet ports. EMLIM
currently does not elaborate historical counters via periodic samples. These counters are
available both in transmission and reception. PKT not requested to manage maintenance
counters.

....................................................................................................................................................................................................................................
1350 OMS
25-19
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Packet Radio protection group

....................................................................................................................................................................................................................................

Packet Radio protection group


Radio protection group switch commands via navigation

The operation of the radio protection group switch position is managed via navigation to
JUSM
Switch position synchronization of single radio protection group

The operator is allowed to select one protection group and to start manually the
synchronization operation of the switch position for the selected protection group. PKT
retrieves and updates the current active switch position, the current switch command, the
current switch criteria and re-triggers alarm correlation for the involved radio links and
supported services.

....................................................................................................................................................................................................................................
1350 OMS
25-20
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Loopback management

....................................................................................................................................................................................................................................

Loopback management
9500MPR Loopback management

PDH loopback is a loop and continue -> only one traffic direction is impacted. When the
PDH loopback is activated, MPR sends an event telling which is the involved port, the
direction and the type (internal, external).
Radio loopback is a simple loop -> both traffic directions are affected. When the Radio
loopback is activated on ODU300 access, MPR sends an event telling which is the
involved radio port, the direction and the type (internal, external).
In order to alert the operator that the loopback operation has affected the traffic:

In case of simple loop, MPR sends LOF on the CES termination that does not receive
the signal (loop and AIS insertion - so that AIS alarm would be raised on egress PDH
port - is not supported)

In case of loop and continue, no alarm is raised but the port state reports on JUSM the
active loopback (the loopback activation event is not managed by PKT)

Switch position synchronization of single radio protection group

The operator is allowed to select one protection group and to start manually the
synchronization operation of the switch position for the selected protection group. PKT
retrieves and updates the current active switch position, the current switch command, the
current switch criteria and re-triggers alarm correlation for the involved radio links and
supported services.

....................................................................................................................................................................................................................................
1350 OMS
25-21
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

T-MPLS domain OAM and protections

....................................................................................................................................................................................................................................

T-MPLS domain OAM and protections


TSS-5C PDH Port assignment to T-MPLS domain

PKT manages reports the elementary alarms generated by TSS and also correlates them to
transport resources. The alarm correlation can be:

horizontal: the originating alarmed resource is an elementary object and the correlated
resource is a transport object at the same layer
vertical: the originating alarmed is resource is a transport object and the correlated
resource is a transport object at the client layer

Figure 25-7 Horizontal and vertical alarm correlation in T-MPLS domain

Vertical correlation is always enabled on T-MPLS domain:

from PW to MPLS Tunnel


from ETH CES port to CES

Horizontal correlation is always enabled on T-MPLS domain:

from PDH CES port to CES


from CES Termination to CES

The availability status of the client transport object has the value:

transport failure, in case of horizontal correlation

server transport failure, in case of vertical correlation

....................................................................................................................................................................................................................................
1350 OMS
25-22
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

T-MPLS domain OAM and protections

....................................................................................................................................................................................................................................

TSS-5C NE configure PDH degrade thresholds

The system supports the configuration of the degrade thresholds, that are used to generate
and clear the degrade alarm on PDH ports. The system checks that there are no
implemented CES on the TSS NE to be configured. The supported ranges and default
values are:

PDH degrade observation interval range: 2-10 seconds


PDH degrade observation interval default: 5 seconds
PDH degrade raise threshold range: 0-1000 errors
PDH degrade raise threshold default: 30 errors

PDH degrade clear threshold range: 0-1000 errors


PDH degrade clear threshold default: 20 errors

The raise threshold must be strictly higher than the clear threshold.
Elementary alarms on TSS-5C PDH ports

PKT receives via CSG the elementary alarms on PDH ports and persists them in database.
At PKT startup the PDH elementary alarms are automatically resynchronized.
PKT correlates horizontally the PDH port failure to the impacted CES, e.g.:

LOS on PDH port -> CES transport failure

Elementary alarms on TSS-5C Ethernet ports

PKT receives via CSG the elementary alarms on Ethernet ports and persists them in
database. At PKT startup the Ethernet elementary alarms are automatically
resynchronized.
PKT correlates vertically the ETH elementary alarms to the impacted CE services
according to the following propagation chain:

Edge port: alarm (e.g. LOS) on ETH port -> CES server transport failure
Link over cable : alarm (e.g. LOS) on ETH port -> Cable link transport failure ->
Tunnel server transport failure -> CES server transport failure

Correlation of elementary alarms to link over PDH

PKT correlates elementary PDH interface alarms to link over PDH, if any.

....................................................................................................................................................................................................................................
1350 OMS
25-23
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Packet Radio domain QoS management

....................................................................................................................................................................................................................................

Packet Radio domain QoS management


Provisioning of ports (via navigation)

The configuration of specific PDH interface characteristics that are independent of the CE
service are supported via navigation to MPR JUSM.
The configuration of all Radio interface characteristics that are independent of the CE
service are supported via navigation to MPR JUSM.

....................................................................................................................................................................................................................................
1350 OMS
25-24
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Packet Radio domain inter-working

....................................................................................................................................................................................................................................

Packet Radio domain inter-working


inter-working

The Packet Radio domain can physically interwork with other domains either at the PDH
or Ethernet level.
Table 25-1

Allowed interface type, depending on link technology

Link technology

Interface type
NNI

IWI

Link over radio

Yes

No

Link over cable

Yes

Yes

Link over PDH

No

Yes

In particular, a link over cable or a link over PDH can be used as the domain
inter-working interface in the cases described by the following RATS.

PKT is requested to manage inter-working Ethernet cable links between Packet Radio
domain and ETS domain.
PKT is requested to manage inter-working Ethernet cable links between Packet Radio
domain and T-MPLS domain.
PKT is requested to manage inter-working Ethernet cable links between Packet Radio
domain and PB domain.
PKT is requested to manage inter-working PDH cable links between Packet Radio
domain and SDH domain. The SDH domain is managed by SDH application. The
PDH IWI cable is uploaded from NPR.

E2E PDH: Manual synchronization of PDH inter-working links

PKT manages the upload via NPR-NBI of PDH links that terminate e.g. on 9500MPR or
on TSS NEs. The upload is triggered manually by operator, as in the link over cable case.
NPR creates the PDH IWI link characterizing it with PDH technology. The NPR message
response contains, for each extremity, the node userlabel and the port userlabel. PKT
ensures that in DB both nodes that terminate the PDH link are present: one of them is e.g.
the MPR/TSS NE, while the other could be any OMSN NE or other not-managed NE.
PKT gets via NPR-NBI also the NE type and Node ID of the not-managed NE.
E2E PDH: Management of network role on PDH port

When the operator assigns one PDH port as edge port to the Packet Radio domain, the
network role has the following values:

UNI -> when there is not PDH IWI link

E-NNI -> when the PDH port is the termination of a PDH IWI link

CE manager must be aware of the PDH network role since this network role is reported in
the CES routing display.
....................................................................................................................................................................................................................................
1350 OMS
25-25
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

T-MPLS domain inter-working

....................................................................................................................................................................................................................................

T-MPLS domain inter-working


Management of inter-domain link: T-MPLS domain SDH domain

PKT is requested to manage inter-working PDH cable links between T-MPLS domain and
SDH domain. The SDH domain is managed by SDH application. The PDH IWI cable is
uploaded from NPR.

....................................................................................................................................................................................................................................
1350 OMS
25-26
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation Service Management

....................................................................................................................................................................................................................................

Circuit Emulation Service Management


Circuit Emulation Service security

PKT supports the capability to prevent the setup of misconnections.


Port segregation

Port segregation is supported by MPR both on Ethernet and radio ports. If more than two
ports must be segregated, one MIB entry is created for each segregated port pair.
Generic Circuit Emulation Service creation and allocation

A Circuit Emulation Service is a transport connection between remote E1 ports, where the
PDH stream is segmented and encapsulated into Ethernet packets.
The service can be terminated by PDH ports at both ends or unterminated: in the latter
case the PDH stream is not reconstructed at one service termination and the PDH traffic is
forwarded to the client equipment either encapsulated into Ethernet packets or into
channelized STM-n.
The service CIR is automatically computed by PKT:

based on interface type, service profile and clock source in case of MEF-8

based on payload size in case of SATOP, CBS is not managed in case of MEF-8.

Manual join a tunnel to a CES

The Tunnel is the object that represents the transport route within a given domain.
The CES itself is the transport object that can represent the routing across different
domains:

The different domains are the nodes of the routing graph


The Tunnel is the connectivity inside one graph node

Two different Tunnels associated to distinct domains (no e2e Tunnel is created) can be
manually joined or stitched to the CES in order to realize one e2e CES:

Join is possible if one Tunnel already supporting CES and the Tunnel being joined are
connected by one transport link

Stitch is possible if one Tunnel already supporting CES and the Tunnel being stitched
share one logical port

Because of Tunnel join or stitching, one CES can be supported by one or many Tunnels
and one Tunnel can support one or more CES.
Tunnel joined to CES: after join, the CES is supported by one tunnel in each crossed
domain and the two tunnels are connected by one transport link

....................................................................................................................................................................................................................................
1350 OMS
25-27
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation Service Management

....................................................................................................................................................................................................................................

Figure 25-8 CES after join

Tunnel stitched to CES: after stitching, the CES is supported by one tunnel in each
crossed domain and the two tunnels share the same logical E1 port
Figure 25-9 CES after stich

....................................................................................................................................................................................................................................
1350 OMS
25-28
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation Service Management

....................................................................................................................................................................................................................................

After tunnel join or stich, no new e2e CES object is created, but the e2e CES preserves
the identity of the CES across a single domain:

When the CES is supported by one single Tunnel, then it is a CES fragment
When the CES is supported by many Tunnels (i.e. it joins or stitches different Tunnel
fragments), then it is an e2e CES

The Tunnel is created in PKT database when the service is created.


At service creation time, PKT creates one pair of Tunnel segments in each crossed NE.
At service creation time, PKT creates one XC in each crossed NE.
Management of CES CoS and encapsulation type

The following new attributes are introduced on CES:

CoS: G, G2, R1, R, R3, R4, BE, BK

Encapsulation type: MEF8, SATOP


Transport type: CesOverPacketRadio, CesOverT-MPLS

The Class of Service (CoS) is configurable only in case of CesOverT-MPLS.


The encapsulation type and transport type are automatically computed by PKT depending
on the underlying transport domain:
Table 25-2

Relation between CES transport type and encapsulation type

Domain

Transport type

Encapsulation type

Packet Radio

CesOverPacketRadio

MEF8

T-MPLS

CesOverT-MPLS

SATOP

CES CoS compatibility check with T-MPLS PW PHB Profile

The CES CoS specified by operator at CES creation time must be compatible with the
PHB Profile of the supporting T-MPLS PW aka Link over T-MPLS. In fact, if a
5-classes PHB Profile was associated to the T-MPLS PW, then not all CoS are not
supported.
Table 25-3

CoS supported vs. T-MPLS PHB Profile

CoS

Supported in PHB Profile #1

Supported in PHB Profile #2

G2

R1

R(2)

R3

R4

BE

....................................................................................................................................................................................................................................
1350 OMS
25-29
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation Service Management

....................................................................................................................................................................................................................................

Table 25-3

CoS supported vs. T-MPLS PHB Profile

(continued)

CoS

Supported in PHB Profile #1

Supported in PHB Profile #2

BK

PKT does not check that:

the requested CES CoS is compatible with the supported CoS of the selected Link
over T-MPLS (bottom-up CES creation)
the automatically created Link over T-MPLS supports the requested CES CoS
(top-down CES creation)

If the operator chooses one CoS that is not supported by the T-MPLS PW, then the CES
traffic will be treated as belonging to the nearest lower supported CoS when forwarded in
the T-MPLS network.
Management of tunnel type

The Tunnel creation:

in case of MEF8 over Packet Radio domain, PKT creates Packet-Radio Tunnel
in case of SATOP over T-MPLS domain, PKT creates T-MPLS Tunnel
in case of MEF8 over 802.1ad or T-MPLS domain (where it corresponds to one p2p
EVC), PKT creates Ethernet Tunnel

in case of PDH over SDH domain (where it corresponds to one SDH Path), PKT
creates SDH Tunnel

Therefore the Tunnel is characterized by a type that is automatically computed by PKT


according to the underlying transport technology: Packet-Radio, T-MPLS, ETH, SDH.
Routing display of CES

The operator can open the graphical routing display of one CES.
PKT shows the CES routing display in two layers:

CES (i.e. PW) layer: it shows the crossed Tunnel

Tunnel layer: it shows all crossed link over radio or link over cable or link over
T-MPLS

At the CES layer, the following resources are displayed:

Edge nodes (A and Z)

Edge ports (PDH port or physical Ethernet)


CES terminations
Tunnel termination segments

Tunnel

....................................................................................................................................................................................................................................
1350 OMS
25-30
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation Service Management

....................................................................................................................................................................................................................................

At the Tunnel layer, the following resources are displayed:

Edge and transit nodes


NNI ports (Radio port or physical Ethernet or logical T-MPLS PW terminations) of
edge and transit nodes
Radio links (in case of 1+1 protection, the radio link with working protection role is
displayed) or cable links or T-MPLS links:
Tunnel segments (termination and intermediate)
Cross-connections between tunnel segments

PKT shows graphically the above resources by means of a dedicated icon: clicking on the
icon, the resource properties are displayed.
Figure 25-10 CES routing display

....................................................................................................................................................................................................................................
1350 OMS
25-31
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation Service Management

....................................................................................................................................................................................................................................

Figure 25-11 Tunnel routing display

Manual deallocation and deletion of CES

PKT manages the unreservation of database resources for selected CE service and the CE
service removal from database. The CES deallocation triggers the automatic Tunnel
deallocation. The CES deletion triggers the automatic Tunnel deletion.

....................................................................................................................................................................................................................................
1350 OMS
25-32
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

MEF8 CES terminated service

....................................................................................................................................................................................................................................

MEF8 CES terminated service


Basic creation and allocation over Packet Radio

PKT is requested to support the following service profiles (corresponding to a particular


radio compression):

TDM2TDM
TDM2ETH

TDM services are switched on local MAC address basis (each PDH board is assigned an
internal MAC address). The default service profile that is proposed to the operator is:

TDM2TDM for terminated services


TDM2ETH for unterminated services

In case of underlying radio infrastructure, the operator can select any service profile. In
case of underlying Ethernet physical infrastructure (link over cable or edge port), only the
TDM2ETH service profile is admitted.
The TDM2TDM service is characterized by one specific VLAN on network basis. MPR
supports TDM2TDM services with proprietary encapsulation, i.e. not MEF-8. For this
reason a TDM2TDM service profile must be terminated at the edge of the MPR network.
Therefore, in case of unterminated CES, the TDM2ETH service profile must be used and
the MAC DA of the Ethernet frame outgoing from one GE interface must manually
configured by operator.
Details

The main service characteristic is the VLAN ID (in the range 2..4080): it is selected by
operator or it can be automatically selected by the system. VLAN ID must be unique per
service in all MPR network, otherwise loss of E1 signal could occur.
In case of TDM2TDM service profile, the PW label (aka ECID) is automatically
computed by MPR and is 1:1 with the service VLAN. In case of TDM2ETH service
profile, the ECID can be selected by operator for each service direction.
The following CES attributes can always be modified upon operator request:

userlabel
service group
comment1/comment2/comment3

text1/text2/text3
signal mode to framed/unframed

The following CES attributes can be modified only when the CES is defined:

ECID A->Z
ECID Z->A

Destination MAC address

....................................................................................................................................................................................................................................
1350 OMS
25-33
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

MEF8 CES terminated service

....................................................................................................................................................................................................................................

All MEF8 CES terminations of all PDH ports belonging to the same card must be
configured with the same TDM clock source type.
The service creation fails if another service already exists that terminates on the same E1
card and has a different type. Two ports belong to the same card if their slot number x is
the same; the card slot number is represented in the ports ifIndex: 60 x nn.
The NE MAC address is used as source address in case of TDM2ETH service profile and
is configured by the management system as destination address of the remote NE. In case
of TDM2TDM NE MAC address is never used.
MPR does not support one MAC address per Ethernet interface.
The TDM clock source has to be configured in the NE at XC creation time.
The ECID Tx identifies uniquely the PDH destination port in the scope of the card. In
fact, the core unit switches packets based on VLAN, while the PDH card switches packets
based on ECID Tx.
Each CES has an associated Packet-Radio tunnel, representing the Ethernet infrastructure
for circuit emulation.
In case of MPR NE, the association between CES and Tunnel is 1:1.
PKT is requested to apply admission control checks at allocation time. The bandwidth
reserved on a given port depends on port technology and also on service characteristics.
A new MIB object has been introduced representing the allocated bandwidth for one E1
service over one radio interface: cesCfgBandwidth on opticsIMCESoEthMIB. This MIB
object is used to provide the E1 bandwidth occupation vs the radio interface.
In general, however, the bandwidth reserved by the service on each interface depends on
interface type, service profile and TDM clock source according to the following table.
Table 25-4

E1 service bandwidth occupation for MPR R1.3/R1.4

Interface

Service Profile

TDM clock source

Service CIR
[Mbit/sec]

Radio

TDM2TDM

Differential

22.852

Radio

TDM2ETH

Differential

22.569

Radio

TDM2ETH

Adaptive

21.844

Ethernet

TDM2ETH

Differential

25.443

Ethernet

TDM2ETH

Adaptive

24.482

The TDM2TDM encapsulation occupies more bandwidth than TDM2ETH one, since it
incorporates also some protection overhead.
In particular, in case of TDM2ETH service profile, E1 service bandwidth occupation
depends also on RTP presence or not. RTP presence depends on TDM clock source value:

differential -> RTP present


adaptive -> RTP not present

....................................................................................................................................................................................................................................
1350 OMS
25-34
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

MEF8 CES terminated service

....................................................................................................................................................................................................................................

At allocation time, PKT creates one XC in each crossed NE.


MEF8 CES allocation over Packet Radio on MPT radio ports

The bandwidth reserved by one E1 signal is different for ODU300 and MPT ODU. The
bandwidth occupied by one E1 signal is computed from a configuration table, using as
inputs the following parameters:

radio interface type


service profile (TDM2TDM, TDM2ETH)

TDM clock source (differential, adaptive)

Table 25-5

E1 service bandwidth occupation since MPR R2.1

Interface type

Service Profile

TDM clock source

Service CIR [Mbit/sec]

Radio ODU300

TDM2TDM

Differential

22.852

Radio ODU300

TDM2ETH

Differential

22.569

Radio ODU300

TDM2ETH

Adaptive

21.844

Radio MPT

TDM2TDM

Differential

21.667

Radio MPT

TDM2ETH

Differential

22.579

Radio MPT

TDM2ETH

Adaptive

21.853

Ethernet

TDM2ETH

Differential

25.443

Ethernet

TDM2ETH

Adaptive

24.482

....................................................................................................................................................................................................................................
1350 OMS
25-35
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Generic Circuit Emulation implementation

....................................................................................................................................................................................................................................

Generic Circuit Emulation implementation


relationships between E1 and PW tables

The following picture shows the relationships between E1 and PW tables depending on
NE type both in case of MEF-8 and SATOP services.
Figure 25-12 SNMP MIB relationships between E1 and PW tables

Manual deimplementation of CES

PKT manages the removal of provisioned CE connectivity in the network.


The CES deimplementation triggers the automatic Tunnel deimplementation.
In case of MPR NE, the automatic pwCTDMCfg deletion is implemented by NE agent
when PKT requests the pw deletion: if the pwCGenTDMCfgIndex value of associated
pwCTDMTable entry is no longer contained in any other pwCGenTDMCfgIndex object,
then the referenced pwCTDMCfgTable entry (that indexed by pwCGenTDMCfgIndex
value) has to be deleted.

....................................................................................................................................................................................................................................
1350 OMS
25-36
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Generic Circuit Emulation implementation

....................................................................................................................................................................................................................................

In case of TSS NE, it is manager (PKT, ZIC) responsibility to maintain 1:1 association
between pwEntry and pwCTDMCfgEntry. Therefore PKT will be in charge of explicit
pwCTDMCfgEntry deletion. If ZIC allows to reuse the same pwCTDMCfgEntry for two
different pw entries, this will cause a failure when PKT tries to deimplement (i.e. delete in
the NE) one those services.
PKT operator workaround to overcome failure:

run an audit: the failed service connection will be recognized as allocated (i.e. deleted
in the NE)

retry the deimplementation of the failed service: the deimplementation will be


successful the second time

....................................................................................................................................................................................................................................
1350 OMS
25-37
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

MEF8 Circuit Emulation Service implementation

....................................................................................................................................................................................................................................

MEF8 Circuit Emulation Service implementation


flows supported by 9500MPR NE

When implementing the MEF-8 service, PKT is requested to configure the following flow
connections in the 9500MPR NE:

PDH to Radio
Radio to Radio
Radio to Ethernet

PDH to Ethernet

MEF8 CES terminated service implementation

TDM2TDM service profile provisioning


PDH To Radio Traffic Flow

The system automatically performs the following provisioning steps:

configuration of the PDH port signal mode to unframed/framed


Tunnel Termination Segment Creation via SNMP:
creation of Ethernet ingress flow associated to PDH port (service ID = PDH port
ifIndex, service type = Ethernet) and corresponding to tunnel termination

creation of TC associated to the VLAN assigned by operator that has to be pushed


and represented by the corresponding tunnel segment attribute
creation of CES over Ethernet profile corresponding to the service profile pointing
to the ingress flow and represented by the corresponding tunnel segment attribute
Tunnel Segment Creation via SNMP:

creation of Ethernet egress flow associated to Radio port (server ID = Radio port
ifIndex, service type = Ethernet) and corresponding to tunnel segment
creation of cross-connection between tunnel segments
CES termination profile creation via SNMP: nothing to be provisioned

CES termination creation via SNMP: nothing to be provisioned


Tunnel Termination Segment Configuration via SNMP: nothing to be provisioned

Radio To Radio Traffic Flow

The provisioning sequence is the same as above.


Radio To PDH Traffic Flow

The provisioning sequence is unchanged.


Radio To Ethernet Traffic Flow

Ethernet to Radio connection is not allowed in case of TDM2TDM service profile.


PDH To Ethernet Traffic Flow

Ethernet to Radio connection is not allowed in case of TDM2TDM service profile.

....................................................................................................................................................................................................................................
1350 OMS
25-38
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

MEF8 Circuit Emulation Service implementation

....................................................................................................................................................................................................................................

Ethernet To Radio Traffic Flow

Ethernet to Radio connection is not allowed in case of TDM2TDM service profile.


MEF8 CES unterminated service implementation

TDM2ETH service provisioning


PDH To Radio Traffic Flow (MPR NE)

In case of MPR NE, the system automatically performs the following provisioning steps:

configuration of the PDH port signal mode to unframed/framed


CES Termination Profile Creation via SNMP:
creation of PW TDM CFG object (fixed payload size = 256, fixed RTP header =
true, TDM clock source specified by operator and represented by corresponding
CES termination attribute)

CES Termination Creation via SNMP:


creation of a PW entry (fixed type = e1Satop(17), ifIndex of the PDH port) -> as a
side effect, the NE creates automatically one PW TDM entry that PKT has to
configure (TDMboundPWlabel = ECID Rx, PSNboundPWlabel = ECID Tx, PW
TDM CFG reference to previously created entry) according to corresponding CES
termination attributes
Tunnel Termination Segment Creation via SNMP:
creation of Ethernet ingress flow associated to PDH port (service ID = PDH port
ifIndex, service type = Ethernet) and corresponding to tunnel termination
creation of TC associated to the VLAN assigned by operator that has to pushed
and represented by corresponding tunnel segment attribute

creation of CES over Ethernet profile corresponding to the service profile pointing
to the ingress flow and to the PW entry (CESCfgPwIndex is set to point to
pwIndex) and characterized by tunnel segments service profile attribute.
Tunnel Segment Creation via SNMP:
creation of Ethernet egress flow associated to Radio port (server ID = Radio port
ifIndex, service type = Ethernet) and corresponding to tunnel segment
creation of cross-connection between tunnel segments

....................................................................................................................................................................................................................................
1350 OMS
25-39
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

MEF8 Circuit Emulation Service implementation

....................................................................................................................................................................................................................................

PDH To Radio Traffic Flow (TSS NE)

In case of TSS NE, the system will perform automatically the following provisioning
steps:

configuration of the PDH port signal mode to unframed/framed


Tunnel Termination Segment Creation via SNMP:
creation of Ethernet ingress flow associated to PDH port (service ID = PDH port
ifIndex, service type = Ethernet) and corresponding to tunnel termination

creation of TC associated to the VLAN assigned by operator that has to pushed


and represented by corresponding tunnel segment attribute
creation of CES over Ethernet profile corresponding to the service profile pointing
to the ingress flow and characterized by tunnel segments service profile attribute.
CESCfgPwIndex is not initialized
Tunnel Segment Creation via SNMP:
creation of Ethernet egress flow associated to Radio port (server ID = Radio port
ifIndex, service type = Ethernet) and corresponding to tunnel segment
creation of cross-connection between tunnel segments
Ces Termination Profile Creation via SNMP:
creation of PW TDM CFG object (fixed payload size = 256, fixed RTP header =
true, TDM clock source specified by operator and represented by corresponding
CES termination attribute)
CES Termination Creation via SNMP:

creation of a PW entry (fixed type = E1SATOP, ifIndex of the PDH port) -> as a
side effect, the NE creates automatically one PW TDM entry that PKT has to
configure (TDMboundPWlabel = ECID Rx, PSNboundPWlabel = ECID Tx, PW
TDM CFG reference to previously created entry) according to corresponding CES
termination attributes
Tunnel Termination Segment Configuration via SNMP:
CESCfgPwIndex is set to point to pwIndex

MEF8 CES terminated service implementation

TDM2TDM service profile provisioning


PDH To Radio Traffic Flow

The system automatically performs the following provisioning steps:

configuration of the PDH port signal mode to unframed/framed


Tunnel Termination Segment Creation via SNMP:
creation of Ethernet ingress flow associated to PDH port (service ID = PDH port
ifIndex, service type = Ethernet) and corresponding to tunnel termination

creation of TC associated to the VLAN assigned by operator that has to be pushed


and represented by the corresponding tunnel segment attribute
creation of CES over Ethernet profile corresponding to the service profile pointing
to the ingress flow and represented by the corresponding tunnel segment attribute

....................................................................................................................................................................................................................................
1350 OMS
25-40
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

MEF8 Circuit Emulation Service implementation

....................................................................................................................................................................................................................................

Tunnel Segment Creation via SNMP:


creation of Ethernet egress flow associated to Radio port (server ID = Radio port
ifIndex, service type = Ethernet) and corresponding to tunnel segment

creation of cross-connection between tunnel segments


CES termination profile creation via SNMP: nothing to be provisioned
CES termination creation via SNMP: nothing to be provisioned
Tunnel Termination Segment Configuration via SNMP: nothing to be provisioned

Radio To Radio Traffic Flow

The provisioning sequence is the same as above with the exception that ECID Tx/Rx
values must not be provisioned (NE configures automatically the zero value).
MPR requires the configuration of TDM clock source, payload size and RTP header also
on transit nodes: these attributes are conventionally aligned in the scope of the XC object
(only in case of transit node and TDM2ETH service profile).
Radio To Ethernet Traffic Flow

The provisioning sequence is the same as for the PDH-Radio cross-connection with the
addition of the destination MAC address provisioning in the PW table and with the
exception that ECID Tx/Rx values must not be provisioned (NE configures automatically
the zero value).
PDH To Ethernet Traffic Flow

The provisioning sequence is the same as for the PDH-Radio cross-connection with the
addition of the destination MAC address provisioning in the PW table.
Ethernet To Radio Traffic Flow

MPR does not allow to configure a VLAN range at an Ethernet input port for association
to one service flow, but only one single specific VLAN.
Ethernet to Radio connection is allowed in case of TDM2ETH service profile. It is a
MEF-8 encapsulation with VLAN tag (EtherType 0x8100).
It is configured in the same way as radio to Ethernet traffic flow.
Radio available bandwidth management during MEF8 CES implementation

The radioPDHTTPBidAvailableBandwith object is used to check if a cross-connection of


a TDM signal to/from Radio Direction is feasible (Connection Admission Control) and it
is updated automatically by the NE when the cross-connection is created or deleted.
CE manager is requested to manage the available bandwidth on Radio ports since the NE
also supports ATM services that contend for bandwidth with CE services. In fact, the
CAC checks performed by CE manager at allocation time ensure that there is enough
available bandwidth on the radio links selected by the routing algorithm, as far as only
circuit emulation services are concerned.

....................................................................................................................................................................................................................................
1350 OMS
25-41
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

MEF8 Circuit Emulation Service implementation

....................................................................................................................................................................................................................................

CE manager is therefore requested to implement the following behavior:

upload the available bandwidth of the radio port, when the radio link is notified to the
Packet Radio domain
automatically synchronize the available bandwidth of the radio port during audit
operation
support manual synchronization of available bandwidth on CE transport link with
radio transport technology
synchronize the available bandwidth of the radio port before starting CES
implementation, for all radio ports along the CES route

The available bandwidth attribute is reported on CE transport links belonging to Packet


Radio domain, together with the reserved bandwidth for CE services.
MEF8 CES configuration

For a TDM2TDM CES, PKT allows the configuration of the following CES attributes:

signal mode to framed/unframed (also at run-time)

VLAN (only if the CES is defined)


PM enabling/granularity (also at run-time)

Signal mode configuration to framed/unframed is not traffic impacting and it is performed


in both PDH ports.
VLAN ID is reconfigured in the tunnel segments.
PM enabling and granularity is reconfigured in the PDH CES terminations.
PM enabling and granularity is reconfigured in the PDH CES terminations.

ECID A->Z/ Z->A (only when the CES is defined)


destination MAC address (only when the CES is defined)

TDM clock source (only when the CES is defined or allocated)

ECID A->Z/ Z->A and destination MAC address are reconfigured in both CES
terminations.
TDM clock source is reconfigured in both CES terminations.
MEF8 CES termination configuration

The CES termination configuration allows to modify the following attributes.


For a CES of TDM2TDM service profile, PKT allows to configure the following CES
termination attributes:

PM enabling/granularity

For a defined CES of TDM2ETH service profile, PKT allows additionally to configure
the following PW termination attributes:

destination MAC address

ECID Tx/Rx and TDM clock source are reconfigured only on CES basis.
....................................................................................................................................................................................................................................
1350 OMS
25-42
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

SATOP Circuit Emulation Service implementation

....................................................................................................................................................................................................................................

SATOP Circuit Emulation Service implementation


Connections configured by PKT

When implementing the SATOP service, PKT is requested to configure only the
following flow connections in the TSS-5C NE:

PDH TO T-MPLS
T-MPLS TO PDH

SATOP CES implementation

It is assumed that the operator has already provisioned via PKT the required T-MPLS
infrastructure for transporting the service across the T-MPLS domain; this implies that
PKT has already performed via TL1 the PW segment creation with the following
characteristics:

Control word set to Enable


Status set to On

The PW is requested to be verified as not already used by Ethernet over T-MPLS services.
The system automatically performs the following provisioning steps:
1. PDH port configuration, consisting of below settings (without ordered sequence)
consisting of below settings (without ordered sequence)
[only in case of TSS-5C] Signal mode provisioning to a value different from
disabled via SNMP
Administrative status provisioning to up via SNMP
2. CES profile entry creation (pwCTDMCfgTable) if not already existing - with setting
of payload size, clock source and other profile parameters
3. CES termination creation
consisting of below settings:
pwIndex retrieval via SNMP GET-NEXT operation

pwEntry entry creation via SNMP by management action, including pwType


configuration to: e1Satop
pwIfIndex is set equal to ifIndex of the ifEntry associated with the PW (computed
from TL1 PW AID according to the well-known naming rule)

The NE automatically creates one pwCTDMTable entry


4. CES termination configuration and activation
consisting of below settings:
pwCTDMIfIndex must point to E1 ifIndex
pwCGenTDMCfgIndex must point to CES profile entry

set of pwCTDMClassOfService and other PW parameters to the value requested


by operator

....................................................................................................................................................................................................................................
1350 OMS
25-43
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

SATOP Circuit Emulation Service implementation

....................................................................................................................................................................................................................................

pwRowStatus set to up value


The NE automatically configures pwCTDMBandwidth according to payload size
and underlying layer of output PW interface and performs both CAC and QoS
checks between SNMP PW and TL1 PW

....................................................................................................................................................................................................................................
1350 OMS
25-44
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Generic Circuit Emulation Service OAM and protections

....................................................................................................................................................................................................................................

Generic Circuit Emulation Service OAM and protections


CES termination alarms enabling/disabling

The alarms on the PDH port are automatically:

enabled when setting the PDH port signal mode to


framed/unframed/framedFAS/framedCRC
disabled when setting the PDH port signal mode to disabled

It is not possible to suppress alarm notifications related to Ethernet ports.


Correlation of PDH port alarms to supported services

PKT manages the PDH port alarms horizontal correlation to CES. In case of unterminated
CES, PKT manages the Ethernet port alarm vertical correlation to CES.
Correlation of CES termination alarms to service

PKT manages the horizontal correlation of CES terminations loss of frame to CES
availability status transport failure.
CES fault localization

In case of faulty CE service, PKT manages the inventory of elementary alarms affecting
the service. The fault localization operates in the reverse direction of the correlation
process.
The CES fault localization must take into account the value of the CES availability status.
In case of transport failure, the root cause is a PDH port alarm or a CES termination
alarm.
In case of server transport failure, the root cause could be:

a radio port alarm


an Ethernet port alarm
a T-MPLS PW alarm

LOF on CES termination is also generated as the consequence of remote fault on a


radio/cable link.
Since the radio link failure does not trigger the automatic AIS insertion in the PDH signal
(or FDI insertion in the VLAN tunnel), then the NE that terminates the CES does not
receive any signal and therefore generates the LOF alarm on CES termination.
PKT must therefore be able to inform the operator that the CES failure is due to the server
layer (radio/cable) fault and that it is not due to the PDH layer fault. This is achieved
introducing a new fault probable cause in the availability status, i.e. the server transport
failure.

....................................................................................................................................................................................................................................
1350 OMS
25-45
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

MEF8 Circuit Emulation Service OAM and protections

....................................................................................................................................................................................................................................

MEF8 Circuit Emulation Service OAM and protections


Elementary alarms on MEF8 CES termination

The following table shows the elementary alarms managed on the MEF8 CES
termination.
Table 25-6
SNMP table
CESoETHCfgTable

MEF8 CES termination alarms

NE Probable
Cause

Description

PKT
object

opticsIMAlarmLossOfFrameRaise

Loss of
frame

CES
termination

PKT Probable
Cause
LOF

PKT severity
(fixed ASAP)
Major

PKT manages the horizontal correlation of CES termination alarms towards the impacted
CES:

LOF on CES termination -> transport failure of CES

Correlation of link over radio alarms to supported services

Correlation of link over radio alarms to supported services (vertical correlation) is


ALWAYS performed.
PKT has to vertically correlate the radio link failure to the impacted services (keeping
into account the radio protection switch position).
The vertical correlation is performed by means of vertical alarm propagation from layer
to layer:

from radio link to VLAN tunnel


from VLAN tunnel to CES

The vertical correlation is performed according to two different algorithms, depending


whether the radio link is protected or unprotected.
Due to the vertically correlated alarm, the CES availability status indicates that there is a
server transport failure.
Vertical correlation in case of unprotected radio linkThe CES is in failure if there is a
radio link failure:

Unprotected link over radio failure -> server transport failure on VLAN tunnel ->
server transport failure on CES

The CES is degraded if there is a radio link degrade:

Unprotected link over radio degrade -> server transport degrade on VLAN tunnel ->
server transport degrade on CES

Vertical Correlation In Case Of Protected Radio Link

The CES is in failure only if there is a LossProt on main radio port:

LossProt on main radio port -> server transport failure on VLAN tunnel -> server
transport failure on CES

....................................................................................................................................................................................................................................
1350 OMS
25-46
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

MEF8 Circuit Emulation Service OAM and protections

....................................................................................................................................................................................................................................

The CES is degraded only if there is NOT a LossProt on main radio port and if there is a
degrade on both main and spare radio links:

Link over radio double degrade (or single failure + single degrade) -> server transport
degrade on VLAN tunnel -> server transport degrade on CES
Link over radio single failure -> no propagation to VLAN tunnel and CES

Link over radio single degrade -> no propagation to VLAN tunnel and CES

PKT triggers the vertical correlation from radio link transport failure to client VLAN
tunnels and CES as follows:

Link over radio double failure -> server transport failure on VLAN tunnel -> server
transport failure on CES
Link over radio double degrade (or single failure + single degrade) or single failure ->
server transport degrade on VLAN tunnel -> server transport degrade on CES

In the last case, the CES degrade must be interpreted as a warning for the user to perform
the fault localization to check if the CES is really impacted or not, since the NE does not
notify if the active link is faulty or not.
LossProt alarm on protected Radio port

Since R2.1 and in case of radio link protection, MPR supports the LossProt alarm on
main radio port.
The LossProt alarm is not propagated to the radio link. PKT reports this alarm on the
radio port and correlates it directly to the client VLAN tunnel and CES.

....................................................................................................................................................................................................................................
1350 OMS
25-47
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

SATOP Circuit Emulation Service OAM and protections

....................................................................................................................................................................................................................................

SATOP Circuit Emulation Service OAM and protections


Elementary alarms on SATOP CES termination

The following table shows the elementary alarms managed on the SATOP CES
termination
Table 25-7

SATOP CES termination alarms

SNMP
table

NE
Probable
Cause

Description

pwCTDMTable
(NOT
SUPPORTED)

opticsIMAlarmJitterBufferOverrunRaise

Jitter buffer overrun: the number of times an over-run


condition has occurred exceeded threshold.

pwCTDMTable

opticsIMAlarmJitterBufferUnderrunRaise

Jitter buffer underrun: the number of times an


under-run condition has occurred exceeded threshold.

pwCTDMTable

opticsimAlarmMalformedFramesRaise

pwCTDMTable

PKT
PKT
object
Probable
Cause

PKT
severity
(fixed
ASAP)

CES
termination

JBO

Major

CES
termination

JBU

Major

Malformed frames: The malformed packet counter


resets every 1sec. If the threshold is not reached
within the 1sec period, the alarm is not reported

CES
termination

MAF

Major

opticsIMAlarmStraypacketsRaise

Stray packets: The stray packet counter resets every


1sec. If the threshold is not reached within the 1sec
period, the alarm is not reported

CES
termination

SPKT Major

pwCTDMTable

opticsIMAlarmExcessivepacketLossRaise

Excessive packet loss: By the end of each monitoring


window, the packet loss rate is compared with
threshold value. If the threshold is reached for 3
continuous window time, the alarm is reported

CES
termination

ELOP Major

pwCTDMTable

opticsIMAlarmRemotepacketlossRaise

Remote packet loss: When remote packet loss happen


(receive valid packets with R-bit set) for 3 continous
seconds, the alarm is reported. The alarm is cleared if
there is no remote packet loss for 10 seconds

CES
termination

RLOP Major

pwCTDMTable

opticsIMAlarmInvalidTdmDataRaise

Invalid TDM data: L bit is set in SAToP Control


Word, it indicate that TDM data carried in the
payload is invalid due to an attachment circuit fault. L
bit is cleared in SAToP Control Word

CES
termination

INTD Major

The counter resets every 1sec. If the threshold is not


reached within the 1sec period, the alarm is not
reported

The counter resets every 1sec. If the threshold is not


reached within the 1sec period, the alarm is not
reported.

....................................................................................................................................................................................................................................
1350 OMS
25-48
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

SATOP Circuit Emulation Service OAM and protections

....................................................................................................................................................................................................................................

PKT manages the horizontal correlation of CES termination alarms towards the impacted
CES, e.g.:

LOF on CES termination -> transport failure of CES

Circuit Emulation Service QoS management

The CE service class by default is transported by guaranteed packet traffic.

....................................................................................................................................................................................................................................
1350 OMS
25-49
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation AAR Network Operation

....................................................................................................................................................................................................................................

Circuit Emulation AAR Network Operation


Audit of 9500 MPR NE

PKT compares the resource attributes in database with the NE attributes and marks the
resource consistency status according to the comparison result:

normal
not-aligned

The audit of CE resources is in charge of CE manager and it is integrated in the scope of


the global AAR procedure.
The audited CE resources are:

CE node
CE port
CE ports include
CE edge ports (PDH or Ethernet)
CE transport link extremities (Ethernet only)

Tunnel XC
Tunnel XCs include:

Tunnel segments
Tunnel cross-connects
CE service terminations

For audit purposes, all Tunnel segment and CES termination attributes are mirrored in the
tunnel XC.
Audit of TSS-5C NE

The audit of T-MPLS PW terminations is performed by T-MPLS manager.


The audited CE resources are:

CE node
CE ports, including: CE edge ports (PDH)

Tunnel XC including: CE service terminations

For audit purposes, all CES termination attributes are mirrored in the tunnel XC.
Audit: ATM Xconn upload

During the audit operation, the upload involves the cross-connection with ATM2ATM or
ATM2ETH service profile, that are synchronized and stored in PKT database.
The retrieved ATM Xconns are visualized in the Xconn list retrievable from the
containing Packet Radio node.
The operator can then inspect the VLANID used by each ATM Xconn.
ATM Xconns are ignored by force-align down and Takeover operations.
....................................................................................................................................................................................................................................
1350 OMS
25-50
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

Circuit Emulation AAR Network Operation

....................................................................................................................................................................................................................................

Alignment: 9500 MPR NE align down

PKT creates in the NE resources that are missing in the NE and present in the database.
PKT marks the resource consistency status according to the alignment result:

normal
failed-to-align

Alignment: 9500 MPR NE forced align down

PKT creates in the NE resources that are missing in the NE and present in the database
and, in case of conflicting values related to resources present in both databases, aligns the
NE value to the NMS value. PKT marks the resource consistency status according to the
alignment result:

normal
failed-to-align

Alignment: TSS-5C NE forced align down

PKT forced align down procedure apply to TSS-5C NE.

....................................................................................................................................................................................................................................
1350 OMS
25-51
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Overview

CES Takeover description

....................................................................................................................................................................................................................................

CES Takeover description


Reservation: 9500 MPR NE

PKT creates in database resources that are present in the NE and missing in NMS
database. PKT marks the consistency status of the uploaded resources as reserved.
Reservation: TSS-5C NE

Starting from CES NE, the user can retrieve all discovered XCs: the XC attributes include
the SNMP PW attributes uploaded from NE.
MEF8 CES Takeover

PKT is requested to upload MEF8 CES connectivity already implemented in the network
and to display it to the user. The Takeover procedure works in PKT database exploiting
the reserved resources. At the end of the procedure, those resources that have been
successfully recognized as components of the recovered CES connectivity are marked as
normal.
The Takeover operation can be started on:

CES port: the system discovers automatically all services crossing the port

CES node: the system discovers automatically all services crossing the node

The algorithm pursues on VLANID and service profile basis the discovered
cross-connections in that port (or node) continuing the discovery in the adjacent node,
until an edge port is reached.
SATOP CES Takeover

The Takeover procedure is applied to SATOP CES, assuming that the T-MPLS PW
infrastructure has been already discovered and assigned to CES Domain.

....................................................................................................................................................................................................................................
1350 OMS
25-52
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Overview

....................................................................................................................................................................................................................................

CES Procedures
Purpose

This section provides an information about the CES procedures.


Contents
Circuit Emulation Service graphical inventory

25-55

View the list of CES Domains (Packet Radio)

25-58

View the details of CES Domain (Packet Radio)

25-59

Inventory from CES Domain (Packet Radio)

25-60

Create CES Domain (Packet Radio)

25-61

Assign/Deassign resources to Packet Radio Domain

25-62

Assign/Deassign resources to T-MPLS Domain

25-63

View the list of CES NEs

25-64

Description of the list of CES NEs

25-65

View the details of CES NE

25-66

Details of CES NE

25-67

Inventory from CES NE

25-68

Inventory from Protection Group

25-70

View the list of CES Transport Links

25-71

Description of the list of CES Transport Links

25-72

View the details of CES Transport Link

25-73

Details of the CES Transport Link

25-74

Inventory from CES Transport Link

25-75

Inventory from CES Transport Link extremity

25-76

View the list of CES PDH Ports

25-78

Description of the list of CES PDH Ports

25-79

View the details of CES PDH Port

25-82

Details of CES PDH Port

25-83

Inventory from CES PDH Port

25-84

List CES Edge Ports

25-85

Description of the list of CES Port

25-86

View the details of CES Edge Port

25-87

Details of CES Port

25-88

Inventory from CES Edge Port

25-89

....................................................................................................................................................................................................................................
1350 OMS
25-53
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures
....................................................................................................................................................................................................................................

View the list of CES Links Over Radio

25-90

Description of the list of CES Links Over Radio

25-91

View the details of CES Link Over Radio

25-92

Details of CES Link Over Radio

25-93

Inventory from CES Link Over Radio

25-94

Synchronization of CES Link Over Radio

25-96

View the list of CES Radio Ports

25-97

Description of the list of CES Radio Ports

25-98

View the details of CES Radio Port

25-99

Details of CES Radio Port

25-100

Inventory from CES Radio Port

25-101

View the list of CES VLAN Paths

25-102

Description of the list of CES VLAN Paths

25-103

Join CES tunnels

25-104

Stitch CES tunnels

25-105

View the list of Circuit Emulation Services

25-106

Description of the list of Circuit Emulation Services

25-107

View the list of CES Terminations

25-114

Description of the list of CES Terminations

25-115

Create Circuit Emulation Service

25-122

Inventory from CES

25-126

Configure CES

25-127

Routing display of CES

25-130

Configure CES terminations

25-131

Takeover procedure for MEF8 CES

25-132

Takeover procedure for SATOP CES

25-134

....................................................................................................................................................................................................................................
1350 OMS
25-54
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Circuit Emulation Service graphical inventory

....................................................................................................................................................................................................................................

Circuit Emulation Service graphical inventory


E2E PDH: Navigation toward SDH manager

The operator can navigate from one CES towards the associated SDH path if the
following conditions are verified:

the SDH path has been already manually implemented


the CES termination corresponds to the local termination of one Link over PDH
the SDH path termination corresponds to the remote termination of the same Link
over PDH

In order to start the navigation towards SDH GUI server and open the SDH path routing
display, the operator has to open the CES routing display, select the SDH network icon
and right-click.
The navigation command is enabled only if the above conditions are true.
Show properties of Tunnel

PKT manages the display of Tunnel properties listed in:

Table 25-8, Generic Tunnel attributes. (p. 25-55)

Table 25-9, Packet Radio Tunnel attributes (p. 25-56)

There are no specific T-MPLS Tunnel attributes.

Table 25-8
PKT attr
name

Generic Tunnel attributes.

PKT attr val

Comment

Description

Userlabel

String

Automatically computed by PKT by


VLAN conversion to string

Friendly name

Configuration
state

{defined, allocated,
implemented}

It tells whether the needed resources


has been reserved or not, in database
only or also in the network

Target configuration state

Availability
status

{normal,
server-transportfailure}

Type

{Packet-Radio,
T-MPLS, Ethernet,
Sdh}

Alarm status

It represents the Tunnel transport


layer

Tunnel type

The following table shows the specific Packet-Radio tunnel attributes.

....................................................................................................................................................................................................................................
1350 OMS
25-55
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Circuit Emulation Service graphical inventory

....................................................................................................................................................................................................................................

Table 25-9
PKT attr name
VLAN-ID

Packet Radio Tunnel attributes


PKT attr val

feb-80

Comment
Operator: not modifiable after
service creation.

Description
Ethernet tunnel identifier

Tunnel label.

Listing of tunnels

PKT manages the list of all tunnels, filterable by domain


Inventory from tunnel

PKT manages the inventory of:

the supported CE services


the server CE transport links

The inventory is started selecting the tunnel and then right-click to open the desired target
list.
Show properties of tunnel segment

Tunnel segments can be retrieved from dedicated inventory (from transport link extremity
or from edge port) or tunnel routing display
PKT manages the display of CE termination properties listed in:

Table 25-10, Generic Tunnel segment attributes (p. 25-56)

MEF8 CES termination attributes (p. 25-116)

There are no specific T-MPLS Tunnel segment attributes.

Table 25-10
PKT attr
name

Generic Tunnel segment attributes

PKT attr val

Configuration
state

{defined, allocated,
implemented}

Alarm status

{normal,
server-transport-failure}

Consistency
status

{normal, not-aligned,
failed-to-align}

Comment

Description

It tells whether the needed resources has


been reserved or not, in database only or
also in the network

Target configuration
state
Alarm status

Download disable management

MIB alignment
between NMS and
NE

....................................................................................................................................................................................................................................
1350 OMS
25-56
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Circuit Emulation Service graphical inventory

....................................................................................................................................................................................................................................

Tunnel Xconn attributes


Table 25-11
PKT attr
name

Generic Tunnel Xconn attributes

PKT attr val

Master

SNMP
table

SNMP
attr
name

SNMP
attr
val

Description

Configuration state

{defined, allocated,
implemented}

PKT

Target
configuration state

Consistency
status

{normal,
not-aligned,
failed-to-align}

PKT

MIB alignment
between NMS and
NE

....................................................................................................................................................................................................................................
1350 OMS
25-57
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the list of CES Domains (Packet Radio)

....................................................................................................................................................................................................................................

View the list of CES Domains (Packet Radio)


When to use

The function lists the CES Domains.


Related information

PKT manages the display of all Packet Radio domains


For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Services menu is shown.
...................................................................................................................................................................................................

Select Circuit Emulation > CES Domain.


Result: The CES Domain list is shown.

The attributes displayed for each domain are:


User Label.
CAC tolerance. (strict, loose). Connection admission control policy. Meaningful
only in case of CES over Packet Radio.
Transport type. (CesOverPacketRadio, CesOverT-MPLS). Server Transport
technology.
Minimun Vlan Type
Maximum Vlan Type
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-58
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the details of CES Domain (Packet Radio)

....................................................................................................................................................................................................................................

View the details of CES Domain (Packet Radio)


When to use

The function show the properties of a CES Domain.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > CES Domain.


Result: The CES Domain list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Select Action > Circuit Emulation > Properties.
Result: The CES Domain Properties window is shown.

The attributes displayed for each domain are:


User Label.
CAC tolerance. (strict, loose). Connection admission control policy. Meaningful
only in case of CES over Packet Radio.
Transport type. (CesOverPacketRadio, CesOverT-MPLS). Server Transport
technology.
Minimun Vlan Type
Maximum Vlan Type
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-59
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES Domain (Packet Radio)

....................................................................................................................................................................................................................................

Inventory from CES Domain (Packet Radio)


When to use

The function lists objects related to a CES Domain .


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Inventory from Packet Radio domain

PKT manages the inventory of resources contained in one Packet Radio domain:

CES nodes

Transport links
CES edge ports

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > CES Domain.
Result: The CES Domain list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Select Action > CES Domain
Select one of resources contained in the CES Domain:

CES nodes

Transport links
CES edge ports
Result: The list of resource is shown.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-60
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Create CES Domain (Packet Radio)

....................................................................................................................................................................................................................................

Create CES Domain (Packet Radio)


When to use

The function creates the CES Domain.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create Domain.


Result: The Create Domain window is shown.
...................................................................................................................................................................................................

Insert User Label.


Select Type (CE). Packet Radio
Select Vlan space. (100-200, 1001, 2000-4080).
Select Used Vlan space. (100-110, 1001, 2000-2005).
Result: The CES Domain is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-61
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Assign/Deassign resources to Packet Radio Domain

....................................................................................................................................................................................................................................

Assign/Deassign resources to Packet Radio Domain


When to use

The function assigns/deassign resources the CES Domain.


Related information

The resources to assign/deassign:

MPR PDH Port


Ethernet Port
Link Over Cable
Link Over Radio

For a description about the action, refer to the topicResource assignment to Packet Radio
domain (p. 25-12).
For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

For procedure refer to Assign resources to a Domain (p. 13-27).


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-62
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Assign/Deassign resources to T-MPLS Domain

....................................................................................................................................................................................................................................

Assign/Deassign resources to T-MPLS Domain


When to use

The function assigns/deassign resources the CES Domain.


Related information

The resources to assign/deassign:

TSS-5C PDH Port


TSS-5C Ethernet Port
Link Over T-MPLS

For a description about the action, refer to the topicResource assignment to T-MPLS
domain (p. 25-14).
For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

For procedure refer to Assign resources to a Domain (p. 13-27).


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-63
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the list of CES NEs

....................................................................................................................................................................................................................................

View the list of CES NEs


When to use

The function lists CES NE.


Related information

PKT manages the list of all nodes supporting CES, filterable by domain.
For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Services menu is shown.
...................................................................................................................................................................................................

Select Circuit Emulation > CES NE.


Result: The Circuit Emulation Services NE list is shown.

See the following topic in this document: Description of the list of CES NEs
(p. 25-65)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-64
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES NEs

....................................................................................................................................................................................................................................

Description of the list of CES NEs


Attributes of a CES NE

The attributes displayed for each NE are:

User Label.

Network Element Type.

Operational State.

Takeover Active

NE CAC tolerance. (strict, loose). Connection admission control policy. Meaningful

only in case of CES over Packet Radio. The CAC tolerance represents whether NE
CAC checks are performed wrt minimum or maximum radio interface capacity. PKT
displays this information to inform the user that the traffic implemented on this NE
can be dropped in case of bandwidth degradation and in case of loose tolerance.
Consistency State.(normal, not-aligned, failed-to-aligned). Alignment beetwen
NMS and NE.
MAC Address. L2 address.

....................................................................................................................................................................................................................................
1350 OMS
25-65
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the details of CES NE

....................................................................................................................................................................................................................................

View the details of CES NE


When to use

The function lists CES NE properties.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > CES NE.
Result: The Circuit Emulation Services NE list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Select Action > Properties.
Result: The Circuit Emulation Services NE list is shown.

See the following topic in this document: Details of CES NE (p. 25-67)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-66
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Details of CES NE

....................................................................................................................................................................................................................................

Details of CES NE
Attributes of a CES NE

The attributes displayed for each NE are:

User Label.

Network Element Type.

Operational State.

Takeover Active

NE CAC tolerance. (strict, loose). Connection admission control policy. Meaningful

only in case of CES over Packet Radio. Supported only by MPR NE.
The CAC tolerance represents whether NE CAC checks are performed wrt minimum
or maximum radio interface capacity. This information informs the user that the traffic
implemented on this NE can be dropped in case of bandwidth degradation and in case
of loose tolerance.
Loose= CAC disabled. Value meaningful only in case of radio adaptive modulation
mode

Consistency State.(normal, not-aligned, failed-to-aligned). Alignment beetwen

NMS and NE.


MAC Address.(00 0B 32 B6 C2 11). L2 address.
Timestamp frequency. (77760kHz, 25000kHz[default], 16384kHz). Supported by

TSS NE only

PDH deg interval. (Range 2-10 sec; 5 sec default)

PDH deg clear thr. (Range 0-1000 errors; 20 default). Supported by TSS NE only

Physical impedance. (ohm). Not managed

PDH deg raise thr. (Range 0-1000 errors; 30 default). Supported by TSS NE only

Note that:

MAC address is not meaningful in case of PDH technology


Signal mode is not meaningful in case of Ethernet port

....................................................................................................................................................................................................................................
1350 OMS
25-67
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES NE

....................................................................................................................................................................................................................................

Inventory from CES NE


When to use

The function lists objects related to CES NE.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Inventory from CES node

PKT manages the inventory of resources contained in one CES node:

PDH ports

Ethernet ports
Radio ports (radio link extremities)
T-MPLS ports (T-MPLS link extremities)

Protection groups
Xconn

The Xconn list includes TDM2TDM, TDM2ETH, ATM2ATM and ATM2ETH


connections.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > CES NE.
Result: The Circuit Emulation Services NE list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Click Action > CES NE
Select one of resources contained in one CES node:

PDH ports

Ethernet ports

Radio ports (radio link extremities)

....................................................................................................................................................................................................................................
1350 OMS
25-68
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES NE

....................................................................................................................................................................................................................................

T-MPLS ports (T-MPLS link extremities)


Protection groups
Xconn
Result: The list of resources is shown, according to the selected type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-69
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from Protection Group

....................................................................................................................................................................................................................................

Inventory from Protection Group


When to use

The function lists objects related to Protection Group.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Inventory from Protection Group

PKT manages the inventory of resources contained in one Protection Group:

Contained Radio ports

Packet Radio Node container

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

List the protection groups.


Refer to the procedure Inventory from CES NE (p. 25-68)
Result: The protection group list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Click Search > Protection group
Select the type of resources related to the protection group:

Radio ports

Packet Radio Node


Result: The list of resources is shown, according to the selected type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-70
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the list of CES Transport Links

....................................................................................................................................................................................................................................

View the list of CES Transport Links


When to use

The function lists CES Transport Links.


Related information

PKT manages the list of all CE transport links, filterable by domain.


For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Services menu is shown.
...................................................................................................................................................................................................

Select Circuit Emulation > CES Transport Links.


Result: The Transport Links list is shown.

See the following topic in this document: Description of the list of CES Transport
Links (p. 25-72)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-71
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Transport Links

....................................................................................................................................................................................................................................

Description of the list of CES Transport Links


Attributes of a CES Transport Link

The attributes displayed for each Transport Link are:

User Label.

Domain.

Transport Type

Transport Link Technology.

PseudoWire Id.

CIR

CBS

PBS

Reserved CIR

Reserved CBS

Reserved PIR

Reserved PBS

VLAN Id.

PIR

....................................................................................................................................................................................................................................
1350 OMS
25-72
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the details of CES Transport Link

....................................................................................................................................................................................................................................

View the details of CES Transport Link


When to use

The function lists Properties of CES Transport Links.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > CES Transport Links.
Result: The list is shown.
...................................................................................................................................................................................................

Select one item in the list


Select Action > Properties.
Result: The Transport Links Property List is shown.

See the following topic in this document: Details of the CES Transport Link
(p. 25-74)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-73
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Details of the CES Transport Link

....................................................................................................................................................................................................................................

Details of the CES Transport Link


Attributes of a CES Transport Link

PKT manages the display of the following CE transport link properties.


Table 25-12
PKT attr name

CE transport link attributes

PKT attr val

Comment

Description

Userlabel

string

Same as Core link userlabel

Friendly name

Bandwidth

Mb/s

Same as Core link rate

Committed net bandwidth

Peak bandwidth

Mb/s

Meaningful only in case of radio


underlying technology. Equal to
rate otherwise

Peak net bandwidth

Available bandwidth
on NE

Mb/s

In case of link over radio, it


corresponds to uploaded Radio
ports available bandwidth

Net available bandwidth on


NE

Used CIR

Mb/s

Computed from implemented CE


services

Used bandwidth for


implemented CE services

Reserved CIR

Mb/s

Computed from allocated and


implemented CE services

Reserved bandwidth for


allocated and implemented
CE services

Transport
technology

{radio, cable}

It represents the underlying


physical transport layer

Transport technology

Transport type

It represents the underlying


{CesOverPacketRadio,
transport technology
CesOverTMPLS}

Transport type

The underlying technology of one CE transport link can be radio or Ethernet cable or link
over T-MPLS. In case of radio link protection, there is only one CE transport link.

....................................................................................................................................................................................................................................
1350 OMS
25-74
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES Transport Link

....................................................................................................................................................................................................................................

Inventory from CES Transport Link


When to use

The function lists objects related to CES Transport Link.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Inventory from CES Transport Link

PKT manages the inventory of resources contained in one CES Transport Link:

CE Transport Link extremities

The extremity underlying technology can be Ethernet physical or radio or T-MPLS port.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > CES Transport Link.
Result: The CES Transport Link list is shown.
...................................................................................................................................................................................................

Select one edge port in the list


Select Search > CES Transport Link >
Select the type of resources contained in one Transport Link:

CE Transport Link extremities


Result: The resources are shown, according to the selected type.

For attributes description refer to Description of the list of CES Port (p. 25-86)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-75
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES Transport Link extremity

....................................................................................................................................................................................................................................

Inventory from CES Transport Link extremity


When to use

The function lists objects related to CES Transport Link extremities.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Inventory from CES Transport Link extremities

PKT manages the inventory of resources contained in one CES Transport Link
extremities:

the physical port or SDH termination or T-MPLS PW termination associated to the


CE transport link extremity
the containing CES node
the supported Tunnel segments. Show properties of tunnel segment (p. 25-56)

The CE transport link extremities are displayed together with the CE edge ports in a
single CE port list.
In case of NNI port type, only the CE transport link extremity inventories are meaningful.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

List CES Transport Link extremities. Refer to the procedure Inventory from CES
Transport Link (p. 25-75)
Result: The CES Transport Link extremity list is shown.
...................................................................................................................................................................................................

Select one item in the list


Click Search > CES Transport Link extremity
Select the type of resources related to one CES Transport Link extremity:

SDH Terminations

T-MPLS PW Terminations

....................................................................................................................................................................................................................................
1350 OMS
25-76
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES Transport Link extremity

....................................................................................................................................................................................................................................

CES nodes

Tunnel segments
Result: The resources are shown according to the selected type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-77
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the list of CES PDH Ports

....................................................................................................................................................................................................................................

View the list of CES PDH Ports


When to use

The function lists CES PDH Ports.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Services menu is shown.
...................................................................................................................................................................................................

Select CES Ports.


Result: The CES Port list is shown.

See the following topic in this document: Description of the list of CES PDH Ports
(p. 25-79)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-78
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES PDH Ports

....................................................................................................................................................................................................................................

Description of the list of CES PDH Ports


Attributes of a CES PDH Port

Depending on the used underlying infrastructure, for the attributes description, refer to
Table 25-13, 9500MPR PDH port attributes (p. 25-79) or Table 25-14, TSS-5C PDH
port attributes (p. 25-80).
Table 25-13
PKT attr
name

9500MPR PDH port attributes

PKT attr val

Master

SNMP
table

SNMP
attr
name

SNMP attr val

Description

userLabel

String

NE: uploaded
by Core

see 1

ifMib::ifIndex

InterfaceIndex:
INTEGER

Friendly
name

technology

PDH

NE: uploaded
by Core

ifTable

ifMib::ifType

ds1 (18) for


MPR also in
case of e1 PDH
port

Characteristic
technology

interfaceRate

Integer

NE: uploaded
by Core &
exported to
CEM

ifTable

ifMib::ifSpeed

2048 Kbit/s

Net
bandwidth

signal mode

{framed,
unframed,
disabled}

PKT. This
attribute is
managed by
CES

E1pPITTPTable
e1pPITTPSignalMode
INTEGER

alarm status

TDM
frame
type

Computed by
PKT

Alarm
status
Alarm
severity
assignment
profile

ASAP profile

Pointer to fixed
ASAP

Severity
assigned by
PKT

Network role

{UNI, E-NNI}

PKT

N.A.

N.A.

N.A.

Network
role

TDM rate

{e1, ds1}

NE: uploaded
by Core

ifTable

ifMib::ifType

ds1 (18) or
e1(19)

TDM
service
rate

Consistency
status

{normal,
not-aligned,
failed-to-align}

MIB
alignment
between
NMS and
NE

....................................................................................................................................................................................................................................
1350 OMS
25-79
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES PDH Ports

....................................................................................................................................................................................................................................

Table 25-13
PKT attr
name
Encapsulation
type

9500MPR PDH port attributes

PKT attr val

Master

(continued)

SNMP
table

{cesUnstructured, NE: uploaded


atmIma}
by Core

SNMP
attr
name

SNMP attr val

Description

E1pPITTPTable
e1pPITTPEncapsType

Notes:

1.

The port userLabel is computed, starting from the retrieved integer value, using the UFL library (User
Friendly Label) according to the naming rule of the 9500MPR NE.
Table 25-14
PKT attr
name

PKT attr
val

TSS-5C PDH port attributes


Master

SNMP
table

SNMP attr
name

SNMP attr val

Description

ifMib::ifIndex

InterfaceIndex:
INTEGER

Friendly name

userLabel

String

NE:
uploaded by
Core

technology

PDH

NE:
uploaded by
Core

ifTable

ifMib::ifType

e1 (19)

Characteristic
technology

interfaceRate

Integer

NE:
uploaded by
Core &
exported to
CEM

ifTable

ifMib::ifSpeed

2048 Kbit/s

Net bandwidth

signal mode

{unframed,
disabled
(default),
framedFAS,
framedCRC}

PKT. This
attribute is
shown in the
associated
CES port

E1pPITTPTable
e1pPITTPSignalMode
INTEGER

alarm status

TDM frame type

Computed by
PKT

Alarm status
Alarm severity
assignment
profile

ASAP profile

Pointer to
fixed
ASAP

Severity
assigned by
PKT

Network role

{UNI,
E-NNI}

PKT

N.A.

N.A.

N.A.

Network role

TDM rate

{e1, ds1}

NE:
uploaded by
Core

ifTable

ifMib::ifType

ds1 (18) or
e1(19)

TDM service
rate

....................................................................................................................................................................................................................................
1350 OMS
25-80
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES PDH Ports

....................................................................................................................................................................................................................................

Table 25-14
PKT attr
name

PKT attr
val

TSS-5C PDH port attributes


Master

SNMP
table

(continued)

SNMP attr
name

SNMP attr val

Description
MIB alignment
between NMS
and NE

Consistency
status

{normal,
not-aligned,
failed-toalign}

Administrative status

{up,
down}

Loopback
status

PKT:
{disabled(default),
Managed
line,
read-only by
internal}
Core (NE
supports also
loopback
configuration).

PKT.
Managed by
CEM at CES
implementation time

ifTable

ifAdminStatus

up(1), down(2)

E1pPITTPTable
e1pPITTPLoopback
disabled(0),
line(1),
internal(2)

Administrative
status

Loopback status

....................................................................................................................................................................................................................................
1350 OMS
25-81
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the details of CES PDH Port

....................................................................................................................................................................................................................................

View the details of CES PDH Port


When to use

The function lists the properties of CES PDH Ports.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > CES Ports.
Result: The CES Port list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Select Action > Properties.
Result: The CES Port property window is shown.

See the following topic in this document: Details of CES PDH Port (p. 25-83)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-82
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Details of CES PDH Port

....................................................................................................................................................................................................................................

Details of CES PDH Port


Attributes of a CES PDH Port

The attributes displayed for each Port are:

User Label.

Interface Technology.

Interface Type.

Network Element .

Domain.

Transport Type

Transport Link.

Reserved Capacity.

Signal Mode

Administrative State

Consistency State

Alarm Status

MAC Address

Radio Interface Type

CBS

PIR

PBS

Reserved CBS

Reserved PIR

Reserved PBS

Maximum Capacity.
Used Bandwidth

Show properties of PDH port

PKT GUI displays the PDH port properties listed in:


in case of MPR NE
in case of TSS-5C NE

....................................................................................................................................................................................................................................
1350 OMS
25-83
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES PDH Port

....................................................................................................................................................................................................................................

Inventory from CES PDH Port


When to use

The function lists objects related to CES PDH Port.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Inventory from PDH Port

Selecting one PDH port, PKT supports the inventory of the supported CES, if any.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > ... > CES PDH Port.
Result: The PDH Port list is shown.
...................................................................................................................................................................................................

Select one item in the list


Click Search > PDH Port
Select the type of resources related to one Edge Port:

Container CES
Result: The resources are shown according to the selected type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-84
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

List CES Edge Ports

....................................................................................................................................................................................................................................

List CES Edge Ports


When to use

The function lists CES Edge Port.


Related information

PKT manages the list of all CES edge ports, filterable by domain.
For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Services menu is shown.
...................................................................................................................................................................................................

Select Circuit Emulation > CES Ports.


Result: The CES Port list is shown.

See the following topic in this document: Description of the list of CES Port
(p. 25-86)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-85
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Port

....................................................................................................................................................................................................................................

Description of the list of CES Port


Attributes of a CES Port

The CES port merges the attributes of CES edge port and CE transport link extremity.
The CE transport link extremity properties are displayed together with the CE edge port
properties. In case of NNI port type, only the CE transport link extremity properties are
meaningful.
Table 25-15

The CES port attributes

PKT attr name

PKT attr val

Comment

userlabel

String

Friendly name

network role

{ENNI, UNI}

Network role

technology

{PDH, radio, eth}

Underlying technology

admin status

{up, down}

Administrative status

ASAP profile

Pointer to fixed ASAP

Alarm severity assignment profile. Not yet


managed

consistency status

{normal, not-aligned,
failed-to-align}

MIB alignment between NMS and NE

DCN label

integer

DCN label. Meaningful only in case of ETH port

peak bandwidth

Number

Net bandwidth corresponding to the maximum


capacity that can be allocated to services

....................................................................................................................................................................................................................................
1350 OMS
25-86
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the details of CES Edge Port

....................................................................................................................................................................................................................................

View the details of CES Edge Port


When to use

The function lists the properties of CES Edge Port.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > CES Ports.
Result: The CES Port list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Select Action > Properties.
Result: The CES Port property window is shown.

See the following topic in this document: Details of CES Port (p. 25-88)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-87
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Details of CES Port

....................................................................................................................................................................................................................................

Details of CES Port


Attributes of a CES Port

The CES port merges the attributes of CES edge port and CE transport link extremity.
Transport Link extremity

The extremity underlying technology can be Ethernet physical or radio or T-MPLS port.
The CE transport link extremity properties are displayed together with the CE edge port
properties: in case of NNI port type, only the CE transport link extremity properties are
meaningful.
Edge Port

The CE edge port properties are displayed together with the CE transport link extremity
properties. In case of UNI port type, only the CE edge port properties are meaningful.
The underlying technology can be PDH or Ethernet physical.
In case of Ethernet physical underlying technology, the edge port is characterized by the
additional attributes.
Table 25-16

Ethernet port attributes

PKT attr name


Acceptable frame type

PKT attr val


{all, only-tagged}

Description
Filtering based on frame tag

NOT MANAGED
Port VLAN ID

0-4094

VLAN ID for untagged frames

NOT MANAGED
Port priority

0-7

Priority for untagged frames

NOT MANAGED
VLAN member set

VLAN range

Filtering based of frame VLAN ID

NOT MANAGED
admin status

{up, down}

Administrative status

Alarm status

{critical, major, minor, warning,


cleared}

Alarm status

ASAP profile

Pointer to fixed ASAP

Alarm severity assignment profile

Consistency status

{normal, not-aligned, failed-to-align}

MIB alignment between NMS and


NE

....................................................................................................................................................................................................................................
1350 OMS
25-88
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES Edge Port

....................................................................................................................................................................................................................................

Inventory from CES Edge Port


When to use

The function lists objects related to CES Edge Port.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Inventory from CES Edge Port

PKT manages the inventory of:

the supported CE service terminations

the containing CES node

From GUI perspective, the CE edge ports are displayed together with the CE transport
links in a single CE port list: in case of UNI port type, only the CE edge port inventories
are meaningful.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > CES Port.
Result: The Edge Port list is shown.
...................................................................................................................................................................................................

Select one item in the list


Select Search > Edge Port
Select the type of resources related to Edge Port:

CE Service terminations

CES Nodes
Result: The resources are shown according to selected type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-89
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the list of CES Links Over Radio

....................................................................................................................................................................................................................................

View the list of CES Links Over Radio


When to use

The function lists CES Link Over Radio.


Related information

PKT displays the list of all links over radio, filtered by domain.
For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is shown.
...................................................................................................................................................................................................

Select Circuit Emulation > CES Link Over Radio.


Result: The Transport Links list is shown.

See the following topic in this document: Description of the list of CES Links Over
Radio (p. 25-91)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-90
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Links Over Radio

....................................................................................................................................................................................................................................

Description of the list of CES Links Over Radio


Attributes of a CES Link Over Radio
Table 25-17
PKT attr name

Link over radio attributes


PKT attr val

Comment

Description

Userlabel

string

Computed by NPR

Friendly name

Rate

Mb/s

Computed from radio port


bandwidth

Committed net bandwidth

Peak rate

Mb/s

Computed from radio port


peak bandwidth

Peak net bandwidth

Protection role

{none, working,
protecting}

Computed from the radio


port naming rule

Traffic bearing role in case


of radio link protection

Protection type

{unprotected, 1+1}

Computed from the presence


or not of the radio protection
group

Protection type

Availability status

{normal, in-failure}

Alarm status

....................................................................................................................................................................................................................................
1350 OMS
25-91
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the details of CES Link Over Radio

....................................................................................................................................................................................................................................

View the details of CES Link Over Radio


When to use

The function shows the properties of CES Link Over Radio.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

List the Link Over Radio


Refer to the procedure View the list of CES Links Over Radio (p. 25-90)
Result: The Link Over Radio list is shown.
...................................................................................................................................................................................................

Select one item in the list


Select Action > Properties.
Result: The Link Over Radio property window is shown.

See the following topic in this document: Details of CES Link Over Radio
(p. 25-93)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-92
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Details of CES Link Over Radio

....................................................................................................................................................................................................................................

Details of CES Link Over Radio


Attributes of a CES Link Over Radio
Table 25-18
PKT attr name

Link over radio attributes


PKT attr val

Comment

Description

Userlabel

string

Computed by NPR

Friendly name

Rate

Mb/s

Computed from radio port


bandwidth

Committed net bandwidth

Peak rate

Mb/s

Computed from radio port


peak bandwidth

Peak net bandwidth

Protection role

{none, working,
protecting}

Computed from the radio


port naming rule

Traffic bearing role in case


of radio link protection

Protection type

{unprotected, 1+1}

Computed from the presence


or not of the radio protection
group

Protection type

Availability status

{normal, in-failure}

Alarm status

....................................................................................................................................................................................................................................
1350 OMS
25-93
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES Link Over Radio

....................................................................................................................................................................................................................................

Inventory from CES Link Over Radio


When to use

The function lists objects related to CES Link Over Radio.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Inventory from CES Link Over Radio

PKT supports the inventory of:

radio interface terminations

supported CES
peer radio link (in case of 1+1 link protection)

Tunnel inventory from link over radio

PKT supports the inventory of:

supported Tunnels

selecting the desired link over radio and then right-click to open the supported VLAN
tunnel list
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

List the Link Over Radio


Refer to the procedure View the list of CES Links Over Radio (p. 25-90)
Result: The Link Over Radio list is shown.
...................................................................................................................................................................................................

Select one item in the list


Click Search > Link Over Radio
Select the type of resources related to the Link Over Radio:

Radio Interface Termination

Supported CES

....................................................................................................................................................................................................................................
1350 OMS
25-94
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES Link Over Radio

....................................................................................................................................................................................................................................

Peer Radio Link (in case of 1+1 protection)


Supported Tunnel
Result: The resource list is shown according to the selected type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-95
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Synchronization of CES Link Over Radio

....................................................................................................................................................................................................................................

Synchronization of CES Link Over Radio


When to use

The function manually upload CES Link Over Radio.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

List the Link Over Radio


Refer to the procedure View the list of CES Links Over Radio (p. 25-90)
Result: The Link Over Radio list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Select Action > Synchronize.
Result: The selected Link Over Radio is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-96
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the list of CES Radio Ports

....................................................................................................................................................................................................................................

View the list of CES Radio Ports


When to use

The function lists CES Radio Port.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction.


Result: The Construction menu is shown.
...................................................................................................................................................................................................

Select .... CES Radio Port.


Result: The CES Radio Port list is shown.

See the following topic in this document: Description of the list of CES Radio Ports
(p. 25-98)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-97
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Radio Ports

....................................................................................................................................................................................................................................

Description of the list of CES Radio Ports


Attributes of a CES Radio Port
Table 25-19

radio port properties

PKT attr name

PKT attr val

Description

userLabel

String

Friendly name

technology

RADIO

Characteristic technology

Modulation mode

{preset, adaptive}

Modulation operation mode

Modulation

{4QAM, 16QAM, 32QAM,


64QAM, 128QAM,
256QAM}

Modulation type

Channel spacing

{7Mhz, 14Mhz, 28MHz,


56Mhz}

Channel spacing

Capacity

130.56Mb/s

Committed gross bandwidth

Maximum capacity

130.56Mb/s

Peak gross bandwidth

Bandwidth

129158Kbit/s

Committed net bandwidth

Peak bandwidth

Kbit/s

Peak net bandwidth

Tx Frequency

10.8GHz

Transmit frequency

Rx Frequency

11.33GHz

Receive frequency

Shifter

530.0MHz

Delta between transmit and receive


frequencies

Alarm status

Alarm status

ASAP profile

Alarm severity assignment profile

Available bandwidth on NE

Mb/s

Net available bandwidth

Consistency status

{normal, failed,
notAligned}

Alignment between NE and NMS MIB

Radio interface type

{ODU300, MPT}

....................................................................................................................................................................................................................................
1350 OMS
25-98
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the details of CES Radio Port

....................................................................................................................................................................................................................................

View the details of CES Radio Port


When to use

The function shows properties of CES Radio Port.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

List the CES Radio Port


Refer to the procedure View the list of CES Radio Ports (p. 25-97)
Result: The CES Radio Port list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Result: The CES Radio Port property window is shown.

See the following topic in this document: Details of CES Radio Port (p. 25-100)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-99
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Details of CES Radio Port

....................................................................................................................................................................................................................................

Details of CES Radio Port


Attributes of a CES Radio Port
Table 25-20

radio port properties

PKT attr name

PKT attr val

Description

userLabel

String

Friendly name

technology

RADIO

Characteristic technology

Modulation mode

{preset, adaptive}

Modulation operation mode

Modulation

{4QAM, 16QAM, 32QAM,


64QAM, 128QAM,
256QAM}

Modulation type

Channel spacing

{7Mhz, 14Mhz, 28MHz,


56Mhz}

Channel spacing

Capacity

130.56Mb/s

Committed gross bandwidth

Maximum capacity

130.56Mb/s

Peak gross bandwidth

Bandwidth

129158Kbit/s

Committed net bandwidth

Peak bandwidth

Kbit/s

Peak net bandwidth

Tx Frequency

10.8GHz

Transmit frequency

Rx Frequency

11.33GHz

Receive frequency

Shifter

530.0MHz

Delta between transmit and receive


frequencies

Alarm status

Alarm status

ASAP profile

Alarm severity assignment profile

Available bandwidth on NE

Mb/s

Net available bandwidth

Consistency status

{normal, failed,
notAligned}

Alignment between NE and NMS MIB

Radio interface type

{ODU300, MPT}

....................................................................................................................................................................................................................................
1350 OMS
25-100
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES Radio Port

....................................................................................................................................................................................................................................

Inventory from CES Radio Port


When to use

The function lists objects related to CES Radio Port.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Inventory from CES Radio Port

PKT manages the inventory of resources related to a Radio Port:

Radio Link

Protection group (1+1 protection)

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

List the CES Radio Port


Refer to the procedure View the list of CES Radio Ports (p. 25-97)
Result: The CES Radio Port list is shown.
...................................................................................................................................................................................................

Select one item in the list


Click Search > Radio Port
Select the type of resources related to the Radio Port:

Radio Link

Protection group (1+1 protection)


Result: The resource list is shown according to the selected type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-101
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the list of CES VLAN Paths

....................................................................................................................................................................................................................................

View the list of CES VLAN Paths


When to use

The function lists CES VLAN Path.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Services menu is shown.
...................................................................................................................................................................................................

Select Circuit Emulation > CES VLAN Path.


Result: The CES VLAN Path list is shown.

See the following topic in this document: Description of the list of CES VLAN
Paths (p. 25-103)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-102
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES VLAN Paths

....................................................................................................................................................................................................................................

Description of the list of CES VLAN Paths


Attributes of a CES VLAN Path

The attributes displayed for each VLAN Path are:

User Label.

Tunnel Type

Working State.

Service State.

Availability Status

Configuration State.

....................................................................................................................................................................................................................................
1350 OMS
25-103
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Join CES tunnels

....................................................................................................................................................................................................................................

Join CES tunnels


When to use

The function adds a tunnel to a Circuit Emulation Service.


Related information

Refer to the description Manual join a tunnel to a CES (p. 25-27)


For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > Circuit Emulation Services.
Result: The Circuit Emulation Services list is shown
...................................................................................................................................................................................................

Select one item in the list.


Select Action > Circuit Emulation Services > Join.
Select Tunnel to join.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-104
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Stitch CES tunnels

....................................................................................................................................................................................................................................

Stitch CES tunnels


When to use

The function lists Circuit Emulation Services.


Related information

Refer to the description Manual join a tunnel to a CES (p. 25-27)


For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Circuit Emulation Services list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Select Action > Circuit Emulation Services > Stitch.
Select Tunnel to stitch.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-105
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the list of Circuit Emulation Services

....................................................................................................................................................................................................................................

View the list of Circuit Emulation Services


When to use

The function lists Circuit Emulation Services.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
The service CIR is automatically computed by PKT:

based on interface type, service profile and clock source in case of MEF-8
based on payload size in case of SATOP, CBS is not managed in case of MEF-8.

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services.


Result: The Services menu is shown.
...................................................................................................................................................................................................

Select Circuit Emulation > Circuit Emulation Services.


Result: The Circuit Emulation Services list is shown.

See the following topic in this document: Description of the list of Circuit Emulation
Services (p. 25-107)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-106
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of Circuit Emulation Services

....................................................................................................................................................................................................................................

Description of the list of Circuit Emulation Services


Attributes of a CES Services

The CES PW list is the same as the CES list.


The attributes displayed for each Services are:

User Label.

Service Group

Domain.

NAD Value.

Service State.

Working State

Service Profile

Availability State

Ecid A-Z

Ecid Z-A

MAC Address AZ

Service Group Id

Encapsulation Type

Transport Type

CIR

CBS

PIR

PBS

Class Of Service

Packet Replace policy

Packet Filter Pattern

Payload Suppression

Average Packet Loss Time Window

Excessive Packet Loss Threshold

Alarm Clearing Threshold

Stray Packet Detection

Stray Packet Threshold

Malformed Packet Threshold

Buffer Overrun Threshold

Signal Type.

Configuration State

Jitter buffer deppth

Alarm Raising Threshold

....................................................................................................................................................................................................................................
1350 OMS
25-107
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of Circuit Emulation Services

....................................................................................................................................................................................................................................

Buffer Underrun Threshold

Remote Packet Loss Threshold

Egress RTP synchro source

Expected Ingress RTP Payload Type

Engress RTP Payload Type

Packet Loss Threshold

Attributes are described in the following:

Generic CES attributes (p. 25-108)

MEF8 attributes (p. 25-109)

SATOP CES attributes (p. 25-110)

Generic CES attributes


Table 25-21
PKT attr
name

Generic CES attributes

PKT attr val

Master

Description

Service group

string

Operator: always modifiable

Friendly name for


service group

Userlabel

string

Operator: always modifiable

Friendly name

Comment1,
Comment2,
Comment3

string

Operator: always modifiable

User comment

Text1, Text2,
Text3

string

Operator: always modifiable

User text

Availability
status

{normal, degraded,
transport-failure,
server-transport-failure,
server-transport-degrade}

Computed automatically by
PKT. It tells whether the service
has been affected by failure of
any used resource

Alarm status

Service rate

e1 (2048 Kb/s)

Operator: no more modifiable


after service definition

Service rate

CoS

{G, G2, R1, R, R3, R4, BE, BK}

Operator: modifiable at any


time.

Class Of Service

CoS=G is fixed in case of


CesOverPacketRadio
Transport
type

{CesOverPacketRadio,
CesOverT-MPLS}

Automatically computed by
PKT based on domain type

Transport type

Encapsulation
type

{MEF8, SATOP}

Automatically computed by
PKT based on domain type

Encapsulation type

....................................................................................................................................................................................................................................
1350 OMS
25-108
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of Circuit Emulation Services

....................................................................................................................................................................................................................................

Table 25-21

Generic CES attributes

(continued)

PKT attr
name

PKT attr val

Master

Description

Configuration
state

{defined, allocated, implemented}

Automatically computed by
PKT. It tells whether the needed
resources has been reserved or
not, in database only or also in
the network

Target configuration
state

PM enabling

{false, true}

Operator: modifiable at any


time. It indicates if PM should
be automatically enabled at
service implementation time on
PDH terminations. The only
supported value is false.

Performance
monitoring enabling

PM
granularity

{15min, 24h}

Operator: modifiable at any


time. It indicates the granularity
of the PM counters. Both
directions are monitored.
Meaningful only if PM enabling
is true.

PM counter
granularity

CIR

Kb/s

It is automatically computed by
PKT

Service committed
rate

CBS

Bytes

It is automatically computed by
PKT. It is not managed in case
of MEF-8

Service burst size

MEF8 attributes

The following table shows the specific MEF8 CES attributes.


Table 25-22

MEF8 CES attributes

PKT attr
name

PKT attr
val

Comment

Signal mode

{framed,
unframed}

Service
profile

{TDM2TDM, Operator: no more modifiable after service definition.


TDM2ETH}
The service compression type

Frame
encapsulation
type

Payload size

121, 256

Size of TDM
payload in bytes

Operator: always modifiable to framed/unframed. This


attribute is mirrored to the PDH ports

Operator: modifiable only when CES is in defined state.


Configurable by operator only in case of MEF8 TDM2ETH
service profile. It is fixed and equal to 121 bytes in case of
TDM2TDM or equal to 256 bytes in case of TDM2ETH. In
case of TDM2ETH it could be configured but the
configuration is not yet supported.

Description
TDM frame
type

....................................................................................................................................................................................................................................
1350 OMS
25-109
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of Circuit Emulation Services

....................................................................................................................................................................................................................................

Table 25-22
PKT attr
name

MEF8 CES attributes

PKT attr
val

TDM clock
source

{adaptive,
differential}

(continued)
Comment

Description

Configurable only when the service is in defined or


allocated state.

TDM clock
source

Configurable only in case of TDM2ETH service profile. In


case of TDM2TDM profile, it is fixed to differential. In the
same card, it is not possible to use both differential and
adaptive clock source.
ECID A->Z

feb-80

Operator: modifiable only when the CES is defined.


In case of MPR, it is to be configurable only in case of
TDM2ETH service profile (in case of TDM2TDM it is
equal to VLAN). In case of TSS5 it has to be configured in
both cases

ECID Z->A

feb-80

Operator: modifiable only when the CES is defined.


In case of MPR, it is to be configurable only in case of
TDM2ETH service profile (in case of TDM2TDM it is
equal to VLAN). In case of TSS5 it has to be configured in
both cases

Destination
MAC address

00 22 fa bd
a3 b6

Operator: modifiable only when the CES is defined.

VLAN-ID

feb-80

Operator: not modifiable after service creation.

Configurable only in case of TDM2ETH service profile. It


is the MAC address of the Ethernet remote peer

Emulated circuit
(PW) identifier
in the A->Z
direction

Emulated circuit
(PW) identifier
in the Z->A
direction

MAC address of
CE remote peer

Ethernet tunnel
identifier

Tunnel label.

Note that:

MAC address is not meaningful in case of PDH technology


Signal mode is not meaningful in case of Ethernet port

SATOP CES attributes

The following table shows the list of SATOP CES attributes.


Table 25-23
PKT attr
name
Signal mode

SATOP CES attributes

PKT attr val


{unframed,
framedFAS,
framedCRC}

Master
Operator. This attribute is mirrored to
the PDH ports. The NE supports also
the value disabled when there is no
supported service.

When
modifiable
not modifiable

Description
TDM frame
type

....................................................................................................................................................................................................................................
1350 OMS
25-110
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of Circuit Emulation Services

....................................................................................................................................................................................................................................

Table 25-23
PKT attr
name
Payload size

SATOP CES attributes

PKT attr val


Bytes: 128,
256(default)

(continued)

Master
Operator.
SATOP standard allows the following
payload sizes, depending on service
rate:

When
modifiable

Description

modifiable only
when CES is in
defined state

Size of
TDM
payload in
bytes

modifiable also
at run-time
when the service
is implemented

TDM clock
source

e1: 32, 64, 128, 256(default),


384, 512, 640
480

ds1: 96, 192(default), 288, 384,

TDM clock
source

{adaptive,
differential,
tdmLine,
system(default)}

Operator.

RTP header
used

TRUE

NE

Not
configurable

Usage of
RTP header

Jitter buffer
depth

Microseconds:
range from 1000
us (default) to
16000 us in step
of 125 us

Operator

configurable
only when the
service is in
defined or
allocated state

Size buffer
(in
microseconds)used
to
accommodate to the
PSNspecific
packet
delay
variation

Packet replace
policy

{allOnes(default), Operator
implementationSpecific}

modifiable also
at run-time
when the service
is implemented

Packet
replace
policy

Packet filler
pattern (NOT
SUPPORTED)

(0..255):

modifiable also
at run-time
when the service
is implemented

Packet filler
pattern

255 (default)

RTP header is always inserted all


cases. In case "adaptive", although the
receiving Node does not care the RTP
header in received CES PW, but the
transmitting Node will always send
RTP header.

Operator. It is modifiable only when:


packet replace policy = filler.

....................................................................................................................................................................................................................................
1350 OMS
25-111
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of Circuit Emulation Services

....................................................................................................................................................................................................................................

Table 25-23
PKT attr
name

SATOP CES attributes

PKT attr val

(continued)

Master

When
modifiable

Description

Payload
suppression

{enable,
disable(default)}

Operator

modifiable also
at run-time
when the service
is implemented

Payload
suppression

Average packet
loss time
window

Milliseconds:
integer
1000(default)

Operator

modifiable also
at run-time
when the service
is implemented

Average
packet loss
time
window

Excessive
packet loss
threshold

[0..100]: 10
(default)

Operator

modifiable also
at run-time
when the service
is implemented

Excessive
packet loss
threshold

Alarm raising
threshold

Milliseconds:
unsigned32

NE

modifiable also
at run-time
when the service
is implemented

Time of
defect
detection
for alarm
reporting

NE

modifiable also
at run-time
when the service
is implemented

Time of
defect
undetection
for alarm
clearing

3000(default)
Alarm clearing
threshold

Milliseconds:
unsigned32
10000(default)

Stray packets
detection

{false(default),
true}

Operator

modifiable also
at run-time
when the service
is implemented

Stray
packets
detection

Stray packets
threshold

[1..300]:

Operator.

modifiable also
at run-time
when the service
is implemented

Stray
packets
threshold

Operator.

modifiable also
at run-time
when the service
is implemented

Malformed
packets
threshold

Operator.

modifiable also
at run-time
when the service
is implemented

Buffer
overrun
threshold

300 (default)
Malformed
packets
threshold

[1..300]:

Buffer overrun
threshold

[1..300]:

300 (default)

300 (default)

....................................................................................................................................................................................................................................
1350 OMS
25-112
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of Circuit Emulation Services

....................................................................................................................................................................................................................................

Table 25-23
PKT attr
name

SATOP CES attributes

PKT attr val

Buffer
underrun
threshold

[1..300]:

Remote packet
loss threshold

[1..300]:

Master

Description

modifiable also
at run-time
when the service
is implemented

Buffer
underrun
threshold

Operator.

modifiable also
at run-time
when the service
is implemented

Remote
packet loss
threshold

Operator.

modifiable also
at run-time
when the service
is implemented

Packet loss
threshold

300 (default)
[1..300]:

When
modifiable

Operator.

300 (default)

Packet loss
threshold

(continued)

1 (default)
Timestamp
frequency
(NOT
SUPPORTED)

{0[default],
77760kHz,
25000kHz,
16384kHz}

Operator.

configurable
only when the
service is in
defined or
allocated state

Timestamp
frequency
per session

Expected
ingress RTP
payload type

[0..127]:

Operator.

modifiable also
at run-time
when the service
is implemented

Expected
RTP
payload
type of
incoming
packets

Operator.

modifiable also
at run-time
when the service
is implemented

RTP
payload
type of
outgoing
packets

101(default)

Egress RTP
payload type

[0..127]:

101(default)

There are no specific T-MPLS Tunnel attributes. All T-MPLS transport attributes are
managed via TL1 and reported in the properties of the T-MPLS PW corresponding to the
Link over T-MPLS.
There are no specific T-MPLS Tunnel segment attributes. All T-MPLS transport segment
attributes are managed via TL1 and reported in the properties of the T-MPLS PW
termination corresponding to the Link over T-MPLS termination.

....................................................................................................................................................................................................................................
1350 OMS
25-113
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

View the list of CES Terminations

....................................................................................................................................................................................................................................

View the list of CES Terminations


When to use

The function lists Circuit Emulation Services Terminations.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).CES PW terminations are the same as CES terminations.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > Circuit Emulation Services.
Result: The CES list is shown.
...................................................................................................................................................................................................

Select one item in the list


Select Search > Circuit Emulation > CES Terminations.
Result: The CES Termination list is shown.

See the following topic in this document: Description of the list of CES
Terminations (p. 25-115)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-114
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Terminations

....................................................................................................................................................................................................................................

Description of the list of CES Terminations


Attributes of a CES termination

CE service terminations can be retrieved via dedicated inventory (from CES or from edge
port) or via CES routing display.
Attributes are described in the following:

Generic CES termination attributes (p. 25-115)

MEF8 CES termination attributes (p. 25-115)

SATOP CES termination attributes (p. 25-116)

The following table shows the specific MEF8 service termination attributes.
Generic CES termination attributes

The following table shows the Generic attributes.


Table 25-24
PKT attr name

Generic CES termination attributes


PKT attr val

Comment

Description

Userlabel

String

It is the port userlabel

Port ifIndex

TDM rate

e1 (2Mb/s)

It corresponds to service rate and


PDH port TDM rate

TDM rate

Transport type

{CesOverPacketRadio, Automatically computed by PKT


CesOverT-MPLS}
based on domain type

Transport type

Encapsulation type

{MEF8, SATOP}

Automatically computed by PKT


based on domain type

Encapsulation type

PM enabling

{false, true}

Meaningful only in case of PDH


termination. The only supported
value is false.

Performance
monitoring enabling

PM granularity

{15min, 24h}

Always both directions are


monitored. Meaningful only if PM
enabling is true.

PM counter granularity

Consistency status

{normal, not-aligned,
failed-to-align}

Download disable management

MIB alignment
between NMS and NE

MEF8 CES termination attributes

The following table shows the specific MEF8 service termination attributes.

....................................................................................................................................................................................................................................
1350 OMS
25-115
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Terminations

....................................................................................................................................................................................................................................

Table 25-25
PKT attr
name

MEF8 CES termination attributes

PKT attr
val

Comment

Description

Service
profile

{TDM2TDM, The service compression type


TDM2ETH}

Frame encapsulation
type

ECID Tx

feb-80

PW egress label. It is equal to ECID Z->A on node A


(and to ECID A->Z on node Z)

Emulated circuit (PW)


identifier in the egress
direction

ECID Rx

feb-80

PW ingress label. It is equal to ECID A->Z on node A


(and to ECID Z->A on node Z). It must be checked
that no two ports receive the same ingress label

Emulated circuit (PW)


identifier in the
ingress direction

Destination
MAC address

00 22 fa bd
a3 b6

In case of MPR NE it has to be provisioned only on


ETH termination

MAC address of CE
remote peer

TDM clock
source

{adaptive,
differential}

Meaningful only in case of PDH termination

TDM clock source

Payload size

121, 256

It is fixed and equal to 121 bytes in case of


TDM2TDM or equal to 256 bytes in case of
TDM2ETH. In case of TDM2ETH it could be
configured but the configuration is not yet supported.

Size of TDM payload

RTP header
used

{false, true}

Meaningful only in case of PDH termination:

Usage of RTP header

false in case of adaptive clock source

true in case of differential clock source

Note that:

MAC address is not meaningful in case of PDH technology


Signal mode is not meaningful in case of Ethernet port

The following table shows the specific Packet-Radio tunnel segment attributes.
PKT attr name
VLAN

PKT attr val


feb-80

Comment
VLAN tunnel identifier

Description
VLAN tunnel identifier

SATOP CES termination attributes

The following table shows the specific SATOP CES termination attributes.

....................................................................................................................................................................................................................................
1350 OMS
25-116
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Terminations

....................................................................................................................................................................................................................................

Table 25-26
PKT attr
name

PKT attr val

SATOP CES termination attributes


Comment

SNMP MIB

Description

Payload size

128,
256(default)

The value of this object indicates the Payload


Size (in bytes) to be defined during the
SNMP PW setUp.

pwCTDMCfgPayloadSize

Size of
TDM
payload in
bytes

TDM clock
source

{adaptive,
differential,
tdmLine,
system(default)}

The clock used to play out the data at the


PSN-bound IWF.

pwCTDMCfgClockSource

TDM clock
source

RTP header
used

TRUE

If set to false, an RTP header is not


pre-pended to the TDM packet. Meaningful
only in case of PDH termination: in case of
SATOP it is always true.

pwCTDMCfgRtpHdrUsed

Usage of
RTP header

Jitter buffer
depth

[1000-16000]

The value shall be in units of microsecond.


The value ranges from 1000 us
(microseconds) = 1ms to 16000 us = 16ms in
step of 125 us.

pwCTDMCfgJtrBfrDepth

Size buffer
used to
accommodate to the
PSNspecific
packet delay
variation

(1000 us
default)

Packet
replace
policy

{allOnes(default), This parameter determines the value to be


played when CE bound packets
implementaover/underflow the jitter buffer, or are
tionSpecific}
missing for any reason. This byte pattern is
sent (played) on the TDM line. Selecting
implementationSpecific implies an
agent-specific algorithm. Selecting filler
requires the setting of pwTDMCfgPktFiller.
The default value is allones, i.e. play AIS.

pwCTDMCfgPktReplacePolicy

Packet
replace
policy

Packet filler
pattern
(NOT
SUPPORTED)

[0..255]

Filler byte pattern played out on the TDM


interface. The default value is 255,i.e. play
all ones, equal to AIS indications.

pwCTDMCfgPktFiller

Packet filler
pattern

Payload
suppression

{enable,
disable(default)}

Selecting enable means that payload


suppression is allowed. Payload may be
omitted in order to conserve bandwidth.
Selecting disable means no suppression
under any condition. Object MAY be
changed at any time

pwCTDMCfgPayloadSuppression

Payload
suppression

255 (default)

....................................................................................................................................................................................................................................
1350 OMS
25-117
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Terminations

....................................................................................................................................................................................................................................

Table 25-26
PKT attr
name

PKT attr val

SATOP CES termination attributes

(continued)

Comment

SNMP MIB

Description

Average
packet loss
time
window

Integer:
1000(default)

The length of time over which the average


packet loss rate should be computed to detect
excessive packet loss rate. The value shall be
in units of millisecond. The default value is
1000 millisecond (1 s)

pwCTDMCfgAvePktLossTimeWindow

Average
packet loss
time
window

Excessive
packet loss
threshold

[0..100]:

Excessive packet loss is detected by


computing the average number of lost
packetloss over a pwTDMCfgAvePktLossTimeWindow amount of time and comparing
it with this threshold value. The rate is
expressed in number of packets.

pwCTDMCfgExcessivePktLossThreshold

Excessive
packet loss
threshold

Alarms are only reported when the defect


state persists for the length of time specified
by this object. Object MAY be changed only
when the related PW is defined as not active.
The value shall be in units of milisec.

pwCTDMCfgAlarmThreshold

Time of
defect
detection for
alarm
reporting

Alarm MUST be cleared after the


corresponding defect is undetected for the
amount of time specified by this object.
Object MAY be changed only when the
related PW is defined as not active. The
value shall be in units of milisec.

pwCTDMCfgClearAlarmThreshold

Time of
defect
undetection
for alarm
clearing

10 (default)

Alarm
raising
threshold

Milliseconds:
unsigned32
3000(default)

Alarm
clearing
threshold

Milliseconds:
unsigned32

10000(default)

Stray
packets
detection

{true,
false(default)}

Enable or Disable the Stray packet detection


mechanism for the Pseudowire.

pwCTDMCfgStrayPacketDetect

Stray
packets
detection

Stray
packets
threshold

[1..300]:

The number of stray packets in the


Pseudowire within 1 second must be met in
order to declare an alarm, if
pwCTDMCfgStrayPacketDetect was set to
True. Stray packet: If the SSRC field of
incoming Pseudowire packets do not match
the configured value of inssrc, the packet is
discarded and stray packet count is
incremented.

pwCTDMCfgStraypacketsThreshold

Stray
packets
threshold

300 (default)

....................................................................................................................................................................................................................................
1350 OMS
25-118
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Terminations

....................................................................................................................................................................................................................................

Table 25-26
PKT attr
name
Malformed
packets
threshold

PKT attr val


[1..300]

300 (default)

SATOP CES termination attributes

(continued)

Comment

SNMP MIB

Description

The number of Malformed packets in the


Pseudowire within 1 second must be met in
order to declare an alarm. Malformed
packets: are detected by mismatch between
the expected packet size (taking the value of
the L bit into account) and the actual packet
size inferred from the PSN and PW
demultiplexing layers. When RTP is used,
lack of correspondence between the PT value
and that allocated for this direction of the PW
is used for this purpose as well.

pwCTDMCfgMalformedPacketsThreshold

Malformed
packets
threshold

The number of times a newly-arriving packet


dropped due to Buffer overrun in the
Pseudowire within 1 second must be met in
order to declare an alarm.

pwCTDMCfgBufferOverrunThreshold

Buffer
overrun
threshold

The number of times a packet needed to be


played out and the jitter buffer was empty in
the Pseudowire within 1 second must be met
in order to declare an alarm.

pwCTDMCfgBufferUnderrunThreshold

Buffer
underrun
threshold

The number of received packets with their R


bit set in the Pseudowire within 1 second
must be met in order to declare an alarm.

pwCTDMCfgRemotePacketLossThreshold

Remote
packet loss
threshold

Buffer
overrun
threshold

[1..300]:

Buffer
underrun
threshold

[1..300]:

Remote
packet loss
threshold

[1..300]:

Packet loss
threshold

[1..300]:
1(default)

The number of lost packets in the


Pseudowire within 1 second must be met in
order to declare an alarm. This threshold is
used to report opticsIMAlarmLossOfCESoETHFrameRaise (aka LOPS) on
opticsIME1PathITTPTable

Packet loss
pwCTDMthreshold
CfgCESoETHFrameLossThreshold

Timestamp
frequency
(NOT
SUPPORTED)

{0[default],
77760kHz,
25000kHz,
16384kHz}

This value is differential timestamp


frequency of the system (in units of KHz).
The default (0) means that global setting is
inherited from opticsIMCESoEthDifferentialTimestampFrequency

pwCTDMDifferentialTimestampFrequency

300 (default)

300 (default)

300 (default)

Timestamp
frequency
per session

....................................................................................................................................................................................................................................
1350 OMS
25-119
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Terminations

....................................................................................................................................................................................................................................

Table 25-26
PKT attr
name
Expected
ingress RTP
synchro
source

Actual
ingress RTP
synchro
source

PKT attr val

SATOP CES termination attributes

(continued)

Comment

SNMP MIB

Description

integer:

The expected value of Synchronization


Source (SSRC) field of the RTP header of the
incoming pseudowire packets.

pwCTDMRTPHdrSsrcIn

2* PW ingress
label (default)

Supported by NE as read-only: therefore


reported only on CES termination.

Expected
RTP
synchronization source
label of
incoming
packets

integer

The actual value of Synchronization Source


(SSRC) field of the RTP header of the
incoming pseudowire packets.

pwCTDMRTPHdrSsrcInActual

Expected
RTP
synchronization source
label of
incoming
packets

pwCTDMRTPHdrSsrcOut

RTP
synchronization source
label of
outgoing
packets

Supported by NE as read-only: therefore


reported only on CES termination.
integer:

The value of Synchronization Source (SSRC)


field of the RTP header of the outgoing
pseudowire packets.

2* PW egress
label (default)

Supported by NE as read-only: therefore


reported only on CES termination.

Expected
ingress RTP
payload type

[0..127]:
101(default)

The expected value of the Payload Type field


of the RTP header on the incoming
Pseudowire packets.

pwCTDMRTPPayloadTypeIn

Expected
RTP payload
type of
incoming
packets

Actual
ingress RTP
payload type

[0..127]

The actual value of the Payload Type field of


the RTP header on the incoming Pseudowire
packets.

pwCTDMRTPPayloadTypeInActual

Actual RTP
payload type
of incoming
packets

Egress RTP
synchro
source

Supported by NE as read-only: therefore


reported only on CES termination.
Egress RTP
payload type

[0..127]:
101(default)

The value of the Payload Type field of the


RTP header on the outgoing Pseudowire
packets.

pwCTDMRTPPayloadTypeOut

RTP payload
type of
outgoing
packets

NE CIR

INTEGER

This value indicates the total amount of


bandwidth necessary to carry the TDM
Service required.

pwCTDMBandwidth

Committed
information
rate
computed
by NE

It is a read-only value of the CES termination

....................................................................................................................................................................................................................................
1350 OMS
25-120
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Description of the list of CES Terminations

....................................................................................................................................................................................................................................

Table 25-26
PKT attr
name
CoS

SATOP CES termination attributes

(continued)

PKT attr val

Comment

SNMP MIB

{G(default),
G2, R1, R, R3,
R4, BE, BK}

This value indicates the Class of Service the


TDM service is expected to be carried in the
PW

pwCTDMClassOfService

Description
Class of
Service

....................................................................................................................................................................................................................................
1350 OMS
25-121
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Create Circuit Emulation Service

....................................................................................................................................................................................................................................

Create Circuit Emulation Service


When to use

The function creates a Circuit Emulation Service.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Dedicated wizard for CES creation

In case of SATOP CES, the operator can select if the CES will be created in bottom-up or
top-down mode, by toggling the top-down flag:

in bottom-up mode, the operator must select the single link transporting the service
in top-down mode, no transport link can be selected and the system automatically
picks up one unused link or it creates a new one on the fly

In case of MEF8 CES, the system automatically applies a routing algorithm to identify
the transport links crossed by the service.
Wizard for SATOP CES creation

Some CES attributes are present both for MEF8 and SATOP services, but with different
range of values, as described in Table 25-22, MEF8 CES attributes (p. 25-109) section
and Table 25-23, SATOP CES attributes (p. 25-110).
Depending on domain type selection, the system automatically computes the
corresponding encapsulation type (MEF8, SATOP) and the wizard should present the
appropriate range of values for that encapsulation type.
Therefore, the operator can configure the following tabs:

in case of MEF8: Generic, Info, MEF8 and QoS

in case of SATOP: Generic, Info, RTP, QoS and OAM

The RTP, QoS and OAM tabs are disabled in case of MEF8, since the corresponding
attributes are not supported by MPR.
The management of SATOP requires also to introduce new CES attributes.
CES automatic allocation and routing

The CE service can be optionally allocated in cascade right after creation time.
The CES allocation triggers the automatic Tunnel allocation.
PKT supports the automatic routing of CE services. It automatically identifies the needed
radio/cable/T-MPLS links for transporting the service and reserves the needed bandwidth
on these links.
The automatic routing is applied to the Tunnel layer.

....................................................................................................................................................................................................................................
1350 OMS
25-122
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Create Circuit Emulation Service

....................................................................................................................................................................................................................................

For a description about Manual deallocation and deletion of CES, refer to the topic
Manual deallocation and deletion of CES (p. 25-32). Unterminated.PKT supports the
creation and allocation of CE services with one Ethernet termination. The CES service
profile must be TDM2ETH.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Action > Packet > Services > Circuit Emulation > Create CES.
Result: The Create Circuit Emulation Service window is shown.

The step Create CES is highlighted.


...................................................................................................................................................................................................

In the step Create CES, click Generic tab.


In the Generic tab, insert the following information:

Insert User Label

Select CES Domain from list


Select Transport Type from list

Select Encapsulation Type from list

Select Service Profile from list (for MEF8 only)

Select Clock Source from list

Select Service Rate from list

Select Payload size from list

Select Signal Type from list

Insert External Mark

Select NAD from list


Select Service Group from list

...................................................................................................................................................................................................

In the step Create CES, click Info tab.


In the Info tab, insert the following optional information:

Comment 1

Comment 2

....................................................................................................................................................................................................................................
1350 OMS
25-123
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Create Circuit Emulation Service

....................................................................................................................................................................................................................................

Comment 3

Text 1

Text 3

Text 2

...................................................................................................................................................................................................

In the step Create CES, click MEF8 tab.


In the MEF8 tab, insert the following information:

Insert R_APS VLAN Id (for MEF8 only)

Insert Ecid A-Z (for MEF8 only)

Insert Ecid Z-A (for MEF8 only)

Insert Destination MAC Address. Meaningful only if TDM2ETH CES. (in hex
characters). (for MEF8 only)

...................................................................................................................................................................................................

In the step Create CES, click QOS tab.


In the QOS tab, insert the following information:

Select Class Of Service from list

Insert Jitter buffer depth (for SATOP only)

Select Payload Suppression (Enable, Disable) (for SATOP only)

...................................................................................................................................................................................................

In the step Create CES, click OAM tab.


In the OAM tab, insert the following information:

Select Packet Replace Policy from list (for SATOP only)

Insert Packet Filter Pattern (for SATOP only)

Insert Average Packet Loss Time Window (for SATOP only)

Insert Excessive Packet Loss Threshold (for SATOP only)


Insert Alarm Raising Threshold (for SATOP only)

Insert Alarm Clearing Threshold (for SATOP only)

Insert Stray Packet Detection. (True, False). (for SATOP only)

Insert Stray Packet Threshold (for SATOP only)

Insert Malformed Packet Threshold (for SATOP only)

Insert Buffer Overrun Threshold (for SATOP only)

Insert Buffer Underrun Threshold (for SATOP only)

Insert Remote Packet Loss Threshold (for SATOP only)

Insert Packet Loss Threshold (for SATOP only)

PM enabling

PM granularity

....................................................................................................................................................................................................................................
1350 OMS
25-124
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Create Circuit Emulation Service

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In the step Create CES, click RTP tab.


In the RTP tab, insert the following information:

Insert RTP header used (for SATOP only. When RTP header is NOT used, all
remaining following attributes in tab are greyed)
Select Expected Ingress RTP Payload Type from list (for SATOP only)
Select Egress RTP Payload Type from list (for SATOP only)

...................................................................................................................................................................................................

Click Next.
Result: The step CES Terminations is highlighted.
...................................................................................................................................................................................................

In the step CES Terminations, select termination A and termination Z.


...................................................................................................................................................................................................

10

Click Next.
Result: The step Available actions is highlighted.
...................................................................................................................................................................................................

11

In the step Available actions, select one or more available actions.


...................................................................................................................................................................................................

12

Click OK.
Result: The step Circuit Emulation Service is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-125
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Inventory from CES

....................................................................................................................................................................................................................................

Inventory from CES


When to use

The function lists objects related to Circuit Emulation Services.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Inventory from CES

PKT manages the inventory of:

CE service terminations

Server Tunnels. Show properties of Tunnel (p. 25-55)

The inventory from PW is the same as the inventory from CES.


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > Circuit Emulation Services.
Result: The CES list is shown.
...................................................................................................................................................................................................

Select one item in the list


Click Search > CES
Select the type of resources related to the CES:

CE Service terminations

Server Tunnels
Result: The resource list is shown according to the selected type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-126
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Configure CES

....................................................................................................................................................................................................................................

Configure CES
When to use

The function configures Circuit Emulation Services.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Allocated SATOP CES configuration

When the CES is in allocated state, PKT allows the configuration of the following
attributes:

Signal mode
PM enabling/granularity
TDM clock source

Jitter buffer depth


Packet replace policy
Packet filler pattern
Payload suppression

Average packet loss time window


Excessive packet loss threshold
Alarm raising threshold

Alarm clearing threshold


Stray packets detection
Stray packets threshold

Malformed packets threshold


Buffer overrun threshold
Buffer underrun threshold
Remote packet loss threshold

Packet loss threshold


Expected ingress RTP payload type

Egress RTP payload type


CoS

The attributes are automatically reconfigured in both CES terminations.


Implemented SATOP CES configuration

When the CES is in implemented state, PKT allows the configuration of the following
attributes:

Signal mode
PM enabling/granularity

....................................................................................................................................................................................................................................
1350 OMS
25-127
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Configure CES

....................................................................................................................................................................................................................................

TDM clock source


Packet replace policy

Packet filler pattern


Payload suppression
Average packet loss time window
Excessive packet loss threshold
Alarm raising threshold

Alarm clearing threshold


Stray packets detection
Stray packets threshold

Malformed packets threshold


Buffer overrun threshold
Buffer underrun threshold
Remote packet loss threshold

Packet loss threshold


Expected ingress RTP payload type
Egress RTP payload type
CoS

The attributes are automatically reconfigured in both CES terminations.


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > Circuit Emulation Services.
Result: The CES list is shown.
...................................................................................................................................................................................................

Select one item in the list


Select Search > Circuit Emulation > CES Configuration.
Result: The CES Configuration window is shown.
...................................................................................................................................................................................................

Modify attributes and click OK

....................................................................................................................................................................................................................................
1350 OMS
25-128
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Configure CES

....................................................................................................................................................................................................................................

Result: The CES is re-Configured.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-129
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Routing display of CES

....................................................................................................................................................................................................................................

Routing display of CES


When to use

The function creates a Circuit Emulation Service.


Related information

For a description about Circuit Emulation Services, refer to the topic Routing display of
CES (p. 25-30).
For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Services > Circuit Emulation > CES.
Result: The Create Circuit Emulation Service list is shown.
...................................................................................................................................................................................................

Select one item in the list.


Select Search > CES > Routing Display.
Result: The graphical routing display is open.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-130
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Configure CES terminations

....................................................................................................................................................................................................................................

Configure CES terminations


When to use

The function configures Circuit Emulation Services terminations.


Related information

For a description about Circuit Emulation Services, refer to the topic Circuit Emulation
Services definition (p. 25-4).
SATOP CES termination configuration

The CES termination configuration allows to modify the following attributes:

PM enabling/granularity

The other CES attributes are reconfigured only on CES basis.


Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From MS-GUI main window:


...................................................................................................................................................................................................

List CES terminations.


Refer to the procedure View the list of CES Terminations (p. 25-114)
Result: The CES ermination tlist is shown.
...................................................................................................................................................................................................

Select one item in the list.


Select Action > CES termination > Configuration.
Result: The CES Configuration window is shown.
...................................................................................................................................................................................................

Modify attributes and click OK


Result: The CES is re-Configured.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-131
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Takeover procedure for MEF8 CES

....................................................................................................................................................................................................................................

Takeover procedure for MEF8 CES


When to use

The procedure permit to take in charge Network Elements and Connectivity when the
PKT is deployed in a network where (network wide) such connectivity is already in place.
Related information

CES Takeover operations start from:

CES Ports

CES NEs

For more information refer to: CES Takeover description (p. 25-52)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
Conditions

The topology of the network must be already defined.


Ports and Transport link must be assigned to Packet radio domain (MEF8) or T-MPLS
(SATOP) domain.
Task for MEF8 CES

From MS-GUI main window:


...................................................................................................................................................................................................

Select the object to start the CES Takeover using one of the following command:

Search > Packet > Services > Circuit Emulation > CES Port.

Search > Packet > Services > Circuit Emulation > CES NE.
Result: The list of the selected objects is shown.

...................................................................................................................................................................................................

Select one item in the list


Select Action > Takeover
Result: NE Cross Connections are uploaded.

PKT recursively discovers all the Cross Connections composing a CES.


If the Cross Connections form a complete CES, The CES is automatically created on
PKT DB.
Port used bandwidth is updated.
The CES Provisioning Status is set to Implemented
....................................................................................................................................................................................................................................
1350 OMS
25-132
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Takeover procedure for MEF8 CES

....................................................................................................................................................................................................................................

Note: If Cross Connections are present on NE and do not belong to any CES, they are
loaded on DB with reserved consistency state.
The user can delete unused Cross Connections.
Note: If a Node is not reachable, CES discovery algorithm cannot be completed. The
uploaded Cross Connections are not correlated to any CES. Therefore they are loaded
on DB with reserved consistency state.
When the node is reachable again, the user restart the action to complete the Takeover.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-133
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Takeover procedure for SATOP CES

....................................................................................................................................................................................................................................

Takeover procedure for SATOP CES


When to use

The procedure permit to take in charge Network Elements and Connectivity when the
PKT is deployed in a network where (network wide) such connectivity is already in place.
Related information

For more information refer to: CES Takeover description (p. 25-52)
For more information refer to: T-MPLS Takeover description (p. 18-130)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
Conditions

The topology of the network must be already defined.


Ports and Transport link must be assigned to Packet radio domain (MEF8) or T-MPLS
(SATOP) domain.
Task for SATOP CES

From MS-GUI main window:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Link Over Cable.
Assign Links Over Cable to T-MPLS domain.
For details refer to the procedure Assign a Link Over Cable to a Domain (p. 14-60).
Result: The selected Links Over Cable are assigned to T-MPLS domain
...................................................................................................................................................................................................

Execute the T-MPLS PW Takeover:


Select Search > Packet > T-MPLS > T-MPLS domain..
Select the T-MPLS domain.
Select Action > T-MPLS > Takeover All
Note: In a large network the Takeover from the domain requires a long time to
execute. The user can start the Takeover only from involved nodes.

....................................................................................................................................................................................................................................
1350 OMS
25-134
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management


CES Procedures

Takeover procedure for SATOP CES

....................................................................................................................................................................................................................................

Result: T-MPLS Tunnels and PseudoWires are discovered and created in the PKT

DB.
...................................................................................................................................................................................................

Assign PWs to CES Domain.


For details refer to the procedure Assign resources to a Domain (p. 13-27).
...................................................................................................................................................................................................

Start the CES Takeover from a CES port or from a CES NE.
Refer to Task for MEF8 CES (p. 25-132)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
25-135
8DG42227DAAA 9.6
Issue 3 December 2012

Circuit Emulation Service Management

Takeover procedure for SATOP CES

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
25-136
8DG42227DAAA 9.6
Issue 3 December 2012

Part IV: Advanced Functions

Overview
Purpose

This document part provides conceptual information and procedures to accomplish


typical network management tasks.
Contents
Chapter 26, TSS-320 versus TSS-40 with packet ring

26-1

Chapter 27, Performance Monitoring

27-1

Chapter 28, Enhanced Procedures

28-1

...................................................................................................................................................................................................................................
1350 OMS
IV-1
8DG42227DAAA 9.6
Issue 3 December 2012

Advanced Functions

Overview

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
IV-2
8DG42227DAAA 9.6
Issue 3 December 2012

26

26
TSS-320
versus TSS-40
with packet ring

Overview
Purpose

This chapter provides the conceptual information and the associated tasks for managing
Ethernet Virtual Connection over the T-MPLS tunnel with packet ring facility.
Contents
Create T-MPLS Tunnel and PW (SNI)

26-2

Create T-MPLS tunnel 320-40 (SNI)

26-2

Create T-MPLS PW 320-40 (SNI)


Create T-MPLS Tunnel and PW (DNI)

26-14
26-21

Create T-MPLS tunnel 320-40 (DNI)

26-21

Create T-MPLS PW 320-40 (DNI)

26-33

Create EVC over T-MPLS 320-40

26-40

Create EVC over T-MPLS 320-40

26-40

Verify creation of EVC over T-MPLS 320-40

26-58

...................................................................................................................................................................................................................................
1350 OMS
26-1
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................

Create T-MPLS Tunnel and PW (SNI)


Create T-MPLS tunnel 320-40 (SNI)
When to use

The scope of this procedure is to create the T-MPLS tunnel between TSS-40 and
TSS-160/320.
Related Information

The reference network is shown below.


Figure 26-1 Reference Network

....................................................................................................................................................................................................................................
1350 OMS
26-2
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................

Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > T-MPLS > Create T-MPLS tunnel.
Figure 26-2 Actions>Packet>T-MPLS>Create T-MPLS tunnel

...................................................................................................................................................................................................

In the Create T-MPLS tunnel box:

enter User Label name

Topology = Point to Point

....................................................................................................................................................................................................................................
1350 OMS
26-3
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................

Protection Level = Packet Ring Bidir

Flow = bidirectional

Figure 26-3 Create T-MPLS tunnel

...................................................................................................................................................................................................

Select folder Quality of Service.


Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile.
...................................................................................................................................................................................................

Select folder OAM

....................................................................................................................................................................................................................................
1350 OMS
26-4
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................

Set fields Alarm Enable, CV (Connectivity Verification) Enable, CV Period, PM


granularity.
Click on Next.
...................................................................................................................................................................................................

In step2 you will select:

the first extremity working

the first extremity protection

the second extremity

Select the node relevant to the first extremity working and to the first extremity protection
(Node 122 in this case).
Figure 26-4 Point to point Packet Ring bidir protected T-MPLS tunnel

....................................................................................................................................................................................................................................
1350 OMS
26-5
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the port for the first extremity working. It is the SDH port used by the SDH path
connecting Node 41 to Node 122.
Figure 26-5 Selection of the port

...................................................................................................................................................................................................

Analogously select the first extremity protection port on the same node.

....................................................................................................................................................................................................................................
1350 OMS
26-6
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the second extremity, in our case node TSS-40_41


Figure 26-6 Select the second extremity (node)

...................................................................................................................................................................................................

Select the port working and protecting, according to the physical connections previously
created.

....................................................................................................................................................................................................................................
1350 OMS
26-7
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................

Figure which follows shows all selected extremities.


Figure 26-7 P2P bid prot T-MPLS tunnel: selected extremities

....................................................................................................................................................................................................................................
1350 OMS
26-8
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

10

Select the constraint. It is the one relevant to the main tunnel.


Figure 26-8 P2P: constraint

....................................................................................................................................................................................................................................
1350 OMS
26-9
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

11

Extremities and constraint have been selected. Click on Apply to confirm.


Figure 26-9 P2P bid prot T-MPLS tunnel: selected extremities and constraint

....................................................................................................................................................................................................................................
1350 OMS
26-10
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12

The tunnel has been created. To verify the creation issue Search > Packet > T-MPLS >
T-MPLS Tunnels.
Figure 26-10 Search>Packet>T-MPLS>T-MPLS Tunnels

....................................................................................................................................................................................................................................
1350 OMS
26-11
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13

The tunnel is created with status defined. Select the created tunnel in the list and issue,
using the right mouse button, Actions > Allocate.
Figure 26-11 Tunnel list

...................................................................................................................................................................................................

14

Implement the tunnel.


Figure 26-12 Actions>Implement T-MPLS Tunnel

....................................................................................................................................................................................................................................
1350 OMS
26-12
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

15

The tunnel is now implemented.


Figure 26-13 The tunnel is implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
26-13
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS PW 320-40 (SNI)

....................................................................................................................................................................................................................................

Create T-MPLS PW 320-40 (SNI)


When to use

The scope of this procedure is to create a pseudo wire within a T-MPLS tunnel.
Related Information

All needed conditions are detailed along the procedure.


Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main bar select Actions > Packet > T-MPLS > Create T-MPLS Pseudo Wire.
Figure 26-14 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire

....................................................................................................................................................................................................................................
1350 OMS
26-14
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS PW 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In the Create T-MPLS Pseudo Wire box select:

User Label

Topology = Point to Point

Flow = Bidirectional

Figure 26-15 Create T-MPLS Pseudo Wire

...................................................................................................................................................................................................

Select folder Quality of Service

....................................................................................................................................................................................................................................
1350 OMS
26-15
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS PW 320-40 (SNI)

....................................................................................................................................................................................................................................

Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile.
Note: These values must be consistent with those specified for the relevant tunnel
...................................................................................................................................................................................................

Select OAM values. Click on Next.


...................................................................................................................................................................................................

Select the extremities. The modality of selection is the same as described for the above
procedure of tunnel create.

....................................................................................................................................................................................................................................
1350 OMS
26-16
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS PW 320-40 (SNI)

....................................................................................................................................................................................................................................

The constraint is the above mentioned tunnel.


Figure 26-16 Point to Point Bidirectional T-MPLS PW

....................................................................................................................................................................................................................................
1350 OMS
26-17
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS PW 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select Search > Packe t> T-MPLS > T-MPLS Pseudo Wire.
Figure 26-17 Search>Packet>T-MPLS>T-MPLS Pseudo Wire

...................................................................................................................................................................................................

The list of the T-MPLS pseudo wires is shown below. The PW just created is Allocated.
Figure 26-18 T-MPLS Pseudo Wires

....................................................................................................................................................................................................................................
1350 OMS
26-18
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS PW 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the relevant Pseudo Wire and issue Actions > Implement T-MPLS Pseudo wire.
Figure 26-19 PW Implementation

...................................................................................................................................................................................................

The T-MPLS Pseudo wire is now implemented.


Figure 26-20 T-MPLS Pseudo wire implemented

...................................................................................................................................................................................................

10

The Pseudo Wire is seen as a T-MPLS Transport Link in the area of the Services.
From the main menu bar issue Search > Packet > Services > T-MPLS > T-MPLS
Transport Links to list the Transport Links.

....................................................................................................................................................................................................................................
1350 OMS
26-19
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS PW 320-40 (SNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

11

The list of the T-MPLS Transport Links is displayed. It includes the Pseudo Wire just
created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
26-20
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................

Create T-MPLS Tunnel and PW (DNI)


Create T-MPLS tunnel 320-40 (DNI)
When to use

The scope of this procedure is to create the T-MPLS tunnel between TSS-40 and
TSS-160/320.
Related Information

The reference network is shown below.


Figure 26-21 Reference Network

....................................................................................................................................................................................................................................
1350 OMS
26-21
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................

Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > T-MPLS > Create T-MPLS tunnel.
Figure 26-22 Actions>Packet>T-MPLS>Create T-MPLS tunnel

...................................................................................................................................................................................................

In the Create T-MPLS tunnel box enter:

the User Label

the Topology = Point to Point


the Protection Level = Packet Ring Bidir Open
....................................................................................................................................................................................................................................
1350 OMS
26-22
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................

the Flow = bidirectional


Figure 26-23 Create T-MPLS tunnel

...................................................................................................................................................................................................

Select folder Quality of Service.


Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile.
...................................................................................................................................................................................................

Select folder OAM

....................................................................................................................................................................................................................................
1350 OMS
26-23
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................

Set fields Alarm Enable, CV (Connectivity Verification) Enable, CV Period, PM


granularity.
Click on Next.
...................................................................................................................................................................................................

In step2 you will select:

the first extremity working

the first extremity protection

the second extremity

Select the node relevant to the first extremity working (Node 122 in this case).
Figure 26-24 Point to point Packet Ring bidir protected T-MPLS tunnel open sink

....................................................................................................................................................................................................................................
1350 OMS
26-24
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the port. It is the SDH port used by the SDH path connecting Node 41 to Node
122.
Figure 26-25 Selection of the port

...................................................................................................................................................................................................

Analogously select the first extremity protection

....................................................................................................................................................................................................................................
1350 OMS
26-25
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the second extremity, in our case node TSS-40_41


Figure 26-26 Select the second extremity (node)

...................................................................................................................................................................................................

Select the port working and protecting, according to the physical connections previously
created.

....................................................................................................................................................................................................................................
1350 OMS
26-26
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................

Figure which follows shows all selected extremities.


Figure 26-27 P2P bid prot T-MPLS tunnel open sink: selected extremities

....................................................................................................................................................................................................................................
1350 OMS
26-27
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

10

Select the constraint. It is the one relevant to the main tunnel.


Figure 26-28 P2P open sink: constraint

....................................................................................................................................................................................................................................
1350 OMS
26-28
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

11

Extremities and constraint have been selected. Click on Apply to confirm.


Figure 26-29 P2P bid prot T-MPLS tunnel open sink: selected extremities and
constraint

....................................................................................................................................................................................................................................
1350 OMS
26-29
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12

The tunnel has been created. To verify the creation issue Search > Packet > T-MPLS >
T-MPLS Tunnels.
Figure 26-30 Search>Packet>T-MPLS>T-MPLS Tunnels

....................................................................................................................................................................................................................................
1350 OMS
26-30
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13

The tunnel is created with status defined. Select the created tunnel in the list and issue,
using the right mouse button, Actions > Allocate.
Figure 26-31 Tunnel list

...................................................................................................................................................................................................

14

Implement the tunnel.


Figure 26-32 Actions>Implement T-MPLS Tunnel

....................................................................................................................................................................................................................................
1350 OMS
26-31
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

15

The tunnel is now implemented.


Figure 26-33 The tunnel is implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
26-32
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS PW 320-40 (DNI)

....................................................................................................................................................................................................................................

Create T-MPLS PW 320-40 (DNI)


When to use

The scope of this procedure is to create a pseudo wire within a T-MPLS tunnel.
Related Information

All needed conditions are detailed along the procedure.


Before you begin

All needed conditions are detailed along the procedure.


Task
...................................................................................................................................................................................................

From the main bar select Actions > Packet > T-MPLS > Create T-MPLS Pseudo Wire.
Figure 26-34 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire

....................................................................................................................................................................................................................................
1350 OMS
26-33
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS PW 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

In the Create T-MPLS Pseudo Wire box select:

User Label

Topology = Dual Point to Point

Flow = Bidirectional

Figure 26-35 Create T-MPLS Pseudo Wire

...................................................................................................................................................................................................

Select folder Quality of Service

....................................................................................................................................................................................................................................
1350 OMS
26-34
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS PW 320-40 (DNI)

....................................................................................................................................................................................................................................

Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile.
Note: these values must be consistent with those specified for the relevant tunnel
...................................................................................................................................................................................................

Select OAM values. Click on Next.


...................................................................................................................................................................................................

Select the extremities. The modality of selection is the same as described for the above
procedure of tunnel create.

....................................................................................................................................................................................................................................
1350 OMS
26-35
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS PW 320-40 (DNI)

....................................................................................................................................................................................................................................

The constraint is the above mentioned tunnel.


Figure 26-36 Dual Point to Point Bidirectional T-MPLS PW

....................................................................................................................................................................................................................................
1350 OMS
26-36
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS PW 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select Search > Packet > T-MPLS > T-MPLS Pseudo Wire
Figure 26-37 Search>Packet>T-MPLS>T-MPLS Pseudo Wire

...................................................................................................................................................................................................

The list of the T-MPLS pseudo wires is shown below. The PW just created is Allocated.
Figure 26-38 T-MPLS Pseudo Wires

....................................................................................................................................................................................................................................
1350 OMS
26-37
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS PW 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the relevant Pseudo Wire and issue Actions > Implement T-MPLS Pseudo wire.
Figure 26-39 PW Implementation

...................................................................................................................................................................................................

The T-MPLS Pseudo wire is now implemented.


Figure 26-40 T-MPLS Pseudo wire implemented

...................................................................................................................................................................................................

10

The Pseudo Wire is seen as a T-MPLS Transport Link in the area of the Services.
From the main menu bar issue Search > Packet > Services > T-MPLS > T-MPLS
Transport Links to list the Transport Links.

....................................................................................................................................................................................................................................
1350 OMS
26-38
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS PW 320-40 (DNI)

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

11

The list of the T-MPLS Transport Links is displayed. It includes the Pseudo Wire just
created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
26-39
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Overview

....................................................................................................................................................................................................................................

Create EVC over T-MPLS 320-40


Create EVC over T-MPLS 320-40
When to use

The scope of this procedure is to create an EVC over T-MPLS.


Related Information

All needed conditions are detailed along the procedure


Before you begin

All needed conditions are detailed along the procedure


Task
...................................................................................................................................................................................................

From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC
Figure 26-41 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC

...................................................................................................................................................................................................

Folder Specific is already selected.

....................................................................................................................................................................................................................................
1350 OMS
26-40
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

Select the following attributes:

User Label

Select Service type, e.g. Service type=EVPLAN


Ethernet service and type are not meaningful
Select domain=T-MPLS

....................................................................................................................................................................................................................................
1350 OMS
26-41
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

Select traffic type=unicast. For service type=BTV, traffic type=multicast


Select resource sharing=Full. It describes the resource reservation (UNI and link).

Figure 26-42 Create T-MPLS EVC: Specific

...................................................................................................................................................................................................

Select folder Detail.

....................................................................................................................................................................................................................................
1350 OMS
26-42
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

Default values are OK.


...................................................................................................................................................................................................

Select folder Info. This folder houses only textual comments.


...................................................................................................................................................................................................

Select folder PM
Execute the suitable selections.
...................................................................................................................................................................................................

Select folder Miscellaneous.


Execute the suitable selections.
Click Next.
...................................................................................................................................................................................................

Select the node. Select the port.


Figure 26-43 Create T-MPLS EVC: Terminations Selection

....................................................................................................................................................................................................................................
1350 OMS
26-43
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select the second node and the port.


Figure 26-44 Terminations Selection

...................................................................................................................................................................................................

Termination Setting. It is the definition of the traffic flows.

....................................................................................................................................................................................................................................
1350 OMS
26-44
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

Click Traffic Descriptor button. Select the traffic descriptor from the selection box and
Click V-sign to confirm.
Note: Traffic Descriptor values (CIR, PIR,....) must be contained in the
corresponding values of the PW being associated.

....................................................................................................................................................................................................................................
1350 OMS
26-45
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

See TransportLlink selection phase of the EVC over T-MPLS tunnel create (this
procedure)
Figure 26-45 Termination Settings

...................................................................................................................................................................................................

10

Select policy mode. If you select color aware, you will select color profile

....................................................................................................................................................................................................................................
1350 OMS
26-46
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

Select classification priority-code0-7 / DSCP code 0-63


Select VLAN POP disabled
...................................................................................................................................................................................................

11

Folder Traffic Classifier deals on VLAN id


Folder Leaf Term deals on HSI
Folder Reuse Flows allows to copy and reuse flow characteristics.

....................................................................................................................................................................................................................................
1350 OMS
26-47
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12

Click Create.
Figure 26-46 Ingress flow create

....................................................................................................................................................................................................................................
1350 OMS
26-48
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13

You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
Figure 26-47 Ingress Flow: create monitoring

....................................................................................................................................................................................................................................
1350 OMS
26-49
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14

Select button Egress Flow, folder Push


Select:

Class of service (guaranteed/best effort/regulated)

If you select Clear all fields, subsequent fields can be ignored.

....................................................................................................................................................................................................................................
1350 OMS
26-50
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

VLAN ID. It is an additional ID added to the stack.


Priority Mode. If set to Color Aware fields Green Priority and Yellow Priority are

active.
Figure 26-48 Egress Flow: Push

....................................................................................................................................................................................................................................
1350 OMS
26-51
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

15

Click Create Egress


You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
Figure 26-49 Create Egress monitoring

....................................................................................................................................................................................................................................
1350 OMS
26-52
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

16

Select folder Spoke Transport Link selection


Figure 26-50 Spoke Transport Link selection

...................................................................................................................................................................................................

17

Select the other port (on TSS-146)

....................................................................................................................................................................................................................................
1350 OMS
26-53
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

All fields are already set with the selections made for the first port.
Select Create Ingress.
Figure 26-51 Create Ingress node A

....................................................................................................................................................................................................................................
1350 OMS
26-54
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

18

Select Create Egress.


Click Next button.
Figure 26-52 Create Egress node A

....................................................................................................................................................................................................................................
1350 OMS
26-55
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

19

Select the Pseudo Wire just created .


Figure 26-53 Select the transport link

...................................................................................................................................................................................................

20

Select EVC state (implemented).

....................................................................................................................................................................................................................................
1350 OMS
26-56
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

Click OK to confirm EVC creation.


Figure 26-54 T-MPLS EVC Allocate and Implement

E...................................................................................................................................................................................................
N D O F S T E P S
....................................................................................................................................................................................................................................
1350 OMS
26-57
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Verify creation of EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

Verify creation of EVC over T-MPLS 320-40


When to use

The scope of this procedure is to verify the creation of EVC over T-MPLS.
Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

From the main menu bar select Search > Packet > Services > T-MPLS > T-MPLS EVCs.
Figure 26-55 Search>Packet>Services>T-MPLS>T-MPLS EVCs

....................................................................................................................................................................................................................................
1350 OMS
26-58
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring


Create EVC over T-MPLS 320-40

Verify creation of EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The list of the T-MPLS EVCs is displayed.


Figure 26-56 T-MPLS EVCs

...................................................................................................................................................................................................

Allocate the EVC


Figure 26-57 Allocate the EVC

...................................................................................................................................................................................................

Implement the EVC


Figure 26-58 EVC implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
26-59
8DG42227DAAA 9.6
Issue 3 December 2012

TSS-320 versus TSS-40 with packet ring

Verify creation of EVC over T-MPLS 320-40

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
26-60
8DG42227DAAA 9.6
Issue 3 December 2012

27

Performance Monitoring
27

Overview
Purpose

This chapter provides the conceptual information and the associated tasks for the
Performance Monitoring management of the1350 OMS PKT application.
Contents
PM in EVC create

27-2

PM in EVC create

27-2

Performance Monitoring activate

27-7

PM activate

27-7

PM consistency
PM consistency
PM Reports create
PM Reports create
PM report generate
PM report generate

27-12
27-12
27-15
27-15
27-19
27-19

...................................................................................................................................................................................................................................
1350 OMS
27-1
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM in EVC create

PM in EVC create

....................................................................................................................................................................................................................................

PM in EVC create
PM in EVC create
When to use

The scope of this procedure is to set PM characteristics in the phase of EVC create.
Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.

....................................................................................................................................................................................................................................
1350 OMS
27-2
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM in EVC create

PM in EVC create

....................................................................................................................................................................................................................................

Task
...................................................................................................................................................................................................

During the EVC creation phase select PM folder on the creation window.
Figure 27-1 EVC definition: PM folder

...................................................................................................................................................................................................

You have to set:

....................................................................................................................................................................................................................................
1350 OMS
27-3
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM in EVC create

PM in EVC create

....................................................................................................................................................................................................................................

PM active or not
granularity (15 ', 24 h)
CSV reporting (typically 2 h)
policy, which deals on maintaining PM data (keep/Purge on stop/Purge on Delete/Not
meaningful)
Figure 27-2 EVC definition: PM policy

....................................................................................................................................................................................................................................
1350 OMS
27-4
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM in EVC create

PM in EVC create

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

When creating a measure, via Actions > Create Measure


Figure 27-3 Create Measure

....................................................................................................................................................................................................................................
1350 OMS
27-5
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM in EVC create

PM in EVC create

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Enter the following attributes:

measure name (userlabel) . The measure name can be modified only if the measure
status is PLANNED.
start/end time. If you do not specify start/end time, you can subsequently activate
manually the measure by means of the command Measure Start, otherwise the
Measure will be started at the Start Time and stopped at the Stop time.

granularity. The granularity is the monitoring frequency, i.e. the frequency of


historical data counters grouping. You can select:
24 hours . Data are grouped per day.
15 minutes. Data are grouped per quarter of hour.

flow (aggregate/flow/aggregate flow)


Automatic Purge of the Measure (TRUE/FALSE)
Purge State of the Measure (when stopped/when terminated)
Automatic deletion Hystorical Data (TRUE/FALSE)

...................................................................................................................................................................................................

Click on button OK to confirm the creation.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
27-6
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
Performance Monitoring activate

PM activate

....................................................................................................................................................................................................................................

Performance Monitoring activate


PM activate
When to use

The scope of this procedure is to activate PM.


Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

From the measure list issue Actions menu.


Figure 27-4 Measure: Actions menu options

....................................................................................................................................................................................................................................
1350 OMS
27-7
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
Performance Monitoring activate

PM activate

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the main menu bar the user can issue Search > PM > PM domains on NML.
Figure 27-5 Search>PM>PM domains

...................................................................................................................................................................................................

The list of the PM domains on NML is displayed.


Select Ethernet domain and issue the Search menu.
Figure 27-6 Ethernet domain: Search menu

....................................................................................................................................................................................................................................
1350 OMS
27-8
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
Performance Monitoring activate

PM activate

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The corresponding Actions menu is shown below.


Figure 27-7 Ethernet domain: Actions menu

...................................................................................................................................................................................................

You may select a PM transport and subsequently the Actions menu.


Figure 27-8 PM transport: Actions menu

....................................................................................................................................................................................................................................
1350 OMS
27-9
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
Performance Monitoring activate

PM activate

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

From the PM transport you can find the PM TP list.


Figure 27-9 PM TP list

...................................................................................................................................................................................................

Select a PMTP and issue Actions>Start TP


Figure 27-10 Start TP dialog box

....................................................................................................................................................................................................................................
1350 OMS
27-10
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
Performance Monitoring activate

PM activate

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Select a PMTP and issue Actions>Stop TP


Figure 27-11 Stop TP dialog box

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
27-11
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM consistency

PM consistency

....................................................................................................................................................................................................................................

PM consistency
PM consistency
When to use

The scope of this procedure is to execute consistency checks on PM data.


Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.

....................................................................................................................................................................................................................................
1350 OMS
27-12
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM consistency

PM consistency

....................................................................................................................................................................................................................................

Task
...................................................................................................................................................................................................

From the measure list select the measure and issue Actions>Measure consistency
Figure 27-12 Measure consistency

...................................................................................................................................................................................................

From the PM NE select Actions>Generate Audit


Figure 27-13 NE: Actions>Generate Audit

....................................................................................................................................................................................................................................
1350 OMS
27-13
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM consistency

PM consistency

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

The Generate Audit box allows to launch the operation.


Figure 27-14 Generate Audit

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
27-14
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM Reports create

PM Reports create

....................................................................................................................................................................................................................................

PM Reports create
PM Reports create
When to use

The scope of this procedure is to create PM Reports.


Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.

....................................................................................................................................................................................................................................
1350 OMS
27-15
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM Reports create

PM Reports create

....................................................................................................................................................................................................................................

Task
...................................................................................................................................................................................................

From the measure issue Actions>Create Report Profile.


Figure 27-15 Create Report Profile

....................................................................................................................................................................................................................................
1350 OMS
27-16
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM Reports create

PM Reports create

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

You can issue the correlation of the Measure with Report Profile.
Figure 27-16 Correlation Measure with Report Profile

....................................................................................................................................................................................................................................
1350 OMS
27-17
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM Reports create

PM Reports create

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

You can issue the uncorrelation of the Measure from Report Profile.
Figure 27-17 Uncorrelation Measure with Report Profile

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
27-18
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM report generate

Overview

....................................................................................................................................................................................................................................

PM report generate
PM report generate
When to use

The scope of this procedure is to generate PM Reports.


Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

From PM TP Actions menu you can select the generate of the suitable report.
Figure 27-18 PM TP Actions menu

....................................................................................................................................................................................................................................
1350 OMS
27-19
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM report generate

PM report generate

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

It is required to export TPs to CSV file.


Figure 27-19 Export TPs to CSV file

....................................................................................................................................................................................................................................
1350 OMS
27-20
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM report generate

PM report generate

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

You can generate Measure PM Report to CSV file.


Figure 27-20 Generate Measure PM Report to CSV file

....................................................................................................................................................................................................................................
1350 OMS
27-21
8DG42227DAAA 9.6
Issue 3 December 2012

Performance Monitoring
PM report generate

PM report generate

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Or generate PM tabular report.


Figure 27-21 Generate PM tabular report

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
27-22
8DG42227DAAA 9.6
Issue 3 December 2012

28

Enhanced Procedures
28

Overview
Purpose

This chapter provides collect procedures dedicated to specific purpose.


Contents
TSS 5 In Band Management

28-3

Overview

28-3

T-MPLS Subnetwork topology

28-4

In-band configuration

28-8

Resources reservation for In fiber Inband


Ethernet Linear Protection

28-11
28-16

Link Over EVC

28-18

Link over EVC: unlock EVC

28-20

Link over EVC creation

28-22

Link over EVC deletion

28-24

Link over EVC: Alarms

28-25

Link over EVC: OAM

28-26

Link over EVC: assign and deassign

28-27

Link over EVC: Transport Link configuration

28-28

Link over EVC: activation and deactivation

28-29

Link over EVC: Usage within an EVC

28-30

Link over EVC: AAR

28-31

Link over EVC: Routing Display

28-32

Link over EVC: Inventory

28-33

Ethernet Linear Protection (ELP)

28-34

Add protection to PB EVC

28-39

...................................................................................................................................................................................................................................
1350 OMS
28-1
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures

Overview

....................................................................................................................................................................................................................................

Remove protection from EVC

28-41

Configure protection

28-42

ELP Protection properties

28-43

Description of the properties

28-44

Send APS command to protection group

28-45

Manual alignment of protection group

28-47

Implement a protected EVC

28-48

Deimplement a protected EVC

28-49

Disabled operations

28-50

Alarm propagation for protected EVCs

28-51

OAM on protected EVC

28-52

Inventory of Transport Link from protected EVC

28-54

Inventory of MA from protected EVC

28-55

Routing Display of protected EVC

28-56

....................................................................................................................................................................................................................................
1350 OMS
28-2
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

Overview

....................................................................................................................................................................................................................................

TSS 5 In Band Management


Overview
About the in-band management

The equipment of the family TSS 320, 100 etc. are able to take in charge and manage
other devices (TSS-3, TSS-5 etc.) usually on the customer side.
The local management is made by DCN, in the case of remote devices the management is
implemented by reserving a channel on the fiber link. On the cable PKT realizes user
services that are added to the service reserved to the control.
Management systems such as PKT must take into account the resources already allocated
in the managing equipment during both the allocation of new resources for the user, but
especially during the reserve release.
In case of release of all the resources you should not put down the ports when the channel
management must remain active.
The ZIC configures the "IN BAND MANAGEMENT". The cable port is configured with
an IP address reserved for the equipment to manage (add route) and a VLAN = 4094
reserved for the management of the NE (VLAN-DCN). In the case of TSS-5, T-MPLS
management requires a structuring of the cable tunnel and the pseudowire. The PKT, to
learn about the resources allocated by the ZIC should do a Takeover that is not working
with TSS-5/T-MPLS. Therefore needs to be rebuilt in PKT "hand" made the management
structure and take it up with the ZIC Allocated in order to reserve resources at PKT. These
resources must be recognizable not be erased by the operator.

....................................................................................................................................................................................................................................
1350 OMS
28-3
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

T-MPLS Subnetwork topology

....................................................................................................................................................................................................................................

T-MPLS Subnetwork topology


Single T-MPLS sub-network

OMS uses the Router as a gateway (next hop) to manage the TSS nodes. A VSI is
configured on TSS-320 to transport the management traffic received from OMS (via
Router). The VSI consists of an incoming port from the Router, PWs connecting to the
remote TSS-5s, and a local interface to TSS-320.
Initially, when the OMS sends traffic towards TSS-5, the Router sends ARP request
towards TSS-320. The VSI on TSS-320 broadcasts this request over all ports/PWs of the
VSI. When the ARP response is received from TSS-5 the VSI learns the MAC address
over the PW and forwards it to the Router. The Router resolves the IP to MAC address of
TSS-5. All further traffic from the OMS (via Router) is sent with MAC address of TSS-5.
The VSI on TSS-320 forwards this traffic on a specific PW based on the destination MAC
address of the packet.
In this topology all IP addresses are on the same IP subnet.

....................................................................................................................................................................................................................................
1350 OMS
28-4
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

T-MPLS Subnetwork topology

....................................................................................................................................................................................................................................

Multiple T-MPLS subnetworks with separate physical connection

Each T-MPLS network has nodes in different IP subnetworks. For e.g. TSS-5 {a, b, and
c} are in a different subnetwork compared to TSS-5-{x, y, and z}.
A separate physical connection is provided from the Router to the TSS-320 for each
subnetwork.
The VSIs forward traffic similar to the single T-MPLS subnetwork topology.

....................................................................................................................................................................................................................................
1350 OMS
28-5
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

T-MPLS Subnetwork topology

....................................................................................................................................................................................................................................

Multiple T-MPLS subnetworks with single physical connection

Each T-MPLS network has nodes in different IP subnetworks. For e.g. TSS-5 {a, b, and
c} are in a different subnetwork compared to TSS-5- {x, y, and z}.
A single physical connection is provided from the Router the TSS-320 for each
subnetwork.
Outgoing traffic from the Router is tagged with a different VLAN for each IP subnetwork.
On the TSS-320, each VLANs traffic is associated with a different VSI.
The VSIs forward traffic similar to the single T-MPLS subnetwork topology.

....................................................................................................................................................................................................................................
1350 OMS
28-6
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

T-MPLS Subnetwork topology

....................................................................................................................................................................................................................................

Protection

In the protected solutions, the PW and the Tunnel may take an alternate path for
protection.

....................................................................................................................................................................................................................................
1350 OMS
28-7
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

In-band configuration

....................................................................................................................................................................................................................................

In-band configuration
Configuration Notes
Figure 28-1 TSS-5 interworking with TSS160/320

Configuration requirements

VLAN tag
The TSS5 requires a VLAN tag on management traffic. The router sends untagged
traffic. The TSS160/320 is not able to push a VLAN tag onto incoming traffic. As a
result there are 2 options:
1. Reconfigure router to insert a VLAN tag onto the port interfacing with the
Gateway TSS 160/320.
2. Insert another TSS5 between the router and the gateway. The VLNC4x will push a
VLAN on the incoming management traffic.

One T-MPLS tunnel required per TSS5 shelf. In addition, if protection is required, 1
protection tunnel per TSS5 is required.
For inband management of the TSS5s, the network (internal) IP address on the TSS5s
must be in the same subnet as the router. The serviceport (external) IP address must be
in a different subnet.

....................................................................................................................................................................................................................................
1350 OMS
28-8
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

In-band configuration

....................................................................................................................................................................................................................................

Inband management of both the VLNC4x and the VLNC6x requires only 1 tunnel.
However, 1 pseudo-wire (PW) is required for the VLNC4x and one PW for the
VLNC6x.
A transit T-MPLS tunnel is required on a node that is not terminating the given tunnel.
For instance, tunnel #3 is terminated on TSS5 #3. So TSS5 #1 and TSS5 #2 must have
a transit tunnel provisioned to forward the management traffic to TSS5 #3.

Tunnel and Pseudo-Wire Configuration

TSS5 T-MPLS Tunnel and Pseudo-Wire Configuration for Inband Management

The management tunnel depicted above is a terminated T-MPLS tunnel. The traffic
descriptor associated with the management tunnel, should have a CIR=PIR. This
value can be increased if necessary. The value for CBS and PBS can be any value.

The two tunnels depicted above are for management of both the VLNC4x and the
VLNC6x. PW #1 above is the PW for inband management of the VLNC4x. PW #2
above is the PW for inband management of the VLNC6x.
Port a-100 is an internal port on the VLNC4x. It is dedicated to inband management.
It is used as the UNI port for the PW #1. Port a-100 is used in R7.0.1 and above. In
release R7.0.0, the UNI port will be port a-60. Port d2-4 is the backplane port to the
VLNC6x. It is the UNI port for the PW #2.

Configuration details

Configuration via ZIC

A management VLAN must be chosen.


This management VLAN must be provisioned on each VLNC4x and on each
VLNC6x, in every TSS5 shelf:
System -> Configuration -> Service Network

Set Host-id and management VLAN.

For inband management to function for each VLNC4x:


create TUNNEL with the decided label.
create PW with decided label.

....................................................................................................................................................................................................................................
1350 OMS
28-9
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

In-band configuration

....................................................................................................................................................................................................................................

Apply TD with CIR= 10, PIR= 20, CBS= 15, PBS= 25 to tunnel e PW.
Create a null GUA Traffic Descriptor for ETS service.

Create VPWS, set name, set port a-100, associate PW and traffic descriptor
created before.(policing mode disable).
For inband management to function for each VLNC6x:
Set a VPWS service similar to the prior VPWS changing the port: d2-4.

....................................................................................................................................................................................................................................
1350 OMS
28-10
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

Resources reservation for In fiber Inband

....................................................................................................................................................................................................................................

Resources reservation for In fiber Inband


When to use

The procedure allocate in the PKT all the resources allocated in the NEs for the In fiber
InBand management.
Related information

For a description of in-band management, refer to Overview (p. 28-3).


For a network classification of in-band management, refer toT-MPLS Subnetwork
topology (p. 28-4).
For configuration requirements, refer toConfiguration Notes (p. 28-8).
For Tunnel and Pseudo-wire settings, refer toTunnel and Pseudo-Wire Configuration
(p. 28-9).
For a description of configuration steps, refer toConfiguration details (p. 28-9).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
Procedure

Following steps should be done to execute correctly the Takeover with online command:
From MS-GUI main window:
...................................................................................................................................................................................................

Search the physical connections setting characteristics.


Select Search > physical > physical connections.
Select the TSS-320 ->TSS-5 physical connection.
Result: Physical connection setting characteristics are shown
...................................................................................................................................................................................................

Search the TSS-5 setting characteristics.


Select Search > EML > NE.
Select the TSS5.
Select Search > NE > Show equipment.
In the ZIC window of the selected device:
Select System > Configuration > Network Connectivity to see VLAN ID, IP address,
Management Priority.

....................................................................................................................................................................................................................................
1350 OMS
28-11
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

Resources reservation for In fiber Inband

....................................................................................................................................................................................................................................

Select System > T-MPLS > Port summary to see information on T-MPLS Ports.
Select System > T-MPLS > Tunnel Management > Tunnel summary to view
transit/termination tunnel, in/out Labels, L2 Encapsulation profile, PHB profile.
Select System > T-MPLS > Quality Of Service to see Traffic Descriptor (CIR, PIR, PBS,
CBS).
Select System > Quality Of Service > ETS Flow > TD to see Traffic Descriptor of ETS
Flow Services.
Result: TSS-5 setting characteristics are shown.
...................................................................................................................................................................................................

Search the TSS-320 setting characteristics.


Select Search > EML > NE.
Select the TSS320.
Select Search > NE > Show equipment.
In the ZIC window of the selected device:
Select T-MPLS > Tunnel management, (filtered by), search.
In the list, select the Tunnel to see Traffic Descriptor, Label Identifiers.
Select T-MPLS > PW management, (filtered by), search.
In the list, select the Pseudo Wire to see Traffic Descriptor, Label Identifiers.
Select Communication > InFiber In Band Management, (Select Board), search, (Select
Port), Details to see VLAN ID label.
Result: TSS-320 setting characteristics are shown.
...................................................................................................................................................................................................

If not created,
Create one or more domains that corresponds to the scenario already acting in field : from
the Construction application
Select Action > Packet > Costruction > Create Domain.

....................................................................................................................................................................................................................................
1350 OMS
28-12
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

Resources reservation for In fiber Inband

....................................................................................................................................................................................................................................

Insert the User Label, Domain Type, Bridge Type and STP Type compliant with the
attributes already present.
Figure 28-2 Create Domain

Result: The list Domain window is shown with new Domain.


...................................................................................................................................................................................................

If not created,
Define the Network Elements to the PKT environment : from the Construction
application.
Select Action > Packet > Costruction > Define NE.

....................................................................................................................................................................................................................................
1350 OMS
28-13
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

Resources reservation for In fiber Inband

....................................................................................................................................................................................................................................

Insert the User Label, Working Mode and STP Type compliant with the attributes already
present.
Figure 28-3 Define NE

...................................................................................................................................................................................................

If not created,
Select the Network Elements to be added from the list, click the confirm button. The
Defined Network Element List updated. When the NEs are added, assign the resources
already present or create them.
Select Action > Packet > Costruction > Assign Resources to Domain.
Result: The list Network Element window is shown with new NE.
...................................................................................................................................................................................................

If the Customer is not created,


Select Action > Packet > Services > Create Customer.
Insert the informations compliant with the attributes already present.

....................................................................................................................................................................................................................................
1350 OMS
28-14
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
TSS 5 In Band Management

Resources reservation for In fiber Inband

....................................................................................................................................................................................................................................

Result: The Customer list is shown with new elements.


...................................................................................................................................................................................................

Create Traffic Descriptor that corresponds to the scenario already acting in field :
Select Action > Packet > Services > Create Traffic Descriptor.
...................................................................................................................................................................................................

Create Traffic Classifier that corresponds to the scenario already acting in field :
Select Action > Packet > Services > Create Traffic Classifier.
...................................................................................................................................................................................................

10

Create the Tunnel that corresponds to the scenario already acting in field :
Select Action > Packet > T-MPLS > Create T-MPLS Tunnel.
Insert the parameters compliant with the attributes already present.
Note: For the general settings, refer to T-MPLS tunnel create (p. 17-14).
Result: The tunnel list window is shown with new object.
...................................................................................................................................................................................................

11

Create the PseudoWire that corresponds to the scenario already acting in field :
Select Action > Packet > T-MPLS > Create T-MPLS Pseudo Wire.
Insert the parameters compliant with the attributes already present.
Note: For the general settings, refer to T-MPLS-Create PW (p. 17-21).
Result: The PW list window is shown with new object.
...................................................................................................................................................................................................

12

Create one or more EVC (with the Service in automatic mode) that corresponds to the
scenario already acting in field :
Select Action > Packet > Services > T-MPLS > Create T-MPLS EVC.
Insert the parameters compliant with the attributes already present.
Insert VLAN ID reserved for the management of the NE (Standard value is 4094).
Insert Service Type EVPLAN.
Note: For the general settings, refer to Create EVC over T-MPLS EVPLAN
(p. 17-72).
Result: The list EVC window is shown with new EVC.
...................................................................................................................................................................................................

13

Allocate the object related to the in band management.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-15
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures

Abbreviations

....................................................................................................................................................................................................................................

Ethernet Linear Protection


Overview
Purpose

ELP is a VLAN-based Ethernet Linear Protection based on ITU-T G.8031/Y.1342


(Ethernet Protection Switching).
Contents
Link Over EVC

28-18

Link over EVC: unlock EVC

28-20

Link over EVC creation

28-22

Link over EVC deletion

28-24

Link over EVC: Alarms

28-25

Link over EVC: OAM

28-26

Link over EVC: assign and deassign

28-27

Link over EVC: Transport Link configuration

28-28

Link over EVC: activation and deactivation

28-29

Link over EVC: Usage within an EVC

28-30

Link over EVC: AAR

28-31

Link over EVC: Routing Display

28-32

Link over EVC: Inventory

28-33

Ethernet Linear Protection (ELP)

28-34

Add protection to PB EVC

28-39

Remove protection from EVC

28-41

Configure protection

28-42

ELP Protection properties

28-43

Description of the properties

28-44

Send APS command to protection group

28-45

Manual alignment of protection group

28-47

Implement a protected EVC

28-48

Deimplement a protected EVC

28-49

Disabled operations

28-50

Alarm propagation for protected EVCs

28-51

OAM on protected EVC

28-52

....................................................................................................................................................................................................................................
1350 OMS
28-16
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Overview

....................................................................................................................................................................................................................................

Inventory of Transport Link from protected EVC

28-54

Inventory of MA from protected EVC

28-55

Routing Display of protected EVC

28-56

....................................................................................................................................................................................................................................
1350 OMS
28-17
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link Over EVC

....................................................................................................................................................................................................................................

Link Over EVC


Description

Link over EVC is lets a higher layer to use an EVC as an infrastructure.


In case of a single domain, Link over EVC is permit to manage scenarios otherwise
handled through E2E.
One EVC plus two Transport Links makes a Link over EVC
Since more than one EVC can coexist over the same Edge Port, the same Transport Link
can be used to form multiple Link over EVCs.
Edge Port is the extremity of one of the interworking links added to the EVC to obtain the
Link over EVC.
Only the case of Link over EVC built over T-MPLS EVCs and assigned to Provider
Bridge domain is considered here.
Once an EVC has been used to form a Link over EVC, it is locked and can't be modified.
It is marked for infrastructure
The created Link over EVC is visible in its own list in construction and can be used, for
the most part, as a normal link and assigned to a Domain in which it will be used to build
EVCs.
Involved objects

A Link over EVC is composed by an EVC and two interworking links are required.
The system checks that:

the EVC is not used to form another Link over EVC


there exist two Transport Links that are connected to the two extremities of the EVC
the two Transport Links have the same Technology. The technology can be either
SDH, Cable, VCG LAG or LAG
in case of Transport Links with SDH or VCG LAG Technology, both links have the
same Protocol Type (either GFP, LAPS or HDLC);
both links are bi-directional (no unidirectional links allowed)
the extremities of the two links that are not UNI for the EVC (the extremities are not
extremities of the Link over EVC):
the extremities:
they are not assigned to any domain
they are not both belonging to ENEs (at most one extremity of the Link over EVC
may belong to an ENE)

Bandwidth usage

The bandwidth used on the lower layer EVCs is allocated on the ports where they have
their termination, i.e. the internal ports of the interworking links.
....................................................................................................................................................................................................................................
1350 OMS
28-18
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link Over EVC

....................................................................................................................................................................................................................................

On the external ports of the interworking links, only the bandwidth of the created Links
over EVC is allocated (in the above figure you can see that of the 3 Mb/s allocated on the
internal ports, only 2 Mb/s are allocated on the external ports, because one of the EVCs
has not been used to form a Link over EVC).
The Link over EVC has its own bandwidth and, on it, it is allocated the bandwidth used
by higher layer EVCs that use that Link over EVC.
A check of the available bandwidth is performed on the two Transport Links that have
been identified during previous checks. Since those Transport Links will be, together with
the specified EVC, the infrastructure of the Link over EVC to be created, the bandwidth
of the Link over EVC will consume the bandwidth of the Transport Links and, hence,
both Transport Links must have enough free bandwidth to host the Link over EVC.
Both Transport Links must have a capacity of at least the PIR of the EVC and they must
have an available bandwidth of at least the CIR of the EVC.
for each Transport Link:

Egress Shaping Rate of external port >= PIR of EVC

Available Bandwidth of external port >= CIR of EVC


Note: external port is the port of the Transport Link that is not a UNI for the EVC
Available Bandwidth = Egress Shaping Rate - sum of CIR .

sum of CIR is the sum of the CIR of all the Links over EVC terminated by that
port.

....................................................................................................................................................................................................................................
1350 OMS
28-19
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: unlock EVC

....................................................................................................................................................................................................................................

Link over EVC: unlock EVC


When to use

The operator un-marks an EVC as an infrastructure thus preventing it to be used to form a


Link over EVC.
Related Information

For more information, refer to Link Over EVC (p. 28-18).


Unlock EVC operation is only provided to work-around rare emergency situations where
there exists an EVC that is marked to be used for infrastructure (locked) but it's not used
for a Link over EVC and the operator does not want to use it to form a Link over EVC.
Lock EVC is not a user operation. It is accomplished when an EVC is used to form a Link
over EVC.
Lock EVC prevents the following operation on the locked EVC.

provisioning state changes (de-implementation)


topology changes (add/remove termination, add/remove flow)

modification (modify EVC, modify Termination, modify Flow)


configuration (configure EVC, configure Termination, configure Flow)
modification/configuration of any object used by the EVC (configuration of Edge
Ports, configuration of Transport Links)

join of a E2E EVC

Any operation that does not modify the EVC can be performed on it (list, properties,
navigations from/to other objects, etc.).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select a locked EVC.


...................................................................................................................................................................................................

Select Action > Un-Lock.

....................................................................................................................................................................................................................................
1350 OMS
28-20
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: unlock EVC

....................................................................................................................................................................................................................................

Result: The system checks that the EVC is not used to form any Link over EVC and
un-marks (unlocks) the EVC.

If the EVC is used in aLink over EVC, the operation is rejected.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-21
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC creation

....................................................................................................................................................................................................................................

Link over EVC creation


When to use

The function creates a Link over EVC.


Related Information

For more information, refer to Link Over EVC (p. 28-18).


To create a Link over EVC, an EVC and two interworking links are required. See
Involved objects (p. 28-18)
A check of the available bandwidth is performed on the two involved Transport Links.
Both Transport Links must have a capacity of at least the PIR of the EVC and they must
have an available bandwidth of at least the CIR of the EVC. See Bandwidth usage
(p. 28-18)
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Action > Packet > Construction > Create Link Over EVC.
...................................................................................................................................................................................................

The operator specifies:

EVC

userlabel

comment (optional)
Result: The system locks the EVC as exported for infrastructure.

The system locks the two involved interworking Links.


Link over EVC has the following characteristics:
the userlabel provided by the operator

the commentprovided by the operator

the CIR of the specified EVC

....................................................................................................................................................................................................................................
1350 OMS
28-22
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC creation

....................................................................................................................................................................................................................................

the PIR of the specified EVC


the extremities of the two interworking Transport Links that are not connected to
the two extremities of the EVC

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-23
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC deletion

....................................................................................................................................................................................................................................

Link over EVC deletion


When to use

The function deletes a Link over EVC.


Related Information

For more information, refer to Link Over EVC (p. 28-18).


If not assigned to any Domain, a Link over EVC can be deleted.
Link over EVC is not assigned when:

if this was the last/only Link over EVC the two interworking Transport Links were
part of, the latter are no more locked and can be freely operated
the operation of un-export is invoked for the EVC

As result of a deletion, the Link over EVC is decomposed to an EVC and two
interworking Links.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select Search > Packet > Construction > Link Over EVC.
...................................................................................................................................................................................................

Select a Link over EVC and select Action > Delete.


Result: The system un-locks the EVC.

The system un-locks the two involved interworking Links.


If the un-export of the EVC fails, the Link over EVC is anyway deleted and an error is
reported to the operator, warning him/her that the involved EVC is yet marked and
that the should be manually invoked to unmark it. See Link over EVC: unlock EVC
(p. 28-20)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-24
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: Alarms

....................................................................................................................................................................................................................................

Link over EVC: Alarms


Alarms on the interworking Transport Links

Alarms on the interworking Transport Links or on the EVC are propagated to the Link
over EVC. Alarms on the Link over EVC are propagated normally.
The Link over EVC introduces a couple correlation kinds:

whenever the EVC is alarmed the Link over EVC is alarmed too
whenever one interworking Transport Link is alarmed the Link over EVC is alarmed
too

In addition, since the Link over EVC is a link, alarms on it must be propagated to other
kinds of link

....................................................................................................................................................................................................................................
1350 OMS
28-25
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: OAM

....................................................................................................................................................................................................................................

Link over EVC: OAM


OAM over link and OAM over EVC

OAM over link has limitations if applied to the Link over EVC. OAM is not allowed
OAM on the Link over EVC
OAM over EVC is handled normally if applied to an EVC that uses the Link over EVC.
On the higher level EVC(s) that use the Link over EVC, no MIPs are create within the
Link over EVC (only at its extremity). .The Link over EVC must be considered a link
from all points of view.

....................................................................................................................................................................................................................................
1350 OMS
28-26
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: assign and deassign

....................................................................................................................................................................................................................................

Link over EVC: assign and deassign


Assign Link over EVC to Domain

Being the Link over EVC a link from most points of view, it must be possible to assign it
to a Domain.
The only kind of Domain allowed to accept such a link is Provider Bridge.
As for any other link kind, whenever a Link over EVC is assigned to a Domain, the
system must check that the extremities of the link reside on two NEs that have a Working
Mode compatible with the chosen Domain.
The main difference in respect to another link kind is that the first Link over EVC to be
assigned to a Domain causes all the other Links over EVC that are made with one or both
of its interworking links, to be assigned to the same Domain (this is in order to prevent
that the same real port is assigned to two different domains).
If, for a mistake of the operator, a Link over EVC "LEVC1" is made by an interworking
Transport Link "Link1", that is part of another Link over EVC assigned to Domain
"PB1", and by an interworking Transport Link "Link2", that is part of another Link over
EVC assigned to Domain "PB2", this means that "LEVC1" can't be assigned to any
domain at all.
Once a Link over EVC is assigned to a Domain, the usual mechanics of the used
bandwidth management apply to its (virtual not real) extremities.
Refer to the general function to assign a resource to a domain.
Deassign Link over EVC from Domain

If not already used by an EVC, a Link over EVC assigned to a (Provider Bridge) Domain
can be de-assigned from it by the operator (as for other kinds of link).
To move a Link over EVC from a Domain to another, all the Links over EVC that share
with the former at least one interworking Transport Link, needs not to be assigned to any
Domain (i.e. any of those Links over EVC must be de-assigned from the Domain it
belongs to).
The procedure to move a Link over EVC from a Domain to another is:
1. De-assign the Link over EVC (LOE1) from its Domain (DOM1)
2. De-assign from DOM1 any Link over EVC sharing at least one interworking
Transport Link with LOE1. Any Link over EVC that shares an interworking TL with
LOE1 either is assigned to DOM1 or not assigned to any Domain.
3. Assign LOE1 to the new Domain (DOM2)
Refer to the general function to deassign a resource from a domain.

....................................................................................................................................................................................................................................
1350 OMS
28-27
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: Transport Link configuration

....................................................................................................................................................................................................................................

Link over EVC: Transport Link configuration


Limitations

The configuration of the extremities of the Link over EVC, from a bridge perspective, is
subject to limitations in its applicability.
The Link over EVC extremities are not real interfaces in the NE, rather they are virtual
ports internally created by PKT.
This means, among other things, that when the operator requests the configuration of a
Link over EVC, he is warned by the system that the configuration will affect all the Links
over EVC that shares the same interworking Transport Links.
In addition, the system will prevent the operator to configure a Link over EVC if it shares
only one interworking Transport Link with another Link over EVC (because this would
cause the other Link over EVC to have its extremities misaligned).
From a bridge perspective, it is possible to configure only the extremities of a Link over
EVC, also because the interworking links which make part of it do not belong to any
bridge Domain (hence they could not be configured in a bridge perspective) and, in
addition, have two extremities that have different Client Types.
As for other bridge Transport Links the configurable attributes are:

Acceptable Frame Type


P-VID
Ingress Filtering

VLAN Type
Default User Priority
Priority Bit Mapping
PCP

Refer to the general function to configure a transport link.

....................................................................................................................................................................................................................................
1350 OMS
28-28
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: activation and deactivation

....................................................................................................................................................................................................................................

Link over EVC: activation and deactivation


The activation of the extremities

The activation of the extremities of the Link over EVC is subject to limitations in its
applicability.
The Link over EVC extremities are not real interfaces in the NE, rather they are virtual
ports internally created by PKT.
This means that when the operator requests the activation of a Link over EVC, he is
warned by the system that the activation will affect all the Links over EVC that shares the
same interworking Transport Links.
If the activation is in the scope of the implementation of an EVC that uses the Link over
EVC, the operator is not warned.
The deactivation of the extremities

The deactivation of the extremities of the Link over EVC is subject to limitations in its
applicability.
The Link over EVC extremities are not real interfaces in the NE, rather they are virtual
ports internally created by PKT.
This means, among other things, that when the operator requests the deactivation of a
Link over EVC, he is warned by the system that the deactivation will affect all the Links
over EVC that shares the same interworking Transport Links.
If the deactivation is in the scope of the de-implementation of an EVC that uses the Link
over EVC, the operation is not performed at all if there's another Link over EVC with the
same interworking Transport Links and that is used by an EVC that is at least partially
implemented.

....................................................................................................................................................................................................................................
1350 OMS
28-29
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: Usage within an EVC

....................................................................................................................................................................................................................................

Link over EVC: Usage within an EVC


Work around

There are limitations to be worked around in order to make correctly interact the Link
over EVC with STP.
The capability of the Link over EVC to correctly interact with (i.e. let pass through) the
BPDU of the xSTP protocol used by the higher level EVC, depends on how the
underlying EVC is made.

capability of the inner EVC to encapsulate the BPDU and transport them;
frames allowed to transit into the inner EVC.

A T-MPLS EVC complies with 1), but the compliancy with 2) depends on the TCs
present in the EVC Terminations of the inner EVC.
This means, for example, that an EVC with a set of TCs that makes only pass frames with
VIDs in the range 10-100, will never be able to make STP/RSTP BPDUs to pass (they are
untagged...).
In this case the operator can approach this problem in different ways:

use the Link over EVC only in domains with STP Type = None/Disabled;
configure the extremities of the Link over EVC to have Forced Port State =
Forwarding;

have the Link over EVC accept any kind of frame (Default TC = Don't Care);
create a second Link over EVC used only for BPDU to pass.

....................................................................................................................................................................................................................................
1350 OMS
28-30
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: AAR

....................................................................................................................................................................................................................................

Link over EVC: AAR


AAR

The Link over EVC extremities are not real interfaces in the NE, rather they are virtual
ports internally created by PKT.
For this reason, in the scope of AAR, they are not considered at all.
This means that AAR will be performed, instead, on the real ports that support the virtual
extremities.

....................................................................................................................................................................................................................................
1350 OMS
28-31
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: Routing Display

....................................................................................................................................................................................................................................

Link over EVC: Routing Display


Routing Display

The routing display of the Link over EVC shows its components (interworking TLs +
EVC)
The routing display of the Link over EVC shows its three components, i.e. the two
interworking Transport Links and the EVC.
It is possible to navigate from the EVC to the routing display of the EVC itself.

....................................................................................................................................................................................................................................
1350 OMS
28-32
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Link over EVC: Inventory

....................................................................................................................................................................................................................................

Link over EVC: Inventory


EVC to Link over EVC

Starting from an EVC marked "for infrastructure" navigates to the Link over EVC built
on it.
Link over EVC to EVC

Starting from a Link over EVC navigates to the EVC marked "for infrastructure" that
makes part of it.
Link over EVC to Transport Link

Starting from a Link over EVC shows the list of Transport Links that support it. The list
shows two Transport Links.
Transport Link to Link over EVC

Starting from a Transport Link shows the list of Links over EVC that are supported by it.

....................................................................................................................................................................................................................................
1350 OMS
28-33
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Ethernet Linear Protection (ELP)

....................................................................................................................................................................................................................................

Ethernet Linear Protection (ELP)


Description

TSS-3 R2.2 introduces a VLAN-based Ethernet Linear Protection based on ITU-T


G.8031/Y.1342 (Ethernet Protection Switching).
Albeit the ITU standard foresees a number of different protection schemes, PKT is going
to support only bidirectional 1:1 linear protection (the only one supported by TSS-3).
Ethernet Linear Protection (ELP) applies to Virtual Bridge and Provider Bridge EVCs.
This specification is going to focus on the Provider Bridge case (even if most of what is
said is applicable to the Virtual Bridge case too).
The protection is linear and, hence, only applies to linear connectivity, i.e. EVCs with
a linear route.
In short, ELP aims to provide an alternative route to the traffic of an EVC, so that, if
there's a failure on the main route, the traffic is switched on the other route quickly and
with minimal impacts.
In order to achieve this, the following elements are needed:

a linear connectivity to protect (i.e. a Virtual or Provider Bridge EVC);


an alternate route;
one MA running on the route to protect (using Down MEPs, of course);

one MA running on the alternate route (using Down MEPs, of course);


a Protection Group that associates the main and the alternate route and that manages
the protection switch.

Whenever on the main route there's a failure that prevents traffic, the failure is detected
by OAM CC and the Protection Group performs the switch on the alternate route.
Independently from the protection, the EVC as a whole can be monitored by an OAM CC
through a MA.
ITU-T G.8031/Y.1342 is a VLAN based protection, this means that what is protected is
the VLAN used as a transport for the frames (i.e. the S-VID in the Provider Bridge case).
The EVC to protect has it's S-VID distributed over its data plane, in addition, the alternate
route must have the protecting S-VID distributed all over the ports that belongs to it.
The protecting S-VID can be the same S-VID of the EVC or a different one depending on
what supported by the involved NEs (e.g. TSS-3 R2.2 only supports different VIDs).
Since STP and EPL conflicts, when EPL is used no STI must be running on the involved
ports. This means either that STP is disabled on the involved NEs (STP Type =
None/Disabled) or that STP Force Port State is "Forwarding" for the involved ports.
As a consequence, the routes of the involved EVC must be fully linear, with no cycles,
nor branches inside (otherwise, without STP, traffic would multiply until fully fill the
transport links capacity).
....................................................................................................................................................................................................................................
1350 OMS
28-34
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Ethernet Linear Protection (ELP)

....................................................................................................................................................................................................................................

This specification has been developed with in mind the T-MPLS protection (tunnel
protection). Since the differences of the two cases (the EVC is an object conceptually
very different than the Tunnel), it has not always been possible to stick to the same
approach.
Even if it could already be obvious (or it will be obvious in the following), it's worth to
specify now that ELP only applies to EVCs with VLAN Distribution = Not Full Meshed.
The T-MPLS approach: why we can't follow it completely

In the T-MPLS approach, when we have a Tunnel to protect, we are able to create another
Tunnel and associate the two under a Protection Group, so that the first Tunnel is the
working one and the second Tunnel is the protecting one.
As a first try, an identical approach based on having a working EVC and a protecting
EVC was firstly analyzed and, after some reasoning, discarded because, in reality, the
"protecting EVC" is not an EVC at all (it has no EVC Terminations), but simply an
alternate route, a protecting data plane.
We discovered that modeling the alternate route as an EVC (which isn't) brings a lot of
conceptual and practical problems that made us discard it.
The proper way to model a protected EVC is to have one EVC and two data planes:
We found a couple of approaches to achieve this kind of model.
Link over EVC and Protecting Data Plane

The approach hereby described consists in having the direct creation of the data plane
(that in the case of EVC Fragment is not a big issue) while removing the need for E2E (so
that we can safely ignore the E2E issues we would have with this approach).
We need two things:

1. direct creation of protecting data plane within the Add Protection operation;
2. link over EVC.

Direct creation of protecting data plane

A new operation "Add Protection" is available to the operator that, through it, is able to
add a "Protecting Data Plane" to an existing EVC. The Protecting Data Plane is specified
in Add Protection by passing a number of Transport Links and, optionally, one or two
E-NNI port(s).
Even if the Protection Group must be provisioned to the involved NEs, it's not needed to
make it a distinct object at PKT level: it could just be a set of properties that are
visible/enabled when the EVC is under protection.
Link over EVC over T-MPLS

This feature is already described by its own set of RATS.

....................................................................................................................................................................................................................................
1350 OMS
28-35
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Ethernet Linear Protection (ELP)

....................................................................................................................................................................................................................................

Pros and cons

Pros:

there exist only a single EVC with two data planes;

there is clear distinction between the working route, the protecting route and the
protected EVC;
alarm correlation works on a single EVC (it could be feasible to allow alarm
correlation only if the EVC is under OAM CC);
only one domain in most cases -> no E2E

in case of single link EVC, an even simpler procedure (and with minimal
development effort) could be used

Cons:

a new entity is introduced (even if it's only a "sub object" of the EVC) and operations
are needed to manage it, alternatively, if few operations are provided to the operator to
manage it, it will be difficult for him to handle this kind of object;
effort to realize Link over EVC
impacts caused by Link over EVC
this approach was designed to avoid E2E, if E2E is needed despite the link over EVC,
creating a Protecting Data Plane for an E2E EVC can be not trivial for the operator
and difficult to understand/manage (it seems also a problem from the development
point of view)

EVC attributes to support ELP

New attributes are added to the EVC in order to support ELP. These new attributes are
meaningful only for protected EVCs.
Notice that, while Protection is always meaningful, when Protection is no all the other
attributes are not meaningful.
Table 28-1

EVC attributes for ELP

Attribute
name

Attribute type

Default

Master

Protection

{yes, no}

no

PKT

NE object
name
(SNMP)

Whether the EVC is protected or not


Revertive

{yes, no}

yes

PKT

opticsIMEthLinearPGType

Whether traffic switches back after recovery of working resource

....................................................................................................................................................................................................................................
1350 OMS
28-36
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Ethernet Linear Protection (ELP)

....................................................................................................................................................................................................................................

Table 28-1

EVC attributes for ELP

(continued)

Attribute
name

Attribute type

Default

Master

NE object
name
(SNMP)

Revert
time

0, ..., 12 min

5 min

PKT

opticsIMEthLinearPGWTR

Time before switching back (meaningful only in case of revertive protection)


Holdoff
time

0, 100, 200 10000 ms

0 ms

PKT

opticsIMEthLinearPGHoldoff

working

NE

opticsIMEthLinearPGProtectingActive

Hold off time before switching


Active

{working, protecting}

Current switch position (i.e. which data plane is carrying traffic)


Current
request

{No Request (Working Active), No Request


(Protection Active), Lockout, Forced Switch,
Signal Fail - W, Signal Fail - P, Manual Switch
(Protection/Active), Wait-to-Restore,
Do-not-Revert, FOP, Manual Switch (Working
Active), Exercise (Working Active), Exercise
(Protection Active), Reverse Request (Working
Active), Reverse Request (Protection Active)}

No
Request
(Working
Active)

NE

opticsIMEthLinearPGProtectionstatus

Last APS command executed for the protection group


Pending
request

{none, Pending Signal Fail}

none

NE

opticsIMEthLinearPGPendingRequest

The pending APS command that will executed when current request clears (i.e. it tells whether
there's a lower priority automatic switch request blocked by a higher priority manual request)
APS
Priority

0, ..., 7

PKT

opticsIMEthLinearPGAPSPriority

Priority of ethernet frames with ETH-APS information (default value (7) is the highest priority)

....................................................................................................................................................................................................................................
1350 OMS
28-37
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Ethernet Linear Protection (ELP)

....................................................................................................................................................................................................................................

Protect an EVC

Protection is applied to an EVC under the following conditions:

the EVC has VLAN Distribution = Not Full Meshed;

the EVC is not already protected;


the values specified for the attributes of the protection are valid;
the S-VID for the Protecting Data Plane is different than the S-VID of the EVC;

the EVC is linear.


the EVC is linear when (the following conditions imply that the EVC is at least
allocated):

it has its EVC Terminations in exactly two NEs (i.e. it has at least two EVC
Terminations in two different NEs, but there can be more than two EVC
Terminations as long as the involved NEs are no more than two);
it has a data plane (which is going to become the Working Data Plane) that is
linear, i.e. it's and end-to-end chain of Transport Links from an extremity NE
(i.e. a NE where an EVC Termination is) to the other;
the specified Protecting Data Plane is linear and has the same extremities of the
Working Data Plane, i.e. it's and end-to-end chain of Transport Links from an
extremity NE (i.e. a NE where an EVC Termination is) to the other;
the involved Domain has STP Type = None/Disabled or all the involved ports have
Forced Port State = Forwarding;
the NEs at the extremities support Ethernet Linear Protection.

Unprotect an EVC

The system does the following:

if the EVC is Implemented or Partially Implemented,


un-provisions the protection from the involved NEs:

un-provisions the Protection Group;


un-provisions the two involved MAs;
un-provisions the Protecting Data Plane;
any failure during this phase ends the procedure leaving the EVC with
Provisioning State = Partially Implemented and Protection = Yes

if the un-provisioning has been successful or if the EVC is Allocated:


removes the Protection Group;
removes the two involved MAs;

removes the Protecting Data Plane;


any failure during this phase causes a rollback and exits with the EVC in the same
state it was before this phase.

....................................................................................................................................................................................................................................
1350 OMS
28-38
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Add protection to PB EVC

....................................................................................................................................................................................................................................

Add protection to PB EVC


When to use

The operator is able to turn an unprotected EVC into a protected one.


Related Information

The operator is able to turn an existing unprotected EVC into a protected one, by
specifying the S-VLAN to be used for the protection and the route of the protection.
The "Add protection" command is only enabled/visible for those EVCs with Protection =
no.
For more information, refer to Ethernet Linear Protection (ELP) (p. 28-34).
For more information, refer to Protect an EVC (p. 28-38).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select a S-VID for the Protecting Data Plane.


...................................................................................................................................................................................................

Select the route of the Protecting Data Plane as a list of Transport Links.
...................................................................................................................................................................................................

(see EVC attributes to support ELP (p. 28-36) for ELP attributes of the EVC, for the
meaning of each attribute, the allowed values and the default values)
Select the attributes of the protection

Revertive

Revert time (meaningful only if Revertive is "yes")


Hold-off time
APS priority

....................................................................................................................................................................................................................................
1350 OMS
28-39
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Add protection to PB EVC

....................................................................................................................................................................................................................................

Result: Once all the checks are passed: the protection is added to the EVC only in the
PKT DB.

the Protecting Data Plane is added to the EVC;


two MAs are created, one for each data plane, with each MA having two Down
MEPs (one Down MEP for each extremity of the associated data plane);

a Protection Group is created with two Protection Units:


the one with Working Role associated to the Working Data Plane and to the
Working MA;
the one with Protecting Role associated to the Protecting Data Plane and to the
Protecting MA;

the EVC's Protection attribute is set to "yes";


if anything goes wrong during this phase, a rollback is done and the state of the
EVC remains unchanged;

if the EVC is Implemented the protection is provisioned to the involved NEs:


the Protecting Data Plane is provisioned;

the two MAs are provisioned and OAM CC is enabled on them;


the Protectiong Group is provisioned;
if at any step there's a failure the EVC becomes Partially Implemented and the
procedure ends.

if the STP Type of the Domain is not None/Disabled, all the ports in the data planes of
the EVC have their Forced Port State locked on Forwarding (i.e. that attribute can't be
configured for those ports).
In the above procedure, any failure during the provisioning of any element needed for
the protection (Protecting Data Plane, OAM objects, Protection Group) causes the
EVC to become Partially Implemented and stops the procedure but always exits with
a protected EVC (although not fully implemented in some cases) .
,whenever a failure occurs during the provisioning phase, at the end the EVC is
Partially Implemented and has Protection = yes.
...................................................................................................................................................................................................

If, after an Add Protection, an EVC that initially was Implemented becomes Partially
Implemented, the operator can recover the situation in one of these three ways:

de-implement the EVC and obtain an allocated protected EVC (then it's possible to
continue by re-trying the implementation of the EVC or removing the protection);
remove the protection from the EVC, thus obtaining (in case of success) an
implemented unprotected EVC (if successful the EVC could yet remain in Partially
Implemented state and it could be necessary to implement it to update its Provisioning
State);
implement the EVC, thus obtaining (in case of success) an implemented protected
EVC.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-40
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Remove protection from EVC

....................................................................................................................................................................................................................................

Remove protection from EVC


When to use

The operator is able to turn a protected EVC into an unprotected one.


Related Information

The operator specifies the protected EVC from which the protection must be removed.
The "Removed protection" command is only enabled/visible for those EVCs with
Protection = yes.
For more information, refer to Ethernet Linear Protection (ELP) (p. 28-34).
For more information, refer to Unprotect an EVC (p. 28-38).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

List the EVC


...................................................................................................................................................................................................

Select the protected EVC, select Remove protection


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-41
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Configure protection

....................................................................................................................................................................................................................................

Configure protection
When to use

This function configures the attributes of the Protection Group.


Related Information

For more information, refer to Ethernet Linear Protection (ELP) (p. 28-34).
For more information, refer to EVC attributes to support ELP (p. 28-36).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select a Protected EVC.


...................................................................................................................................................................................................

(see EVC attributes to support ELP (p. 28-36) for ELP attributes of the EVC, for the
meaning of each attribute, the allowed values and the default values)
Modify the attributes of the protection:

Revertive
Revert time (meaningful only if Revertive is "yes")
Hold-off time

APS priority
Result: Attributes are modified.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-42
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

ELP Protection properties

....................................................................................................................................................................................................................................

ELP Protection properties


When to use

The protection-specific attributes of the EVC are shown in a dedicate tab of the properties
window.
Related Information

For more information, refer to Ethernet Linear Protection (ELP) (p. 28-34).
For more information, refer to EVC attributes to support ELP (p. 28-36).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select a Protected EVC.


...................................................................................................................................................................................................

Select one item in the list. Select Search > Properties.


Result: The Property window is displayed.

See the following topic in this document: Description of the properties (p. 28-44)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-43
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Description of the properties

....................................................................................................................................................................................................................................

Description of the properties


Attributes specific for ELP

The attributes displayed are:

Protection (no, yes).Whether the EVC is protected or not

Revertive (yes, no).Whether traffic switches back after recovery of working resource.

Revert time (from 0 to 12 min; default: 5).Time before switching back (meaningful

only in case of revertive protection)


Hold-off time (0, 100, 200 10000 ms; default: 0). Hold off time before switching
Active (working, protecting).Current switch position (i.e. which data plane is
carrying traffic)
Current request (No Request (Working Active), No Request (Protection Active),
Lockout, Forced Switch, Signal Fail - W, Signal Fail - P, Manual Switch
(Protection/Active), Wait-to-Restore, Do-not-Revert, FOP, Manual Switch
(Working Active), Exercise (Working Active), Exercise (Protection Active),
Reverse Request (Working Active), Reverse Request (Protection Active)). Last
APS command executed for the protection group
Pending request (none, Pending, Signal Fail).
APS Priority (from 0 to 7; default: 7). Priority of ethernet frames with ETH-APS

information.

....................................................................................................................................................................................................................................
1350 OMS
28-44
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Send APS command to protection group

....................................................................................................................................................................................................................................

Send APS command to protection group


When to use

The operator is able to send APS commands to the NE.


Related Information

The operator is able to send APS commands to the NE, so to affect the selection of the
active data plane.
For more information, refer to Ethernet Linear Protection (ELP) (p. 28-34).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select a Protected and Implemented EVC.


...................................................................................................................................................................................................

Select the send APS command.


Chose one of the following commands:

Clear (default value); to clear any initiated command

Lockout of Protection (LO); to fix the selector position to the working connection

Forced Switch (FS); for working connection: switches the selector from the working

connection to the protection connection (unless a higher priority switch request (i.e.,
LO) is in effect)
Manual Switch (MS); for working connection: switches the selector from the working
connection to the protection connection (unless an equal or higher priority switch
request (i.e., LO, FS, SF or MS) is in effect)
Manual Switch (MS-W); for protection connection: switches the selector from the
protection connection to the working connection (unless an equal or higher priority
switch request (i.e., LO, FS, SF, MS, MS-W) is in effect);
Exercise (EXER); tests if the APS communication is operating correctly, and does not
modify the selector
Note: Freeze, Clear Freeze, Lockout and Clear Lockout have been excluded because
not supported by our NEs.

....................................................................................................................................................................................................................................
1350 OMS
28-45
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Send APS command to protection group

....................................................................................................................................................................................................................................

Result: The system checks that the specified EVC is protected and implemented and
then sends the command to one of the two NEs at the extremities of the EVC. If one
of the two NEs is an ENE, the provisioning is mandatory in the other NE.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-46
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Manual alignment of protection group

....................................................................................................................................................................................................................................

Manual alignment of protection group


When to use

The operator is able to manually align the NE mastered attributed of the Protection
Group/Protection Units.
Related Information

An alignment operation is available to the operator to manually align the NE mastered


attributed of the Protection Group/Protection Units. Manual alignment is useful in case
automatic alignment fails for various reasons (NE isolation, crash of EoT BB or
Adaptation BB, etc.).
For more information, refer to Ethernet Linear Protection (ELP) (p. 28-34).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select a Protected and Implemented EVC.


...................................................................................................................................................................................................

Select the Switch command synchronization command.


Result: The system uploads the PG/PUs attributes from one of the involved NEs and

refreshes the GUI.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-47
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Implement a protected EVC

....................................................................................................................................................................................................................................

Implement a protected EVC


When to use

The operator is able to implement a protected EVC.


Related Information

The implementation of a protected EVC, in addition to what is done for un-protected


EVCs, involves the provisioning of the protecting Data Plane, the two MAs for the
working and protecting Data Planes and the provisioning of the Protection Group.
For more information, refer to Ethernet Linear Protection (ELP) (p. 28-34).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select a Protected EVC.


...................................................................................................................................................................................................

Select the Implement command.


Result: The EVC is in implemented state.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-48
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Deimplement a protected EVC

....................................................................................................................................................................................................................................

Deimplement a protected EVC


When to use

The operator is able to deimplement a protected EVC.


Related Information

The de-implementation of a protected EVC, in addition to what is done for un-protected


EVCs, involves the un-provisioning of the Protection Group, of the two MAs for the
working and protecting Data Planes and of the protecting Data Plane.
For more information, refer to Ethernet Linear Protection (ELP) (p. 28-34).
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select a Protected and Implemented EVC.


...................................................................................................................................................................................................

Select the Deimplement command.


Result: The EVC is in allocated state .
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-49
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Disabled operations

....................................................................................................................................................................................................................................

Disabled operations
Deallocation is disabled

A Provider Bridge EVC can be protected only when at least allocated, hence de-allocation
is disabled.
To enable de-allocation is necessary to remove the protection from the EVC.
Change topology is disabled

A protected Provider Bridge EVC has its topology locked so any operation that changes
the topology is disabled.
The following operations are not allowed for a protected EVC:

add termination
remove termination

add transport link


remove transport link
add flow
remove flow

NNIs is Locked

The NNIs that are referred by a Protection Group (i.e. the extremities of the working and
protecting data planes) can't be configured or they could have different configuration and
that's not allowed.
For each protected EVC there exist four NNIs that are the extremities of its two Data
Planes (two NNIs for the working Data Plane and two NNIs for the protecting Data
Plane), in order for the protection to work properly the working NNI and the protecting
NNI that are in the same NE must have the same configuration.
This means, among other things, that when an EVC is protected the NNIs at the
extremities of its Data Planes can't be configured anymore by the operator (they are
locked). any explicit configuration operation on those ports is refused by the system.

....................................................................................................................................................................................................................................
1350 OMS
28-50
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Alarm propagation for protected EVCs

....................................................................................................................................................................................................................................

Alarm propagation for protected EVCs


Propagation from Transport Link to EVC

At the moment, in the scope of bridge EVCs, there's no propagation at all of alarms from
Transport Link to EVC. This is due to the fact that a failure on a single Transport Link in
a connectionless scenario does not mean, in general, any failure for the supported EVC(s).
The case of the protected EVC is different: there are two linear routes and this means that
if two links on the two routes stop working, the EVC is alarmed. This kind of
correlation/propagation could be done by PFM BB basing on the currently active route.
Anyway, in order to simplify the management of alarms it has been decided to not
implement this kind of correlation and, instead, leave this task to the OAM on the EVC.
In other words, if the operator wants to know whether the EVC is working or not, he will
have to activate the OAM CC on it and watch OAM alarms.

....................................................................................................................................................................................................................................
1350 OMS
28-51
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

OAM on protected EVC

....................................................................................................................................................................................................................................

OAM on protected EVC


OAM for data planes

In order for ELP to work, there's the need of a MA for each Data Plane.
This means that a new kind of MA is introduced: after the MA for EVC, the MA for Edge
Port and the MA for Transport Link we have the MA for Data Plane.
OAM on protected EVC

The EVC has two VIDs : the VID of the protected route/data plane (i.e. the original
S-VID) and the VID of the protection.
If the protection route is active the NEs at the extremity of the EVC take care to "convert"
the OAM packets, that originally were created for the S-VID, so to work with the
protection VID.
The internal NEs of the protection route are not even aware of the protection and, in order
to make OAM work, must have a MA with protection S-VID.
The operator must be aware of the protection when operating the OAM over the protected
EVC.
For example, when the operator requests an OAM LB specifying the MAC address of a
MIP, he/she must be aware of the currently active route and know that if a MIP on the
other route will be chosen, the loopback will fail for sure.
Analogously, in the case of OAM LT, the operator must be aware of the protection in
order to correctly interpret the results of the link trace.
Performance Monitoring

PM on protected EVC has no impacts at all for what concerns ELP


Audit

The new items with protected EVCs are:

protected Data Plane


Data Plane MAs

Protection Group

First two items must be handled by PKT at high level (toward the operator and internally
within the DB) but the related NE elementary objects (VLAN member sets, MDs, MAs,
MEPs) are already managed by PKT. This means that no new management is needed for
these objects on the AAR side
In the audit results we will only see the Protection Group entity that, will encompass
attributes of both the Protection Group and the Protection Unit.

....................................................................................................................................................................................................................................
1350 OMS
28-52
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

OAM on protected EVC

....................................................................................................................................................................................................................................

Force align down

The Protection Group, introduced for ELP, needs to be part of all the AAR procedures.
The provisioning sequence for the ELP is:
1. VLAN Member set on Data Plane
2. Data Plane MAs and MEPs
3. Protection Group + Protection Units
This order is fixed both for provisioning and for un-provisioning .
Reservation and take-over

The Protection Group and Protection Unit information are saved during reservation to be
used during the take-over.
For the operator, operations are identical to the ones done in the un-protected case.

....................................................................................................................................................................................................................................
1350 OMS
28-53
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Inventory of Transport Link from protected EVC

....................................................................................................................................................................................................................................

Inventory of Transport Link from protected EVC


When to use

This command shows the list of Transport Links of the Working Data Plane or of the
Protecting Data Plane.
Related Information

For a protected PB EVC the Search > Transport Links contextual menu is replaced by two
menu items:

Working Data Plane Transport Links


Protecting Data Plane Transport Links

Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select a Protected EVC.


...................................................................................................................................................................................................

Select the Search command.


Result: The following sub menu are shown:

Working Data Plane Transport Links

Protecting Data Plane Transport Links

...................................................................................................................................................................................................

Select the desired data plane.


Result: The list shows the Transport Links belonging to the selected Data Plane
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-54
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Inventory of MA from protected EVC

....................................................................................................................................................................................................................................

Inventory of MA from protected EVC


When to use

This command shows the list of MA of the Working Data Plane or of the Protecting Data
Plane.
Related Information

From a protected EVC the operator can navigate to the MA associated to its Working
Data Plane or its Protecting Data Plane.
Before you begin

The system is running.


The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Task

From the MS-GUI Main menu:


...................................................................................................................................................................................................

Select a Protected EVC.


...................................................................................................................................................................................................

Select the Search command.


Result: The following sub menu are shown:

Working Data Plane MA

Protecting Data Plane MA

...................................................................................................................................................................................................

Select the desired data plane.


Result: The list shows the MA belonging to the selected Data Plane
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS
28-55
8DG42227DAAA 9.6
Issue 3 December 2012

Enhanced Procedures
Ethernet Linear Protection

Routing Display of protected EVC

....................................................................................................................................................................................................................................

Routing Display of protected EVC


Routing Display request

The Routing Display command shows both the route of the Working Data Plane and of
the Protecting Data Plane.
The operator is able to understand which is the working Data Plane and which is the
protecting Data Plane.
Any additional action from the operator is required.

....................................................................................................................................................................................................................................
1350 OMS
28-56
8DG42227DAAA 9.6
Issue 3 December 2012

Appendix A: Use script


changeNeShOperatorLabel.sh

Use the script changeNeShOperatorLabel.sh to change


NEShOperator
When to use

The script changeNeShOperatorLabel.sh allows to change the NEShOperator label in


PKT
Related Information

This task does not have any related information.


Before you begin

This task does not have any preconditions.


Task
...................................................................................................................................................................................................

Login as bmml user into the system.


...................................................................................................................................................................................................

Set to the correct directory:


cd /usr/Systems/PKT_<BM Id>_<BM Version>/databases/dbbmml/admin/create
...................................................................................................................................................................................................

Run the script:


$
./changeNeShOperatorLabel.sh <old_shOperatorLabel> <new_
shOperatorLabel>
...................................................................................................................................................................................................

Verify that the migration of the data has been correctly executed checking the file
changeNeShOperatorLabel.lst.

...................................................................................................................................................................................................................................
1350 OMS
A-1
8DG42227DAAA 9.6
Issue 3 December 2012

Use script changeNeShOperatorLabel.sh

Use the script changeNeShOperatorLabel.sh to change


NEShOperator

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Remove the files: changeNeShOperatorLabel.lst and changeNeShOperatorLabel.sql


E...................................................................................................................................................................................................
N D O F S T E P S

Where
Variable

Description

BM Id

is the 1354BMETH instance identification


number

BM version

is the 1354BMETH version

old_shOperatorLabel

userlabel to be modified

new_shOperatorLabel

new value of the userlabel

....................................................................................................................................................................................................................................
1350 OMS
A-2
8DG42227DAAA 9.6
Issue 3 December 2012

Appendix B: Application Limits

Limits
Overview

This appendix provides a reminder of every limits and constraints that are managed by the
1350 OMS PKT application.
Table B-1

Limits for Subnetworks

Maximum number of subnetworks

500

Maximum number of subnetwork levels

Maximum number of NEs or ENEs in one subnetwork

60

Maximum number of subnetworks in one subnetwork

250

Table B-2

Limits for Service Nodes

Maximum number of service nodes

Table B-3

See the NE limitation Table B-4,


Limits for NEs (p. B-1)

Limits for Domains

Maximum number of domains managed by 1350 OMS PKT


Table B-4

500

Limits for NEs

Maximum number of NEs managed by 1350 OMS PKT

2500

...................................................................................................................................................................................................................................
1350 OMS
B-1
8DG42227DAAA 9.6
Issue 3 December 2012

Application Limits

Limits

....................................................................................................................................................................................................................................

Table B-5

Limits for ENEs

Maximum number of ENEs managed by 1350 OMS PKT


Table B-6

20000

Limits for ETPs in an ENE

Maximum number of ETPs per ENE

100

Maximum number of ETPs at ENE creation

10

Maximum number of Edge ETPs at ENE creation

Table B-7

Limits for LSPs

Maximum number of LSPs


Table B-8

Limits for Customers

Maximum number of Customers


Table B-9

250000

Limits for Ethernet Services

Maximum number of Ethernet Services


Table B-10

108000

250000

Limits for Ethernet Virtual Connections

Maximum number of Ethernet virtual connections (EVC)

250000

Maximum number of EVC terminations

500000

Table B-11

Limits for Ethernet Transport Links

Maximum number of Ethernet Transport Links (ETS)

500000

Maximum number of Ethernet Transport Link terminations

1000000

Maximum number of Ethernet Transport Links (ETB)

100000

....................................................................................................................................................................................................................................
1350 OMS
B-2
8DG42227DAAA 9.6
Issue 3 December 2012

Application Limits

Limits

....................................................................................................................................................................................................................................

Table B-12

Limits for Ethernet Segments

Maximum number of Ethernet Segments


Table B-13

Limits for Ethernet edge physical ports

Maximum number of Ethernet edge physical ports


Table B-14

600000

25000

Limits for Ethernet Traffic Descriptors

Maximum number of Ethernet Traffic Descriptors

2000

Maximum number of Ethernet Traffic Descriptors per NE

Table B-22,
Limits for each
board (p. B-4)

Table B-15

Limits for Ethernet Traffic Classifiers

Maximum number of Ethernet Traffic Classifiers

5000

Maximum number of Ethernet Traffic Classifiers per NE

Table B-22,
Limits for each
board (p. B-4)

Table B-16

Limits for Ethernet Color Profiles

Maximum number of Ethernet Color Profiles

2000

Maximum number of Ethernet Color Profiles per NE

Table B-22,
Limits for each
board (p. B-4)

Table B-17

Limits for Ethernet switches

Maximum number of Ethernet Switches

2000000

....................................................................................................................................................................................................................................
1350 OMS
B-3
8DG42227DAAA 9.6
Issue 3 December 2012

Application Limits

Limits

....................................................................................................................................................................................................................................

Table B-18

Limits for VLAN Types

Maximum number of VLAN Types

128

Maximum number of VLAN Types constraints

200000

Table B-19

Limits for MPLS Transport Links

Maximum number of Best Effort VC-LSPs & LSP tunnels per Transport
Link (FW & BW)
Table B-20

200

Limits for MPLS Traffic Descriptors

Maximum number of MPLS Traffic Descriptors

200

Maximum number of MPLS Traffic Descriptors per NE

200

Table B-21

Limits for MPLS VC-LSPs

Maximum number of VC-LSPs

504000

Depending of NE type are defined different limits for each object that 1350 OMS PKT
provisions on the boards. The table these limits:
Table B-22

Limits for each board

Board Type

ES1 3FE

ES1 8FE

ES1 8FX

Board
Version

Traffic
Descriptor
Limit

Color
Profile
Limit

Cross
Connection limit

Traffic
Classifier
Limit

1.0

Not
supported

16

16

1.1 / 1.1B

Not
supported

1512

512

1.0

Not
supported

16

16

1.1 / 1.1B

Not
supported

1512

512

1.1 / 1.1B /
1.2

Not
supported

1512

512

....................................................................................................................................................................................................................................
1350 OMS
B-4
8DG42227DAAA 9.6
Issue 3 December 2012

Application Limits

Limits

....................................................................................................................................................................................................................................

Table B-22

Limits for each board

Board Type

Board
Version

(continued)

Traffic
Descriptor
Limit

Color
Profile
Limit

Cross
Connection limit

Traffic
Classifier
Limit

ES4 8FE

1.1 / 1.1B /
1.2

Not
supported

1512

512

ISA PR EA S1P

1.0

200

Not
supported

2000

2000

1.1 / 1.2

200

256

2000

5000

1.0

200

Not
supported

2000

5000

1.1 / 1.2

200

256

2000

5000

1.0

200

Not
supported

2000

5000

1.1 / 1.2

200

256

2000

5000

ES16- No Access
Module

2.0

200

256

20000

20000

ES16 - Access
Module: 14FE

2.0

200

256

20000

20000

ES16 - Access
Module: 4GE

2.0

200

256

20000

20000

ES16 - No Access
Module

2.1

200

256

20000

20000

ISA PR EA 4ETH

ISA PR EA 1GEP

....................................................................................................................................................................................................................................
1350 OMS
B-5
8DG42227DAAA 9.6
Issue 3 December 2012

Application Limits

Limits

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS
B-6
8DG42227DAAA 9.6
Issue 3 December 2012

Appendix C: List of
Abbreviations

Abbreviations
List
Abbreviation

Meaning

100Base-T

100 Mb/s IEEE standard Physical Ethernet interface.

10Base-TX

10 Mb/s IEEE standard Physical Ethernet interface.

1355VPN

Virtual Private Network manager (Alcatel-Lucent product).

14FE

Board type.

1678MCC

Alcatel-Lucent equipment.

1GEP

Board type.

3FE

Board type.

4ETH

Board type.

4GE

Board type.

802.1ad

IEEE standard (Provider Edge Bridging).

802.1D

IEEE standard (MAC Bridge).

802.1p

IEEE standard (Priority Queuing).

802.1Q

IEEE standard (Virtual Bridge).

802.1X

IEEE standard. Port Based Network Access Control.

8FE

Board type.

8FX

Board type.

AAR

Audit/Align/Reserve (as a single function).

ACL

Access Control List.

ADM

Add and Drop Multiplexer.

AF

Assured Forwarding.

AIS

Alarm Indication Signal.

ALMAP

Alcatel-Lucent MAnagement Platform.

ANSI

American National Standards Institute.

...................................................................................................................................................................................................................................
1350 OMS
C-1
8DG42227DAAA 9.6
Issue 3 December 2012

List of Abbreviations

Abbreviations

....................................................................................................................................................................................................................................

Abbreviation

Meaning

AS

Alarm Surveillance; Alarm Surveillance interface.

ASAP

Alarm Severity Assignment Profile.

ATM

Asynchronous Transfer Mode.

BA

Broadband Access.

BE

Best Effort.

BM

Broadband Management, Broadband Manager.

BPDU

Bridge Protocol Data Units.

BSR

Broadband Service Router.

BTV

Broadcast Tele Vision.

BW

BandWidth.

CAC

Check Admission Control.

CBS

Committed Burst Size.

CCITT

Telegraph and Telephone International Consultative Committee.

CD-ROM

Compact Disk Read Only Memory.

CE

Customer Edge.

CES

Circuit Emulation Service.

CE-VLAN

Customer Edge VLAN.

CIR

Committed Information Rate.

CIST

Common and Internal Spanning Tree.

CM

Connect Manager.

CNA

CMISE Element Network Adapter.

CORBA

Common Object Requesting Broker Architecture.

CoS

Class of Service.

CP

Connection Profile; Connectivity Problem.

CPE

Customer Premise Equipment.

CSF

Client Signal Failure.

CTP

Connection Termination Point.

C-VLAN

Customer VLAN.

DB

Database.

DEG

Degraded Signal.

DSCP

Differentiated Services Code Point.

DSLAM

Digital Subscriber Line Access Multiplexer.

DWDM

Dense Wavelength Division Multiplexing.

DXC

Cross-Connect.

....................................................................................................................................................................................................................................
1350 OMS
C-2
8DG42227DAAA 9.6
Issue 3 December 2012

List of Abbreviations

Abbreviations

....................................................................................................................................................................................................................................

Abbreviation

Meaning

E/FE

Ethernet and Fast Ethernet board.

E/FE/GE

Ethernet/Fast Ethernet/Gigabit Ethernet.

E2E

End to End.

EBS

Excess Burst Size.

EF

Expedited Forwarding.

EIR

Excess information Rate.

E-LAN

Ethernet LAN.

E-LINE

Ethernet Line.

ELR

Effective Line Rate.

E-LSP

EXP inferred LSP.

EML

Element Management Layer.

ENE

External Network Element.

eOMS

Element Management System.

EOT

Ethernet Over Transport; end-of-task.

EPL

Ethernet Private Line.

EPLAN

Ethernet Private LAN.

EPLANE

Ethernet Private Local Area Network Emulation.

EPLINE

Ethernet Private Line.

EPTL

Ethernet Private Transparent Line.

EPTLINE

Ethernet Private Line.

ES

Ethernet Switching equipment.

ES1

ISA Ethernet Switch equipment.

ES1/4

ISA Ethernet Switch equipment.

ES16

ISA Ethernet Switch equipment.

ES4

ISA Ethernet Switch equipment.

ETB

Ethernet Transport Bridging.

ETH

Ethernet.

ETP

External Termination Point.

E-TREE

Ethernet tree service type.

ETS

Ethernet Transport Service.

ETSI

European Telecommunications Standards Institute.

EVC

Ethernet Virtual Connection.

EVP

Ethernet Virtual Private.

EVPL

Ethernet Virtual Private Line.

....................................................................................................................................................................................................................................
1350 OMS
C-3
8DG42227DAAA 9.6
Issue 3 December 2012

List of Abbreviations

Abbreviations

....................................................................................................................................................................................................................................

Abbreviation

Meaning

EVPLAN

Ethernet virtual private LAN.

EVPLINE

Ethernet Virtual Private Line.

FAD

Function Access Domain.

FE

Fast Ethernet.

FM

Fault Management.

FR

Fault Report.

FW

Farward.

GARP

Generic Attribute Registration Protocol.

Gbit

Giga bits.

Gbit/s

Gigabits per Second.

Gbps

Gigabits per Second.

GE

Gigabit Ethernet.

GENOS

generic OS-to-OS.

GFP

Generic Frame Protocol.

GMPLS

Generalized Multi Protocol Label Switching.

GMRP

GARP Multiple Registration Protocol.

GTM

GFP Type Mismatch Alarm.

GUI

Graphical User Interface.

GVRP

GARP VLAN Registration Protocol.

HA

High Availability.

HDLC

High Level Data Link Control.

HSI

High Speed Internet.

HTML

HyperText Markup Language.

I/O

input/output.

Id

identify, identifier; identification.

IEEE

Institute of Electrical and Electronics Engineers.

IETF

Internet Engineering Task Force.

IGMP

Internet Group Management Protocol.

IM

Information Manager.

IP

Internet Protocol.

ISA

Industry Standard Architecture.

ISA E/FE

ISA Ethernet Switch equipment.

ISA E/FE/GE

ISA 10/100 Eth /ISA Gb Eth.

ISA ES

ISA Ethernet Switch.

....................................................................................................................................................................................................................................
1350 OMS
C-4
8DG42227DAAA 9.6
Issue 3 December 2012

List of Abbreviations

Abbreviations

....................................................................................................................................................................................................................................

Abbreviation

Meaning

ISA ES1

ISA Ethernet Switch equipment.

ISA ES1/4

ISA Ethernet Switch equipment.

ISA ES16

ISA Ethernet Switch equipment.

ISA ES4

ISA Ethernet Switch equipment.

ISA PR

Integrated Service Adapter Packet Ring.

ISA PR EA

Integrated Service Adapter Packet Ring Edge Aggregator.

ISA PR ES16

ISA Ethernet Switch equipment.

ISP

Internet Service Provider.

IWI

Interworking Interface.

Kb/s

Kilo bits per second.

Kbit

Kilo bits.

Kbit/s

Kilo bits per second.

L2CP

Layer 2 Control Protocol.

LAC

Local Access Control.

LACP

Link Aggregation Control Protocol.

LAG

Link Aggregation Group.

LAN

Local Area Network.

LAPS

Link Access Procedure for SDH.

LER

Label Edge Router.

LO

Low Order.

LOF

Loss-of-Frame.

LOS

Loss-of-Signal.

LSP

Label Switched Path.

LSR

Label Switched Router.

MAC

Media Access Control.

MAN

Metropolitan Area Network.

MAU

Medium Attachment Unit.

max

maximum.

Mb/s

Mega bits per second.

Mbps

Megabits per second.

MEF

Metro Ethernet Forum.

MEN

Metro Ethernet Network.

MEP

Maintenance End Point.

MIB

Management Information Base.

....................................................................................................................................................................................................................................
1350 OMS
C-5
8DG42227DAAA 9.6
Issue 3 December 2012

List of Abbreviations

Abbreviations

....................................................................................................................................................................................................................................

Abbreviation

Meaning

min

minimum.

MISTP

Multiple Instance Spanning Tree Protocol.

MPLS

Multiple Protocol Label Switching.

MPtoMP

Multi Point to Multi Point.

MS-GUI

Multi Service - Graphical User Interface.

MSTI

Multiple Spanning Tree Instance.

MSTP

Multiple Spanning Tree Protocol (also called MISTP).

MW

Middleware equipment.

MW-INT

Middleware Interface.

NA

Network Adapter.

NAD

Network Access Domain.

NAP

Network Access Point.

NBI

Northbound Interface.

NE

Network Element.

NML

Network Management Layer.

NMS

Network Management System.

NNI

Network-to-Network Interface.

NV

Native View.

OAM

Operations, Administration, and Maintenance.

OMSN

Optical Multi-Services Node.

OS

Operating System, as in UNIX; Operations System; Optical Section.

OSK

Operation System Kernel.

OTH

Optical Transport Hierarchy.

PAE

Port Access Entity.

PBS

Peak Burst Size.

PC

personal computer.

PCP

Priority Code Point.

PDF

Portable Document Format.

PE

Provider Edge or Edge node.

PHB

Per Hop Behaviour.

PIR

Peak Information Rate.

PKT

Packet.

PLM

Payload Label Mismatch.

PLS

Physical Layer Signalling.

....................................................................................................................................................................................................................................
1350 OMS
C-6
8DG42227DAAA 9.6
Issue 3 December 2012

List of Abbreviations

Abbreviations

....................................................................................................................................................................................................................................

Abbreviation

Meaning

PM

Performance Monitoring.

PMC

Process Monitoring Control.

POP

Point Of Presence.

PPT

Ethernet Physical Port.

PR EA

Packet Ring Edge Aggregator (ISA Ethernet Switch equipment).

P-tagged

Proprietary tagged frame.

PtoMP

Point to Multi Point.

PtoP

Point to Point.

PTP

Physical Termination Point.

P-VLAN

Provider VLAN.

PVSTP

Per-VLAN Spanning Tree Protocol.

PW

Pseudo Wire.

Q3

CMISE-based OSI Inteface.

QoS

Quality of Service.

Q-TAG

Standard VLAN tag.

Q-tagged

Standard VLAN tagged frame.

RM

Regional Manager. Ring Manager.

RMP

routed multipoint.

RPR

Risilient Packet Ring.

RSTP

Rapid Spanning Tree Protocol.

S1P

Board type.

SC

Service Connect.

SDH

Synchronous Digital Hierarchy.

SLA

Service Level Agreement.

SMF

System Management Functions.

SML

Service Management Layer.

SNMP

Simple Network Management Protocol.

SNMP NE

Either an ISA board or a 4G NE.

SONET

Synchronous Optical Network.

STI

Spanning Tree Instance.

STP

Spanning Tree Protocol.

SUBM

Alcatel-Lucent SUBMarine equipments.

S-VLAN

Service VLAN.

TCI

Tag Control Information.

....................................................................................................................................................................................................................................
1350 OMS
C-7
8DG42227DAAA 9.6
Issue 3 December 2012

List of Abbreviations

Abbreviations

....................................................................................................................................................................................................................................

Abbreviation

Meaning

TDM

Time Division Multiplexing.

TL

Transport Link.

TL1

Transaction Language 1.

T-MPLS

Transport Multiple Protocol Label Switching.

TNA

TL1 Network Adapter.

TOS

Type Of Service.

TSF

Trail Signal Failure.

TSS

Transport Service Switch.

TU

Transport Unit.

UI

User Interface.

UNI

User Network Interface.

URU

Underlying Resource Unavailable.

VC

Virtual Container; Virtual Connection.

VC12

Virtual Container 1/2 Mbit/s.

VC-LSP

Virtual Connection - Label Switched Path.

VID

VLAN Identifier.

VLAN

Virtual Local Area Network.

VPAS

Virtual Private Access Services.

VPHS

Virtual Private Hub Services.

VPLAN

Virtual private LAN.

VPLS

Virtual Private LAN Services.

VPN

Virtual Private Network.

VPWS

Virtual Private Wire Services.

VT

Virtual Terminal

WDM

Wavelength Division Multiplexing.

XC

Cross-Connect.

XML

Extensible Markup Language.

XoS

XML-over-socket.

....................................................................................................................................................................................................................................
1350 OMS
C-8
8DG42227DAAA 9.6
Issue 3 December 2012

Index

Symbols

EmlAdapter process, 4-3

.data log file suffix, 6-2


.dataflow log file suffix, 6-2

NmlAdapter process, 4-3


Added value modules

.log log file suffix, 6-2

1350 OMS HA, 1-5

*_dbi.log, 6-2

1350 OMS OI, 1-5

*Gui.log, 6-3
.............................................................
Numerics

1350 OMS
applications, 1-2

Administration functions, 11-43


Administrator, 11-71
Also see: System management
AF
See: Assured Forwarding
See: Assured Forwarding (AF)

Alignment, 23-4, 23-26


Also see: Utilities
Also see: Utilities
after deletion and recreation of
SDH Path, 12-61
offline procedure
AlignDBSDHPathID, 12-61
All to One Bundling attribute
See: User Network Interface
(UNI)
allTracesModify.log, 6-3
Any to Any
See: Service classification

definition, 1-2

Alarm management
See: Fault Management

supported NEs, 1-4

Alarm synchronization, 22-15

Backup and restore, 2-2

Alarms

instances, 2-1

1350 OMS PKT application


General information, 11-3

AlmAdapter process, 4-3

Applications

Process Monitoring, 2-1

1354BM.log, 6-2

AS_Current_IM process, 4-3

ascurusm.log, 6-3

1678MCC NE

AS_Historic_IM process, 4-3

Assured Forwarding (AF), 11-66,


15-5

Add port, 13-141


Overview, 13-140
Remove port, 13-143
.............................................................
A AAR

See: Utilities
Access control
default operator profiles, 5-2
Access Control Data Base, 11-71
Adapters

Align Up
See: Utilities
AlignDBSDHPathID
See: Alignment
AlignDBSDHPathID Tool
definition, 10-2
operating principals, 10-2

Audience intended for this


document, lxix, lxx
Audit
See: Utilities
Audit results, 23-8, 23-24
Also see: Utilities
Also see: Utilities

Run AlignDBSDHPathID Tool


task, 10-3

for Construction domain, 23-8

tool location and execution,


10-2

for MPLS domain, 23-10

for Ethernet domain, 23-8

for T-MPLS domain, 23-11

AlmAdapter process, 4-3


....................................................................................................................................................................................................................................
1350 OMS
IN-1
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Auditable NEs
See: Utilities
Audited NEs
See: Utilities
Autonegotiation, 11-52
Also see: Network Topology
Construction

Configure Edge Port, 19-83


Create, 19-49

Add NE to a Domain, 19-91

Delete, 19-56

Configure a NE, 19-98

Delete Termination, 19-81

Create a Customer, 19-104

Details, 19-58

Create an Ethernet Service,


19-107

.............................................................

Inventory Transport Link,


19-64

B BA

List, 19-47
See: Broadband Access (BA)

Modify, 19-53

Back hauling, 11-31

Overview, 19-6

Backups

Remove Transport Link, 19-63

Application backups, 2-2

Routing Display, 18-75

Full system backups, 2-2

Show PM, 18-74

Bandwidth Profile, 19-17

Bridge Workflow, 19-88

Show STI, 19-119

Create and configure EVC,


19-111
Create Domain, 19-90
Domain configuration, 19-88
Domain Configuration, 19-94
Domain definition, 19-88
Domain Modification, 19-96
Ethernet Physical Port
configuration, 19-102

Default operations, 19-19

Start PM, 18-71

EVC provisioning, 19-20

Stop PM, 18-72

Link Over TDM configuration,


19-100

Manual operations, 19-19

Synchronize PM, 18-73

NE configuration, 19-89

per CoS, 19-18

Terminations, 19-72

Overwiew, 19-88

per EVC, 19-18

View Provider Bridge Flows,


19-26

Traffic Descriptor Definition,


19-109

per UNI, 19-18, 19-18


QoS, 19-19

Bridge NE, 19-22

Broadband Access (BA), 11-8

See: Best Effort (BE)

Bridge Network
See: Ethernet Transport
Bridging (ETB)

Broadcast Containment
See: Broadcast Domain
Containment

BmAdaptationModifyTrace.log,
6-3

Bridge Traffic management


See: Ethernet Transport
Bridging (ETB)

Broadcast Domain Containment

BmMplsModifyTrace.log, 6-3, 6-3

Bridge Transport Link

BE
Best Effort (BE), 11-66

Bridge Edge Port

Activate, 19-41

Activate, 19-45

Add to EVC, 19-62

Configure, 19-83

Configure, 19-30

Deactivate, 19-46

deactivate, 19-42

List, 19-43

Details, 19-38

Description, 20-76
Disable, 20-78
Enable, 20-77
Broadcast Service Type
See: Service Type
Broadcast Tele Vision
See: Broadcast TV (BTV)
Broadcast TV (BTV), 11-24
Also see: Service Type

Bridge ENE, 19-24

Get extremities, 19-34

Bridge EVC

Inventory, 19-64

Bridge Based Service, 21-40

Add Termination, 19-74

List, 19-27

Bridge Services, 21-41

Add Transport Link, 19-62

Remove from EVC, 19-63

Configure, 19-61

Construction workflow, 21-24


Create, 21-8

....................................................................................................................................................................................................................................
1350 OMS
IN-2
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Create Customer, 21-34


Create element, 21-26
Create ETP, 21-20
Create EVC, 21-37
Create Link, 21-29
Create path, 21-25

CES
See: Circuit Emulation
Services
CES procedures, 25-53
Assign resources to Radio
Domain, 25-62

Create Service, 21-35

Assign resources to T-MPLS


Domain, 25-63

Delete, 21-14

CES attributes, 25-107

Details, 21-16
EVC management, 21-44

CES configuration, 25-127


CES creation, 25-122

IGMP Snooping management,


21-42

CES inventory, 25-126

IGMP Snooping state, 21-44


List, 21-6

CES Nodes
See: CES NE

List ETP, 21-18

CES Routing display, 25-130

Modify, 21-11
Overview, 21-3
Service workflow, 21-33
BTV
See: Broadcast TV (BTV)
Bundling
See: User Network Interface
(UNI)
B-VID
See: PBB B-VID
.............................................................
C CBS

See: Committed Burst Size


(CBS)
CC
Continuity Check (CC)
See: Operations,
Administration, and
Maintenance (OAM)
CDN
See: CORBA-based interface
(CDN)
CE
See: Customer Edge (CE)

CES list, 25-106

CES termination attributes,


25-115
CES termination configuration,
25-131
CES termination list, 25-114
Deassign resources from Radio
Domain, 25-62

Link Over Radio list, 25-90


Link Over Radio properties,
25-92
Link Over Radio property
attributes, 25-93
Link Over Radio
synchronization, 25-96
NE attributes, 25-65
NE inventory, 25-68
NE List, 25-64
NE properties, 25-66
NE property attributes, 25-67
PDH Port attributes, 25-79
PDH Port inventory, 25-84
PDH Port properties, 25-82
PDH Port property attributes,
25-83
PDH ports, 25-78
Protection Group inventory,
25-70
Radio Port attributes, 25-98
Radio Port inventory, 25-101

Deassign resources from


T-MPLS Domain, 25-63

Radio Port list, 25-97

Domain creation, 25-61


Domain inventory, 25-60

Radio Port property attributes,


25-100

Domain List, 25-58

Stitch tunnels, 25-105

Domain properties, 25-59

Takeover for MEF8, 25-132

Edge Port attributes, 25-86

Takeover for SATOP, 25-134

Edge Port inventory, 25-89

Transport Link attributes,


25-72

Edge Port list, 25-85


Edge Port properties, 25-87
Edge Port property attributes,
25-88
Join tunnels, 25-104
Link Over Radio attributes,
25-91
Link Over Radio inventory,
25-94

Radio Port properties, 25-99

Transport Link extremity


inventory, 25-76
Transport Link inventory,
25-75
Transport Link List, 25-71
Transport Link properties,
25-73
Transport Link properties
attributes, 25-74

....................................................................................................................................................................................................................................
1350 OMS
IN-3
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

VLAN Paths attributes, 25-103


VLAN Paths list, 25-102
CE-VLAN, 11-12
CIR
See: Committed Information
Rate (CIR)
Circuit Emulation Services
AAR Network Operation,
25-50

Implementation, 25-36, 25-38,


25-38, 25-39, 25-40, 25-43,
25-43
inband management, 25-13

Reservation, 25-52, 25-52,


25-52

Interworking, 25-25, 25-25,


25-26, 25-26

Reservation of Link over


T-MPLS, 25-14

join, 25-27

Resource assignment, 25-12

layering, 25-4

Resource assignment to
T-MPLS domain, 25-14

Loopback management, 25-21,


25-21

Alarm management, 25-17,


25-18, 25-18, 25-18

Manual deimplementation,
25-36

Align, 25-51, 25-51, 25-51

Manual synchronization of
PDH links, 25-25

Audit, 25-50, 25-50, 25-50


Bandwidth, 25-41
CAC tolerance, 25-11
Configuration, 25-42, 25-42,
25-43
Control word, 25-15
CoS, 25-29
CoS/PHB Profile compatibility,
25-29

MEF 8, 25-7
modulation mode, 25-11
Navigation, 25-55
network role on PDH port,
25-25
OAM and protections, 25-45,
25-46, 25-48
OAM and protections on
PACKET radio, 25-17

creation, 25-33

OAM and protections on


T-MPLS, 25-22

creation and allocation, 25-27

Overview, 25-4

deallocation, 25-32

PDH degrade thresholds


(TSS-5C), 25-23

definitions, 25-4
deletion, 25-32
E1, 25-36

QoS management, 25-24

infrastructures, 25-5

Alarm correlation, 25-22,


25-23, 25-23, 25-23

allocation, 25-33, 25-35

Protection setup (Workaround),


25-9

Performance Monitoring,
25-19, 25-19, 25-19, 25-19

E1 signal, 25-34, 25-35

Port assignment, 25-12, 25-14,


25-14, 25-22

Encapsulation, 25-7, 25-7,


25-29

Port deassignment, 25-12,


25-14

External Interfaces, 25-7

Port segregation, 25-27

External Products, 25-6


Fault localization, 25-45

Protection Group, 25-20,


25-20, 25-20

IETF, 25-7

Protection schemes, 25-9


Protection setup, 25-9

Routing display, 25-30


SAToP, 25-7
scenarios, 25-4
security, 25-27
stitch, 25-27
Supported flow, 25-38
Switch synchronization, 25-21
synchronization between CES
terminations, 25-8
synchronization of Transport
Link, 25-13
Takeover, 25-52
Takeover description, 25-52
TDM traffic, 25-7
terminated, 25-33
timestamp frequency, 25-16
Traffic Flow, Ethernet To
Radio, 25-39, 25-41
Traffic Flow, PDH To Ethernet,
25-38, 25-41
Traffic Flow, PDH To Radio,
25-38, 25-39, 25-40, 25-40
Traffic Flow, Radio To
Ethernet, 25-38, 25-41
Traffic Flow, Radio To Radio,
25-38, 25-38, 25-41
Transport link assignment,
25-12
Transport link deassignment,
25-12

....................................................................................................................................................................................................................................
1350 OMS
IN-4
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

tunnel type management, 25-30

Allocation, 18-54

unterminated, 25-4

Commission, 18-58

Unterminated, 25-39

Configure, 19-61

CORBA-based interface (CDN),


11-42
See: Software interfaces
Also see: Software interfaces

Create, 18-44

Core

Class of Service (CoS)


CoS Preservation, 18-41
Color Profile

Deallocation, 18-55

c_AuditAlignRecovery, 4-3

Decommission, 18-59

c_DataManagement process,
4-3

Create, 18-135

Deimplement, 18-57

Delete, 18-139

Delete, 18-49

c_EquipmentTopology, 4-3

Details, 18-140

Delete Termination, 18-62

c_FaultManagement process,
4-3

List, 18-134

Details, 18-51

Modify, 18-136

Fault Localization, 18-68

Overview, 18-133

Get terminations, 18-60

Color Profile Management


macro functions and default
user profiles, 5-12
Command Log, 2-3
administration, 2-3
Committed Burst Size (CBS),
11-64
Committed Information Rate
(CIR), 11-64
Compressed transmission, 11-30,
11-31
Configuration
Access the System
Configuration Window and
Configure a 1350 OMS
Application task, 3-3
Integrate the 1350 OMS PKT
Master Workstation with the
Client Workstation task, 3-9
Integrate the 1350 OMS PKT
with Other NMSs task, 3-8
Configure the application, 11-43
Confirm the action, 11-40
Connection Less Networks
See: Ethernet Transport
Bridging (ETB)
Connection Oriented EVC
Add termination, 18-66

Implement, 18-56

c_Scheduler, 4-3
c_TopologyManagementprocess,
4-3

List, 18-42

CoS
See: Class of Service (CoS)

Modify, 18-47

CoS Preservation, 18-44

Overview, 18-37

CPE
See: Customer Premise
Equipment

Properties, 18-63
Routing Display, 18-75

Start PM, 18-71

Cross Connection, 18-197, 15-63


See: T-MPLS Pseudo Wire
See: T-MPLS tunnel
Also see: LSP Tunnel

Stop PM, 18-72

Customer

Show PM, 18-74

Synchronize PM, 18-73


Constraint
of Ethernet Segment, 18-213
of LSP Tunnel, 15-53, 15-56,
15-58, 15-60

Create, 18-11
Customer Edge (CE), 11-49
Also see: Network
Topology Construction
Delete, 18-14

of T-MPLS Pseudo Wire,


16-60, 16-62, 16-76, 16-78

Details, 18-15

of T-MPLS Tunnel, 16-109,


16-111

List, 18-9

Constructor, 11-71
Also see: System management
Continuity Check (CC)
See: Operations,
Administration, and
Maintenance (OAM)

inventory Services, 18-36

Modify, 18-12
Overview, 18-8
Single-Customer, 12-69
VLAN Mapping, 11-59
Also see: Ethernet Frame
Hierarchy
VLAN tunneling, 11-61
Also see: Ethernet Frame
Hierarchy

....................................................................................................................................................................................................................................
1350 OMS
IN-5
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Customer management
macro functions and default
user profiles, 5-9

Configure OAM ETH DM


Tool, 24-50

Deactivate DM Tool, 24-46

C-VLAN

List, 24-38

C-VLAN Preservation, 18-41,


18-44

Inventory, 24-48

Documentation
related documents, lxxiii
Domain
Assign resource, 13-27
Create, 13-20

D Data Plane

create Topological View, 13-34

Databases
PM Administration, 2-2
databases/dbbmml/data directory,
6-4
DB_SIZE parameter, 7-6
DEI bit, 20-81
Directories

Delete, 13-24
Details, 13-25
eOMS, 13-15
ETB Domain, 13-15
ETS Domain, 13-15
Indirect, 13-15
inventory of NE, 13-31

databases/dbbmml/data, 6-4

inventory of Transport Links,


13-32

ORACLE/databases/dbnml/
admin/bdump, 6-3

inventory of VT Queue
Profiles, 13-33

ORACLE/databases/dbnml/
admin/create, 6-3

List, 13-17

ORACLE/databases/dbnml/
admin/logbook, 6-3
ORACLE/databases/network,
6-4
SMF/tools/log/data, 6-3
TAO/maintenance/trace, 6-4
DM
(Packet) Delay Measurement
See: DM Tool
DM Tool, 24-33
Activate DM Tool, 24-46
Configure Maintenance End
Points, 24-36

See: End-to-End
E_Bridge

Description, 24-34

.............................................................

See: EVC

E E2E

Create ETH DM Tool, 24-42

Customer Premise Equipment


(CPE), 11-48
Also see: Network Topology
Construction

Customer VLAN, 11-59


Also see: Ethernet Frame
Hierarchy

.............................................................

Modify, 13-22
Overview, 13-15
Domain management, 11-47
Also see: Network Topology
Construction
macro functions and default
user profiles, 5-3
Domain Wide VID distribution
See: PBB B-VID
Duplex mode

E_Bridge process, 4-4


Edge Port
See: Ethernet Edge Port
EF
See: Expedited Forwarding
(EF)
Egress (-ing), 11-35
Element Management Layer
(EML), 11-5
ELP
See: Ethernet Linear Protection
(ELP)
EML
See: Element Management
Layer
EML Proxy, 11-43
EML-IM, 11-43
EMLStart.log, 6-2
Encapsulation
Layer-2
See: T-MPLS Pseudo Wire
See: T-MPLS tunnel
Martini
See: Martini encapsulation
End-to-End, 18-76
Also see: End-to-End EVC
Also see: End-to-End Service
End-to-End EVC
Create, 18-80
Create full EVC, 18-84
Create raw EVC, 18-86
Full E2E EVC, 18-76
Join, 18-89

full mode, 11-52

List, 18-78

half mode, 11-52

Modify full EVC, 18-87


Overview, 18-76
Prevented Actions, 18-77

....................................................................................................................................................................................................................................
1350 OMS
IN-6
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Raw E2E EVC, 18-76


End-to-End Service, 11-11
ENE
See: External Network Element
(ENE)
ENE management
macro functions and default
user profiles, 5-4
EOT
e_AuditAlignRecovery
process, 4-4

ERP Instance
See: Ethernet Ring Protocol
(ERP)
ETB
See: Ethernet Transport
Bridging (ETB)
Ether Type
Frame Classification, 18-6
Ethernet connectivity
See: Functional domain
Ethernet Edge Physical Port
Configure, 18-172

e_DataManagement process,
4-4

Details, 18-175

e_Facility process, 4-4

List, 18-169

e_FaultManagement process,
4-4

List traffic parameters, 18-177

e_ProfileManagement process,
4-4
e_ServiceManagement process,
4-4
e_TrafficManagement process,
4-4
EotModifyTrace.log, 6-3
EPL
See: Ethernet Private Line
See: Ethernet Private Line
(EPL)
EPTL
See: Ethernet Private
Transparent Line
Equipment
Inner equipment, 11-48
Also see: Network
Topology Construction
Provider equipment, 11-48
Also see: Network
Topology Construction
view, 13-70
ERP
See: Ethernet Ring Protection
See: Ethernet Ring Protocol

VLAN Tag, 11-54


VLAN Tag Protocol Type,
11-54
Ethernet Linear Protection (ELP),
28-16
Add protection, 28-39
Alarms, 28-51
Audit, 28-52
Condition for protecting,
28-38
Condition for unprotecting,
28-38
Configure protection, 28-42
de-implementation, 28-49
Description, 28-34

macro functions and default


user profiles, 5-10

Disabled operations, 28-50

Modify, 18-170

EVC specific Attributes,


28-36

Overview, 18-168
Show equipment, 18-180
Ethernet Edge Port

Force align, 28-53


Implementation, 28-48
Inventory, 28-33

Show External Termination


Point, 18-183

Inventory of MA, 28-55

Show PM, 18-182

Inventory of Transport Link,


28-54

Ethernet Edge Port management,


11-51
Also see: Network Topology
Construction
Ethernet Frame Hierarchy
Customer VLAN mapping,
11-54
Customer VLAN tunneling,
11-54
Overview, 11-54
Also see: Traffic
Management Overview
Provider VLAN mapping,
11-54

Linear, 28-38
Manual alignment, 28-47
OAM, 28-52
PM, 28-52
Properties, 28-43
Remove protection, 28-41
Reservation, 28-53
Routing Display, 28-56
Send APS command, 28-45
Take-Over, 28-53
Ethernet Macro functions

Provider VLAN tunneling,


11-54

Color Profile management,


5-12

VLAN management, 11-55

Customer management, 5-9

....................................................................................................................................................................................................................................
1350 OMS
IN-7
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Ethernet Edge Physical Port


management, 5-10

Ethernet Ring Protection (ERP),


20-107

Ethernet Segment
management, 5-11

Ethernet Ring Protocol (ERP)

Ethernet Traffic Classifier


management, 5-10
Ethernet Traffic Descriptor
management, 5-10
Ethernet Transport Segment
management, 5-11
EVC management, 5-9
Provider Network
management, 5-13
Service management, 5-9
Transport Link management,
5-12
VLAN Type management, 5-13
Ethernet Operations,
Administration, and Maintenance
(OAM), 24-1
See: Operations,
Administration, and
Maintenance (OAM)
Ethernet Physical Port, 13-96
assign to Domain, 13-35
Assign to domain, 13-106
Configure, 13-99
deassign from Domain, 13-36
Details, 13-108
List, 13-96
Modify, 13-104
Navigation to equipment,
13-111
Ethernet physical port
management
macro functions and default
user profiles, 5-5

Add/remove Node, 20-116


Add/remove ring in a bundle,
20-118
Add/remove Transport Link,
20-115
associate to OAM, 20-126
Create/delete, 20-110

Details, 18-240
Details of constraint, 18-219
Disassociate a Traffic
Classifier, 18-211
Get extremities, 18-235
Get Route, 18-242
Implement, 18-229
List, 18-199
List constraint, 18-216

Create/delete bundle, 20-117

macro functions and default


user profiles, 5-11

Create/delete ERP instance,


20-123

Modify, 18-205

Fault Localization, 20-134


Graphical view, 20-127
Implement/deimplement,
20-112, 20-125
Instance List, 20-121
List, 20-108
Modify Defined ERP instance,
20-129
Modify implemented ERP
instance, 20-131
Navigation to AS, 20-134
Overview, 20-10
Switch Command, 20-113,
20-114
Ethernet Segment, 11-6

Modify constraint, 18-222


Overview, 18-197
Ethernet Service, 11-6, 11-15
All to One Bundling attribute
See: User Network
Interface (UNI)
Bundling Service attribute
See: User Network
Interface (UNI)
Create, 18-22
Delete, 18-32
Details, 18-33
List, 18-20
management, 11-53
Also see: Traffic
Management

Add constraint, 18-213

Modify, 18-30

Allocate, 18-226

Overview, 18-17

Associate a Traffic Classifier,


18-209

Service Multiplexing attribute


See: User Network
Interface (UNI)

Configure, 18-233
connectivity view, 18-244
Create, 18-202

Ethernet Private Line (EPL), 11-8,


11-18

Deallocate, 18-227

Ethernet Private Transparent Line


(EPTL), 11-17

Delete, 18-208

Deimplement, 18-231

Delete constraint, 18-218

Setup, 18-24
Ethernet Switch, 18-197
Ethernet Termination Point (ETP)
Create, 21-20
Delete, 21-22
List, 21-18

....................................................................................................................................................................................................................................
1350 OMS
IN-8
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Ethernet Traffic Classifier


management
macro functions and default
user profiles, 5-10
Ethernet Traffic Descriptor
management
macro functions and default
user profiles, 5-10
Ethernet Transport Bridging
(ETB), 19-4
Also see: Bridge
Overview, 19-4
Ethernet Transport Link
Bandwidth load, 18-196
Configure, 18-188

Ethernet Virtual Private Line


(EVPL), 11-8, 11-16

Extended Ethernet Virtual Private


Line (Extended EVPL), 11-20

ETP
See: Ethernet Termination
Point

Extended EVPL
See: Extended Ethernet
Virtual Private Line

ETS
See: Ethernet Transport Service
(ETS)

Extended EVPLAN
See: Extended Ethernet
Virtual Private LAN

ETS NNI Interface

External Network Element


(ENE), 13-78, 11-48
Also see: Network Topology
Construction

VLAN Push/Pop
See: VLAN Management
EVC
See: Ethernet Virtual
Connection (EVC)
EVC Bandwidth

Create, 13-82
Delete, 13-87
Details, 13-88

Dynamic change, 19-112

List, 13-80

EVC Terminations, 19-116

Modify, 13-85

Implemented Object
applicability, 19-113

Overview, 13-78

List, 18-186
Overview, 18-184

Object applicability, 19-112

Details, 18-193
Get extremities, 18-190

Ethernet Transport Segment


macro functions and default
user profiles, 5-11
Ethernet Transport Service (ETS),
11-6
Also see: Traffic Management
Also see: Connection Oriented
Ethernet Virtual Connection
(EVC), 11-6
Also see: Bridge EVC
Also see: End-to-End EVC
Data Plane, 19-11
Fault Localization, 19-65,
19-70
Life cycle
See: Spanning tree instance
Start OAM, 24-28
Ethernet Virtual Private hub (EVP
Hub), 11-8
Ethernet Virtual Private LAN
(EVPLAN)
See: LAN

Object status applicability,


19-113
EVC management, 11-53
Also see: Traffic Management
macro functions and default
user profiles, 5-9
EVP Hub
See: Ethernet Private Line hub
(EVP hub)
EVPL
See: Ethernet Virtual Private
Line
See: Ethernet Virtual Private
Line (EVPL)
EVPLAN
See: Ethernet Virtual Private
LAN
Expedited Forwarding (EF), 11-66
Extended Ethernet Virtual
Connection
See: End-to-End EVC
Extended Ethernet Virtual Private
LAN (Extended EVPLAN),
11-21

External termination management


macro functions and default
user profiles, 5-5
External Termination Point
Create, 13-92
Delete, 13-94
List, 13-90
............................................................
F FAD

See: Functional Access


Domain
Failure management
log file location, 6-5
log file suffixes, 6-5
Fault Localization, 11-69
List, 22-12
Navigation to equipment,
19-65
Navigation to manager, 19-70
Fault Management (FM), 22-12,
22-12
Also see: Fault Localization
Alarm probable cause, 22-2

....................................................................................................................................................................................................................................
1350 OMS
IN-9
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Alarm synchronization, 22-15

Graphical User Interface (GUI),


11-39

Client Signal Fail, 22-16

Grooming feature, 11-31

from ISA E/FE/GE board, 22-3

GUI
See: Graphical User Interface

from ISA ES1 board, 22-4


from ISA ES16 board, 22-6

.............................................................

from ISA ES4 board, 22-4


H Half mode

on SDH paths, 22-8

See: Duplex mode

Overview, 22-2

Hash key, 13-118

Flow control

High Speed Internet (HSI), 11-22

Asymmetric, 11-52
Symmetric, 11-52
FM
See: Fault Management (FM)
Frame delivery, 18-41, 18-44
Frame distribution
See: Hash key

Instances, 2-1
Interworking Interface (IWI),
11-48
IP address
See: TCP/IP address
IP DSCP/TOS

Hub & Spoke Topology, 11-31


Also see: Network Topology
Description

ISA BCE Ethernet Board

In Band

free pool, 11-71, 11-72

Address Configuration, 20-157

Full E2E EVC


See: End-to-End EVC

LAG port creation, 20-165

Full meshed Topology, 11-33


Also see: Network Topology
Description

Inner Provider, 11-48


Also see: Network Topology
Construction

HSI
See: High Speed Internet

.............................................................
I

Inner equipment, 11-48


Also see: Network Topology
Construction

Management, 20-156
NMS Start Supervision, 20-183
In band management, 28-3

Frame Classification, 18-6

Configuration, 13-146
ISA board
MIB realignment for, 9-2
Realign an ISA Board MIB
task, 9-4
IWI
See: Interworking Interface
.............................................................
J JacORB.log, 6-2

Full mode
See: Duplex mode

Configuration requirements,
28-8

Join
See: CES procedures

Functional Access Domain (FAD),


11-71

Manual resource reservation,


28-11

Jumbo Frames, 13-135

Functional domain

Overview, 28-3

Ethernet connectivity, 11-45

Pseudowire configuration, 28-9

Maintenance management,
11-46

Subnetwork topology, 28-4

Configure, 13-137
Overview, 13-135
.............................................................

MPLS management, 11-46


Network Topology
Construction, 11-45
Overview, 11-45
T-MPLS management, 11-46
Traffic management, 11-45
Utilities, 11-46
.............................................................
G Glossary, lxxiii

Tunnel configuration, 28-9


In fiber management
See: In band management

L Label Edge Router (LER), 11-10,

11-10
Label Switched Router (LSR),
11-10

inband management, 25-13


Also see: Circuit Emulation
Services

LAC state, 13-40


See: Network Element (NE)

Ingress (-ing), 11-35

LAG
See: Link Aggregation

Initiator, 11-71, 11-72


Inner ENE, 11-48
Also see: Network Topology
Construction

LAG Link Over Cable, 14-62


Create from extremities, 14-63
Create from Links, 14-66

....................................................................................................................................................................................................................................
1350 OMS
IN-10
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Create VCG from extremities,


14-69
Create VCG from Links, 14-72
Delete, 14-77
Details, 14-80
Get extremities, 14-79
List, 14-62
Modify, 14-75
LAG Port
Assign NAD, 13-125
Create, 13-118

deassign from Domain, 14-61

Get extremities, 14-90

Delete, 14-46

List, 14-89

Details, 14-50

Link over MPLS

Fault Localization, 14-59


Get extremities, 14-48
Join, 14-52
List, 14-41
Link over cable
macro functions and default
user profiles, 5-6
Link Over Cable

Details, 13-126

Modify, 14-44

Inventory of physical port,


13-128

Overview, 14-38

List, 13-116
Modify, 13-120
LAN
See: Local Area Network
Layer-2
Control Protocol Processing,
19-16
Encapsulation
See: T-MPLS Pseudo Wire
See: T-MPLS tunnel
LER
See: Label Edge Router
Link Aggregation (LAG), 13-113,
13-113
Also see: LAG Port
Group of Ports, 13-113
Overview, 13-113
Supporting NE, 13-114
Link Over Cable, 14-38
Assign NAD, 14-58
assign to Domain, 14-60

Split, 14-52
Upload, 13-74
Link over EVC
AAR, 28-31
Activation, 28-29
Alarms, 28-25
Assign to Domain, 28-27
Bandwidth usage, 28-18
Creation, 28-22
Deactivation, 28-29
Deassign from Domain, 28-27
Deletion, 28-24
Description, 28-18
Inventory, 28-33
Involved objects, 28-18
Lock and unlock, 28-20
OAM, 28-26
Routing Display, 28-32
STP impacts, 28-30

Configure, 14-57

Transport Link configuration,


28-28

Configure Join, 14-54

Usage within an EVC, 28-30

Configure Split, 14-54


Create, 14-42

Link Over MPLS


Details, 14-91

macro functions and default


user profiles, 5-6
Link Over MPLS
Overview, 14-88
Link Over Radio
List, 14-93
Link over SDH
macro functions and default
user profiles, 5-5
Link Over TDM
Assign NAD, 14-32
assign to Domain, 14-30
Configure, 14-25
Create, 14-21
deassign from Domain, 14-31
Delete, 14-24
Details, 14-34
Fault Localization, 14-36
Get extremities, 14-27
List, 14-17
remove inconsistent paths,
14-29
Upload, 13-59
Link Over T-MPLS
Details, 14-97
Get extremities, 14-96
infrastructure, 14-99
List, 14-95
Overview, 14-94
Link Over WDM
Details, 14-86
Get extremities, 14-84
List, 14-83
Overview, 14-82

....................................................................................................................................................................................................................................
1350 OMS
IN-11
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Linktrace
See: Operations,
Administration, and
Maintenance (OAM)
Local port, 11-47, 11-47
Also see: Ethernet physical
port

trace management log file


locations, 6-6

LSR
See: Label Switched Router

trace management log file


suffixes, 6-6

.............................................................

log out, 11-38

Loopback
See: Operations,
Administration, and
Maintenance (OAM)

login, 11-38

LSP PHB profile

Logs

Create, 16-8

1354BM.log, 6-2

Delete, 16-11

allTracesModify.logg, 6-3

Details, 16-13

ascurusm.log, 6-3

List, 16-6

BmAdaptationModifyTrace.log, 6-3

Modify, 16-9

BmMplsModifyTrace.log, 6-3,
6-3
Command logs, 2-3
.data log file suffixes, 6-2
.dataflow log file suffixes, 6-2
*_dbi.log, 6-2
EMLStart.log, 6-2
EotModifyTrace.log, 6-3
failure management log file
location, 6-5
failure management log file
suffixes, 6-5
*Gui.log, 6-3
JacORB.log, 6-2
list of maintenance/log files,
6-2

Overview, 16-5
LSP Tunnel, 15-39
Add constraint, 15-56

MAC Bridge
Configure edge switching port,
12-73
Configure internal switching
port, 12-72
Configure switching port,
12-71
Configure UNI, IWI, or NNI
switching ports, 12-72
Distributed MAC Bridge,
12-67

Bandwidth load, 15-74

Network Configuration, 12-77

Create, 15-43

Provisioning procedure, 12-70

Deallocate, 15-51

MAC Bridging, 11-8

Delete, 15-47

MAC flushing

Delete constraint, 15-58, 15-60

Creation, 16-158

Details, 15-70

Force, 16-164

Get extremities, 15-67

Interconnection Schemes,
16-162

Implement, 15-65
List, 15-18, 15-36, 15-41,
16-28
List constraint, 15-53

log file locations, 6-2


.log log file suffixes, 6-2

List of Transport Links, 15-79

NMLStart.log, 6-2

List of VC-LSP, 15-72

pmc2.log, 6-2

Modify, 15-45

PMCStart.log , 6-2

Overview, 15-40

Security logs, 2-3

Route, 15-77

System logs, 2-3

Maintenance Association (MA)


See: Operations,
Administration, and
Maintenance (OAM)

Allocate, 15-48

List of cross connections,


15-63

smf.log, 6-2

M MA

LSP Tunnel management


macro functions and default
user profiles, 5-7

List, 16-160
MAC flushing protection
Description, 16-157
MAC Flushing Protection, 16-156
Also see: T-MPLS Tunnel
Redundancy
Macro functions
Domain management, 5-3
ENE management, 5-4
Ethernet physical port, 5-5
External termination
management, 5-5
Link over cable, 5-6

....................................................................................................................................................................................................................................
1350 OMS
IN-12
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Link over MPLS, 5-6

EVPLAN, 11-27

Link over SDH, 5-5

Extended EVPL, 11-27

NE management, 5-4

Extended EVPLAN, 11-27

SDH termination management,


5-4

HSI, 11-27

Service node management, 5-3


TMPLS management, 5-3
Utilities management, 5-6
Maintenance Activation, 24-28
Maintenance Association (MA)
See: Operations,
Administration, and
Maintenance (OAM)
Maintenance management, 11-69,
11-46
Also see: Fault Localization
Also see: Functional domain
overview
Alarms, 11-69
Inventory, 11-70
Overview, 11-69
Management Layers

Service Definition, 11-27


MIB
categories of misalignment, 9-3
definition, 9-2
MIB parameter, 7-6
operating principals, 9-2
Realign an ISA Board MIB
task, 9-4
realignment for a new ISA
board, 9-2
MPLS
LSP Tunnel management
macros, 5-7
m_AuditAlignRecovery
process, 4-3
m_DataManagement process,
4-3

Element Management Layer


(EML), 11-5

m_FaultManagement process,
4-3

Network Management Layer


(NML), 11-5

m_NetworkManagement
process, 4-3

Physical Layer, 11-5

m_TrafficProfileManagement
process, 4-3

Service Management Layer


(SML), 11-5
Manager control, 13-90
Also see: External Termination
Point
Martini encapsulation, 11-33
MEF
See: Metro Ethernet Forum
Metro Ethernet Forum (MEF)
Broadcast, 11-27
BTV, 11-27
EPL, 11-27
EPTL, 11-27

Traffic descriptor management


macros, 5-7
Transport Link management
macros, 5-7
VC LSP management macros,
5-8
MPLS layer
T-MPLS comparison, 11-9
MPLS management, 11-46
Also see: Functional domain
overview
LSP Tunnel, 11-65, 11-66
MPLS Transport Link, 11-65

T-MPLS Transport Link,


11-65, 11-65
Traffic Descriptor, 11-65,
11-66
Transport Link, 11-65
VC-LSP, 11-65, 11-67
MS-GUI
See: Multi-Service GUI
Multi-Manager management,
11-44
Multi-Manager Management
definition, 8-2
identifying Ethernet-defined
entities, 8-3
operational guidelines, 8-3
scenarios, 8-2
Multiplexing attribute
See: User Network Interface
(UNI)
Multipoint to Multipoint
See: Service classification
Multi-Service GUI (MS-GUI),
11-39
Multi-service node
T-MPLS PseudoWire, 11-10
MW-INT
functionality, 2-1
instances and, 2-1
Process Monitoring, 2-1
............................................................
N NAD

See: Network Access Domain


Create, 13-132
Delete, 13-134
List, 13-130
Modify, 13-133
Native Network, 11-35
NBI
NbiManagement process, 4-4

EVPL, 11-27
....................................................................................................................................................................................................................................
1350 OMS
IN-13
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

NE
See: Network Element (NE)
NE management
macro functions and default
user profiles, 5-4
NEs
those supported for this release,
1-4

Network Topology Construction,


11-45
Also see: Functional domain
overview
Auto-negotiation, 11-48
Customer Edge (CE), 11-49
Domain management, 11-47
ENE management, 11-48

Network Access Domain (NAD),


11-71, 11-72, 11-72, 13-130

Ethernet Edge Port


management, 11-51

Network architecture, 11-7

Inner equipment, 11-48

Network Element (NE), 13-40,


11-47
Also see: discovery

NE management, 11-47

Add to Subnetwork, 13-46


assign to Domain, 13-29
available NE, 13-53
Boards, 11-48
create Topological View, 13-77

Overview, 11-47

.............................................................
O OAM

See: Operations,
Administration, and
Maintenance (OAM)
Operations, Administration, and
Maintenance (OAM), 11-9
Configure Maintenance
Association, 24-23
Configure OAM Domain,
24-13
Continuity Check (CC), 24-3
Create OAM Domain, 24-7

Provider equipment, 11-48

Deimplement Maintenance
Association, 24-25

Subnetwork management,
11-47

Deimplement OAM Domain,


24-14

Transport Link management,


11-50

Disable Continuity Check,


24-24

Network Topology Description

create VT Queue Profile, 13-76

Full meshed Topology, 11-33

Enable Continuity Check,


24-24

deassign from Domain, 13-30

Hub & spoke Topology, 11-31

Inventory item of MA, 24-26

Define, 13-43

Overview, 11-30

Defined NE, 13-42

Point to Point Topology, 11-30

Inventory objects of MA,


24-27

Details, 13-52

Ring Topology, 11-35

inventory of VT Queue
Profiles, 13-73

Network-to-Network Interface
(NNI), 11-10, 11-48, 18-225

LAC state Acknowledge, 13-68

NML
See: Network Management
Layer

Management, 11-47
Also see: Network
Topology Construction

NML Proxy, 11-43

Modify, 13-49

NML-IM, 11-43

Overview, 13-40

NMLStart.log, 6-2

Resources, 11-47
Also see: Network
Topology Construction

NNI
See: Network-to-Network
Interface

Network Management Layer


(NML), 11-5
Network topologies, 11-8
Also see: Service classification

north interface, 11-71


Also see: System management

Inventory of monitored objects,


24-16
Inventory of OAM Domain,
24-15
Linktrace, 24-3
Linktrace activation, 24-31
List Maintenance Association,
24-18
List OAM Domains, 24-8
Loopback, 11-69, 24-3
Loopback activation, 24-29
Maintenance Association,
24-17
Maintenance Association
(MA), 24-3
Maintenance Domain (MD),
24-3
Model, 24-4

....................................................................................................................................................................................................................................
1350 OMS
IN-14
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Modify Maintenance
Association, 24-22
Modify OAM Domain, 24-12
Monitored Objects, 24-6
Overviw, 24-3
Properties of MA, 24-20
Properties of OAM Domain,
24-10
Start on EVC, 24-28
Terminology, ITU vs IEEE,
24-3
Operator, 11-71
Also see: System management
Oracle
ORACLE/databases/dbnml/
admin/bdump directory, 6-3
ORACLE/databases/dbnml/
admin/create directory, 6-3
ORACLE/databases/dbnml/
admin/logbook file, 6-3
ORACLE/databases/network
directory, 6-4
oracle_monitor_process, 4-3
.............................................................
P Packet concatenation, 11-31, 11-33

Packet Radio
See: Circuit Emulation
Services
Parameters
DB_SIZE parameter, 7-6
MIB parameter, 7-6
PRINTER parameter, 7-4
SYS_START_WAIT_VAL
parameter, 7-5
SYSTEM_TUNING_VAL
parameter, 7-5
TMP_ALM_PADDINGRATE
parameter, 7-9
TMP_ALM_TEMPOASYNC
parameter, 7-9

TMP_A:LM_
TEMPOPOLLING parameter,
7-9

TMP_WAIT_MPLS_
SYNCHRO_STARTUP
parameter, 7-12

TMP_ALM_TEMPOTIMER
parameter, 7-9

UI_LANGUAGE parameter,
7-4

TMP_
CDNDATABLOCKSIZE
parameter, 7-9

PBB
See: Provider Backbone
Bridge (PBB)

TMP_EML_
TEMPOPOLLING parameter,
7-10

PBB B-VID

TMP_FORBIDDEN_
COMMENT_CHAR
parameter, 7-10
TMP_FORBIDDEN_LABEL_
CHAR parameter, 7-10
TMP_LINK_OVER_SDH_
SYNCHRONIZATION_AT_
STARTUP parameter, 7-10

Allocate, 20-87
Create, 20-84
Deallocate, 20-88
Deimplement, 20-91
Delete, 20-86
Domain Wide distribution,
20-93
Implement, 20-89

TMP_LOG_BASED_
SYNCHRONIZATION_AT_
STARTUP parameter, 7-10

Inventory of ERP instances,


20-101

TMP_NE_UNDER_
<application>_
MANAGEMENT parameter,
7-11

List ERP instances, 20-101

TMP_NML_
TEMPOPOLLING parameter,
7-11

Ring Association, 20-95

TMP_
REMOTENAMINGEMLFILE parameter, 7-11

Transport Link association,


20-102

TMP_SDH_TERM_
SYNCHRONIZATION_AT_
STARTUP parameter, 7-11
TMP_SE_ACCESSCTL
parameter, 7-11
TMP_TRACELEVEL
parameter, 7-12

List, 20-83

Management, 20-82
modify ERP, 20-99

Ring Dissociation, 20-97

Transport Link dissociation,


20-104
PBB EVC, 20-77, 20-78
Also see: Broadcast Domain
Containment
Also see: Broadcast Domain
Containment
Add Termination, 20-56

TMP_
TRACEMAXLINECOUNT
parameter, 7-12

Add Termination on
implemented EVC, 20-71

TMP_WAIT_EOT_
SYNCHRO_STARTUP
parameter, 7-12

Bridge Flows, 20-74

Allocation, 20-65

Configure, 20-73
Create, 20-63, 20-144

....................................................................................................................................................................................................................................
1350 OMS
IN-15
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Deallocation, 20-67

Per Hop Behaviour (PHB), 19-18

deimplement, 20-70

profile
See: LSP PHB profile
See: T-MPLS Pseudo Wire

Fault Localization, 20-134


Fault Management, 20-133
Implement, 20-68

Performance Monitoring (PM),


11-69

List, 20-61

Selective collection, 11-69

Management, 20-60

ShowPM, 18-74, 18-182

Navigation to AS, 20-134

Start, 18-71

Remove Termination, 20-59

Stop, 18-72

Remove Termination on
implemented EVC, 20-72

Synchronize, 18-73

PBB EVC Termination


Automatic association to
default VT, 20-79
Manual association to default
VT, 20-80
PBB Workflow, 20-135
Add NE to a Domain, 20-138
Add Transport Link to a
Domain, 20-139
B-VID configuration, 20-143
Create PBB Domain, 20-137
Domain overview, 20-135
ERP provisioning, 20-141
EVC Allocation and
Implementation, 20-155

VPWS procedure, 12-62


per-STI
See: Spanning Tree Instance
PHB
See: Per Hop Behaviour (PHB)
Physical Layer, 11-5, 11-5
Physical Port
Inventory from LAG port,
13-128
Upload, 13-54
PIR
See: Peak Information Rate
(PIR)
PM
See: Performance Monitoring
(PM)
PM Administration, 2-2

EVC traffic classification,


20-153

pmc2.log, 6-2

Overwiew, 20-135

PMCStart.log, 6-2

Traffic Descriptor Definition,


20-154

Point to Multipoint
See: Service classification

Transport Link overwiew,


20-135

Point to Point
See: Service classification

PBS
See: Peak Burst Size (PBS)
Peak Burst Size (PBS), 11-64
Peak Information Rate (PIR),
11-64

Topology, 11-30
Also see: Network
Topology Description
Policy Control, 11-64
Also see: Traffic Management
PRINTER parameter, 7-4

Priority Id, 11-56


Also see: VLAN Management
Process Monitoring, 2-1
Protection, 28-16
Also see: Ethernet Linear
Protection (ELP)
Provider
Equipment, 11-48
Also see: Network
Topology Construction
Provider network, 12-67
VLAN mapping, 11-60
Also see: Ethernet Frame
Hierarchy
VLAN tunneling, 11-61
Also see: Ethernet Frame
Hierarchy
Provider Backbone Bridge (PBB),
20-5
Also see: PBB
Overview, 20-5
Provider Bridging, 11-8
Provider Network Management
macro functions and default
user profiles, 5-13
Proxies
Proxy_E_EML_NAME
process, 4-4
Proxy_E_SNA_NAME
process, 4-4
Proxy_N_NML_NAME
process, 4-4
Proxy, 11-43
Pseudo Wire
See: T-MPLS Pseudo Wire
P-VLAN, 11-60
Also see: Provider VLAN
.............................................................
Q Q3, 11-47, 11-48

QoS
See: Quality of Service

....................................................................................................................................................................................................................................
1350 OMS
IN-16
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Q-tag, 11-56, 11-58


Also see: VLAN Management
Quality of Service, 11-69
.............................................................
R Radio Ports

Upload, 13-75
Raw E2E EVC
See: End-to-End EVC
Remote port, 11-47, 11-47
Also see: TDM terminations
Replacement
See: Utilities
Reroute operation, 16-109, 16-111
Reservation
See: Utilities
Reserved Spanning Tree Protocol,
12-69
Restore procedure, 23-33
Resynchronization
See: Synchronization
Ring Topology, 11-35
Also see: Network Topology
Description
Routed Multipoint
See: Service classification
Routing Display, 18-75

SEC User Authentication, 2-2


Service classification, 11-15
Any to Any, 11-15
Multipoint to Multipoint, 11-15
Point to Multipoint, 11-15
Point to Point, 11-15
Routed Multipoint, 11-15
Service Delimiting, 19-117
Operation and expected
behavior, 19-117
Vlan Push/Pop on UNI/IWI,
19-117
Service management
macro functions and default
user profiles, 5-9
Service Management Layer
(SML), 11-5
Service Node
inventory of NE, 13-38
List, 13-39
Overview, 13-37
Service node management
macro functions and default
user profiles, 5-3
Service Type

RSTP
See: Reserved Spanning Tree
Protocol

BTV, 11-24

.............................................................

EPL, 11-18

S Safety information, lxix

EPTL, 11-17

SDH termination management


macro functions and default
user profiles, 5-4

Broadcast, 11-26

EVPL, 11-16
EVPLAN, 11-19
Extended EVPL, 11-20

SEC User Administration, 2-2

Extended EVPLAN, 11-21

SEC User Authentication, 2-2

HSI, 11-22

Section
See: T-MPLS Section
Security
SEC User Administration, 2-2

Sessions
SessionManagement process,
4-4

SLM
(Packet) Loss Measurement
See: SLM Tool
SLM Tool, 24-33
Activate SLM Tool, 24-47
Configure Maintenance End
Points, 24-36
Configure OAM ETH SLM
Tool, 24-52
Create ETH SLM Tool, 24-44
Deactivate SLM Tool, 24-47
Description, 24-35
Inventory, 24-49
List, 24-40
SMF
smf.log, 6-2
SMF/tools/log/data file
directory, 6-3
SML
See: Service Management
Layer
SNMP, 11-47, 11-48
Software interfaces, 11-42
Spanning Tree Instance (STI)
active STI, 19-8
configuration, 19-121
Control plane, 19-9
Deimplementation, 19-124
EVC life cycle, 19-13
Implementation, 19-123
inventory, 19-119
List, 19-120
Overview, 19-8
per-STI, 19-8
Port configuration, 19-8
Static tree topology, 19-9
ST-link, 19-8
Tree topology, 19-8, 19-8

....................................................................................................................................................................................................................................
1350 OMS
IN-17
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Start AAR procedure


See: Utilities
STI
See: Spanning Tree Instance
Stitch
See: CES procedures

.............................................................
T Takeover

CES
See: CES Procedures
Description for TMPLS,
18-130

TMP_ALM_PADDINGRATE
parameter, 7-9
TMP_ALM_TEMPOASYNC
parameter, 7-9
TMP_ALM_TEMPOPOLLING
parameter, 7-9

ST-link
See: Spanning Tree Instance

Full EVC Overview, 18-121

TMP_ALM_TEMPOTIMER
parameter, 7-9

Stop AAR procedure


See: Utilities

Key features for T-MPLS,


18-130

TMP_CDNDATABLOCKSIZE
parameter, 7-9

Subnetwork

Main procedure steps for


T-MPLS, 18-130

TMP_EML_TEMPOPOLLING
parameter, 7-10

Procedure for full EVC, 18-122

TMP_FORBIDDEN_
COMMENT_CHAR parameter,
7-10

Create, 13-8
Delete, 13-13
Details, 13-14
List, 13-7
Modify, 13-10
Overview, 13-5
Subnetwork management, 11-47
Also see: Network Topology
Construction
Synchronization, 12-60
synchronization
CES Link Over Radio
See: CES procedures
SYS_START_WAIT_VAL
parameter, 7-5
System management, 11-46
Also see: Functional domain
overview

Procedure for TMPLS, 18-131


TAO/maintenance/trace file, 6-4
Tasks
Access the System
Configuration Window and
Configure a 1350 OMS
Application, 3-3
Integrate the 1350 OMS PKT
Master Workstation with the
Client Workstation, 3-9
Integrate the 1350 OMS PKT
with Other NMSs, 3-8
Realign an ISA Board MIB
task, 9-4
Run AlignDBSDHPathID Tool
task, 10-3
View Application Release
Information, 2-4

Access Control Data Base,


11-71

TCP/IP address, 11-38, 13-40

FAD, 11-71

TDM termination

free pool, 11-71, 11-72

Audit, 13-62

Initiator, 11-71, 11-72

Details, 13-67

NAD, 11-71, 11-72

List, 13-66

Overview, 11-71

Synchronize, 13-64

User Profile management,


11-71, 11-71

Upload, 13-57

SYSTEM_TUNING_VAL
parameter, 7-5

Termination Point
See: Ethernet Termination
Point

TMP_FORBIDDEN_LABEL_
CHAR parameter, 7-10
TMP_LINK_OVER_SDH_
SYNCHRONIZATION_AT_
STARTUP parameter, 7-10
TMP_LOG_BASED_
SYNCHRONIZATION_AT_
STARTUPP parameter, 7-10
T-MPLS EVC
Force MAC flushing, 16-164
List, 17-32
MAC flushing List, 16-160
T-MPLS layer
MPLS comparison, 11-9
TMPLS management
macro functions and default
user profiles, 5-3
T-MPLS networking layers, 11-10
LSP Tunnel, 11-10
PseudoWire, 11-10
Section, 11-10
T-MPLS Pseudo Wire
Add constraint, 16-60
Add/Remove PHB profile,
16-64
Allocate, 16-67

....................................................................................................................................................................................................................................
1350 OMS
IN-18
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Bandwidth load, 16-86

Dellocate, 16-120

Configure, 16-60, 16-62, 16-64

Details, 16-107

Create, 16-53

Get extremities, 16-132

Deallocate, 16-70

Get route, 16-137

Deimplement, 16-74

Implement, 16-122

Delete, 16-57

Inventory, 16-134

Delete constraint, 16-62

Inventory of Pseudo Wires,


16-138

Details, 16-58
Details of constraints, 16-78
Get extremities, 16-82
Get route, 16-87
Implement, 16-72
Layer-2 encapsulation, 16-66
List, 16-51
List constraints, 16-76
List cross connections, 16-80
List crossing Pseudo Wires,
16-88

Layer-2 encapsulation, 16-115


List, 16-99
List constraints, 16-126
List cross connections, 16-130
Modify, 16-104
Overview, 16-97
Remove PHB Profile, 16-113
T-MPLS Tunnel Redundancy,
16-165
Also see: MAC Flushing
Protection

List sections, 16-84

Black Hole prevention, 16-167

Modify, 16-55

Create Dual-point-topointProtection, 16-175

Overview, 16-50
T-MPLS Section
Details, 14-102

Create MAC Flushing


Protection Schema, 16-177

TMP_NML_TEMPOPOLLING
parameter, 7-11
TMP_
REMOTENAMINGEMLFILE
parameter, 7-11
TMP_SDH_TERM_
SYNCHRONIZATION_AT_
STARTUP parameter, 7-11
TMP_SE_ACCESSCT parameter,
7-11
TMP_TRACELEVEL parameter,
7-12
TMP_
TRACEMAXLINECOUNT
parameter, 7-12
TMP_WAIT_EOT_SYNCHRO_
STARTUP parameter, 7-12
TMP_WAIT_MPLS_
SYNCHRO_STARTUP
parameter, 7-12
Tool
See: Utilities
Trace management
log file location, 6-6
log file suffixes, 6-6
Traffic Classifier

Get extremities, 14-101

Create one-to-one-open
protection, 16-173

Associate to an Ethernet
Segment, 18-209

Inventory from tunnel, 16-134

Description, 16-166

Create, 18-160

List, 14-100

EVC setup, 16-178

Delete, 18-164

Overview, 14-99

Interconnection types, 16-167

T-MPLS LSP Tunnel, 11-10

Disassociate from an Ethernet


Segment, 18-211

PW dual-point-to-point, 16-167

T-MPLS Tunnel

List, 18-158

Add constraint, 16-109

Redundancy creation types,


16-166

Modify, 18-162

Add PHB Profile, 16-113

Reference network, 16-166

Overview, 18-156

Allocate, 16-117

Reference scenarios, 16-168

Properties, 18-165

Bandwidth load, 16-136

Tunnel one-to-one-open,
16-166

Create, 16-101
Deimplement, 16-124
Delete, 16-106
Delete constraint, 16-111

TMP_NE_UNDER_
<application>_MANAGEMENT
parameter, 7-11

Traffic Descriptor
Create, 18-146
Delete, 18-152
Details, 18-153
for MPLS, 15-5

....................................................................................................................................................................................................................................
1350 OMS
IN-19
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

List, 18-144

Transport Link for MPLS

Modify, 18-149

Bandwidth load, 15-33

Overview, 18-142

Define, 15-25

Traffic Descriptor for MPLS

Details, 15-31

Create, 15-8

Get extremities, 15-28

Delete, 15-15

Inventory, 15-36

Details, 15-16

List, 15-23

Inventory, 15-18

List from LSP Tunnel, 15-79

List, 15-6

Overview, 15-21

Modify, 15-12
Traffic descriptor management
macro functions and default
user profiles, 5-7
Traffic management, 11-45
See: Ethernet Transport
Bridging (ETB)
Also see: Functional domain
overview
EVC management, 11-53
Overview, 11-53
Policy Control, 11-64
VLAN management, 11-54
Also see: Ethernet Frame
Hierarchy

Transport Link for T-MPLS


Bandwidth load, 16-25
Define, 16-18
Details, 16-23
Get extremities, 16-20
Inventory, 16-28
List, 16-16
Overview, 16-14
Transport Link management
Link Over Cable, 11-50
Link Over MPLS, 11-51
Link Over RPR, 11-51
Link Over TDM, 11-50

Traffic parameter
See: Ethernet Edge Physical
Port

Link Over T-MPLS, 11-51

Transparent transmission, 11-30,


11-31

macro functions and default


user profiles, 5-7

Transport layer, 11-8


RPR ring, 11-11
SDH layer, 11-9
T-MPLS layer, 11-9
Transport Link, 18-184
Also see: Ethernet Transport
Link
Classification, 14-5
Concatenated VC, 14-11
List by domain, 14-104
Overview, 14-4

Link Over WDM, 11-51, 11-51

Transport Link Management


macro functions and default
user profiles, 5-12
Transport Link management, 11-50
Also see: Network Topology
Construction
TSS 5
See: In band management
Tunnel Redundancy
See: T-MPLS Tunnel
Redundancy

.............................................................
U UI_LANGUAGE parameter, 7-4

UNI
See: User Network Interface
(UNI)
User Network Interface (UNI),
19-18
Also see: Bandwidth Profile
All to One Bundling attribute,
11-12
Bundling Service attribute,
11-12
Service Multiplexing attribute,
11-13
User profiles (default)
Color Profile management,
5-12
Customer management, 5-9
domain management, 5-3
ENE management, 5-4
Ethernet Edge Physical Port
management, 5-10
Ethernet physical port, 5-5
Ethernet Segment
management, 5-11
Ethernet Traffic Classifier
management, 5-10
Ethernet Traffic Descriptor
management, 5-10
Ethernet Transport Segment
management, 5-11
EVC management, 5-9
External termination
management, 5-5
Link over cable, 5-6
Link over MPLS, 5-6
Link over SDH, 5-5
LSP Tunnel management, 5-7
NE management, 5-4
Provider Network
management, 5-13

....................................................................................................................................................................................................................................
1350 OMS
IN-20
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

SDH termination management,


5-4
Service management, 5-9
Service node management, 5-3
TMPLS management, 5-3
Traffic descriptor management,
5-7

.............................................................
V VC LS management

macro functions and default


user profiles, 5-8
VC-LSP, 15-81, 15-72
Also see: LSP Tunnel, List of
VC-LSP

Transport Link management,


5-7, 5-12

Commission, 15-96

Utilities management, 5-6

Decommission, 15-98

VC LS management, 5-8

Deimplement, 15-94

VLAN Typemanagement, 5-13

Delete, 15-91

Users

Create, 15-85

Details, 15-102

VLAN configuration scenario,


12-75
VLAN Tag, 11-57
Also see: Ethernet Frame
Hierarchy
VLAN Tag Protocol Type,
11-62
Also see: Ethernet Frame
Hierarchy
Also see: VLAN Type
Virtual Private Hub Service
(VPHS), 11-8
Virtual Private Wire Service
(VPWS), 12-62
PM management, 12-62

SEC User Administration, 2-2

Get extremities, 15-99

SEC User Authentication, 2-2

Implement, 15-92

Configure, 16-42

List, 15-18, 15-36, 15-83,


16-28

Create, 16-35

Utilities, 11-46
Also see: Functional domain
overview
AAR procedure, 23-3
Align Up, 23-15, 23-28

Modify, 15-89
Overview, 15-82

Alignment, 23-4, 23-26

Viewer, 11-71
Also see: System management

Audit, 23-3

Virtual Bridging, 11-8

audit on a NE, 23-20

Virtual concatenation, 11-31

Audit results, 23-8, 23-24

Virtual Local Area Network


(VLAN)

Audit tool, 23-6


Force Alignment, 23-4
List of auditable NEs, 23-18
List of Audited NEs, 23-22
Overview, 23-3
Recovery, 23-5
Replacement, 23-30
Reservation, 23-4, 23-32
Start AAR procedure, 23-16
Stop AAR procedure, 23-17
Utilities management
macro functions and default
user profiles, 5-6

Virtual Transport

Deimplement, 16-46
Delete, 16-39
Details, 16-40
Get extremities, 16-48
Implement, 16-44
List, 16-33
Modify, 16-37
Overview, 16-31

Management, 11-54, 11-62


Also see: Ethernet Frame
Hierarchy

VLAN
See: Virtual Local Area
Network

Mapping, 11-59
Also see: Ethernet Frame
Hierarchy

Vlan and Priority based

Overview, 19-10

VLAN Id, 11-56


Also see: VLAN Management

pop, 11-57, 11-58


push, 11-57, 11-58
Push/Pop at ETS NNI
Interface, 18-225

Frame Classification, 18-6


Also see: VLAN

VLAN Tag, 11-56


Also see: VLAN Management
VLAN type

swap, 11-57, 11-58

Create, 18-248

Tunneling, 11-61
Also see: Ethernet Frame
Hierarchy

Delete, 18-253
List, 18-247
Modify, 18-251

....................................................................................................................................................................................................................................
1350 OMS
IN-21
8DG42227DAAA 9.6
Issue 3 December 2012

Index
....................................................................................................................................................................................................................................

Overview, 18-246
VLAN Type Management
macro functions and default
user profiles, 5-13
VPHS, 11-33
See: Virtual Private Hub
Service (VPHS)
VPWS
See: Virtual Private Wire
Service
VT
association to fixed VT, 20-80
default VT, 20-79
VT Queue Profile
create, 13-76
.............................................................
W Web Desktop, 11-38

Web Portal, 1-3, 2-2

....................................................................................................................................................................................................................................
1350 OMS
IN-22
8DG42227DAAA 9.6
Issue 3 December 2012

Вам также может понравиться