Академический Документы
Профессиональный Документы
Культура Документы
ALCplus2 IDU
ALS series equipment with ALCplus2 IDU
management software application
Release 1.2
User manual
MN.00237.E - 006
Volume 1/1
The information contained in this handbook is subject to change without notice.
Property of SIAE MICROELETTRONICA. All rights reserved according to the law and according to the inter-
national regulations. No part of this document may be reproduced or transmitted in any form or by any
means, electronic or mechanical, without written permission from SIAE MICROELETTRONICA.
Unless otherwise specified, reference to a Company, name, data and address produced on the screen dis-
played is purely indicative aiming at illustrating the use of the product.
MS-DOS®, MS Windows® are trademarks of Microsoft Corporation
HP®, HP OpenView NNM and HP–UX are Hewlett Packard Company registered trademarks.
UNIX is a UNIX System Laboratories registered trademark.
Oracle® is a Oracle Corporation registered trademark.
Mozilla Firefox is a Mozilla Foundation registered trademark.
Linux term is a trademark registered by Linus Torvalds, the original author of the Linux operating system.
Linux is freely distributed according the GNU General Public License (GPL).
Other products cited here in are constructor registered trademarks.
WEB LCT ALCplus2 IDU
Contents
INSTALLATION ...................................................................................................................... 17
START-UP .............................................................................................................................. 18
START-UP FROM BROWSER ................................................................................................. 19
To open the WEB LCT page from browser (Ethernet connection) ......................................... 19
To open the WEB LCT page from browser (USB connection) ............................................... 20
To open the WEB LCT page from browser (serial connection) .............................................. 20
To open the WEB LCT page from browser (connection via modem) ...................................... 21
Messages displayed at the start of WEB LCT ..................................................................... 22
START-UP FROM SCT/LMT ................................................................................................... 25
The WEB LCT application allows an user connecting to an equipment via his own machine (pc, workstation,
etc.) using the operating system (1) and the Web browser at his disposal.
WEB LCT is an application resident in the equipment controller. It does not require any additional module
installed on the user PC, except for the SCT/LMT program or the WEB Lct Console program, necessary to
WEB LCT for the management of the file transfer between PC and equipment (FTP), of the serial/USB/mo-
dem connection (PPP) and of the help on-line of WEB LCT (Help Web Server).
(1)For operating systems different from MS Windows®, a FTP server, an Help WEB server and a PPP man-
agement module must be installed on one’s PC.
It is possible to open:
• More WEB LCT pages on more machines or on the same machine, using the same user or dif-
ferent users.
• Only one WEB LCT page relevant to the same equipment.
• More WEB LCT pages relevant to different equipment.
For more information about the limits of the application, refer to the specific paragraph (pag.16).
Fig.1 WEB LCT application (start-up of the WEB LCT page from browser)
FTP
Help Web Server
Network
equipment
SCT/LMT
or
Web Lct
Console
FTP
PPP
Network Help Web Server
equipment
SCT/LMT
or
Web Lct
Console
WEB LCT
Network page
equipment local
equipment
(172.18.60.33)
WEB LCT
Network page
equipment local
equipment
(172.18.60.33)
The WEB LCT application is called WEB LCT <equipment type> depending on the equipment type to man-
age.
This guide describes the WEB LCT ALCplus2 IDU application present in the equipment of series ALS with
ALCplus2 IDU.
The version of the WEB LCT application present in the equipment controller can be verified opening the
relevant WEB LCT page and executing one of the following operations:
(1) If the WEB LCT page is opened from browser (local equipment and remote equipment - see Fig.1). If
the WEB LCT page is opened from SCT application, the user can connect only to the local equipment (see
Fig.2).
WEB LCT is an application resident in the equipment controller. It does not require any installation on the
user PC.
To install or update the WEB LCT application present in an equipment, see pag.126.
As help to the WEB LCT application for the management of the FTP, PPP and Help Web Server, it is neces-
sary to use the SCT/LMT or WEB Lct Console program.
The instructions for the installation of the SCT/LMT and Web Lct Console programs are reported in the rel-
evant manuals.
For the management of the FTP, PPP and Help Web Server, it is necessary to start even the SCT/LMT or
WEB Lct Console (WLC) program.
The instructions to start the SCT/LMT and Web Lct Console programs are reported in the relevant manuals.
Depending on the type of used physical connection PC-equipment, follow the specific procedure:
• To open the WEB LCT page from browser (Ethernet connection) - pag.19.
• To open the WEB LCT page from browser (USB connection) - pag.20.
• To open the WEB LCT page from browser (serial connection) - pag.20.
• To open the WEB LCT page from browser (connection via modem) - pag.21.
If this type of connection is used, checks or settings are not generally necessary. Only if more network
cards are equipped, it will be necessary to select the card you wish to use (Host Adapter) (see Web Lct
Console user manual).
When the equipment is connected to the PC via LAN network, the relevant WEB LCT page can be opened
also selecting the equipment from the address book of Web Lct Console (see relevant documentation).
2. Run a browser.
5. Type, into the Password box, the access code coupled with the set user.
6. Check the Remember Me box if you wish that, on the next opening of the WEB LCT application of the
considered equipment, the current username and password are automatically displayed. Otherwise un-
check the considered box.
7. Press Login.
If the typed values are correct, the WEB LCT page of the local equipment and of the remote equipment
is displayed.
Fig.3 shows an example of WEB LCT ALCplus2 IDU pages.
The items present in the WEB LCT ALCplus2 IDU page of the local equipment and of the remote equip-
ment are the same and are described in Fig.5.
As regards the messages that can be displayed during the start procedure of WEB LCT go to pag.22.
After the opening of the WEB LCT page depicted in Fig.3, the Login page of the browser remains avail-
able pointing out the characteristics of the connected equipment. In any moment, it is possible to close
the WEB LCT page and re-open it without executing the login but simply selecting the label Click here
in the Login window.
If this type of connection is used, before activating the connection, the USB driver must be installed
and configured (see Web Lct Console user manual).
Then, if you think the USB driver does not operate correctly, execute the controls pointed out in the Web
Lct Console user manual.
When the equipment is connected to PC via an USB connection, the connection management is implement-
ed by WLC program.
2. If not already active, run Web Lct Console program and open the relevant graphical interface (see rel-
evant documentation).
The Web Lct Console window opens.
3. Press Options.
The Options window opens.
4. Select the Connect using direct serial cable option in the PPP area.
5. Press Ok.
6. Execute one of the following operations:
• In the Web Lct Console window, press Connect.
• Select , press the right mouse button and select Connect in the pop-up menu.
If the connection operation is successful, the default browser is opened with the WEB LCT login page.
7. Type, into the User box, the name of the SCT/LMT user to use to activate the connection.
8. Type, into the Password box, the access code coupled with the set user.
9. Check the Remember Me box if you wish that, on the next opening of the WEB LCT application of the
considered equipment, the current username and password are automatically displayed. Otherwise un-
check the considered box.
10.Press Login.
If the typed values are correct, the WEB LCT page of the local equipment and of the remote equipment
is displayed.
Fig.3 shows an example of WEB LCT ALCplus2 IDU pages.
The items present in the WEB LCT ALCplus2 IDU page of the local equipment and of the remote equip-
ment are the same and are described in Fig.5.
As regards the messages that can be displayed during the start procedure of WEB LCT go to pag.22.
After the opening of the WEB LCT page depicted in Fig.3, the Login page of the browser remains avail-
able pointing out the characteristics of the connected equipment. In any moment, it is possible to close
the WEB LCT page and re-open it without executing the login but simply selecting the label Click here
in the Login window.
If this type of connection is used, checks or settings are generally not necessary as, at the installation
of WLC, the Remote Access (LctDirectPPP) is automatically installed and configured.
If you think the Remote Access does not operate correctly, verify its configuration as points out in Web Lct
Console user manual.
When the equipment is connected to PC via the serial connection, the connection management is imple-
mented by WLC program.
2. If not already active, run Web Lct Console program and open the relevant graphical interface (see rel-
evant documentation).
3. Press Options.
The Options window opens.
4. Select the Connect using direct serial cable option in the PPP area.
5. Press Ok.
7. Type, into the User box, the name of the SCT/LMT user to use to activate the connection.
8. Type, into the Password box, the access code coupled with the set user.
9. Check the Remember Me box if you wish that, on the next opening of the WEB LCT application of the
considered equipment, the current username and password are automatically displayed. Otherwise un-
check the considered box.
10.Press Login.
If the typed values are correct, the WEB LCT page of the local equipment and of the remote equipment
is displayed.
Fig.3 shows an example of WEB LCT ALCplus2 IDU pages.
The items present in the WEB LCT ALCplus2 IDU page of the local equipment and of the remote equip-
ment are the same and are described in Fig.5.
As regards the messages that can be displayed during the start procedure of WEB LCT go to pag.22.
After the opening of the WEB LCT page depicted in Fig.3, the Login page of the browser remains avail-
able pointing out the characteristics of the connected equipment. In any moment, it is possible to close
the WEB LCT page and re-open it without executing the login but simply selecting the label Click here
in the Login window.
To open the WEB LCT page from browser (connection via modem)
If this type of connection is used, before activating the connection, the default modem must be config-
ured (see Web Lct Console user manual).
When the equipment is connected to PC via modem, the connection management is implemented by WLC
program.
3. Press Options.
The Options window opens.
5. Press Ok.
7. Type, into the User box, the name of the SCT/LMT user to use to activate the connection.
8. Type, into the Password box, the access code coupled with the set user.
10.Press Login.
If the typed values are correct, the WEB LCT page of the local equipment and of the remote equipment
is displayed.
Fig.3 shows an example of WEB LCT ALCplus2 IDU pages.
The items present in the WEB LCT ALCplus2 IDU page of the local equipment and of the remote equip-
ment are the same and are described in Fig.5.
As regards the messages that can be displayed during the start procedure of WEB LCT go to pag.22.
After the opening of the WEB LCT page depicted in Fig.3, the Login page of the browser remains avail-
able pointing out the characteristics of the connected equipment. In any moment, it is possible to close
the WEB LCT page and re-open it without executing the login but simply selecting the label Click here
in the Login window.
• Welcome in the WebLct Software upload utility.... The WEB LCT program is not present on the
equipment you wish to connect to.
In order to install WEB LCT, follow the procedure To update the WEB LCT application (pag.126)
starting from step 3.
• Warning: in order to view the contents you must install Adobe Flash Player.... It is necessary to
install or to update the version of Adobe Flash Player present on one’s PC for a correct use of
WEB LCT. The program can be installed/updated from the web site:
• www.siaemic.com > Login (to access to the Download area the registration is necessary)
> Download area - Software > WEB LCT (Windows version) > Adobe Flash Player...
• www.adobe.com.
• Login Fail. Problem: Invalid User!. It means that the typed username is wrong and/or not
present in the equipment user list or that the user password is wrong.
• Login Fail. Problem: The equipment is update protected by element manager, retry to login as
Read Only user. It means that the equipment is managed also by the NMS5UX/NMS5UX-B/
NMS5LX supervisory system and the NMS5UX user has prevented the possibility, for the SCT/
LMT user, to be able to execute the login of the equipment.
In this case, it is necessary that the NMS5UX user enables again the SCT/LMT user for the ex-
ecution of the operation.
• Login Fail. Problem: Too many WEB users!. It means that the equipment has been connected to
the maximum number of allowed users (see par. Limits - pag.16).
• Warning: compatibility issue found. The Equipment software version is greater/lower than We-
bLct version. This may cause unpredictable problems, means that the firmware version present
on the equipment is not compatible with the version of WEB LCT.
In order to update the firmware, follow the procedure To update the firmware of the equipment
(pag.124).
Fig.3 notes
(1) The local equipment is the equipment which you are connected to (equipment which the IP address
typed in the command line of the browser corresponds to).
At the opening of the WEB LCT page, the user will be connected to the local equipment with the
user/profile entered during the login request. In any moment it is possible to execute the logout
(pag.31) and re-execute the login (pag.30) using the same or a different user with respect to that
used for the login.
If the equipment is managed also by the NMS5UX/NMS5UX-B/NMS5LX supervisory system, the su-
pervisory system considers the connection of a SCT/LMT user with Read Only profile a LCT connec-
tion in Monitoring mode. While the supervisory system considers the connection to the equipment
of a SCT/LMT user with Station Operator or System profile a LCT connection in Configuration mode.
(2) For a correct display of the equipment in the WEB LCT page, it is NECESSARY insert in the remote
equipment list of the local equipment:
• The local equipment with type Managed by SCT.
• The remote equipment with type Remote Link.
If an equipment of type Remote Link is not present in the remote equipment list, the message Una-
ble to open remote element interface. Cause: Remote element not defined in local equipment re-
mote element list is displayed in this area. Press Click here to display, in the WEB LCT page of the
local equipment, the Remote Element Manager contextual area (see Fig.16) where the remote
equipment list can be managed.
If more equipment configured as Remote Link are present in the remote equipment list, the appli-
cation will automatically acknowledge as remote equipment the FIRST equipment of Remote Link
type present in the list, even if this one is not physically connected, with respect to the local equip-
ment, to the other side of the radio link.
In the remote equipment list, the equipment are sorted in increasing order by their IP address.
Moreover, the bar Remote Element List is displayed on the right side of the WEB LCT page of the
local equipment: selecting the bar, the Available Remote Element List pop-up window is displayed,
where the equipment configured as Remote Link present in the remote equipment list is listed.
For each equipment, the following characteristics are reported:
• Station. Station name.
• Equipment ID. Equipment identifier.
• IP Address. IP address.
• Radio Direction. Radio direction (radio branch)
• Conn. Status. Connection status between equipment and WEB LCT page (PC). Wording:
• Connected (green). The connection is active.
• Unreacheable (red). The connection is inactive.
Selecting an equipment in the list, the relevant WEB LCT page is displayed. For example, if the fol-
lowing remote equipment list is defined for the local equipment A:
Equipment B - 172.18.10.23 - Remote Link
Equipment C - 172.18.10.25 - Remote Link
At the opening of the WEB LCT page of equipment A from browser, the WEB LCT pages of equipment
A and equipment B (equipment of type Remote Link present in the Remote Element Table with low-
est IP address) will be displayed. In order to display the WEB LCT page of equipment C, instead of
that of equipment B, it is sufficient to open the Available Remote Element List window and select
the area pointing out the characteristics of equipment C.
To close the Available Remote Element List pop-up window, select the bar Remote Element List.
At the opening of the WEB LCT page, the user will be connected to the remote equipment in Monitor
modality. In order to set or modify the parameters of the remote equipment, the user shall execute
the login for the remote equipment. Even for the remote equipment, in any moment it is possible
to execute the logout and re-execute the login using the same or a different user with respect to
that used for the first login.
2. Activate the connection with the wished equipment (see relevant documentation).
3. Double click on the record representing the equipment in the SCT/LMT window or selecting the record
of the equipment and the Equipment > LCT Interface command.
The WEB LCT page of the equipment opens.
Fig.4 shows an example of WEB LCT ALCplus2 IDU page.
The items present in the WEB LCT ALCplus2 IDU page are described in Fig.5.
As regards the messages that can be displayed during the opening of WEB LCT page go to pag.22.
At the opening of the WEB LCT page, the user will be connected to the equipment with the user/profile
of the equipment in the SCT/LMT window.
In any moment, it is possible to execute the logout (pag.31) and re-execute the login (pag.30) using
the same or a different user with respect to that used for the login.
If both the LCT module and the WEB LCT module are available for a given equipment type, the se-
lection of the equipment in the SCT/LMT window and the successive selection of the LCT Interface
command automatically open the LCT equipment interface.
Some equipment types have only the WEB LCT program and not the LCT module. In this case, when
the LCT Interface command is selected, a message is displayed warning that, for the considered
equipment type, only the WEB interface is available. The message is displayed even if the selected
equipment type has the LCT module but this has not been installed on one’s PC.
In this case, there is no need to differentiate the opening of the WEB LCT page according to the con-
nection type, as the connection management is executed by the SCT/LMT program itself. For more infor-
mation, refer to the relevant documentation.
Fig.5 shows an example of WEB LCT ALCplus2 IDU page subdivided in the following areas:
Info/status
equipment
area
Contextual
area
Events
List
area
The info/equipment status area points out the characteristics and the connection status of the equipment
as depicted in Fig.6.
The information displayed in the area are updated at regular intervals depending on the timeout set by the
user.
Functional
status and
configuration
of the
equipment
(6)
Fig.6 notes
(1) The wording ALCplus2 IDU points out the ALCplus2 radio equipment.
(3) Label:
• Read & Write, Station Op or System. The equipment is in connected/login status and the user
who has required the login has, respectively, a profile of type Read and Write, Station Op-
erator or System.
• Monitor. The equipment is in connected/monitor status or in connected/login status the user
who has required the login has profile of type Read Only.
(4) Tab:
• About. Displays the version of the WEB LCT application present on the equipment.
• Options. Displays and manages the timeout used for the update of all the information
present in the WEB LCT page.
• Login. Manages the login and the logout of the user.
(5) Label:
• On Line (green). The equipment is in connected status. In this condition, the parameters can
be verified/modified.
• Off Line (red). The equipment is in disconnected status. In this condition, the parameters
cannot be verified/modified. The browser sends the command of reconnection at regular in-
tervals (timeout set by the user) until when the equipment returns in connected status or
the WEB LCT page is closed.
(7) For each branch, a line is foreseen pointing out from left to right in the column:
• Radio. Branch which the data present in the relevant row refer to. Wording:
• Tx.... Operating status and radio parameters of the branches (1 and 2) relevant to
transmission.
• Rx... Operating status and radio parameters of the branches (1 and 2) relevant to
reception.
The boxes Tx2A and Rx2A are present and meaningful only for the equipment in protected
configuration.
If the radio is not equipped (Radio A: Unequipped - see Fig.44) the parameters present in this area
are not meaningful and then the relevant values are not displayed (---).
To verify/modify the timeout used for the update of all the information
present in the WEB LCT page
3. Press Ok.
2. Type the name of the user, with which you wish to execute the login, in the User box.
3. Type the access code associated to the set use into the Password box.
4. Press Login.
If the operation is successful, the profile of the user who has executed the operation is pointed out in
the Curr. Profile box (Read and Write, Station Operator or System).
If the system displays the following message:
• Login Fail. Invalid User!, it means that the typed username is wrong and/or not present in the
users list of the local equipment or that the user password is wrong.
2. Press Logout.
If the operation is successful, the wording Monitor is displayed in the Curr. Profile box.
The contextual area is the part of the WEB LCT page where the equipment parameters are displayed. Its
content changes accordingly to the selected command.
In WEB LCT the commands allowing to verify/modify the equipment parameters are collected in the fol-
lowing menus:
• Main Menu (pag.37). Commands for the management of the general equipment parameters
as, for example, the configuration of the supervision ports, the Routing Table, the remote equip-
ment list, the measure of Performance Monitoring, etc.
The commands of the Main Menu are displayed in the contextual area at the opening of the
WEB LCT page or each time you select the command Go to Main or Equipment Menu > Main
Menu as depicted in Fig.7.
• Equipment Menu (pag.152). Commands for the management of the configuration parameters
typical of the equipment type which the WEB LCT page refers to.
The command of the Equipment Menu are displayed in a pop-up area that opens when the
pointer passes over the Equipment Menu as depicted in Fig.8.
When a command is selected in the Main Menu or in the Equipment Menu, the contextual area displays
all the parameters relevant to the selected command.
For some commands, the parameters are subdivided in tabs. If all the tabs are not displayed at the same
time, the arrows keys are displayed to scroll the tabs.
In detail, use the keys to scroll the tabs and the key to display the list of the tabs.
For each equipment, a timeout can be set after which the relevant active manual operations
are automatically deactivated (see pag.134). The wording No Timeout points out that the time-
out is disabled; this means that a manual operation remains active until when the user deacti-
vates it.
• Requesting Data. Please wait!, Sending Data. Please wait!. The request or the sending of data
is respectively in progress between the PC and the equipment.
• Operation Fail! Wrong value assigned! A not allowed value has been set.
• Operation Fail! Unable to Get or Update parameter(s). Wrong user profile or not logged yet! The
operation cannot be executed because the user profile in use is not enabled to execute the action
or is not logged to the equipment yet.
• Not Implemented Yet!. The command is not available for the current version of the program.
Commands
Select this command list
to display in the
contextual area
the parameters
associated to it
Name of a compressed
group of commands.
The selection of the
option expands the
list of the associated
commands
Name of a expanded
command group: in fact,
under this option there
is a list of commands
The selection of the
option closes the list
of commands
In this bar
pointed out (1)
the name of (2)
the selected
command
The contents
of this area
changes
dynamically
according to
the command
selected
(3)
(4)
Fig.9 notes
(2) Select the Go to Main command to display in the contextual area the commands of the Main Menu
(pag.37).
(3) Press Refresh to force the reading of the data from equipment.
If the push-button is not available, the connection with the equipment is not active.
The Events List area displays the list of the status and alarm signals stored in the equipment controller as
depicted in Fig.10.
By means of the items present in the area, it is possible:
• To verify/modify the filters applied to the list of alarm/status signals (pag.36).
While, by means of the Main Menu > Reports & Loggers Maintenance command, it is possible:
• To save the equipment configuration, the alarm/status signals and the operations executed by
the users to file (pag.106).
• To delete the signals stored into the equipment controller (pag.109).
Activation
status of
filters (2)
Information
Status/ updating
alarms (3)
signals
list (1)
Fig.10 notes
(1) To each signal a record is associated, where the following information is reported:
• <Coloured box>. Box:
• Green. Status signal.
• Light blue. Alarm detected with Warning severity.
• Yellow. Alarm detected with Minor severity.
• Orange. Alarm detected with Major severity.
• Red. Alarm detected with Critical severity.
• Grey. Alarm detected/cleared.
• Alphanumeric string which details the nature of the signal.
When the pointer passes over a signal, a window is displayed where the following information is
reported:
• Signal type:
• Status. Status signal.
• Warning. Alarm detected with Warning severity.
• Minor. Alarm detected with Minor severity.
• Major. Alarm detected with Major severity.
• Critical. Alarm detected with Critical severity.
• Cleared. Alarm detected/cleared.
• Logic group which the signal belongs to: LIM, RT, COMMON, etc.
• Date/time of the signal detection (field In:).
• Date/time of the signal clearing (field Out:).
This field is present only for the detected/cleared alarms (signals of type Cleared).
(2) Wording:
• Filter is Off. No filter is active.
• Filter is On. At least one filter is active.
(3) The information present in the list are updated at regular intervals.
The period between an update and the successive one is pointed out by the clock.
If you want to update the information immediately without waiting for the refresh period select the
Reload command.
1. In the Events list area of the WEB LCT page (see Fig.10) if present the wording:
• Filter is Off. No filter is active for the status/alarm signals displayed in the area.
• Filter is On. At least one filter is active for the status/alarm signals.
2. To verify the status of the filters, select the Filter is... command.
A tab opens where the following filters are displayed:
• Status. Status signal.
• Warning. Alarm detected with Warning severity.
• Minor. Alarm detected with Minor severity.
• Major. Alarm detected with Major severity.
• Critical. Alarm detected with Critical severity.
• Cleared. Alarm detected and cleared.
Box:
• . Filter active. For example, if the Status box is active the status signals will not be present in
the list.
• . Filter inactive.
4. Select .
Each time a filter is applied, not only the currently displayed records are considered, but even all the
records stored in the equipment controller.
The setting of the filters remains valid until it is not modified by the user or the WEB LCT is closed.
The term alarm defines the fault signal generated by an error or malfunction of the equipment or of any
component that composes it.
The term status identifies instead the signals referring to any event that does not points out a malfunction
but a status change, an operation in progress or an operating indication.
The term event defines each single signal of status, detected alarm and cleared alarm.
A maximum of 400 events are recorded in the equipment controller. When this limit is exceeded, each new
event will overwrite the oldest event.
In the Main Menu of the WEB LCT page, the following commands are present:
For each command, the relevant description points out the user profile necessary to be able to use it. In
detail, the wording:
• Monitor. Equipment in connected/monitor status.
• Read only, Read and Write, Station Operator or System. Equipment in connected/login status
and that the user, who has requested the login, has respectively profile Read only, Read and
write, Station operator or System.
Moreover, if the commands allows executing some settings or changes, for each user profile the type of
operation that can be executed is pointed out. The option Reading points out that it is possible to check
the parameters, the option Writing that it is possible to set or to change them.
* The Station Operator user cannot align the reference date/time of the equipment to the date/time of the
PC.
The Equipment Properties command manages the properties and executes the equipment software re-
set.
In detail, it is possible:
• To verify the equipment properties (pag.38).
• To modify the equipment identifier (pag.39)
• To modify the IP address of the agent SNMP of the equipment (pag.39).
• To execute the equipment software reset (pag.39).
• To align the reference date/time of the equipment to the current date/time of the PC (pag.40).
Equipment
properties
(1)
Reference
date/time
of the PC (2)
Reference
date/time of the
equipment (2)
Fig.11 notes
(1) Box:
• Equipment Type. Equipment type and MIB (Management Information Base) version.
Read-only parameter.
• Equipment ID. Equipment identifier.
If the equipment is an element of a node parameter is read-only.
(2) The format of date/time changes according to the setting made in the operating system.
If the selected equipment is configured as element of a node, the relevant identifier can NOT be mod-
ified through this procedure. In order to modify it, if the equipment is element of a node:
• ALCplus2, refer to ALCplus2 Node Manager manual.
• ALplus, refer to SCT manual (ALplus Node Manager option).
If the selected equipment is configured as element of a node, the relevant IP address of the SNMP agent
can NOT be modified through this procedure. In order to modify it, if the equipment is element of a node:
• ALCplus2, refer to ALCplus2 Node Manager manual.
• ALplus, refer to SCT manual (ALplus Node Manager option).
2. Into the Agent IP Address box, type, for each one of the four available spaces (subdivided by a point),
a number comprised between 0 and 255.
After the reset, all the values activated before the operation result as valid ones.
The Port Configuration & ACL command manages the communication ports reserved to the local and
remote supervision of the equipment and the IP Access Control List.
In detail, it is possible:
• To verify/modify the characteristics of the communication ports reserved to the local and remote
supervision of the equipment (pag.41).
• To execute the equipment software reset (pag.47).
• To verify the rules used by the IP Access Control List (pag.47)
• To add/remove a rule from the IP Access Control List (pag.48)
• To enable/disable the use of the IP Access Control List (pag.48)
1. Select the Main Menu > Port Configuration & ACL command.
The Port Configuration & ACL contextual area opens.
The tabs Ethernet, LCT PPP, Radio 1A, 2Mb/s EOC and IP Over OSI/NSap represent the communication
ports of the equipment.
To verify the parameters relevant to a port, bring at front the specific tab.
Fig.12 shows an example.
2. To modify the parameters of the:
• Ethernet port, see pag.42
• LCT PPP port, see pag.43
• Radio 1A port, see pag.44
• 2Mb/s EOC port, see pag.45
• IP Over OSI port, see pag.45
3. Press Apply and confirm.
Each tab
(except ACL)
represents
a different
equipment
port (1)
(2)
Fig.12 notes
(1) For the ALCplus2 equipment are available the following tabs:
• Ethernet. Communication port with the LAN network.
• LCT PPP. Port for the connection to the PC where resides the SCT/LMT management program
or the browser for the start of WEB LCT.
• Radio 1A. 64Kbit/s communication channel of the EOC radio frame.
• 2Mb/s EOC. Communication port represented by the 2Mb EOC signal.
• IP Over OSI. Inner port for the interfacing with the OSI router.
Depending on the type of protocol managed by the selected equipment (IP/OSI), only the tabs rel-
evant to the communication ports managed by this protocol will be available.
(2) Push-button:
• Restart. It executes the software reset of the equipment.
• Store. It stores the values into the equipment controller.
• Retrieve. It reads again the values set into the equipment controller.
Ethernet port
Parameter/area:
If the selected equipment is configured as element of a node, the relevant IP address of the LAN
port can NOT be modified through this procedure. In order to modify it, if the equipment is element
of a node:
• ALCplus2, refer to ALCplus2 Node Manager manual.
• ALplus, refer to SCT manual (ALplus Node Manager option).
• In band management. Activation status of the in band supervision (the connection to the super-
vision is achieved by means of the traffic Lan tributaries and/or the internal Ethernet port).
In detail, if the LAN x/Port A box:
• . The in band supervision on the specific Ethernet port is not active.
• . The in band supervision on the specific Ethernet port is active.
To modify the parameter, activate/deactivate the specific boxes.
A VLan for this management MUST be reserved when the in band supervision is active (at least one
LAN x and/or Port A box active).
In detail, if the value present in the VLan ID box is:
• 0. No VLan is reserved for the in band supervision.
• Value different from 0. For the in band supervision, the VLan with the specific ID is reserved.
To modify the parameter, set a value comprised between 0 and 4095.
If the message Warning! VLAN ID already defined in “Virtual Lan list” or Mac Learning disable is
displayed when the user confirms the parameters (selection of button Apply), this means that at
least one of the following condition is present:
• The identifier set for the in-band supervision corresponds to that already used by a traffic
VLAN (see Fig.63). Change the value in the box VLan ID.
• The Ethernet port selected for the in-band supervision has not the MAC Address automatic
learning enabled in the MAC Address Table. For this port, set the parameter MAC Learning
to the value Enable (see Fig.64).
If the equipment belongs to a ALCplus2 node and is connected to other node elements through
Ethernet nodal Bus, the in-band supervision is not forwarded to the management LAN ports (MNGT/
1 and MNGT/2).
The x value points out the number of the Ethernet LAN port.
Parameter/push-button/area:
• IP PPP Address. IP/PPP address of the port for the connection with the PC where resides the SCT/
LMT management program or the browser for the start of WEB LCT.
To change the parameter, type, for each one of the four available spaces (sub-divided by a dot), a
number comprised between 0 and 255. The typed number has to be compatible with the setting of
the relevant IP PPP NetMask field.
• IP Unnumbered. The selection of this push-button allows using the address/mask of the Ethernet
port (if the equipment is managed by IP protocol) or IP Over OSI (if the equipment is managed by
OSI protocol) as IP PPP Address and IP NetMask of the considered port. As consequence, the IP/PPP
address is reset while the network mask displays the acquired value, which can be modified by the
user.
• PC IP Address. IP address of the remote equipment:
• Port IP Address + 1. The IP address of the considered port increased by 1 is assigned to the
remote equipment.
For example, if the IP PPP Address 10.10.10.8 is assigned to the port, the address
10.10.10.9 will be automatically assigned to the remote equipment.
• Eth Broadcast Ip Address - 1 or IP Over OSI Broadcast Address - 1. The last IP address valid
for the IP subnetwork connected to the considered port is assigned to the remote equipment.
For example, if the IP PPP Address 10.10.10.8 with mask 255.255.255.0 is assigned to the
port, the address 10.10.10.254 will be automatically assigned to the remote equipment.
It is suggested to use this setting if you wish to use only one IP address, within the IP sub-
network, for the connection to the PC.
If the equipment is managed with protocol:
• IP, the value Eth Broadcast Ip Address -1 is present.
• OSI, the value IP Over OSI Broadcast Address - 1 is present.
• xxx.xxx.xxx.xxx. The address set by the user in the fields xxx is assigned to the remote
equipment.
To modify the parameter, select the wished option and, only for the last option, type the wished IP.
The PPP operating mode is automatic: the port self-configures in Server mode and, when the connection
is set up, assigns the IP address to the remote equipment (see parameter PC IP Address).
Radio 1A port
Port available only for the equipment managed with the IP protocol and if the in band supervision is
disable (see Ethernet port - pag.42) and the radio is equipped (see option Radio A - Fig.44).
Parameter/push-button:
• IP Address. IP/PPP address of the 64Kbit/s communication channel of the EOC radio frame.
To change the parameter, type, for each one of the four available spaces (sub-divided by a dot), a
number comprised between 0 and 255. The typed number has to be compatible with the setting of
the relevant IP PPP NetMask field.
• IP Unnumbered. The selection of this push-button allows using the address/mask of the Ethernet
port (if the equipment is managed by IP protocol) or IP Over OSI (if the equipment is managed by
OSI protocol) as IP PPP Address and IP NetMask of the considered port. As consequence, the IP/PPP
address is reset while the network mask displays the acquired value, which can be modified by the
user.
Port available only for the equipment managed with the IP protocol.
Parameter/push-button/area:
• IP Address. IP/PPP address of the communication port represented by the 2Mb EOC signal.
To change the parameter, type, for each one of the four available spaces (sub-divided by a dot), a
number comprised between 0 and 255. The typed number has to be compatible with the setting of
the relevant IP PPP NetMask field.
• Signal input. Interface type to be used for the port under examination:
• Not used. No interface.
• E1. One or more 16Kbit channels of a timeslot relevant to A or B tributary (2Mbit/s).
To change the parameter select the wished option.
• EOC. Setting of the 2Mb tributary/timeslot/16Kbit used for the connection with the remote terminal.
In detail, parameter:
• 2Mb Selector. Used tributary (Trib A or Trib B). The wording No 2Mb Used points out that the
system does not use any tributary.
To change the parameter selects the box and then the option from the list.
If a value is not available, this means that the relevant tributary is used as output of the
T12 synchronism (see Fig.53).
• Slot Selector. Number of the used timeslot.
To change the parameter, type the number of the timeslot (value between 1 and 31).
• 16 Kbit PPP Map. Used 16Kbit (boxes with green color). The 16Kbit with the boxes of white
color are not used.
To change the parameter, select the wished boxes. At each selection, the box change its sta-
tus, it switches from active (green color) to deactivated (white color) and vice-versa.
The EOC area is available only if it has been selected the E1 value into the Signal input area.
Port available only for the equipment managed with the OSI protocol.
Parameter/area:
• IP Address. IP address of the inner port of the equipment, for the interfacing with the OSI router.
To change the parameter, type, for each one of the four available spaces (sub-divided by a dot), a
number comprised between 0 and 255. The typed number has to be compatible with the setting of
the relevant IP NetMask field.
• Signal input. Interface type to be used for the port under examination:
• Not used. No interface.
• E1. One or more 16Kbit channels of a timeslot relevant to A or B tributary (2Mbit/s).
To change the parameter select the wished option.
• EOC. Setting of the 2Mb tributary/timeslot/16Kbit used for the connection with the remote terminal.
In detail, parameter:
• 2Mbit/s Selector. Used tributary (Trib A or Trib B). The wording No 2Mb Used points out that
the system does not use any tributary.
To change the parameter selects the box and then the option from the list.
If a value is not available, this means that the relevant tributary is used as output of the
T12 synchronism (see Fig.53).
• Slot Selector. Number of the used timeslot.
To change the parameter selects the box and then the value from the list.
• 16 Kbit PPP Map. Used 16Kbit (boxes with green color). The 16Kbit with the boxes of grey
color are not used.
To change the parameter, select the wished boxes. At each selection, the box change its status, it
switches from active (green color) to deactivated (grey color) and vice-versa.
The EOC area is available only if it has been selected the E1 value into the Signal input area.
• EOC 2Mbit Side. Usage modality of the EOC E1 channel:
• Network. The LAP D protocol is configured as Network side.
• User. The LAP D protocol is configured as User side.
To change the parameter selects the box and then the value from the list.
The EOC 2Mbit Side area is available only if it has been selected the E1 value into the Signal
input area.
NSap tab
Area:
After the reset, all the values activated before the operation result as valid ones.
1. Select the Main Menu > Port Configuration & ACL command.
The Port Configuration & ACL contextual area opens (see Fig.12).
2. Press Restart.
The message Are you sure to restart? is displayed.
1. Select the Main Menu > Port Configuration & ACL command.
The Port Configuration & ACL contextual area opens.
2. Select the ACL tab.
The tab displays the rules used by the IP Access Control List (see Fig.13).
Use status
of the
IP Access
Control List
(1)
Rules used
by the
IP Access
Control List
(2)
(3)
Fig.13 notes
(1) Option:
• Enable. The use of the IP Access Control List is enabled: the access to the equipment by oth-
er elements (equipment, PC, etc.) is allowed only if the IP address of the element matches
the rules pointed out in the list.
• Disable. The use of the IP Access Control List is disabled: the access to the equipment by
other elements (equipment, PC, etc.) is not defined by the rules pointed out in the list.
(3) Push-button:
• Add. It adds a rule to the list.
• Remove. It deletes a rule from the list.
1. Select the Main Menu > Port Configuration & ACL command.
The Port Configuration & ACL contextual area opens.
2. Select the ACL tab (see Fig.13).
3. To add a rule:
a. Press Add.
The Insert parameters window opens.
c. Set, in the box Ip, the IP subnetwork or the single IP address which the rule refers to.
d. Set, in the box Mask, the netmask relevant to the IP subnetwork/IP address which the rule refers
to (if a single IP is set, the mask is 255.255.255.255).
f. If you wish the equipment allows or denies the access to any IP address, activate the check-box
Any. In detail, if you activates the check-box Any with selected the option:
• deny, the equipment will refuse packets sent by any IP address (with the exception point-
ed out at pag.49)in par. IP Access Control List (more info).
• allow, the equipment will accept packets sent by any IP address.
Selecting the check-box Any is equivalent to setting IP address to 0.0.0.0 and netmask to
0.0.0.0.
a. Select the row relevant to the rule you wish to delete from the list.
Multiple selections can be executed using the Ctrl or Shift keys.
1. Select the Main Menu > Port Configuration & ACL command.
The Port Configuration & ACL contextual area opens.
The IP Access Control List is a mechanism used to control and filter the source IP addresses which are al-
lowed accessing to an equipment.
This mechanism consists in a list of rules (Access Control Entry) which determine if an IP subnetwork or a
single IP address is allowed accessing to the selecting equipment.
Every rules are composed by a descriptive part and a decision-making part. The descriptive part of the rule
is represented by the IP address (or by a set of IP addresses) source of the packet. The decision-making
part is the action to execute: making the packet passes (allow) or refusing it (deny).
For an ALCplus2 equipment, the analysis of the packet consists in considering the following conditions:
1. The rules present in ACL are considered only if the use of ACL itself is enabled (Fig.13 - value Enable
active).
2. The control is applied only to the packets destined to the local equipment.
3. The access to the equipment is always allowed by the port LCT PPP (see pag.43)
4. The access is always allowed if the IP address coincides with that of an user who has executed a Login
procedure. The user is allowed modifying ACL without involving the loss of the connection with the
equipment.
5. The access is allowed only if the source IP address of the packet is not contained in any deny rule.
6. The access is allowed only if the source IP address of the packet is contained in, at least, one any rule.
The Routing Table command manages the static Routing Table and the Default Gateway address current-
ly used by the equipment (Running Routing Table and Running Default Gateway).
In detail, it is possible:
• To verify the Routing Table and the Default Gateway currently used by the selected equipment
(Running Routing Table and Default Gateway) (pag.50)
• To add an element to the Routing Table (pag.51)
• To remove one or more elements from the Routing Table (pag.51)
• To set/modify the IP address used as Default Gateway (pag.52)
• To delete the IP address used as Default Gateway (pag.52)
For more information about the Routing Table and the Default Gateway go to pag.52.
To verify the Routing Table and the Default Gateway currently used by the
selected equipment (Running Routing Table and Running Default Gateway)
Modality of
connection
(direct or
indirect) between
Elements of the specific port
routing table (Interface) and
destination IP
network (2)
IP address
of the IP
network or of Supervision port
the destination of the local
element equipment which
the Gateway
equipment is
IP NetMask
connected to (1)
of the IP
network or of
the destination
element IP address of
the equipment
that acts as
IP address of Gateway
the equipment
that acts as
Defaul Gateway
Fig.14 notes
(1) Wording:
• Lan. Communication port with the LAN network.
• Lan/OSI. Communication port that interfaces itself with the router OSI.
(2) Wording:
• Local. The IP network or the element are directly connected to the equipment interface. The
IP network or the element are automatically inserted by the equipment software.
• NetMgmt. The IP network or the element are not directly reachable from the equipment in-
terfaces. The IP network or the element have been manually inserted by the user (static el-
ement).
• Ospf. The IP network or the element are not directly reachable from the equipment interfac-
es. The IP network or the element have been manually inserted by the OSPF protocol (dy-
namic element).
• Other. All the other situations that are not comprised into one of the previous cases (this
label generally does not shown; it has been anticipated for future uses).
5. Into the Hop box, type the IP Address of the equipment acting as Gateway for the destination network.
For each one of the four available spaces (sub-divided by a dot), insert a number comprised between
0 and 255.
6. Press Add and confirm.
The new element is inserted into the table. The system records the new element into the currently used
Routing Table (Running Routing Table) and into the backup memory of the equipment (Stored Routing
Table).
Items automatically inserted by the controller (items with Local protocol) cannot be deleted.
3. Into the Destination box, type the IP Address of the equipment used as Default Gateway.
For each one of the four available spaces (sub-divided by a dot), insert a number comprised between
0 and 255.
The Interface box automatically points out the supervision port which the IP address of the Gateway
equipment corresponds to.
When all the equipment belong to the same IP network, it is not necessary to define the Routing Table
and the address of the gateway equipment because the network is able to manage its own inner traffic.
The setting of these parameters is necessary when the equipment belong to different networks, then, the
traffic has to be routed again from a network to the other one.
Routing Table
The function of the Routing Table is the one to check the routing of the supervisory messages exchanged
among the elements (PCs, equipment, etc.), that use the TCP/IP protocol, from one network to the other
one.
Each equipment at its initialisation (start-up operation) automatically sets the elements of the Routing Ta-
ble that identify the supervisory ports of the equipment (communication ports provided with the equipment
for the input/output of the supervisory signal).
These elements are set according to the IP addresses assigned to each port.
If the user changes the IP address of a supervisory port, the system does not dynamically change it into
the equipment Routing Table. It is necessary to execute a reset of the equipment, because the elements
of the Routing Table are set at the equipment start-up.
If it is necessary, the WEB LCT user can add to these elements (automatically set) some other ones.
The system records each new element (manually set) into the currently used Routing Table (Running Rout-
ing Table) and into the backup memory of the equipment controller (Stored Routing Table); the system
does not record the elements (automatically set) into the backup memory of the controller because they
are newly set at every equipment start-up.
The Running Routing Table is a static one. The system updates such a table, through the elements present
into the Stored Routing Table, at every equipment start-up.
The equipment does not currently use the Stored Routing Table. This table becomes operative on the
equipment restart. In fact, in this case, the system inserts the elements of the Stored Routing Table into
the Routing Table used by the equipment (Running Routing Table). What just said is valid only for the el-
ements whose router equipment (Hop) is associated to an active interface.
The setting of the Stored Routing Table id necessary, for instance, when the user wants to change an ad-
dress of the equipment supervisory ports. In such a case, it is not possible to change the currently used
Routing Table (Running Routing Table). The changes have to be inserted into the Stored Routing Table. At
the next equipment start-up, the system inserts the elements of the Stored Routing Table into the Routing
Table used by the equipment.
Default Gateway
The system forwards to the equipment with the Default Gateway function the data that have a receiver
unreachable through the routes present into the Routing Table.
The Stored Routing Table command manages the static Routing Table and the Default Gateway address
stored in the equipment (Stored Routing Table and Stored Default Gateway).
In detail, it is possible:
• To verify the static Routing Table and the Default Gateway address present into the backup
memory of the equipment controller (Stored Routing Table and Default Gateway) (pag.54).
• To add elements to the Stored Routing Table (pag.55).
• To remove one or more elements from the Stored Routing Table (pag.56).
• To set or to change the IP address used as Default Gateway into the Stored Routing Table
(pag.56).
• To delete the IP address used as Default Gateway into the Stored Routing Table (pag.56).
For more information about the Routing Table and the Default Gateway go to pag.52.
To verify the static Routing Table and the Default Gateway address present
into the backup memory of the equipment controller (Stored Routing Table
and Stored Default Gateway)
Elements of the
routing table
Supervision
port of the
IP address
local equipment
of the IP
which the
network or of
Gateway equipment
the destination
is connected to (1)
element
IP NetMask IP address
of the IP of the equipment
network or of acting as Gateway
the destination
element
IP address of
the equipment
that acts as
Defaul Gateway
(2)
(1) Wording:
• Lan. Communication port with the LAN network.
• Lan/OSI. Communication port that interfaces itself with the router OSI.
• Lct. Port for the connection to the PC where resides the SCT/LMT management program or
the browser for the start of WEB LCT.
• Radio 1A. Communication port represented by the radio signal.
• 2Mb/s EOC. 2Mb EOC communication port.
The available values change according to the protocol managed by the equipment (IP/OSI),
The current setting of the parameters relevant to each single port can be verified selecting the Main
Menu > Port Configuration & ACL (pag.41) command.
(2) Push-button:
• Retrieve. It reads again the data from the backup memory and loads them into the equip-
ment memory.
• Save. It saves the elements of the table into the backup memory of the equipment.
• Refresh. It reads again the data from the memory of the equipment after a Retrieve com-
mand.
For instance, if the user wants updating the stored Routing Table displaying the elements
manually added by the user into the running Routing Table, he has to press Retrieve and
later the Refresh one.
3. Into the Destination box, type the IP Address of the IP network or of the destination element.
For each one of the four available spaces (sub-divided by a dot), insert a number comprised between
0 and 255.
4. Into the NetMask box, type the mask for the destination IP network
For each one of the four available spaces (sub-divided by a dot), insert a number comprised between
0 and 255.
5. Into the Hop box, type the IP Address of the equipment acting as Gateway for the destination network.
For each one of the four available spaces (sub-divided by a dot), insert a number comprised between
0 and 255.
6. Into the Interface box, set the supervisory port of the local equipment which the Gateway equipment
is connected to.
Select the arrow placed on the side of the box and select the wished option from the list (see Fig.15).
Select the wording None selected, when the system has automatically to insert the parameter according
to the IP address of the router.
The system records the new element ONLY into the backup memory of the equipment (Stored Rout-
ing Table). At the next equipment start-up, the system will insert this new element also in the current
routing table (Running Routing Table). What just said is valid only for the elements whose equipment
(Hop) is associated to an active interface.
Items automatically inserted by the controller (items with Local protocol) cannot be deleted.
The system deletes the element ONLY from the backup memory of the equipment (Stored Routing
Table). At the next equipment start-up, the system will delete such an element also into the current
Routing Table (Running Routing Table).
To set/modify the IP Address used as Default Gateway into the Stored Rout-
ing Table
The system records the IP address of Default Gateway ONLY into the backup memory of the equip-
ment (Stored Routing Table). The equipment will display such an IP address only at the next restart
procedure of the equipment itself and the system will insert it also into the current Routing Table (Run-
ning Routing Table).
To delete the IP address used as Default Gateway into the Stored Routing
Table
The Remote Element Table command manages the remote equipment list.
In detail, it is possible:
• To verify the remote equipment list (pag.57).
• To add (pag.58), to rename (pag.58) and to remove (pag.59) a station.
• To add (pag.59) and to remove (pag.60) an equipment inside the list.
• To reset the remote equipment list (pag.60)
For more information about the remote equipment list (Remote Element Table) go to pag.60.
Record that
List of the represents
equipment the station (1)
subdivided
according to
the belonging Record that
station represents the
equipment (2)
Equipment
name
IP address
(Agent SNMP)
Equipment
type (3)
Fig.16 notes
(1) For each station, the name of the station is displayed after the suffix Station:
The name of the station is assigned by the user during the creation of the station itself.
The stations are displayed in the same order as they are inserted in the remote equipment list.
An empty station, that is a station without associated equipment, cannot be stored in the remote
equipment list.
To expand a station and see the list of the associated equipment, it is sufficient to select the record
of the station.
(3) Wording:
• Managed by SCT. Equipment managed by the WEB LCT and/or SCT/LMT application.
• Remote Link. Equipment managed by the WEB LCT and/or SCT/LMT application that consti-
tutes the equipment placed on the other end of the radio connection with respect to the local
equipment (equipment which the user is connected to by WEB LCT).
• Elem. Manager. Element Manager of the equipment (IP address of the machine where the
NMS5UX/NMS5UX-B/NMS5LX system resides).
• Not Managed. Element not managed by the WEB LCT and/or SCT/LMT application. This op-
tion can be used to insert into the remote equipment list some information as for instance
the coupling between the IP address and the NSAP (Gosip) one of an equipment inserted into
an OSI network.
• Node X. Equipment belonging to the ALCplus2 or ALplus local node.
With ALCplus2 local node we mean a set of minimum 2 and maximum 8 equipment
(ALCplus2) interconnected by a Ethernet nodal Bus and/or by a TDM nodal Bus, where the
considered equipment is an element. In this case the value X can correspond to a number
between 1 and 8 and points out the subset.
With ALplus local node we mean a set of minimum 2 and maximum 3 equipment (ALplus-
Nodal Matrix/ALCplus2 with IduBoard Exp. Nod. 2xSTM-1 16E1 expansion) interconnected
by TDM nodal bus, where the considered equipment is an element. In this case the value X
can correspond to A, B or C and points out the subset.
3. Type, into the text box, the name to be assigned to the station (alphanumeric string with minimum 1
and maximum 11 characters).
The program does not create two stations with the same name in the same list. Moreover, the use of
a number or of a space as first character is not allowed.
4. Press Ok.
The application displays the new station into the Remote Element Manager contextual area, at the end
of the list relevant to the already existing stations.
4. Type, into the text box, the new name (alphanumeric string with minimum 1 and maximum 11 char-
acters).
The program does not create two stations with the same name in the same list. Moreover, the use of
a number or of a space as first character is not allowed.
5. Press Ok.
The application displays the new name of the station into the Remote Element Manager contextual area.
The deleting of the station causes also the removal of all the equipment coupled with such a station.
5. Only if the equipment is inserted into an OSI network, set the NSAP (Gosip) address executing the fol-
lowing procedure:
a. Into the Sys.ID field (Gosip Address area), type the wished value.
b. To check or to change the setting of the default part of the address, press Set.
The Gosip Address area is expanded.
7. Press OK.
In the Remote Element Table contextual area, under the selected station, a record named Equipment
<progressive number> is displayed with the characteristics of the new equipment.
Each equipment has a remote equipment list stored in its own controller.
With remote equipment list we mean a list containing all the network remote equipment which you wish
to connect to.
For a better vision of the equipment during the setting of the list, it is possible to subdivide the equipment
into stations, in such a way that, at the selection of a station, the application will display only the detail of
the equipment associated with such a specific station. The station does not have any particular meaning;
it has been simply introduced to help the user during the localization of the equipment.
Into each remote equipment list, it is possible to create a maximum of 100 equipment and 30 station.
The remote equipment list has a specific function according to the management program in use.
When the user requires the opening from browser of the WEB LCT application of an equipment (local equip-
ment), at the opening, besides the WEB LCT page of this equipment, the system automatically opens even
the WEB LCT page of the equipment, of Remote Link type, present in the remote equipment list of the local
equipment.
If the remote equipment does not answer to the connection request, the connection command will be sent
cyclically until when:
• The WEB LCT page of the local equipment is closed.
• The equipment is deleted from the remote equipment list of the local equipment.
For a correct display of the equipment in the WEB LCT page, it is NECESSARY to insert in the remote
equipment list of the local equipment:
• The local equipment with type Managed by SCT.
• The remote equipment with type Remote Link.
SCT/LMT program
When the user requests the connection to a generic equipment present into the network (local equipment),
at the connection of such an equipment, the SCT/LMT program reads its remote equipment list and auto-
matically forwards the connection command to all the equipment present into the list.
In such a way, the application displays, into the Station List area of the SCT/LMT graphical interface, all
the stations that group the equipment and, into the Equipment List area (selecting the relevant station),
it displays the functional status of the local equipment (that results in connected/login status) and the func-
tional status of all the remote equipment present into the list. The equipment that have answered to the
connection request of the application will result in connected/monitor status.
The application will cyclically forward the connection command, to the equipment that have not answered
to the connection request, until to:
• It is deactivated the connection with the local equipment.
• The user disables the equipment.
• The equipment is deleted from the remote equipment list of the local equipment.
More detailed information concerning the SCT/LMT program are reported into the relevant manuals.
The measures available for the ALCplus2 equipment are the following.
• G829 RstB1 STM-1 <STM-1 number> (pag.70). This measure checks the quality of the received
signal at line side (STM-1 stream).
The check consists of measuring, by means of the B1 byte, the BBE, ES, SES, SEP, UAS, OOFS qual-
ity parameters.
The BBE, ES, SES, UAS parameters are implemented according to G.829 ITU-T Rec.
he SEP parameter is implemented according to G.828 ITU-T Rec.
• G829 MstB2M1 STM-1 <STM-1 number> (pag.75). This measure checks the quality of the re-
ceived signal at line side (STM-1 stream).
The check consists of measuring, by means of the B2 and M1 bytes, the following quality parame-
ters:
• Byte B2 -> BBE, ES, SES, UAS, SEP.
• Byte M1 -> BBE FE, ES FE, SES FE, UAS FE, SEP FE.
• Byte B2 e M1 -> UASBIDI.
The BBE, ES, SES, UAS, BBE FE, ES FE, SES FE, UAS FE, UASBIDI parameters are implemented
according to G.829 ITU-T Rec.
The SEP, SEP FE parameters are implemented according to G.828 ITU-T Rec.
• G828 Radio <radio branch> (pag.79). This measure checks the quality of the received signal at
radio side.
The check consists of measuring the BBE, ES, SES, SEP, UAS quality parameters.
The parameters are implemented according to G.828 ITU-T Rec.
• G828 E1 Line Side (pag.83). This measure checks the quality of the received signal from one of
the IDU board E1 tributary (A or B) at line side.
The check consists of measuring the BBE, ES, SES, SEP, UAS quality parameters. The BBE, ES, SES,
UAS parameters are implemented according to G.826 ITU-T Rec.
The SEP parameter is implemented according to G.828 ITU-T Rec.
• G828 E1 Radio Side (pag.87). This measure checks the quality of the received signal from one of
the IDU board E1 tributary (A or B) at radio side.
The check consists of measuring the BBE, ES, SES, SEP, UAS quality parameters. The BBE, ES, SES,
UAS parameters are implemented according to G.826 ITU-T Rec.
The SEP parameter is implemented according to G.828 ITU-T Rec.
• G828 STM-1 <STM-1 number> - Vc12 <TUG3-TUG2-TUG12> (pag.89). This measure checks
the quality of the received VC12 into the STM-1 stream.
The check consists of measuring the ES, SES, UAS, ES FE, SES FE, UAS FE, UASBIDI, SEP, SEP FE,
BBE, BBE FE quality parameters.
The parameters are implemented according to G.828 ITU-T Rec.
• ACM Radio A (pag.93). This measure traces the trend of the ACM profiles in the time.
The trend is traced using one counter for each ACM profile and two further counters (UpShift and
DownShift).
• RxPwr Radio <radio branch> (pag.99). This measure checks the power of the signal at recep-
tion.
The check consists of measuring the RLTS, RLTM quality parameters specified by the Standard EN
301 129 of the ETSI.
• TxPwr Radio <radio branch> (pag.102). This measure checks the power of the signal at trans-
mission.
The check consists of measuring the TLTS, TLTM quality parameters, specified by the Standard EN
301 129 of the ETSI.
The quality parameters description of the G829 RstB1 STM-1 <STM-1 number> measure (pag.70) is the
following:
• BBE (Background Block Error). Number of blocks where it has been detected at least one er-
rored bit not belonging to SES.
• ES (Errored Second). The second when there have been one or more errored blocks.
• SES (Severely Errored Second). The second when there have been a percentage of errored
blocks > N% (the N value can be configured) or the second when it has been activated an alarm
equivalent to the interruption of the signal at reception (Loss of Signal Alarm, Loss of Frame
Alarm, B2 Excessive Ber Alarm, etc.).
• SEP (Severely Errored Period). Number of periods with a number of consecutive SES comprised
between 3 and 9. The sequence is ended by a second without SES.
• UAS (UnAvailable Seconds). Number of unavailability seconds.
The counting of the seconds starts after P consecutive seconds with SES presence and it ends
at the beginning of a period of Q consecutive seconds without SES. The P seconds are counted
into the unavailability period. The Q and P values can be configured.
• OOFS (Out of Frame Seconds). The second that do not belong to UAS but with the Out OF Frame
Alarm activated.
The quality parameters description of the G829 MstB2M1 STM-1 <STM-1 number> measure (pag.75) is
the following:
• BBE (Background Block Error). Number of blocks where it has been detected at least one er-
rored bit not belonging to SES.
• ES (Errored Second). The second when there have been one or more errored blocks.
• SES (Severely Errored Second). The second when there have been a percentage of errored
blocks > N% (the N value can be configured) or the second when it has been activated an alarm
equivalent to the interruption of the signal at reception (Loss of Signal Alarm, Loss of Frame
Alarm, B2 Excessive Ber Alarm, etc.).
• SEP (Severely Errored Period). Number of periods with a number of consecutive SES comprised
between 3 and 9. The sequence is ended by a second without SES.
• UAS (UnAvailable Seconds). Number of unavailability seconds.
The counting of the seconds starts after P consecutive seconds with SES presence and it ends
at the beginning of a period of Q consecutive seconds without SES. The P seconds are counted
into the unavailability period. The Q and P values can be configured.
• BBE FE (Background Block Error Far End). Number of remote blocks, where it has been detected
at least one errored bit, not belonging to SES.
• ES FE (Errored Second Far End). The second when there have been one or more errored remote
blocks.
• SES FE (Severely Errored Second Far End). The second when there have been a percentage of
errored blocks > N% (the N value can be configured) or the second when it has been activated
an alarm equivalent to the interruption of the signal at reception (Ms Rdi Alarm).
• SEP FE (Severely Errored Period Far End). Number of periods with a number of consecutive SES
FE comprised between 3 and 9. The sequence is ended by a second without SES FE.
• UAS FE (UnAvailable Seconds Far End). Number of remote unavailability seconds.
The counting of the seconds starts after P consecutive seconds with SES FE presence and it ends
at the beginning of a period of Q consecutive seconds without SES FE. The P seconds are counted
into the unavailability period. The Q and P values can be configured.
• UASBIDI (UnAvailable Seconds Bidirectional). Number of local (UAS) or remote (UAS FE) una-
vailability seconds.
The quality parameters description of the G828 Radio <radio branch> (pag.79), G828 E1 Line Side
(pag.83) and G828 E1 Radio Side (pag.87) measure is the following:
• BBE (Background Block Error). Number of blocks where it has been detected at least one er-
rored bit not belonging to SES.
• ES (Errored Second). The second when there have been one or more errored blocks.
• SES (Severely Errored Second). The second when there have been a percentage of errored
blocks > N% (the N value can be configured) or the second when it has been activated an alarm
equivalent to the interruption of the signal at reception (Loss of Signal Alarm, Loss of Frame
Alarm, B2 Excessive Ber Alarm, etc.).
• SEP (Severely Errored Period). Number of periods with a number of consecutive SES comprised
between 3 and 9. The sequence is ended by a second without SES.
• UAS (UnAvailable Seconds). Number of unavailability seconds.
The counting of the seconds starts after P consecutive seconds with SES presence and it ends
at the beginning of a period of Q consecutive seconds without SES. The P seconds are counted
into the unavailability period. The Q and P values can be configured.
The quality parameters description of the G828 STM-1 <STM-1 number> - Vc12 <TUG3-TUG2-TUG12>
measure (pag.89) is the following:
• BBE (Background Block Error). Number of blocks where it has been detected at least one er-
rored bit not belonging to SES.
• ES (Errored Second). The second when there have been one or more errored blocks.
• SES (Severely Errored Second). The second when there have been a percentage of errored
blocks > N% (the N value can be configured) or the second when it has been activated an alarm
equivalent to the interruption of the signal at reception (Loss of Signal Alarm, Loss of Frame
Alarm, B2 Excessive Ber Alarm, etc.).
• SEP (Severely Errored Period). Number of periods with a number of consecutive SES comprised
between 3 and 9. The sequence is ended by a second without SES.
• UAS (UnAvailable Seconds). Number of unavailability seconds.
The counting of the seconds starts after P consecutive seconds with SES presence and it ends
at the beginning of a period of Q consecutive seconds without SES. The P seconds are counted
into the unavailability period. The Q and P values can be configured.
• BBE FE (Background Block Error Far End). Number of remote blocks, where it has been detected
at least one errored bit, not belonging to SES.
• ES FE (Errored Second Far End). The second when there have been one or more errored remote
blocks.
• SES FE (Severely Errored Second Far End). The second when there have been a percentage of
errored blocks > N% (the N value can be configured) or the second when it has been activated
an alarm equivalent to the interruption of the signal at reception (Ms Rdi Alarm).
• SEP FE (Severely Errored Period Far End). Number of periods with a number of consecutive SES
FE comprised between 3 and 9. The sequence is ended by a second without SES FE.
• UAS FE (UnAvailable Seconds Far End). Number of remote unavailability seconds.
The counting of the seconds starts after P consecutive seconds with SES FE presence and it ends
at the beginning of a period of Q consecutive seconds without SES FE. The P seconds are counted
into the unavailability period. The Q and P values can be configured.
• UASBIDI (UnAvailable Seconds Bidirectional). Number of local (UAS) or remote (UAS FE) una-
vailability seconds.
The quality parameters description of the ACM Radio A measure (pag.93) is the following:
• 4QAM Str. Counter relevant to the ACM profile 4QAM Str. The rule used to increase the counter
changes according to the active increase mode (1).
(1) The counters relevant to the ACM profiles can be increased according to the following modes:
• Active Mod. The counter is increased each second if the corresponding ACM profile is equal to
the one currently active.
• Not Avail. Mod. The counter is increased each second if the corresponding ACM profile is higher
than the current one and lower than or equal to the upper modulation threshold (Upper Modu-
lation).
Example. Suppose the ACM profile 128 QAM has been defined as Upper Modulation and the current mod-
ulation is 16 QAM. If the active modality is:
• Active Mod, each second only the counter 16QAM is increased.
• Not Avail. Mod, each second the counters 32QAM, 64QAM, 128QAM are increased.
The mode used to increase the counters of the ACM profiles is common to all the counters and must be
selected by the user.
The quality parameters description of the RxPwr Radio <radio branch> measure (pag.99) is the following:
• TMMax (Tide Mark Max). Maximum value reached by the power at reception (RL) during the
observation period (15 min or 24 hours).
• TMMin (Tide Mark Min). Minimum value reached by the power at reception (RL) during the ob-
servation period (15 min or 24 hours).
• Average Level. Average level of the power at reception (RL) during the observation period (15
min or 24 hours).
• Rlts (Received Level Threshold Second). Number of seconds where it has been detected that
the value of the power at reception (RL - Received Level) is lower than the pre-defined threshold
level. It is possible to define up to a maximum of 5 threshold levels.
The quality parameters description of the TxPwr Radio <radio branch> measure (pag.102) is the following:
• TMMax (Tide Mark Max). Maximum value reached by the power at transmission (TL) during the
observation period (15 min or 24 hours).
• TMMin (Tide Mark Min). Minimum value reached by the power at transmission (TL) during the
observation period (15 min or 24 hours).
• Average Level. Average level of the power at transmission (TL) during the observation period
(15 min or 24 hours)
• Tlts (Transmitted Level Threshold Second). Number of seconds where it has been detected that
the value of the power at transmission (TL - Transmitted Level) is higher than the pre-defined
threshold level. It is possible to define up to a maximum of 4 threshold levels.
Measure
List of status (2)
the PM
measures
available
(1)
Fig.17 notes
(2) Wording:
• Stopped. The measure is not on progress.
• Running. The measure is on progress.
To activate a PM measure
To deactivate a PM measure
• Press Stop at the side of the measure in Running status to be deactivated and confirm.
The measure is stopped and its status switches from Running to Stopped.
To display the results of a measure and the status of the threshold exceeding
alarms
Measure available and meaningful only when the management of STM-1 stream(s) is active (see
Fig.44).
The G829 RstB1 STM-1 <STM-1 number> measure checks the quality of the received signal at line side
(STM-1 stream).
The check consists of measuring, by means of the B1 byte, the BBE, ES, SES, SEP, UAS, OOFS quality
parameters (see pag.64).
The BBE, ES, SES, UAS parameters are implemented according to G.829 ITU-T Rec. The SEP parameter is
implemented according to G.828 ITU-T Rec.
In the Performance Monitoring contextual area (see Fig.17) the selection of the Show push-button, at the
side of the measure, opens the Performance G829 RstB1 STM-1 <STM-1 number> window (see Fig.18).
With the commands present into the window, it is possible:
• To reset the values of the records (daily and primary) (pag.72).
• To execute the reset of the threshold exceeding alarms (pag.72).
• To activate/deactivate the measure (pag.72).
• To change the type of the displayed control parameters (pag.72).
• To set the thresholds of the control parameters and the intervention thresholds of the alarms
(pag.73).
Name of the Commands The values present into each column point out the result
PM measure bar (1) of the measure relevant to the control parameters (2)
(1) Command:
• Refresh. It updates the data.
• Clear Counters. It resets the values contained into the records (daily or primary).
• Clear Alarms. It executes the reset of the alarms relevant to the threshold exceeding.
• Stop/Start. The commands are displayed one in alternative to the other: the first stops the
measure, the second one reactivates it.
• Chart View. Command not available for the current version of WEB LCT.
• Commons. It sets the intervention thresholds of the alarms relevant to the parameters.
Label:
• Seconds. Into the table there are the parameters that use the seconds as measuring unit.
• Blocks. Into the table there are the control parameters that use the blocks as measuring unit.
(2) Each column represents a daily or primary record. In detail, the column:
• Curr. Day. Current daily record (24 hours).
• Last Day. Preceding daily record.
• Curr. 15m. Current primary record (15 minutes).
• 15m... 4h. 16 preceding primary records (each record is of 15 minutes).
The Type column, points out the parameters corresponding to the values present into each column.
What just said is valid from the second row of the table on, because the first row points out the
status of the records - see note (4).
(3) Parameter: BBE, ES, SES, SEP, UAS, OOFS (see pag.64).
Into the table, the system does not point out the results relevant to all the control parameters. Such
results have been subdivided according to the used measuring unit: seconds or blocks.
(4) Wording:
• Meaningless. The record has been completely acquired and the measure is not affected by
errors.
• Meaningful. The record has been completely acquired and the measured control parameters
have not exceeded their threshold value.
• Incomplete. The record has not been completely acquired during the corresponding obser-
vation period.
The measure starting record is always in this status. The daily record gets this status also
when only one primary record of the corresponding day is in incomplete status.
The daily record of the current date will be always an incomplete one because the daily
records are acquired at 23.59 of each day.
• Lost. The record has not reached the main controller of the equipment for instance because
the corresponding peripheral card has been physically extracted before it could have for-
warded the record itself or for generic hardware/software troubles.
• Restarted. The record has been lost after a reset of the NE.
When the NE has a software restart and checks that the measure is activated for a certain
measure point, all the record coupled with such a measure point will result in this status.
• ---. The record is not an available one because, during the observation period under exam-
ination, the measure was not activated.
The operation affects all the actually active alarms with the exception of the UAS.
To activate a measure
To deactivate a measure
4. Into the commands bar, select the arrow present on the side of the box and select from the list:
• Seconds, to display the results of the parameters whose measure unit are the seconds: ES, etc.
• Blocks, to display the results of the parameters whose measure unit are the blocks: BBE.
To set the thresholds of the control parameters and the intervention thresholds of the alarms
(G829 RstB1 STM-1)
3. Press Show at the side of the G829 RstB1 STM-1 <STM-1 number> measure.
The Performance G829 RstB1 STM-1 <STM-1 number> window opens.
Measure available and meaningful only when the management of STM-1 stream(s) is active (see
Fig.44).
The G829 MstB2M1 STM-1 <STM-1 number> measure checks the quality of the received signal at line
side (STM-1 stream). The check consists of measuring, by means of the B2 and M1 bytes, the following
quality parameters (for the description see pag.64):
• Byte B2 -> BBE, ES, SES, UAS, SEP.
• Byte M1 -> BBE FE, ES FE, SES FE, UAS FE, SEP FE.
• Byte B2 and M1 -> UASBIDI.
The BBE, ES, SES, UAS, BBE FE, ES FE, SES FE, UAS FE, UASBIDI parameters are implemented according
to G.829 ITU-T Rec. The SEP, SEP FE parameters are implemented according to G.828 ITU-T Rec.
In the Performance Monitoring contextual area (see Fig.17) the selection of the Show push-button, at the
side of the measure, opens the Performance G829 MstB2M1 STM-1 <STM-1 number> window (see Fig.19).
With the commands present into the window, it is possible:
• To reset the values of the records (daily and primary) (pag.72).
• To execute the reset of the threshold exceeding alarms (pag.72).
• To activate/deactivate the measure (pag.72).
• To change the type of the displayed control parameters (pag.72).
• To set the thresholds of the control parameters and the intervention thresholds of the alarms
(pag.77).
Name of the Commands The values present into each column point out the result
PM measure bar (1) of the measure relevant to the control parameters (2)
(1) Command:
• Refresh. It updates the data.
• Clear Counters. It resets the values contained into the records (daily or primary).
• Clear Alarms. It executes the reset of the alarms relevant to the threshold exceeding.
• Stop/Start. The commands are displayed one in alternative to the other: the first stops the
measure, the second one reactivates it.
• Chart View. Command not available for the current version of WEB LCT.
• Commons. It sets the intervention thresholds of the alarms relevant to the parameters.
Label:
• Seconds. Into the table there are the parameters that use the seconds as measuring unit.
• Blocks. Into the table there are the control parameters that use the blocks as measuring unit.
(2) Each column represents a daily or primary record. In detail, the column:
• Curr. Day. Current daily record (24 hours).
• Last Day. Preceding daily record.
• Curr. 15m. Current primary record (15 minutes).
• 15m... 4h. 16 preceding primary records (each record is of 15 minutes).
The Type column, points out the parameters corresponding to the values present into each column.
What just said is valid from the second row of the table on, because the first row points out the
status of the records - see note (4).
(3) Parameter: BBE, ES, SES, SEP, UAS, BBE FE, ES FE, SES FE, SEP FE, UAS FE, UASBIDI (see pag.64).
Into the table, the system does not point out the results relevant to all the control parameters. Such
results have been subdivided according to the used measuring unit: seconds or blocks.
(4) Wording:
• Meaningless. The record has been completely acquired and the measure is not affected by
errors.
• Meaningful. The record has been completely acquired and the measured control parameters
have not exceeded their threshold value.
• Incomplete. The record has not been completely acquired during the corresponding obser-
vation period.
The measure starting record is always in this status. The daily record gets this status also
when only one primary record of the corresponding day is in incomplete status.
The daily record of the current date will be always an incomplete one because the daily
records are acquired at 23.59 of each day.
• Lost. The record has not reached the main controller of the equipment for instance because
the corresponding peripheral card has been physically extracted before it could have for-
warded the record itself or for generic hardware/software troubles.
• Restarted. The record has been lost after a reset of the NE.
When the NE has a software restart and checks that the measure is activated for a certain
measure point, all the record coupled with such a measure point will result in this status.
• ---. The record is not an available one because, during the observation period under exam-
ination, the measure was not activated.
Press Refresh to restore the values set at the opening of the window.
The measure is available only if the equipment is provided with the radio (see option Radio A - Fig.44).
The G828 Radio 2A measure is available only for equipment in protected radio configuration.
The G828 Radio <radio branch> measure checks the quality of the received signal at radio side.
The check consists of measuring the BBE, ES, SES, SEP, UAS quality parameters (see pag.64).
The parameters are implemented according to G.828 ITU-T Rec.
In the Performance Monitoring contextual area (see Fig.17) the selection of the Show push-button, at the
side of the measure, opens the Performance G828 Radio <radio branch> window (see Fig.20).
With the commands present into the window, it is possible:
• To reset the values of the records (daily and primary) (pag.72).
• To execute the reset of the threshold exceeding alarms (pag.72).
• To activate/deactivate the measure (pag.72).
• To change the type of the displayed control parameters (pag.72).
• To set the thresholds of the control parameters and the intervention thresholds of the alarms
(pag.81).
Name of the Commands The values present into each column point out the result
PM measure bar (1) of the measure relevant to the control parameters (2)
(1) Command:
• Refresh. It updates the data.
• Clear Counters. It resets the values contained into the records (daily or primary).
• Clear Alarms. It executes the reset of the alarms relevant to the threshold exceeding.
• Stop/Start. The commands are displayed one in alternative to the other: the first stops the
measure, the second one reactivates it.
• Chart View. Command not available for the current version of WEB LCT.
• Commons. It sets the intervention thresholds of the alarms relevant to the parameters.
Label:
• Seconds. Into the table there are the parameters that use the seconds as measuring unit.
• Blocks. Into the table there are the control parameters that use the blocks as measuring unit.
(2) Each column represents a daily or primary record. In detail, the column:
• Curr. Day. Current daily record (24 hours).
• Last Day. Preceding daily record.
• Curr. 15m. Current primary record (15 minutes).
• 15m... 4h. 16 preceding primary records (each record is of 15 minutes).
The Type column, points out the parameters corresponding to the values present into each column.
What just said is valid from the second row of the table on, because the first row points out the
status of the records - see note (4).
(4) Wording:
• Meaningless. The record has been completely acquired and the measure is not affected by
errors.
• Meaningful. The record has been completely acquired and the measured control parameters
have not exceeded their threshold value.
• Incomplete. The record has not been completely acquired during the corresponding obser-
vation period.
The measure starting record is always in this status. The daily record gets this status also
when only one primary record of the corresponding day is in incomplete status.
The daily record of the current date will be always an incomplete one because the daily
records are acquired at 23.59 of each day.
• Lost. The record has not reached the main controller of the equipment for instance because
the corresponding peripheral card has been physically extracted before it could have for-
warded the record itself or for generic hardware/software troubles.
• Restarted. The record has been lost after a reset of the NE.
When the NE has a software restart and checks that the measure is activated for a certain
measure point, all the record coupled with such a measure point will result in this status.
• ---. The record is not an available one because, during the observation period under exam-
ination, the measure was not activated.
3. Press Show at the side of the wished G828 Radio <radio branch> measure.
The Performance G828 Radio <radio branch> window opens.
Press Refresh to restore the values set at the opening of the window.
In order to execute this measure, it is necessary to use a tributary framed according the G.704 Rec.
The G828 E1 Line Side measure checks the quality of the received signal from one of the IDU board E1
tributary (A or B) at line side.
The check consists of measuring the BBE, ES, SES, SEP, UAS quality parameters (see pag.64).
The BBE, ES, SES, UAS parameters are implemented according to G.826 ITU-T Rec. The SEP parameter is
implemented according to G.828 ITU-T Rec.
In the Performance Monitoring contextual area (see Fig.17) the selection of the Show push-button, at the
side of the measure, opens the Performance G828 E1 Line Side window (see Fig.21).
With the commands present into the window, it is possible:
• To reset the values of the records (daily and primary) (pag.72).
• To execute the reset of the threshold exceeding alarms (pag.72).
• To activate/deactivate the measure (pag.72).
• To change the type of the displayed control parameters (pag.72).
• To set the thresholds of the control parameters and the intervention thresholds of the alarms
(pag.85).
• To set the 2Mbit/s tributary used for the measure (pag.86).
Alarms Name of the Commands The values present into each column point out the result
status (5) PM measure bar (1) of the measure relevant to the control parameters (2)
(1) Command:
• Refresh. It updates the data.
• Clear Counters. It resets the values contained into the records (daily or primary).
• Clear Alarms. It executes the reset of the alarms relevant to the threshold exceeding.
• Stop/Start. The commands are displayed one in alternative to the other: the first stops the
measure, the second one reactivates it.
• Chart View. Command not available for the current version of WEB LCT.
• Commons. It sets the intervention thresholds of the alarms relevant to the parameters.
Label:
• Seconds. Into the table there are the parameters that use the seconds as measuring unit.
• Blocks. Into the table there are the control parameters that use the blocks as measuring unit.
(2) Each column represents a daily or primary record. In detail, the column:
• Curr. Day. Current daily record (24 hours).
• Last Day. Preceding daily record.
• Curr. 15m. Current primary record (15 minutes).
• 15m... 4h. 16 preceding primary records (each record is of 15 minutes).
The Type column, points out the parameters corresponding to the values present into each column.
What just said is valid starting from the second row of the table on, because the first row points out
the status of the records - see note (4).
(4) Wording:
• Meaningless. The record has been completely acquired and the measure is not affected by
errors.
• Meaningful. The record has been completely acquired and the measured control parameters
have not exceeded their threshold value.
• Incomplete. The record has not been completely acquired during the corresponding obser-
vation period.
The measure starting record is always in this status. The daily record gets this status also
when only one primary record of the corresponding day is in incomplete status.
The daily record of the current date will be always an incomplete one because the daily
records are acquired at 23.59 of each day.
• Lost. The record has not reached the main controller of the equipment for instance because
the corresponding peripheral card has been physically extracted before it could have for-
warded the record itself or for generic hardware/software troubles.
• Restarted. The record has been lost after a reset of the NE.
When the NE has a software restart and checks that the measure is activated for a certain
measure point, all the record coupled with such a measure point will result in this status.
• ---. The record is not an available one because, during the observation period under exam-
ination, the measure was not activated.
(6) The No 2Mb Used, wording indicates that no tributary is set for the measure.
Press Refresh to restore the values set at the opening of the window.
The operation is not available when the system uses as supervisory port (EOC) an equipment tributary
(refer to pag.45). In such a case, the system automatically uses for the PM measures, the same tributary
used for the supervisory operations.
The change of the tributary for the G828 E1 Line Side measure automatically changes the value of the
tributary for the G828 E1 Radio Side measure and vice versa.
If a value is not available, this means that the relevant tributary is used as output of the T12 syn-
chronism (see Fig.53).
Press Refresh to restore the values set at the opening of the window.
The measure is available only if the equipment is provided with the radio (see option Radio A - Fig.44).
In order to execute this measure, it is necessary to use a tributary framed according the G.704 Rec.
The G828 E1 Radio Side measure checks the quality of the received signal from one of the IDU board E1
tributary (A or B) at radio side.
The check consists of measuring the BBE, ES, SES, SEP, UAS quality parameters (see pag.64).
The BBE, ES, SES, UAS parameters are implemented according to G.826 ITU-T Rec. The SEP parameter is
implemented according to G.828 ITU-T Rec.
In the Performance Monitoring contextual area (see Fig.17) the selection of the Show push-button, at the
side of the measure, opens the Performance G828 E1 Radio Side window (seen Fig.22).
With the commands present into the window, it is possible:
• To reset the values of the records (daily and primary) (pag.72).
• To execute the reset of the threshold exceeding alarms (pag.72).
• To activate/deactivate the measure (pag.72).
• To change the type of the displayed control parameters (pag.72).
• To set the thresholds of the control parameters and the intervention thresholds of the alarms
(pag.85).
• To set the 2Mbit/s tributary used for the measure (pag.86).
Alarms Name of the Commands The values present into each column point out the result
status (5) PM measure bar (1) of the measure relevant to the control parameters (2)
(1) Command:
• Refresh. It updates the data.
• Clear Counters. It resets the values contained into the records (daily or primary).
• Clear Alarms. It executes the reset of the alarms relevant to the threshold exceeding.
• Stop/Start. The commands are displayed one in alternative to the other: the first stops the
measure, the second one reactivates it.
• Chart View. Command not available for the current version of WEB LCT.
• Commons. It sets the intervention thresholds of the alarms relevant to the parameters.
Label:
• Seconds. Into the table there are the parameters that use the seconds as measuring unit.
• Blocks. Into the table there are the control parameters that use the blocks as measuring unit.
(2) Each column represents a daily or primary record. In detail, the column:
• Curr. Day. Current daily record (24 hours).
• Last Day. Preceding daily record.
• Curr. 15m. Current primary record (15 minutes).
• 15m... 4h. 16 preceding primary records (each record is of 15 minutes).
The Type column, points out the parameters corresponding to the values present into each column.
What just said is valid starting from the second row of the table on, because the first row points out
the status of the records - see note (4).
(4) Wording:
• Meaningless. The record has been completely acquired and the measure is not affected by
errors.
• Meaningful. The record has been completely acquired and the measured control parameters
have not exceeded their threshold value.
• Incomplete. The record has not been completely acquired during the corresponding obser-
vation period.
The measure starting record is always in this status. The daily record gets this status also
when only one primary record of the corresponding day is in incomplete status.
The daily record of the current date will be always an incomplete one because the daily
records are acquired at 23.59 of each day.
• Lost. The record has not reached the main controller of the equipment for instance because
the corresponding peripheral card has been physically extracted before it could have for-
warded the record itself or for generic hardware/software troubles.
• Restarted. The record has been lost after a reset of the NE.
When the NE has a software restart and checks that the measure is activated for a certain
measure point, all the record coupled with such a measure point will result in this status.
• ---. The record is not an available one because, during the observation period under exam-
ination, the measure was not activated.
(6) The No 2Mb Used, wording indicates that no tributary is set for the measure.
Measure available and meaningful only when the management of STM-1 stream(s) is active (see
Fig.44).
The G828 STM-1 <STM-1 number> - Vc12 <TUG3-TUG2-TUG12> measure checks the quality of the
received VC12 into the STM-1 stream.
The check consists of measuring the ES, SES, UAS, ES FE, SES FE, UAS FE, UASBIDI, SEP, SEP FE, BBE,
BBE FE quality parameters (see pag.64).
The parameters are implemented according to G.828 ITU-T Rec.
In the Performance Monitoring contextual area (see Fig.17) the selection of the Show push-button, at the
side of the measure, opens the Performance G828 STM-1 <STM-1 number> - Vc12 <TUG3-TUG2-TUG12>
window (see Fig.23).
With the commands present into the window, it is possible:
• To reset the values of the records (daily and primary) (pag.72).
• To execute the reset of the threshold exceeding alarms (pag.72).
• To activate/deactivate the measure (pag.72).
• To change the type of the displayed control parameters (pag.72).
• To set the thresholds of the control parameters and the intervention thresholds of the alarms
(pag.91).
(1) Command:
• Refresh. It updates the data.
• Clear Counters. It resets the values contained into the records (daily or primary).
• Clear Alarms. It executes the reset of the alarms relevant to the threshold exceeding.
• Stop/Start. The commands are displayed one in alternative to the other: the first stops the
measure, the second one reactivates it.
• Chart View. Command not available for the current version of WEB LCT.
• Commons. It sets the intervention thresholds of the alarms relevant to the parameters.
Label:
• Seconds. Into the table there are the parameters that use the seconds as measuring unit.
• Blocks. Into the table there are the control parameters that use the blocks as measuring unit.
(2) Each column represents a daily or primary record. In detail, the column:
• Curr. Day. Current daily record (24 hours).
• Last Day. Preceding daily record.
• Curr. 15m. Current primary record (15 minutes).
• 15m... 4h. 16 preceding primary records (each record is of 15 minutes).
The Type column, points out the parameters corresponding to the values present into each column.
What just said is valid from the second row of the table on, because the first row points out the
status of the records - see note (4).
(3) Parameter: BBE, ES, SES, SEP, UAS, BBE FE, ES FE, SES FE, SEP FE, UAS FE, UASBIDI (see pag.64).
Into the table, the system does not point out the results relevant to all the control parameters. Such
results have been subdivided according to the used measuring unit: seconds or blocks.
(4) Wording:
• Meaningless. The record has been completely acquired and the measure is not affected by
errors.
• Meaningful. The record has been completely acquired and the measured control parameters
have not exceeded their threshold value.
• Incomplete. The record has not been completely acquired during the corresponding obser-
vation period.
The measure starting record is always in this status. The daily record gets this status also
when only one primary record of the corresponding day is in incomplete status.
The daily record of the current date will be always an incomplete one because the daily
records are acquired at 23.59 of each day.
• Lost. The record has not reached the main controller of the equipment for instance because
the corresponding peripheral card has been physically extracted before it could have for-
warded the record itself or for generic hardware/software troubles.
• Restarted. The record has been lost after a reset of the NE.
When the NE has a software restart and checks that the measure is activated for a certain
measure point, all the record coupled with such a measure point will result in this status.
• ---. The record is not an available one because, during the observation period under exam-
ination, the measure was not activated.
The measure is available only if the equipment is provided with the radio (see option Radio A - Fig.44).
Furthermore the measure meaningful only when the adaptive modulation is active.
The ACM Radio A measure traces the trend of the ACM profiles in the time.
The trend is traced using one counter for each ACM profile and two further counters: UpShift and DownShift
(see pag.64).
In the Performance Monitoring contextual area (see Fig.17) the selection of the Show push-button, at the
side of the measure, opens the Performance ACM Radio A window (see Fig.24).
With the commands present into the window, it is possible:
• To reset the values of the records (daily and primary) (pag.72).
• To execute the reset of the threshold exceeding alarms (pag.72).
• To activate/deactivate the measure (pag.72).
• To change the type of the displayed counters (pag.72).
• To set the thresholds of the alarms (pag.85).
• To modify the modality used to increase the counters (pag.98).
Name of the Commands The values present into each column point out the
PM measure bar (1) result of the measure relevant to the counters (2)
(1) Command:
• Refresh. It updates the data.
• Clear Counters. It resets the values contained into the records (daily or primary).
• Clear Alarms. It executes the reset of the alarms relevant to the threshold exceeding.
• Stop/Start. The commands are displayed one in alternative to the other: the first stops the
measure, the second one reactivates it.
• Chart View. Command not available for the current version of WEB LCT.
• Commons. It sets the intervention thresholds of the alarms relevant to the parameters.
Label:
• Seconds. The counters relevant to the ACM profiles are present in the table.
• UpDownShift. The counters DownShift and UpShift are present in the table.
(2) Each column represents a daily or primary record. In detail, the column:
• Curr. Day. Current daily record (24 hours).
• Last Day. Preceding daily record.
• Curr. 15m. Current primary record (15 minutes).
• 15m... 4h. 16 preceding primary records (each record is of 15 minutes).
The Type column, points out the counters corresponding to the values present into each column.
What just said is valid from the second row of the table on, because the first row points out the
status of the records - see note (3).
(3) Wording:
• Meaningless. The record has been completely acquired and the measure is not affected by
errors.
• Meaningful. The record has been completely acquired and the measured control parameters
have not exceeded their threshold value.
• Incomplete. The record has not been completely acquired during the corresponding obser-
vation period.
The measure starting record is always in this status. The daily record gets this status also
when only one primary record of the corresponding day is in incomplete status.
The daily record of the current date will be always an incomplete one because the daily
records are acquired at 23.59 of each day.
• Lost. The record has not reached the main controller of the equipment for instance because
the corresponding peripheral card has been physically extracted before it could have for-
warded the record itself or for generic hardware/software troubles.
• Restarted. The record has been lost after a reset of the NE.
When the NE has a software restart and checks that the measure is activated for a certain
measure point, all the record coupled with such a measure point will result in this status.
• ---. The record is not an available one because, during the observation period under exam-
ination, the measure was not activated.
(4) One counter is foreseen for every ACM profile: 4QAM Str, 4QAM, 8PSK, 16QAM, 32QAM, 64QAM,
128QAM, 256QAM (see pag.64).
For every counter, the column of the specific observation period points out (expressed in seconds)
the number of times the counter is increased.
The rule used to increased a counter changes according to the currently active modality (see note 6).
Besides one counter per modulation, two further counters are foreseen:
• DownShift. Number of times the profile, during the specific observation period, has changed
assuming a profile lower than the previous one.
• UpShift. Number of times the profile, during the specific observation period, has changed as-
suming a profile higher than the previous one.
The table does not display all the counters at the same time (see note 1).
Example. Suppose the ACM profile 128 QAM has been defined as Upper Modulation and the current
modulation is 16 QAM. If the active modality is:
• Active Mod, each second only the counter 16QAM is increased.
• Not Avail. Mod, each second the counters 32QAM, 64QAM, 128QAM are increased.
The measure is available only if the equipment is provided with the radio (see option Radio A - Fig.44).
The RxPwr Radio 2A measure is available only for equipment in protected radio configuration.
The RxPwr Radio measure checks the power of the signal at reception.
The check consists of measuring the RLTS, RLTM quality parameters specified by the Standard EN 301 129
of the ETSI (see pag.64).
In the Performance Monitoring contextual area (see Fig.17) the selection of the Show push-button, at the
side of the measure, opens the Performance RxPwr Radio <radio branch> window shown (see Fig.25).
With the commands present into the window, it is possible:
• To reset the values of the records (daily and primary) (pag.72).
• To execute the reset of the threshold exceeding alarms (pag.72).
• To activate/deactivate the measure (pag.72).
• To change the type of the displayed control parameters (pag.101).
• To set the thresholds of the control parameters and the intervention thresholds of the alarms
(pag.101).
Alarms Name of the Commands The values present into each column point out the result
status (5) PM measure bar (1) of the measure relevant to the control parameters (2)
(1) Command:
• Refresh. It updates the data.
• Clear Counters. It resets the values contained into the records (daily or primary).
• Clear Alarms. It executes the reset of the alarms relevant to the threshold exceeding.
• Stop/Start. The commands are displayed one in alternative to the other: the first stops the
measure, the second one reactivates it.
• Chart View. Command not available for the current version of WEB LCT.
• Commons. It sets the intervention thresholds of the alarms relevant to the parameters.
Label:
• Rlts. Into the table there are the control parameters that use the seconds as measuring unit.
• TM. Into the table there are the control parameters that use the dBm as measuring unit.
(2) Each column represents a daily or primary record. In detail, the column:
• Curr. Day. Current daily record (24 hours).
• Last Day. Preceding daily record.
• Curr. 15m. Current primary record (15 minutes).
• 15m... 4h. 16 preceding primary records (each record is of 15 minutes).
The Type column, points out the parameters corresponding to the values present into each column.
What just said is valid starting from the second row of the table on, because the first row points
out the status of the records - see note (4).
(4) Wording:
• Meaningless. The record has been completely acquired and the measure is not affected by
errors.
• Meaningful. The record has been completely acquired and the measured control parameters
have not exceeded their threshold value.
• Incomplete. The record has not been completely acquired during the corresponding obser-
vation period.
The measure starting record is always in this status. The daily record gets this status also
when only one primary record of the corresponding day is in incomplete status.
The daily record of the current date will be always an incomplete one because the daily
records are acquired at 23.59 of each day.
• Lost. The record has not reached the main controller of the equipment for instance because
the corresponding peripheral card has been physically extracted before it could have for-
warded the record itself or for generic hardware/software troubles.
• Restarted. The record has been lost after a reset of the NE.
When the NE has a software restart and checks that the measure is activated for a certain
measure point, all the record coupled with such a measure point will result in this status.
• ---. The record is not an available one because, during the observation period under exam-
ination, the measure was not activated.
(6) Each box points out the power threshold level actually set. This parameter can be configured by the
user.
3. Press Show at the side of the RxPwr Radio <radio branch> measure.
The Performance RxPwr Radio <radio branch> window opens.
4. Into the commands bar, select the arrow present on the side of the text box and select from the list:
• Rlts, to display the results of the parameters whose measure unit are the seconds: Rlts1, etc.
• TM, to display the results of the parameters whose measure unit are the dBm: TMMax, TMMin,
Average Level.
To set the thresholds of the control parameters and the intervention thresholds of the alarms
3. Press Show at the side of the RxPwr Radio <radio branch> measure.
The Performance RxPwr Radio <radio branch> window opens.
Press Refresh to restore the values set at the opening of the window.
The measure is available only if the equipment is provided with the radio (see option Radio A - Fig.44).
The TxPwr Radio 2A measure is available only for equipment in protected radio configuration.
The TxPwr Radio <radio branch> measure checks the power of the signal at transmission.
The check consists of measuring the TLTS, TLTM quality parameters, specified by the Standard EN 301 129
of the ETSI (see pag.64).
In the Performance Monitoring contextual area (see Fig.17) the selection of the Show push-button, at the
side of the measure, opens the Performance TxPwr Radio <radio branch> window (see Fig.26).
With the commands present into the window, it is possible:
• To reset the values of the records (daily and primary) (pag.72).
• To execute the reset of the threshold exceeding alarms (pag.72).
• To activate/deactivate the measure (pag.72).
• To change the type of the displayed control parameters (pag.104).
• To set the thresholds of the control parameters and the intervention thresholds of the alarms
(pag.104).
(1) Command:
• Refresh. It updates the data.
• Clear Counters. It resets the values contained into the records (daily or primary).
• Clear Alarms. It executes the reset of the alarms relevant to the threshold exceeding.
• Stop/Start. The commands are displayed one in alternative to the other: the first stops the
measure, the second one reactivates it.
• Chart View. Command not available for the current version of WEB LCT.
• Commons. It sets the intervention thresholds of the alarms relevant to the parameters.
Label:
• Tlts. Into the table there are the control parameters that use the seconds as measuring unit.
• TM. Into the table there are the control parameters that use the dBm as measuring unit.
(2) Each column represents a daily or primary record. In detail, the column:
• Curr. Day. Current daily record (24 hours).
• Last Day. Preceding daily record.
• Curr. 15m. Current primary record (15 minutes).
• 15m... 4h. 16 preceding primary records (each record is of 15 minutes).
The Type column, points out the parameters corresponding to the values present into each column.
What just said is valid from the second row of the table on, because the first row points out the
status of the record - see note (4).
(4) Wording:
• Meaningless. The record has been completely acquired and the measure is not affected by
errors.
• Meaningful. The record has been completely acquired and the measured control parameters
have not exceeded their threshold value.
• Incomplete. The record has not been completely acquired during the corresponding obser-
vation period.
The measure starting record is always in this status. The daily record gets this status also
when only one primary record of the corresponding day is in incomplete status.
The daily record of the current date will be always an incomplete one because the daily
records are acquired at 23.59 of each day.
• Lost. The record has not reached the main controller of the equipment for instance because
the corresponding peripheral card has been physically extracted before it could have for-
warded the record itself or for generic hardware/software troubles.
• Restarted. The record has been lost after a reset of the NE.
When the NE has a software restart and checks that the measure is activated for a certain
measure point, all the record coupled with such a measure point will result in this status.
• ---. The record is not an available one because, during the observation period under exam-
ination, the measure was not activated.
(6) Each box points out the power threshold level actually set. This parameter can be configured by the user.
3. Press Show at the side of the TxPwr Radio <radio branch> measure.
The Performance TxPwr Radio <radio branch> window opens.
4. Into the commands bar, select the arrow present on the side of the text box and select from the list:
• Tlts, to display the results of the parameters whose measure unit are the seconds: Tlts1, etc.
• TM, to display the results of the parameters whose measure unit are the dBm: TMMax, TMMin.
To set the thresholds of the control parameters and the intervention thresholds of the alarms
3. Press Show at the side of the TxPwr Radio <radio branch> measure.
The Performance TxPwr Radio <radio branch> window opens.
Press Refresh to restore the values set at the opening of the window.
A PM measure consists of recording, during a pre-defined time range (observation period), the values of
specific parameters.
Some threshold limits have been assigned to such control parameters (the setting of the thresholds can
be changed).
The exceeding of the threshold limit points out a more or less serious degradation of the signal. This con-
dition generates an alarm.
The alarms relevant to the threshold exceeding are treated by the equipment and by the application as
normal alarms. The only exception is that the alarm is not automatically reset at the return into the thresh-
old limit but the user has to execute the reset of this kind of alarms.
The control parameters under examination change according to the equipment type and to the measure
type supported by that type of equipment. Usually, all the executed measures refer to ITU-T Recommen-
dations (for instance G.828, G.826, etc.).
The activation (and the deactivation) of the PM measures can be executed only after a command forwarded
by the user.
When it has been activated a PM measure, the main controller of the equipment starts the storing of the
values relevant to the control parameters. The results of the measures are sub-divided into records. Each
record contains the values recorded into a specific time range (observation period).
If at the end of the observation period, the measure has not yet been deactivated the system starts another
observation period and so on until when the operator stops the measure.
The equipment group the results of the PM measures into observation period of 15 minutes (primary
records) and of 24 hours (daily records).
The observation periods can not be synchronized with the instant when the measure is activated but such
records refer, for the primary records, to the quarter of an hour (00.00, 00.15, 00.30, etc.) and, for the
daily records, to the time 00.00 UTC (Universal Time, Coordinated).
For instance, if a measure starts at 11.40, the first primary record will have as observation period the time
11.40...11.45 (corresponding to the time range 11.30...11.45), while the first daily record will have as ob-
servation period 11.40...00.00.
When the user requires the display of the results of the PM measures, the daily and primary records rele-
vant to the running PM measures are displayed in the WEB LCT page of the equipment.
For each type of measure, the equipment keeps stored the current records and also the last 16 primary
records (corresponding to the last 4 hours) and the last daily one (corresponding to the preceding day).
The preceding records are overwritten.
When the operator stops a measure, the system stores the uncompleted current record.
If the operator activates and deactivates the measure more times during the same observation period, the
system will store the record that contains the results of the last executed measure.
For instance if the measure has been activated at 9.02 and deactivated at 9.07, then it has been newly
activated at 9.09, the record relevant to the observation period 9.00...9.15 will contain the results of the
measures relevant to the period 9.09...9.15, while the ones relevant to the period 9.02...9.07 will not be
stored.
If an equipment has some PM measures on progress and it is re-started up or turned off, when it will suc-
cessively restarted or turned on the measures activated before the turning off will be automatically re-
started.
The records (primary and daily), relevant to the period when measure has been stopped, will result empty
and when it has been reached the limit of 16 primary records and 1 daily one, they will overwrite the pre-
ceding records.
* The Read Only, Read and Write and Station Operator user cannot delete the signals and the list of oper-
ations.
The Reports & Loggers Maintenance command saves to file the equipment configuration, the status/
alarm signals and the operations executed by the users.
In detail, it is possible:
• To save the equipment configuration, the alarm/status signals and the operations executed by
the users to file (pag.106)
• To delete the signals stored into the equipment controller (pag.109).
• To delete the operations list stored into the equipment controller (pag.109).
To save the equipment configuration, the alarm/status signals and the op-
erations executed by the users to file
In order to execute this operation, the display of menu bar in the browser must be active.
1. Select the Main Menu > Reports & Loggers Maintenance command.
The Report Manager contextual area opens (see Fig.27).
2. Activate, in the Report Options area, the information you wish to save to file:
• Inventory report. Whole equipment configuration: WEB LCT version, properties, list of units, sta-
tus/version of the firmware, addresses, routing table, default gateway, remote equipment list,
user inputs, user outputs, operating parameters, etc.
• Fault report. List of status/alarm signals currently active on the equipment (current alarms) and
signals stored in the equipment controller (alarm history).
• Command Log. List of the operations, executed by the WEB LCT, SCT/LMT or NMS5UX users,
stored in the equipment controller.
It is possible to select one or more options. Depending on the activated options, a file will be created
containing the relevant data.
Activated Information
option that can
be saved
Deactivated to file (1)
option
Fig.27 notes
Equipment
parameters
(1)
Operations
list (2)
Current
alarms (3)
Alarms
history
(3)
Fig.28 notes
(1) The whole equipment parameters are subdivided in groups. The format of the parameters present
in each groupALCplus2 is self-explicative and changes according to the type of represented data.
(2) To each operation, it is devoted a record that points out the following information:
• Date/Time. Date and time when it has been executed the operation.
The format of date/time changes according to the setting made in the operating system.
• Source address. IP address of the machine (PC or workstation) from which it has been exe-
cuted the operation.
• User. Name of the user who has executed the operation.
• Object. Object to which the operation refers.
• Instance. Name of the equipment instance to which the operation refers.
The instances relevant to the OAM-FM objects (see Fig.103/Fig.104) refer to numeric in-
dicators having the following meaning:
• OAM CFM MA. The instance relevant to this object have 2 formats: one with two field
and one with three fields. In detail, the format with:
• 2 fields is equivalent to <Domain identifier>.<MA identifier> (for example
1.500).
• 3 fields is equivalent to <Bridge identifier>.<Domain identifier>.<MA identifi-
er> (for example 1.1.500).
• OAM CFM MEP. The instance is equivalent to <Domain identifier>.<MA identifi-
er>.<MEP identifier> (for example 1.500.602).
In the equipment managed by WEB LCT/NMS5UX/NMS5UX-B/NMS5LX:
• <MA identifier> corresponds to the VLAN identifier (VLAN ID).
(3) To each signal, it is devoted a record that points out the following information:
• Severity. This field points out if the record refers to a status or alarm signal or if the signal
has been detected or it has been reset. If the situation concerns an alarm, it is pointed out
also its severity level.
With details the wording:
• Disable. Alarm signal reset
• Status. Status signal
• Warning. Alarm detected with Warning severity
• Minor. Alarm detected with Minor severity
• Major. Alarm detected with Major severity
• Critical. Alarm detected with Critical severity
• Date/Time. Detection or reset date and time of the signal.
• Description. Alphanumeric string that specify the type of the signal. If:
• The wording CLEARED is absent, the record refers to a detected alarm.
• The wording CLEARED is present, the record refers to a cleared alarm.
1. Select the Main Menu > Reports & Loggers Maintenance command.
The Report Manager contextual area opens (see Fig.27).
1. Select the Main Menu > Reports & Loggers Maintenance command.
The Report Manager contextual area opens (see Fig.27).
The SNTP & Wake Up Configuration command manages the automatic acquisition of the reference date/
time of the equipment from a network element (SNTP functionality) and the Wake Up trap (Wake Up func-
tionality).
In detail, it is possible:
• To verify the SNTP functionality status (pag.110)
• To set the execution parameters and activate the SNTP functionality (pag.111)
• To disable the SNTP functionality (pag.111)
• To verify the Wake Up functionality status (pag.112)
• To set the execution parameters and activate the Wake Up functionality (pag.112)
• To disable the Wake Up functionality (pag.113)
1. Select the Main Menu > SNTP & Wake Up Configuration command.
The SNTP & Wake Up Configuration contextual area opens with the SNTP tab active.
The tab displays the activation status of SNTP functionality and the current setting of the relevant ex-
ecution parameters (see Fig.29).
Fig.29 notes
(1) In detail, the automatic acquisition of the reference date/time of the equipment is:
• Active, when a valid value (different from 0.0.0.0) is present in the Main Server IP Address
and/or Reverse Server IP Address box.
(2) The activation of the NTP Server Lost Alarm points out that none of the set network elements is
reachable, as consequence the reference date/time of the equipment is not aligned.
The colour of the box points out the status of the alarm:
• Green. The alarm is not active.
• Red, orange, yellow or light blue. The alarm is active and has, respectively, severity Critical,
Major, Minor or Warning.
The execution parameters (Main Server IP Address, Reserve Server IP Address, etc.) can be modified
even when the SNTP functionality is already active.
1. Select the Main Menu > SNTP & Wake Up Configuration command.
The SNTP & Wake Up Configuration contextual area opens with the SNTP tab active (see Fig.29).
2. Set the IP address of the main element present in the network, from which the equipment automatically
gets the reference date/time, in the Main Server IP Address box.
It is possible type, for each one of the four available spaces (sub-divided by a dot), a number comprised
between 0 and 255.
Typing a valid value (different from 0.0.0.0) involves the activation of the automatic acquisition of the
reference date/time.
3. Set the IP address of the secondary element present in the network, from which the equipment auto-
matically gets the reference date/time, in the Reserve Server IP Address box.
It is possible type, for each one of the four available spaces (sub-divided by a dot), a number comprised
between 0 and 255.
4. Set the time interval between a request of refresh of the reference date/time and the next one in the
Polling Interval box.
Typing or selecting the arrows of the box, set a number between 1 and 16777215 seconds.
5. Set the time interval (t) the equipment must wait for, before re-attempting the transmission of a re-
quest to the main or secondary element in the Polling Timeout box.
Typing or selecting the arrows of the box, set a number between 1 and 30 seconds.
6. Set the number of times that the equipment must re-attempt the transmission of a request to the main
or secondary element in the Polling Retries box.
Typing or selecting the arrows of the box, set a number between 1 and 10.
7. Press Apply and confirm.
1. Select the Main Menu > SNTP & Wake Up Configuration command.
The SNTP & Wake Up Configuration contextual area opens with the SNTP tab active (see Fig.29).
2. Press Reset next to the Main Server IP Address box to reset the value (0.0.0.0).
3. Press Reset next to the Reverse Server IP Address box to reset the value (0.0.0.0).
1. Select the Main Menu > SNTP & Wake Up Configuration command.
The SNTP & Wake Up Configuration contextual area opens.
Optional
parameter (4)
IP address and
NSAP address
(Gosip) of the server
which the Wake Up
trap must be
sent to (2)
Fig.30 notes
(2) With server we mean the machine where the supervision system NMS5UX-B or NMS5LX or a differ-
ent management system, able to manage the reception of the Wake Up trap, is installed.
(3) The setting of the value 0 points out that the trap is sent until when the user manually disables it
or the NMS server automatically disables it when intercepts it.
(4) The user can insert the physical location (for example the name of the site) of the equipment in this
field. This information is communicated to the remote manager together with the characteristics of
the equipment.
The supervision system NMS5UX-B or NMS5LX does not use this information.
The execution parameters (NMS IP Address, Timeout, etc.) cannot be modified when the Wake Up func-
tionality is already active. To modify them, it is necessary to deactivate the Wake Up functionality (see
pag.113) and them modify them.
1. Select the Main Menu > SNTP & Wake Up Configuration command.
3. Set the IP address of the server, which the Wake Up trap must be sent to, in the NMS IP Address box.
It is possible type, for each one of the four available spaces (sub-divided by a dot), a number comprised
between 0 and 255.
4. Only if the equipment and the server are inserted into an OSI network, set the NSAP address (Gosip
Address area).
To change the parameter:
• System ID, type the wished value in the relevant boxes.
• AFI, choose the arrow placed on the side of the box and select the desired value from the list.
• Domain, type the values of the bytes that represent the Domain.
• Area, type the values of the bytes that represent the area.
• IDI, Ver, Auth, Reserved and Sel, type into the relevant boxes the value of the corresponding
byte/s.
5. Set the time interval, for which the Wake Up trap is sent at the end of which it is automatically disabled,
in the Timeout box.
Typing or selecting the arrows of the box, set a number between 0 and 1440 minutes.
The setting of the value 0 points out that the trap is sent until when the user manually disables it or
the NMS server automatically disables it when intercepts it.
6. Set the physical location (for example, the name of the site) of the equipment in the NE Location box.
The setting of the parameter is optional.
1. Select the Main Menu > SNTP & Wake Up Configuration command.
The SNTP & Wake Up Configuration contextual area opens.
The ALCplus2 equipment, via SNTP (Simple Network Time Protocol) protocol, can update its date/time us-
ing an element within the network as reference (SNTP functionality).
Via WEB LCT (or SCT/LMT) application, it is possible to define a maximum of two elements, one main (set
in the Main Server IP Address box - see Fig.29) and one secondary (set in the Reserve Server IP Address
box) from which the equipment automatically gets the reference date/time each n seconds (set in the Poll-
ing Interval box). Entering a valid value for the main and/or secondary element causes the activation of
the functionality.
If the main element does not answer to the request of updating of the equipment reference date/time, this
request is sent for n times (set in the Polling Retries box) each t seconds (set in the Polling Timeout box).
At the end of this requests, if the main element does not answer, the equipment requires the updating of
the date/time to the secondary element.
If the secondary element does not answer to the request of updating of the equipment reference date/
time, this request is sent for n times each t seconds. At the end of this request, if the secondary element
If no network element set can be reached, the reference date/time of the equipment is not updated. This
condition is signalled by the activation of NTP Server Lost Alarm (see Fig.29).
To deactivate the automatic acquisition of the reference date/time, it is necessary to reset the IP address
of the main and secondary elements.
The Wake Up functionality allows the user enabling the spontaneous forward, from the equipment to a re-
mote server, of a SNMP trap for the notification of the equipment commissioning (Wake Up trap).
This functionality has been implemented as help to the Auto Discovery modality available in the supervision
systems NMS5UX-B and NMS5LX.
The Auto Discovery mode has the purpose to point out new equipment in the network, not managed by
the supervision system yet. More information about the Auto Discovery modality is reported in the relevant
documentation.
This chapter shows only the management of the Wake Up trap by the equipment. In detail, the implemen-
tation of the Wake Up functionality is the following.
When the Wake Up functionality is activated, the equipment starts sending the Wake Up trap every minute
for the time interval defined by the user (option Timeout). For example, if the value 60 has been set as
timeout, the trap is sent each 60 minutes. At the end of 60 minutes, the sending of the trap is automatically
disabled.
If, in the period when the sending of the trap is enabled, the supervision system intercepts the Wake Up
notification records the presence of the new equipment in its database and disables the sending of the
Wake Up trap by the equipment (trap switch-off).
The SD Memory Management command manages the SD memory card (Secure Digital Memory Card)
for the backup/restore of the equipment software and configuration.
In detail, it is possible:
For more information about the use of the SD memory card in the equipment, go to pag.120.
Stus and
configuration
of the SD
memory card
(1)
(2)
(1) Option:
• Status. SD memory status
In case of replacement of the IDU unit of an equipment, it is possible to use the SD memory, where the
equipment configuration and software (Boot SD) have been previously saved, to restart the new controller
based on the data present in SD memory.
This operation is very important because it avoids the equipment re-configuration necessary after a change
of the IDU unit.
Here below the whole procedure is described, which must be applied so that the automatic equipment re-
start from SD memory is successful.
At this point, if the SD memory is not removed from the equipment, the controller activates the auto-
matic synchronisation of the data: this means that every configuration change is automatically saved
even to the SD memory.
If the equipment software is updated, this is not automatically saved into the SD memory. Moreo-
ver, the procedure for the automatic restart is aborted (the parameters Enable automatic restore (all)
and/or Enable automatic restore (Data only) assume the value Disabled). In this case, it is suggested
to execute again this procedure in order to enable again the SD memory to the automatic restart.
2. When the equipment becomes faulted and a replacement of the IDU unit is necessary, remove the SD
memory from the faulted equipment and insert the new IDU unit.
a. The backup configuration files are copied from the SD memory to the controller.
b. The controller sw is updated overwriting the inactive memory bench (status Loaded). This op-
eration is executed only if:
• The Enable automatic restore (all) command has been selected at step 1f
• The running version of the equipment software (Running) is different from that present
in the SD memory.
c. The Serial Number of the controller present in the descriptor file of the SD memory is updated.
e. The controller with change of the memory bench in use (Bench Switch) is forced to restart if
even the sw update (selection of the Enable automatic restore (all) command - see step 1f) has
been required.
f. The controller restarts with the updated sw (if required) and applying the configuration data read
from the SD memory.
If at least one of the above mentioned checks was not successful, the automatic restart is not executed
and the controller stays in status Replaced Controller waiting for an intervention of the user.
If the equipment software must be updated on different equipment, the SD memory can be used to
execute the operation automatically without the use of the management software (WEB LCT or SCT/LMT).
Here below the whole procedure, which must be applied in order that the automatic update of the equip-
ment sw from SD memory is successful, is described.
a. Insert the SD memory into the equipment where the new sw version is present.
h. Select the Enable “Not running” Sw delete command (area Actions) if you wish that, once
the update and the change of the memory bench of the controller are ended, the sw present in
the standby bench (bench where the old sw is present), is automatically deleted.
2. Remove the SD card from the equipment and insert it into another equipment whose software you wish
to update.
Before copying the equipment sw into the new controller, the following checks are executed:
• The data structure of the SD memory must be of type Sw Dwl SD.
• The automatic update from SD memory must be active in the descriptor file of the SD memory
(parameter Enable automatic restore (all)).
• The sw version stored in the SD memory must be different from both the versions present in
the memory benches of the controller.
If the above mentioned checks were successful:
a. The controller sw is updated overwriting the inactive memory bench (status Loaded)
b. The restart of the controller with change of the memory bench in use is forced (Bench Switch)
and, then, if set (see step 1.h.), the sw present in the standby bench is deleted.
If at least one of the above mentioned checks was not successful, the operation is not executed.
As help for the management of SD memory, by means of the SD Management window (see Fig.31), the
following can be executed.
• To delete the configuration data and/or the equipment sw from the SD memory (pag.119)
• To disable the automatic equipment restart from SD memory (data + sw) (pag.120)
• To disable the deletion of the equipment sw present in the standby memory bench after an au-
tomatic sw update from SD memory (pag.120)
• To force the restore of the configuration data and of the equipment sw from the SD memory to
the controller (pag.120)
• To copy the equipment sw from the SD memory to the controller (Sw Dwl SD) (pag.120)
To delete the configuration data and/or the equipment sw from the SD memory
This operation deletes ALL the files of the structure Boot SD or Sw Dwl SD. The deletion of a single file
os not foreseen.
To disable the deletion of the equipment sw present in the standby memory bench
after an automatic sw update from SD memory
Operation meaningful only for SD memories where data of type Sw Dwl SD are present.
To force the restore of the configuration data and of the equipment sw from the SD
memory to the controller
Operation meaningful only for SD memories where data of type Boot SD are present.
To copy the equipment sw from the SD memory to the controller (Sw Dwl SD)
Operation meaningful only for SD memories where data of type Sw Dwl SD are present.
ALCplus2 equipment is provided with a SD memory card reader, which allows storing the equipment data
on SD (Secure Digital) memory cards.
The following equipment data can be saved and managed into SD memory:
• Equipment configuration parameters and equipment software.
Saving these data generates a data structure named Boot SD into the SD memory.
• Equipment software.
Saving these data generates a data structure named Sw Dwl SD into the SD memory.
Both the data structures cannot be saved at the same time in the same SD memory. The creation of
the structure Boot SD automatically deletes the data structure Sw Dwl SD and vice versa.
What just said is valid only for the information with data structure recognized by ALCplus2 equipment and
relevant management programs (WEB LCT or SCT/LMT). Any other type of data stored in SD memory (user
file) is not deleted or damaged by the commands described in this chapter.
When the user saves the configuration parameters and/or the equipment software on SD memory, the fol-
lowing file data structure is automatically created:
• Root
• Descriptor.txt.
Descriptor file of text type, where the characteristics of the data present in the SD memory
are present: type of equipment the data refer to, type of data in SD memory (Boot SD or Sw
Dwl SD), etc.
This information is used by the management software to execute the compatibility checks
between the data of the SD memory and the equipment where the SD memory is inserted.
• Backup
• Backup file of the equipment configuration parameters
• Software
• Files of equipment software (equipment Sw/Fw + WEB LCT)
The SD memory can be used to make the following operations easy and fast.
This operation allows saving, on the SD memory, the new equipment sw/fw which will result to be the mas-
ter sw to use for the updating of other equipment.
At this point, it is sufficient to extract the SD card from the IDU unit and to insert into a different IDU unit.
When the IDU unit is switched on and if some compatibility checks are passed, the sw present in the SD
memory is copied into the controller.
The complete procedure to execute this operation is described at pag.118.
The commands available to the user for the management/maintenance of the SD memory are listed in
Tab.1.
The table points out, for every command, the use depending on the type of data structure present in the
SD memory and the mean execution times of the operations.
(1)
Command SD memory without SD memory with data structure SD memory with data structure Time
data structure Boot SD Sw Dwl SD
Delete SD files It deletes all the files present in SD memory 1/2 min.
Create BOOT SD It creates the structure and copies the files of the equipment configuration parameters and 5 min.
equipment sw (Boot SD) from the controller to the SD memory
Create Sw DWL SD It creates the structure and copies the files of the equipment sw (Sw Dwl SD) 5 min.
from the controller to the SD memory
Enable automatic - It enables the automatic equipment It enables the automatic equipment 1/2 sec.
restore (all) restart from SD memory: when the restart from SD memory: when the
equipment restarts, both the config- equipment restarts, the equipment
uration data and the equipment sw sw will be copied from the SD mem-
will be copied from the SD memory. ory to the controller.
Disable automatic - It disables the automatic restart of It disables the automatic update of 1/2 sec.
restore the equipment from SD memory the equipment sw from SD memory
(1)
Mean execution time of the operation.
* The IP/OSI stack switch tab is not available to the user Monitor, Read Only, Read and Write and Station
Operation.
The Software info & Maintenance command manages the equipment firmware, the WEB LCT software
present in the equipment, the communication stack used by the equipment and the restore of the default
equipment settings.
In detail, it is possible:
• To verify the firmware version of the equipment (pag.123).
• To update the firmware of the equipment (pag.124).
• To switch the functioning of the memory benches relevant to the main controller (pag.125).
• To verify the WEB LCT version present into the equipment (pag.125).
• To update the WEB LCT application (pag.126).
• To verify the communication stack in use (pag.127)
• To modify the communication stack in use (pag.127)
• To execute the equipment software reset (pag.128)
• To restore Factory Default of the equipment (pag.128)
1. Select the Main Menu > Software info & Maintenance command.
The Software info & Maintenance contextual area opens with the Equip. Firmware tab active.
The tab displays the version of the equipment firmware (see Fig.32).
Fig.32 Equip. Firmware tab (Software info & Maintenance contextual area)
Functioning
status of the
memory bench
1 and 2 (1)
List of the
codes and of
the FPGA
files that
compose the
equipment
firmware (2)
(1) Wording:
• Running. It is on progress the firmware relevant to the subject memory bench.
• Loaded. The firmware is present into the bench but actually it is not on progress (standby).
• Not Loaded. The firmware is not present into the memory bench.
• Downloading. It is on progress the updating of the firmware relevant to the memory bench.
• Interrupted/Aborting. The update of the firmware has been interrupted.
• Aborting. The update operation has been interrupted.
(2) Column:
• Unit. Name of the tab or of the equipment part where there is the controller (code) or the
programmable device (FPGA file).
• Software. Firmware name. Usually the name points out the component type. Wording:
• FW_boot. Boot code. This part of code can not be updated in fact it is not provided
with a version of the memory benches.
• FW_appl, Application code.
• Conf_... or Fpga... Configuration file of the programmable devices.
• Actual Rel. Version of the code or of the FPGA file present into the controller.
For the codes (FW…), the system points out the version and also the relevant identification
code composed by the letter E or N followed by a number (each number identifies a different
code type).
• Rel Bench 1/Rel Bench 2. Firmware version present into the memory bench 1 and 2 of the
main controller.
The application automatically updates the firmware of the memory bench not on progress or not present
(wording Loaded or Not Loaded - see Fig.32).
It is not possible to execute such an operation when the updating of the firmware is already on progress
(wording Downloading).
Then, it is necessary to point out that the firmware update procedure could change the equipment func-
tions.
1. If not already active, run the WEB LCT Console program or the SCT/LMT program, necessary to manage
the operation of FTP for the file transfer.
2. Select the Main Menu > Software info & Maintenance command.
The Software info & Maintenance contextual area opens with the Equip. Firmware tab active (see
Fig.32).
3. Select the Download SW Setup tab.
The Sw Download tab opens.
4. Set the path where there is the file into the Download file path box.
It is possible to type the path and the filename or to select the Browse local system (the window of the
O.S. opens for the selection of the file) and select the file.
The file you wish to use for the operation must be on the local PC (PC where the browser used for
the display of WEB LCT is running).
During the updating, the system deletes the firmware present into the bench memory and it
updates the firmware of the equipment one component at a time.
If the operation is stopped, into the memory bench there will be only the already updated com-
ponents. In this case, the new version can result unusable because it is not an integral one (the
bench will be in Not Loaded status).
In this case, the main controller keeps the minimum functions necessary to allow a new updating
of the firmware.
• Completed (refresh in 20 sec). The update operation is ended and the window will automatically
refresh in 20 seconds.
The refresh of the window can be forced, before the expiry of 20 seconds, pressing Refresh.
After the update, the Software Version box (see Fig.32) points out the new firmware version.
To switch the functioning of the memory benches relevant to the main con-
troller
It is not possible to switch the memory bench when the updating of the firmware is on progress (word-
ing Downloading - see Fig.32) and when the firmware of the equipment is not present into a bench (word-
ing Not Loaded).
The switching between the memory benches DOES NOT stop the traffic.
1. Select the Main Menu > Software info & Maintenance command.
The Software info & Maintenance contextual area opens with the Equip. Firmware tab active (see
Fig.32).
1. Select the Main Menu > Software info & Maintenance command.
The Software info & Maintenance contextual area opens.
Fig.33 Web LCT tab (Software info & Maintenance contextual area)
WEB LCT
type (1)
WEB LCT
version
present
into the
equipment
Fig.33 notes
(1) The wording Web LCT ALC Plus 2 points out the WEB LCT application for the control and the man-
agement of ALCplus2 equipment.
1. Select the Main Menu > Software info & Maintenance command.
The Software info & Maintenance contextual area opens.
3. Press Browse.
The window of the O.S. for the selection of the file opens.
4. Select the file (with .tar extension) you wish to use for the update.
The Status box points out the version of WEB LCT present in the file.
1. Select the Main Menu > Software info & Maintenance command.
The Software info & Maintenance contextual area opens.
Fig.34 IP/OSI stack switch tab (Software info & Maintenance contextual area)
Communication
stack in
use (1)
Fig.34 notes
(1) Wording:
• IP. Communication stack Full IP
• OSI. Communication stack IP Over OSI
1. Select the Main Menu > Software info & Maintenance command.
The Software info & Maintenance contextual area opens.
2. Bring at front the IP/OSI stack switch tab (see Fig.34).
3. Into the SYSTEM password required box, type the access code of System user.
5. Activate the Factory Default check-box if you wish that the change of communication stack restores the
default equipment settings.
The operation, if executed on an equipment subjected to the radio supervision, could cause the loss
of the link because the restore of the factory settings involves the re-channelling of the radios to the
default values.
1. Select the Main Menu > Software info & Maintenance command.
The Software info & Maintenance contextual area opens.
1. Select the Main Menu > Software info & Maintenance command.
The Software info & Maintenance contextual area opens.
3. Into the SYSTEM password required box, type the access code of System user.
The firmware of the equipment is the assembly of all the firmware necessary for the management of the
entire equipment (firmware of the main controller firmware of the peripheral units).
The firmware of the equipment is present into the main controller that is provided with two memory bench-
es (bench) the first one on service and the other one in waiting status.
Each bench can contain one firmware version (also different from the other one) of the equipment.
It is possible to update the sw/fw of the equipment, relevant to a memory bench, at a time. The WEB LCT
automatically updates the firmware of the memory bench not on progress or not present (wording Loaded
or Not Loaded - see Fig.32).
Through the graphical interface WEB LCT, the Factory Default settings of an equipment can be restored.
This operation can be executed during the change of the equipment communication stack (see pag.127)
or as independent operation (see pag.128).
In both cases, at the restart or at the new switch-on of the equipment, the Factory Default configuration
will be applied.
All the settings executed until then by the user will be deleted (for example, user list, remote equipment
list, cross connections, etc.).
In order to login to the equipment, the default user must be used. Username: SYSTEM - Password: siae-
micr.
The communication ports of the equipment will be restored to the addresses pointed out in Tab.2.
These addresses differ depending on the type (High or Low) of ODU of branch 1. The equipment keeps
always in memory the type (High or Low) of the last connected ODU. If no ODU has never been connected
to the IDU, the addresses of ODU Low must be used. If an ODU of High type is connected to an equipment
configured with ODU of Low type (and vice versa), the equipment automatically changes its own default
addresses.
The Backup/Restore Configuration command manages the backup/restore from file of the whole equip-
ment configuration.
In detail, it is possible:
For more information about the backup/restore of the equipment configuration, go to pag.131.
1. If not already active, start the WEB LCT Console program or the SCT/LMT program, necessary to man-
age the operation of FTP for the file transfer.
3. Type, in the Backup file name box, the name of the file and the path where you wish to save the file.
It is possible to set a name already existing for the file in the chosen path. In this case, the data
present in the file will be overwritten.
If the user does not set any path, the file will be saved in the main disk (for example c:\).
4. Press Backup.
The Operation status box displays the progress of the operation as messages.
During the operation, the Abort push-button is available. Pressing it and confirming, the operation is
interrupted.
The display of the message Completed in the Operation status box points out that the operation has
been executed with success.
1. If not already active, start the WEB LCT Console program or the SCT/LMT program, necessary to man-
age the operation of FTP for the file transfer.
3. Set, in the Restore file name box, the name of the file you wish to use to restore the configuration.
It is possible to type the path and the name of the file or select the Browse local system option (the
O.S. window for the selection of the file opens) and select the file.
1. If not already active, start the WEB LCT Console program or the SCT/LMT program, necessary to man-
age the operation of FTP for the file transfer.
During the
This box operation the
points out the Abort push-button
progress of the is active.
current operation Selecting it, the
operation in
progress can
be interrupted
Date/time of the
backup file
automatically
created by the
program before
the last restore
operation (1)
Fig.35 notes
(1) The format of date/time changes according to the setting made in one’s operating system.
The wording Unavailable points out that the file is not available.
The WEB LCT program allows save the whole equipment configuration (configuration backup - pag.130).
The saved file is in binary format and can be saved on PC or external support according to the user needs.
Then, in any moment, the user can restore the equipment configuration saved to file transferring the data
of the file to the same equipment (configuration restore - pag.130).
Before restoring the configuration, the equipment saves its own current configuration and keeps it available
until the successive restore operation.
In any moment, the user can retrieve the equipment configuration automatically saved by the program
before the last operation of configuration restore (configuration revert - pag.131).
In this way, two backup versions will be always available for an equipment: one executed by the user and
the other automatically executed by the program before the last restore operation.
The Unit List command displays the characteristics of the equipment units (real configuration).
Unit
Functional
status of Characteristics
the unit of the unit (1)
(2)
Resuming
functional
status of
the units
(2) (3)
Fig.36 notes
(1) Parameter:
• Real Type. Unit type really present into the equipment.
The wording Unequipped points out that the unit is not physically present into the equip-
ment.
• Expected Type. Foreseen unit type.
The wording Unequipped points out that the unit is not foreseen.
• HW Version. Unit version.
• Part Number. Part Number of the unit.
• Par Part Num. Part Number of the group that contains the unit.
Usually the group represents the equipment part that can be replaced.
Not all the unit are into a group. In this case the field will result empty and the part that can
be replaced will correspond to the unit itself.
• Serial Number. Series Number of the group that contains the unit.
(3) For each alarm inside the box, the total number of active alarms of the specific type in the equip-
ment units is pointed out.
List of the
active
manual
operations
(1)
Current
Timeout
relevat to the
equipment
manual
operations
(2)
Fig.37 notes
(1) The information present into the contextual area are not dynamically updated. Press Refresh to
update the information.
(2) The value 0 points out that the timeout has not been activated, this means that the activation of a
manual operation remains active until when the user deactivates it.
The activation of a manual forcing (for instance a loop) affects the traffic.
The timeout setting is common for all the manual forcing operations of the equipment.
2. Use the scrolling arrows to set a timeout comprised between 1 and 172800 seconds (48 hours).
The setting of the value 0 corresponds to the disabling of the timeout (it means that the activation
operations of the manual forcing will not be automatically disabled but the user will have to execute
such operations).
The Alarm Severity Configuration command manages the alarm transmission and their severity level.
In detail, it is possible:
• To verify the severity level and the enabling/forwarding status of the alarms (pag.136).
• To enable/disable an alarm (pag.137).
• To enable/disable the forwarding of the trap of an alarm (pag.137).
• To change the severity level of an alarm (pag.138).
To verify the severity level and the enabling/forwarding status of the alarms
Group
name (1)
Alarm
Alarm list
subdivided
into groups
(1) To display the alarm list select the symbol. To hide the alarm list select the symbol.
The number of alarms present in the group is displayed next to the name of the group (between
brackets). The groups and the alarms change according to the equipment configuration.
(2) Wording:
• Trap Enable. The forwarding of the trap is enabled.
• Trap Disable. The forwarding of the trap is not enabled.
(3) In detail:
• X Disabled. Memorization of the alarm disabled.
• <Coloured box> Critical, Major, etc. Memorization of the alarm enabled. The severity level
is pointed out by the colour of the box and by the name of the level.
The wording Unavailable in this SW ver. points out that the involved alarm is not supported by
the current firmware version present into the equipment controller.
To enable/disable an alarm
5. Press Ok.
The settings are reported in the Alarm Severity Configuration contextual area.
It is possible to change the forwarding status of the trap only if it has been enabled the alarm (see
pag.137).
5. Press Ok.
The settings are reported in the Alarm Severity Configuration contextual area.
4. In the Severity area, select the option relevant to the severity you wish to associate to the alarm: Sta-
tus, Warning, Minor, Major or Critical.
If the alarm was disabled (Disable option selected), the selection of a different option, besides mod-
ifying the alarm severity level, automatically enables it.
5. Press Ok.
The settings are reported in the Alarm Severity Configuration contextual area.
6. Press Apply and confirm.
The enabling/disabling of the alarm and of the forwarding of the trap is independent for each alarm and
local to the equipment which the operation is executed for. This means that the setting must be executed
for each single alarm of each single equipment.
The term alarm means the fault signal generated by an error or by a wrong operation of the equipment or
of any element that compose it.
The equipment alarms can be disabled and re-enabled by the user according to the needs.
Disabling an alarm means that, on the detection of the alarm itself, this is not registered in the equipment
controller and, as consequence, is not communicated to a possible management program: as the alarm
had never occurred.
On the contrary, enabling an alarm (default condition) means that, on the detection of the alarm itself, this
is registered in the equipment controller and, if the forwarding of the relevant trap is enabled (see next
item), it is communicated to the management system, which displays it in the current alarms and the his-
tory alarms.
The trap is a message (in this case of detection or clearing of an alarm) spontaneously sent by the equip-
ment to a possible external management system, for example SCT/LMT and/or NMS5UX/NMS5UX-B/
NMS5LX.
The forwarding of the trap of each alarm can be disabled and re-enabled by the user according to his own
needs.
Disabling a trap means that, on the detection of the alarm, this is not registered in the equipment controller
and, as consequence, is not communicated to a possible management program.
On the contrary, enabling a trap (default condition) means that, on the detection of the alarm, this is reg-
istered in the equipment controller and communicated to the management system, which displays it in the
current alarms and the history alarms.
Alarm severity
Each alarm acknowledged and managed by the management program has an associated severity level
which determinates the importance of the alarm.
This severity is not fixed, but can be changed by the user as he likes.
Curr. Profile Reading Monitor, Read Only, Read and Write, Station Operator
Reading/Writing System
The View Logged User command manages the users connected to the equipment.
In detail, it is possible:
User
name
(1)
User
profile
User
Timeout
Machine
IP address
(2)
Fig.39 notes
(1) The wording NMS5UX points out the user of the NMS5UX/NMS5UX-B/NMS5LX supervisory system
or a remote user (different from WEB LCT, SCT/LMT or NMS5UX user) who has the possibility to be
connected to the equipment (Permanent Login).
The other ones identify the WEB LCT or SCT/LMT users.
(2) With the wording machine, it is intended the PC (for the WEB LCT and SCT/LMT users) or the server,
the workstation (for the NMS5UX users and remote users) on which the application used by the user
is actually running.
If the Force Logout push-button is not available, this means that the record relevant to one’s user
has been selected.
The User Manager command manages the list of the equipment users.
In detail, it is possible:
User list
of the
equipment
User
name
User
profile
(1)
User
timeout
(2)
Fig.40 notes
The System and NMS5UX users are not pointed out into the User Manager contextual area.
(2) Wording:
• No Timeout. The option is disabled, this means that the user is not automatically disconnect-
ed after a defined time range.
• <number> Sec. The option is enabled, this means that the user (if no operation is executed
in the WEB LCT page) will be disconnected after the specified time range.
Into each list, it is possible to define up to a maximum of 4 users for each profile (up to a maximum of
12 users).
3. Into the User box, type the user name (alphanumeric string with a number of characters from 1 up to
8).
It is not possible to assign the same name to two different users present into the same list. Then, when
the user name has been assigned, it can not be changed later.
4. Into the Password box, type the access code of the (alphanumeric string with a number of characters
from 1 up to 8).
5. Into the Confirm Password box, type newly the access code of the user.
7. Into the Profile box, set the profile to be assigned to the user: Read only, Read and write or Station
operator.
8. Press OK.
The new user is inserted into the User Manager contextual area.
It is necessary to set again all the user parameters (password, timeout, profile) with the exception
of the user name that can not be changed.
5. Press OK.
To change the password and the timeout of the System user (System Pass-
word)
3. Into the Enter new password box, type the new access code of System user (alphanumeric string with
a number of characters from 1 up to 8).
4. Into the Confirm new password box, type newly the access code.
If you wish to modify only the timeout, it is necessary to input the current network password in the
Enter new password and Confirm new password fields.
3. Into the Enter new password box, type the new network password (alphanumeric string with a number
of characters from 1 up to 8).
4. Into the Confirm new password box, type newly the new network password.
To change the password and timeout of the NMS5UX user (CEM password)
The changing of the CEM password has to be executed only if it is changed the default password used
by the NMS5UX/NMS5UX-B/NMS5LX supervisory system.
If you wish to modify only the timeout, it is necessary to type the current CEM password into the Enter
new password and Confirm new password fields.
3. Into the Enter new password box, type the new CEM password (alphanumeric string with a number of
characters from 1 up to 8)
4. Into the Confirm new password box, type newly the CEM password.
The remote user has the same characteristics of the NMS5UX user with the only exception that he does
not need for a login password.
It is possible to set a maximum of 2 remote users.
4. Into the Manager IP Address 2 box, set the IP address of the machine relevant the second remote user.
It is possible type, for each one of the four available spaces (sub-divided by a dot), a number comprised
between 0 and 255.
5. Pressing the Reset push-button next to the relevant Manager IP Address… box, the value is set to zero
(0.0.0.0).
6. Activate the Trap Version 2 option, under the relevant Manager IP Address… box, to set the trap man-
agement of version 2 (SNMP).
If the option is not activated, the version 1 (SNMP) of the traps is used.
The users list is a list of users that can be connected and ask for the login to the equipment.
If a user is not present into the users list memorized into the controller on an equipment, such an user will
not be able to connect and/or to execute the login of that equipment.
With the exception of the System and NMS5UX users, all the other users of the users list relevant to an
equipment have to be set by the WEB LCT application (see pag.142), the SCT/LMT program or NMS5UX/
NMS5UX-B/NMS5LX system.
Each equipment, that can be managed by the WEB LCT application or by the SCT/LMT program, is equipped
with two pre-defined users:
• SYSTEM. User of the WEB LCT application or SCT/LMT program with the following features:
User name System (unchangeable parameter).
Timeout No Timeout (changeable parameter).
Profile System (unchangeable parameter)
Password Siaemicr (default) (changeable parameter - see pag.143)
The System user is single one for every equipment and he can not be deleted.
Only this user has the possibility to create, modify and delete users in the user list.
The user with System profile can as to check the parameters (reading operation) as to forward
commands or to execute changing (writing operation) to the equipment configuration.
Curr. Profile Reading Monitor, Read Only, Read and Write, Station Operator
Reading/Writing System
The Features Management command manages the functionalities (modulation, synchronisation, OSPF
protocol, etc.) enabled for the equipment.
In detail, it is possible:
List of the
available
functionalities
(1)
Enabling
status of the
functionalities
(2)
Fig.41 notes
(1) Functionalities:
• Maximum equipment modulation:
• Upgrade up to 8PSK
• Upgrade up to 16QAM
• Upgrade up to 32QAM
• Upgrade up to 64QAM
• Upgrade up to 128QAM
• Upgrade up to 256QAM
• Channel spacing:
• Upgrade up to 14M
(2) Wording:
• Enabled. The functionality is enabled.
• Disabled. The functionality is not enabled.
In order to enable one or more functionalities, IT IS NECESSARY to require the enabling certificate,
represented by a file (with .sfc extension), to the company that provides the equipment.
For each equipment you wish to enable one or more functionalities, a specific enabling certificate is re-
quired, because there is an univocal link between each single certificate and each specific equipment.
2. Press Browse.
The window of the O.S. for the selection of the file opens.
4. Press Open.
The selected file is indicated in the Status - Ready to send:... box.
Curr. Profile Monitor, Read Only, Read and Write, Station Operator, System
The RMON command manages the statistic counters of the Ethernet ports of the equipment. The managed
counters are described in RFC 2819 - History Control Group.
In detail, it is possible:
• To display the enabling/disabling status of the collection of the statistic counters of the equip-
ment Ethernet ports (pag.148)
• To activate the collection of the statistic counters for an Ethernet port (pag.149)
• To deactivate the collection of the statistic counters for an Ethernet port (pag.149)
• To display the values of statistical counters of an Ethernet port (pag.149)
For more information about the implementation of the RMON standard in the equipment managed by
WEB LCT go to pag.150.
List of the
external
and internal
ports of the
Ethernet
switch
Count
status (1)
Fig.42 notes
(1) Wording:
• Stopped. The count is not on progress.
• Running. The count is on progress.
The deactivation of the count involves the loss of the collected data.
Operation meaningful only for Ethernet ports for which the count of the RMON statistics is active. To
active the count see pag.149.
(1) Command:
• Refresh. It updates the data.
• Stop/Start. The commands are displayed one in alternative to the other: the first stops the
count, the second one reactivates it.
• Freeze/Unfreeze. The commands are displayed one as an alternative to the other: the first
one interrupts the dynamic display of the values in the window (freezes the window), the
second one reactivates it.
When the window is opened, the dynamic display of the values is active by default.
• Counter Filter. It manages the display of the counters in the window.
When the command is selected, the Select Counters window is opened where every counter
has a box on its side. If the box is:
• Active ( ). The counter is present in the Remote Monitoring... window
• Inactive ( ). The counter is not present in the Remote Monitoring... window
To activate (or deactivate) the display of a counter, activate (or deactivate) the relevant box
and press Ok.
(3) This parameter points out the seconds missing to the end of the current sampling interval, at the
end of which the new row is displayed.
The wording List update Freezed points out that the window is freezed (see command Freeze/Un-
freeze).
(4) The statistic counters of the considered Ethernet port are freezed by the equipment each minute.
For each port, the equipment can store a maximum of 120 samples (corresponding to 2 hours).
When the maximum value is reached, the new data will overwrite the oldest ones.
(5) At the end of a sampling interval, for each counter, the pointed out value corresponds to the value
registered during the measuring interval.
RMON Standard
RMON (Remote Monitoring) is a standard whose function is providing a set of services of statistics count,
monitoring and alarm report with reference to the activity of a LAN network.
These services are defined in terms of MIB (Management Information Base) group described in the docu-
ment RFC2819 - Remote Network Monitoring Management Information Base, which must be read for any
further detail.
The RMON standard is based on two components: an agent (RMON probe) and a client (remote manage-
ment station).
The agent saves the data within its own RMON tables present on the network devices (equipment, routers,
etc.). The RMON probes can see only the traffic flowing through themselves and therefore are located on
each (internal/external) port of the Ethernet Switch of the device to monitor.
The remote management station communicates with the RMON agent to obtain and correlate the RMON
data. Generally, the station is equipped with an interface (graphic or textual) which allows the display and
the analysis of the collected RMON data.
With reference to what depicted in the previous paragraph, the RMON functionality acts as client which,
through the commands present in the WEB LCT page, allows the analysis of the data collected by the
probes present on each (internal/external) port of the Ethernet Switch of the equipment in compliance with
the RMON standard (currently, the ALCplus2 equipment by the WEB LCT implement the RMON MIB group:
History).
The probes collect the statistic data, which are stored in the RMON table of the equipment.
The history of the statistics of every equipment stores, each 60 seconds (sampling range), the value of the
counters of each active Ethernet port. The equipment stores these data into a rotation buffer where, when
full, the new information overwrites the old ones (value set to 120 samples which allow storing 2 hours in
the equipment).
In order to store in the equipment and display the statistics history of a port, it is necessary to activate the
port (see pag.149). This port will remain active until when an user (WEB LCT or SCT/LMT) does not deac-
tivate it (see pag.149).
At the activation of the port, the equipment starts storing the data relevant to the statistics and makes
them available to the user, in form of table, subdivided by single Ethernet port (see pag.149).
During the count, the display of the data in the WEB LCT window can be interrupted. This operation does
not interrupt the count, but freezes only the data present in the window. In fact, when the data update is
re-activated, the window displays the values of all the sampling ranges (up to a maximum of 120), even
those stored in the equipment while the window was freezed.
The description of the counters is the same reported for the counters of the packets/bytes in input/output
from an Ethernet port (Lan Statistics - see pag.290).
The only difference is the name of the counter which, in some cases, change from the RMON counters with
respect to the Lan Statistics counters.
Tab.3 reports the correspondence of the names for the Ethernet RMON counters.
The counter Utilization is meaningful only as RMON counter and has the following description: the best
estimate of the mean physical layer network utilization on this interface during this sampling interval, in
hundredths of a percent.
The percentage of usage of the radio port refers to the bit rate of the port at the Switch (1Gbit/s) and not
to the available radio band.
The percentage of usage of the LAN ports instead refers to the real bit rate of the port (10Mbit/s, 100Mbit/
s or 1Gbit/s).
In the Equipment Menu of the WEB LCT page, the following commands are present:
• Main Menu (pag.153). It displays the Main Menu commands into the contextual area of the
WEB LCT page.
• Equipment (pag.154). It manages the equipment configuration.
• Synchronisation (pag.176). It manages the synchronism sources.
• Base Band (pag.190). It manages the base band parameters.
• Radio (pag.281). It manages the radio parameters.
• Maintenance (pag.289). It manages the loops, PRBS, switching modality, Fade Margin, etc.
• Switch (pag.332). It manages the switch of the protected STM-1 stream.
• User Input (pag.340). It manages the local and remote user input.
• User Output (pag.346). It manages the user output.
For equipment in protected configuration the commands relevant to the management of the redundant
parts of the modem and of the radio section are subdivided according to the branches managed by the
equipment.
For example, in case of equipment in protected configuration, two commands will be available for the radio
parameters: Radio Branch 1A and Radio Branch 2A. The first one refers to branch 1, the second one to
branch 2.
For each command, in the relative description, it is pointed out the user profile necessary to be able to use
it. In detail, the wording:
• Monitor. Equipment in connected/monitor status.
• Read only, Read and Write, Station Operator or System. Equipment in connected/login status
and that the user, who has requested the login, has respectively profile Read only, Read and
write, Station operator or System.
Moreover, if the commands allows executing some settings or changes, for each user profile the type of
operation that can be executed is pointed out. The option Reading points out that it is possible to check
the parameters, the option Writing that it is possible to set or to change them.
Curr. Profile Monitor, Read Only, Read and Write, Station Operator, System
The Main Menu command displays the commands of the Main Menu (pag.37) into the contextual area of
the WEB LCT page.
At the choice of Equipment option, the program displays the following commands:
The Mod. Cap/Link ID and General Preset commands are available only for equipment with the radio
equipped (see Fig.44).
When the equipment belongs to an ALCplus2 node and is connected to other elements of the node through
nodal Bus Ethernet, it is possible:
• To verify/modify the enabling status of the transit of packets of the ports of the local Ethernet
Switch to/from the ports of the Ethernet switches of the other elements of the ALCplus2 node
(Nodal Port Based VLAN) (pag.162)
This area
displays the
diagram with
the units that
compose the
equipment (1)
(6) (7)
(9) (10)
(13)
Option available only for ALCplus2 with expansion IduBoard Exp. Nod. 2xSTM-1 16E1.
(5) Nbr of Eth. Elements. Number of elements of the ALCplus2 node interconnected by nodal Bus Eth-
ernet:
• No Elements. No element of the node is interconnected by the nodal Bus Ethernet.
• 2, 3, ... 8. The first two, three, ... eight elements of the node are interconnected by the nodal
Bus Ethernet.
For example, if the value 3 is set means that the equipment occupying the first three logic
positions within the ALCplus2 node are interconnected by the nodal Bus Ethernet. The logic
position of the equipment is given by its identifying number: the equipment with identifying
number 1 will be considered in first position, 2 in second position and so on.
Parameter available only if the value ALCplus2 is set for the option Node Type.
(6) Node Elements ID. Identifying number of the equipment in the ALCplus2 node:
• 1. In ALCplus2 node, the equipment is identified by number 1.
• 2. In ALCplus2 node, the equipment is identified by number 2.
...
• 8. In ALCplus2 node, the equipment is identified by number 8.
The identifying number represents even the logic position assumed by the equipment in the
ALCplus2 node. This position is important in the definition of the equipment interconnected by the
nodal Bus Ethernet and/or nodal Bus TDM (see note 5 and 8).
Parameter available only if a value different from No Elements is set for the option Nbr of Eth. Ele-
ments and/or Nbr of TDM Elements.
(7) STP Mode. Enabling status of the Spanning Tree protocol at level of ALCplus2 node (STP node):
• Disable. STP node disabled.
• Bridge1-pro. STP node enabled: the equipment belongs to Bridge 1.
(8) Nbr of TDM Elements. Number of elements of the ALCplus2 node interconnected by the nodal Bus
TDM:
• No Elements. No element of the node is interconnected with the nodal Bus TDM.
• 2, 3, ... 8. The first two, three, ... eight elements of the node are interconnected by the nodal
Bus TDM.
For example, if the value 4 is set, this means that the equipment occupying the first four
logic positions within the ALCplus2 node are interconnected by the nodal Bus TDM. The logic
position of the equipment is given by its identifying number: the equipment with identifying
number 1 will be considered in first position, 2 in second position and so on.
Parameter available only if the value ALCplus2 is set for the option Node Type.
(9) TDM Nodal Bus Protection.Management of the protection of the TDM nodal Bus in the ALCplus2
node2:
• Not Protected. The nodal Bus TDM is not protected.
• Protected. The nodal Bus TDM is protected.
Parameter available only if a value different from No Elements is set for the option Nbr of TDM El-
ements and the equipment, which the WEB LCT page refers to, is an element interconnected by the
nodal Bus TDM.
This means that the value of Node Elements ID must be a number lower than or equal to the number
set for the parameter Nbr of TDM Elements.
(10) Nodal ID. Identifier name of the equipment in the ALplus node:
• Node A. The equipment belongs to a nodal system as node A.
• Node B. The equipment belongs to a nodal system as node B.
• Node C. The equipment belongs to a nodal system as node C.
Parameter available only if the value ALplus is set for the option Node Type.
(12) Nodal Protection. Management of the protection of the nodal Bus TDM in the ALplus node:
• Not Protected. The nodal Bus TDM is not protected.
• Protected. The nodal Bus TDM is protected.
Parameter available only if the value ALplus is set for the option Node Type.
Operation available only for equipment provided with expansion IduBoard Exp. 2xSTM-1 32E1 or Idu-
Board Exp. Nod. 2xSTM-1 16E1.
Option available only for ALCplus2 with expansion IduBoard Exp. Nod. 2xSTM-1 16E1.
Operation available and meaningful only if the equipment belongs to an ALCplus2 node.
Operation available and meaningful only for equipment belonging to an ALCplus2 node and for which
the number of elements interconnected by a nodal Bus Ethernet and/or nodal Bus TDM has been already
defined.
2. In order to modify the parameter, select the option relevant to the number you wish to assign to the
equipment: 1 ÷ 8.
The values available in the list change depending on the maximum number of elements interconnected
by nodal Bus Ethernet and/or by the nodal Bus TDM composing the node. For example, if an ALCplus2
node with 4 elements interconnected by nodal Bus Ethernet and 3 elements by nodal Bus TDM has been
defined, the values 1, 2, 3 and 4 will be available in the list.
The identifying number represents even the logic position assumed by the equipment in the ALCplus2
node. This position is important in the definition of the equipment interconnected by the nodal Bus Eth-
ernet and/or nodal Bus TDM.
3. Press Apply and confirm.
Operation available and meaningful only for equipment belonging to an ALCplus2 node, for which the
number of elements interconnected by nodal Bus Ethernet has been already defined and the equipment,
which the WEB LCT pages refers to, is an element interconnected by the nodal Bus Ethernet.
Operation available only for equipment provided with expansion IduBoard Exp. Nod. 2xSTM-1 16E1 and
belonging to a ALCplus2 node.
To verify/modify the protection of the nodal Bus TDM in the ALCplus2 node
Operation available and meaningful only for equipment belonging to an ALCplus2 node, for which the
number of elements interconnected by nodal Bus TDM has been already defined and the equipment, which
the WEB LCT pages refers to, is an element interconnected by the nodal Bus TDM.
Operation available only for equipment provided with expansion IduBoard Exp. Nod. 2xSTM-1 16E1 and
belonging to a ALplus2 node.
Operation available only for equipment provided with expansion IduBoard Exp. Nod. 2xSTM-1 16E1 and
belonging to a ALplus node.
To verify/modify the protection of the nodal Bus TDM in the ALplus node
Operation available only for equipment provided with expansion IduBoard Exp. Nod. 2xSTM-1 16E1 and
belonging to a ALplus node.
To verify/modify the enabling status of the transit of the packets of the ports of the
local Ethernet Switch to/from the ports of the Ethernet switches of the other ele-
ments of the ALCplus2 node
Operation available and meaningful only for equipment belonging to an ALCplus2 node, for which the
number of elements interconnected by nodal Bus Ethernet has been already defined and the equipment,
which the WEB LCT pages refers to, is an element interconnected by the nodal Bus Ethernet.
a. Select the bar relevant to the equipment of the node for which you wish to modify the status of
the ports.
b. Select, in the Port Based VLan table, the check-box corresponding to the combination: port of
local Ethernet Switch - port of Ethernet Switch of node element.
At each selection, the check-box assumes the status complementary to the previous one (if the
check sign is present, it is removed and vice versa).
The presence of the check sign means that the transit between the two ports is allowed. Its ab-
sence means that the transit is forbidden.
The transit of the packets of the ports LAN 1 and LAN 2 of the local Ethernet Switch from/to the
ports of the Ethernet Switch of the specific node element is automatically enabled by the system as
pointed out in Fig.45.
If you wish to disable one of this check-box, the message Changing these settings may result in loss
of Ethernet traffic through the node. Continue? is displayed, warning that the change of the setting can
cause the loss of traffic of the nodal Bus Ethernet.
Ports of Ethernet
switch of the
specific equipment
of ALCplus2 node
Enabling status
Equipment of of the ports in
ALCplus2 node relation to the
interconnected transit of the
by Ethernet packets (table
nodal bus (1) Port Based VLan)
(3)
Ethernet ports
of the equipment
which you are
connected to (ports
of local Ethernet
switch) (2)
Fig.45 notes
(1) Each bar corresponds to an equipment of the ALCplus2 node interconnected by nodal Bus Ethernet.
The number reported in the bar after the prefix IDU points out the equipment identifying number.
It is possible to display the status of the table Port Based VLan of one element at a time.
(2) The colour of the ports Lan 1 and Lan 2 is different with respect to the others to point out that the
ports are used for the Ethernet nodal interconnection.
(3) In the table Port Based VLan each check-box represents a different combination: local Ethernet
Switch port - Ethernet Switch port of the node element.
The presence of the check sign in a check-box points out that, for this combination of ports, the
transit of the packets is allowed. The absence of the check sign points out that the transit is not
allowed.
The transit of the packets of the ports LAN 1 and LAN 2 of the local Ethernet Switch from/to the
ports of the Ethernet Switch of the specific node element is automatically enabled by the system.
If you wish to disable one of this check-box, the message Changing these settings may result in
loss of Ethernet traffic through the node. Continue? is displayed, warning that the change of the
setting can cause the loss of traffic of the nodal Bus Ethernet.
Command available only for equipment provided with the radio (see option Radio A - Fig.44).
The Mod. Cap/Link ID command manages the parameters relevant to modulation/capacity, adaptive
modulation and link identification number
In detail, it is possible:
• To verify the reference band/modulation, the operating status and the configuration parameters
of the adaptive modulation (pag.164).
• To display the table summarizing the radio transport (pag.166).
• To modify the reference band/modulation (Bandwidth & Modulation) (pag.167).
• To modify the operating status of the adaptive modulation (ACM Engine) (pag.167).
• To modify the configuration parameters of the adaptive modulation.
These parameters change depending on the operating status of the adaptive modulation itself.
In detail, if the adaptive modulation is:
• Active, it is possible:
• To modify the power profile of RF transmitter (Tx Power Constant Peak Mode)
(pag.167).
• To modify the lower and upper thresholds of the modulation (Upper Modulation/Lower
Modulation) (pag.168).
• To modify the number of E1 streams permanently allocated (high priority streams)
(Permanent TDM Traffic) (pag.168).
• To modify the number of E1 streams assigned to an ACM profile (low priority streams)
(Extra TDM Cap.) (pag.168).
• Inactive, it is possible:
• To modify the number of E1 streams permanently allocated (high priority streams)
(Permanent TDM Traffic) (pag.168).
• To modify the number of E1 streams assigned to an ACM profile (low priority streams)
(Extra TDM Cap.) (pag.168).
• To verify/modify the link identification number (pag.168)
• To verify/modify the priority of the dynamic E1 stream (Extra TDM Cap.) (pag.169)
The operation:
• To verify/modify the number of E1 streams permanently allocated (high priority streams) (Per-
manent TDM Traffic) is NOT available for the ALCplus2 equipment of IduBoard or IduBoard Exp.
16E1 type.
• To verify/modify the priority of the E1 stream (Extra TDM Cap.) is NOT available for the ALCplus2
equipment of IduBoard type.
To verify the reference band/modulation, the operating status and the configuration
parameters of the adaptive modulation
When the window is opened, the values present in the tab refer to the currently selected reference
band/modulation.
If the currently selected reference band/modulation is modified, some parameters are disabled.
In order to display the parameters relevant to the new selected band, it is necessary to confirm (push-
button Apply) the new reference band/modulation.
(2)
(1) (3)
(4)
(6)
(5)
(7) (8)
(11)
(9) (10)
(12)
Fig.46 notes
(2) Tx Power Constant Peak Mode. Power profile of the RF transmitter. Option:
• Enable. Power increasing when the modulation decreases.
• Disable. Mean power constant when the modulation changes.
This parameter is available and meaningful only if the adaptive modulation is enabled.
The profile is used only if a modulation corresponding to the minimum modulation has been selected
as reference.
(4) Tx Power Mode. Current status of the power profile of the RF transmitter. Value:
• Average. Mean power constant when the modulation changes.
• Peak. Power increasing when the modulation changes
(5) Upper Modulation, Lower Modulation. Respectively upper and lower thresholds of the Tx modula-
tion.
This parameter is available and meaningful only if the adaptive modulation is enabled.
(6) Permanent TDM Traffic. Number of E1 streams assigned permanently (high priority streams). These
streams cannot be never discarded by the adaptive modulation.
The maximum number of E1 streams which can be assigned permanently is pointed out next to the
box.
This parameter is available and meaningful only for ALCplus2 equipment with IduBoard Exp.
2xSTM-1 32E1 or IduBoard Exp. Nod. 2xSTM-1 16E1 expansion.
(7) ACM Table. This table shows, for each ACM level, the number of E1 streams which can be used.
Depending on the operating status of the adaptive modulation, one or more profile will be available.
In detail, if the adaptive modulation is:
• Disabled. The table contains only the ACM profile relevant to the reference modulation
(Bandwidth & Modulation).
(8) Use the scrolling bar to display the detail of all the ACM profiles.
Selecting the arrow , it is possible to expand the list in such a way to display all the ACM profiles
at the same time. To return to the standard display, select the arrow .
(9) ACM profile. 8 profiles ACM are available from 4AQM to 256QAM. An additional profile on 4QAM with
low rate FEC (4QAM Strong) is present too.
(10) Max TDM Cap. Maximum number of (high and low priority) E1 streams which can be assigned to
the TDM traffic for every ACM profile.
(11) Extra TDM Cap. Number of (low priority) E1 streams assigned to each ACM profile. These streams
will be discarded by adaptive modulation according to the order configured by the user (see Fig.49).
(12) Pressing this push-button displays the table summarizing the radio transport and its subdivision be-
tween Ethernet and E1, in relation to the current band/modulation (see Fig.47).
(1)
(2)
Fig.47 notes
(2) Column:
• Active Modulation. ACM profile.
• Global Capacity. Global capacity associated to the ACM profile.
The value is given by: Ethernet Capacity + TDM High Priority + TDM Low Priority + Mainte-
nance Channel.
2. To modify the parameters Upper Modulation and Lower Modulation, select the value relevant to the
wished modulation.
Operation available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard Exp.
Nod. 2xSTM-1 16E1 expansion.
2. To modify the parameter, use the scrolling arrows to set the wished value.
Identificative
number of the
connection (1)
Fig.48 notes
(1) The current value is displayed into the Value field. The lack of selection of said identification (val-
ue=0) is shown by the wording Not Used.
Maximum
priority
Sorting
sequence
of Extra TDM
E1 streams
(1)
Minimum
priority
Fig.49 notes
(1) Wording:
• A. Tributary A (first E1 tributary of base board).
• B. Tributary B (second E1 tributary of base board).
• 1...n. E1 radio.
n = 16 (equipment with IduBoard Exp. 16E1 expansion) or 19 (equipment with IduBoard
Exp. 2xSTM-1 32E1 or IduBoard Exp. Nod. 2xSTM-1 16E1 expansion).
When an E1 stream is grey, this means that this stream is available but is not included within
the maximum number of Extra TDM E1 streams carried by the configured radio frame.
For example, in the figure the maximum number of Extra TDM streams configured for the radio
transport is 8. Then, the first 8 E1s from top to bottom in the list will be displayed black, the remnant
ones grey.
The order, as displayed in the window, goes from highest priority (first position in the list) to lowest
one (last position in the list).
This means that the E1 at the bottom of the list will be the first stream to be discarded by the adap-
tive modulation, the penultimate E1 in the list will be the second to be discarded and so on until
reaching the E1 at the top of the list which will be the last stream to be discarded by the adaptive
modulation.
Ethernet transport
ALCplus2 equipment assigns all the capacity not assigned to the TDM transport to the Ethernet interface.
Then, in absence of TDM traffic, the Ethernet capacity coincides with the total available capacity.
TDM transport
(ALCplus2 equipment of IduBoard or IduBoard Exp. 16E1 type)
The TDM traffic is assigned to every ACM profile selecting the number of E1 streams which must be trans-
ported.
a. For each ACM profile, the value Extra TDM Cap must be lower than or equal to Max TDM Cap -
Permanent TDM Traffic and cannot be never greater than 2 (ALCplus2 equipment of IduBoard
type) or 18 (ALCplus2 equipment with IduBoard Exp. 16E1 expansion).
b. When the user sets a value Extra TDM Cap for an ACM profile, WEB LCT automatically checks
and possibly modifies the values Extra TDM Cap of the higher modulation ACM profiles, in such
a way they result higher than or, at most, equal to the value Extra TDM Cap set by the user.
Key:
• Max TDM Cap. Maximum number of (high and low priority) E1 streams which can be assigned
to the TDM traffic for each ACM profile.
• Extra TDM Cap. Number of (low priority) E1 streams assigned to each ACM profile.
TDM transport
(ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard Exp. Nod. 2xSTM-1 16E1
expansion)
The TDM band can be subdivided in two parts: one not subjected to ACM, destined to the privileged traffic
(high priority) and not shareable with the Ethernet band (Permanent TDM Traffic), and one subjected to
ACM and destined to the lower priority traffic, possibly shareable with the Ethernet traffic (Extra TDM Cap).
The rules to respect for the setting of TDM traffic are the following:
a. The number of high priority E1 traffic channels must be lower than or equal to value displayed
next to the Permanent TDM Traffic box.
b. The value of Permanent TDM Traffic fixes the minimum allowed modulation as it blocks all the
modulations for which Max TDM Cap is lower than Permanent TDM Traffic (WEB LCT highlights
the minimum allowed modulation as consequence of the value Permanent TDM Traffic set disa-
bling all the not allowed modulations).
c. For each ACM profile, the value Extra TDM Cap must be lower than or equal to Max TDM Cap -
Permanent TDM Traffic and cannot be never greater than 21.
d. When the user sets a value Extra TDM Cap for an ACM profile, WEB LCT automatically checks
and possibly modifies the values Extra TDM Cap of the higher modulation ACM profiles, in such
a way they result higher than or, at most, equal to the value Extra TDM Cap set by the user.
e. A change of Permanent TDM Traffic can cause a violation of rule c. In this case, WEB LCT only
highlights which are the out-of-range values of Max TDM Cap (the wordings of the row of the
ACM profile become red) and the restore of the correct values is at user’s charge.
Key:
• Max TDM Cap. Maximum number of (high and low priority) E1 streams which can be assigned
to the TDM traffic for each ACM profile.
• Extra TDM Cap. Number of (low priority) E1 streams assigned to each ACM profile.
• Permanent TDM Traffic. Number of E1 streams permanently assigned (high priority streams).
The user, via WEB LCT, can define the priority of dynamic Radio E1s (Extra TDM Cap) (see Fig.49).
This priority determines the modality used to discard the dynamic Radio E1s when the ACM profile changes.
The choice of the reference modulation and of the power profile depends on the license type owned by the
network operator.
The reference modulation determines the emission spectrum to be in compliance with the current laws.
The power profile increasing when the modulation decreases can be enabled according to the standard
ETSI EN 302 217-2-2: the power as function of the modulation can be only lower then or equal to the power
of the reference modulation.
More information is reported in the equipment manual ALCplus2.
Command available only for equipment provided with the radio (see option Radio A - Fig.44).
The General Preset command manages the modem and radio parameters.
In detail, it is possible to verify/modify:
• Threshold level of the signal at reception (pag.172)
• Status of the local/remote synchronization protocol (pag.173)
• Enabling of the switch in transmission (pag.173)
• T and N parameters (Tx Switch Control) (pag.174)
• Reset the Transmitter Switch on Remote... alarm (Tx Switch Control) (pag.174)
• Radio branch label (pag.174)
1. Select the Equipment Menu > Equipment > General Preset command.
The General Preset contextual area opens with the General tab active.
The Rx Signal Level Alarm Threshold: <current value> dBm parameter points out the threshold level
of the signal at reception (see Fig.50). Under this threshold level, it is activated the relevant alarm.
2. To change the parameter, move the cursor to the wished level.
Threshold
of the signal
at reception
Status of the
local/remote
synchronization
protocol (1)
Fig.50 notes
(1) Option:
• Enable. The local/remote synchronization protocol is active.
• Disable. The local/remote synchronization protocol is inactive.
1. Select the Equipment Menu > Equipment > General Preset command.
The General Preset contextual area opens with the General tab active.
The Synchronization Setup Protocol parameter points out the state of the local/remote synchronization
protocol (see Fig.50).
Operation available only for the equipment in 1+1 isofrequential configuration. For the 1+1 etherofre-
quential configuration, the operation is not available because the two branches (1 and 2) transmit at the
same time as the selection of the signal is made in reception.
1. Select the Equipment Menu > Equipment > General Preset command.
The General Preset contextual area opens.
2. Select the Tx Sw on Remote Alarms tab.
In the Tx Switch Control area the enabling of the switch in transmission is displayed (see Fig.51).
Enabling of
the switch in
transmission Select this
(1) push-button
to reset the
Transmitter
Switch on
Remote...
(3)
(2)
Fig.51 notes
(1) Enabling status of the switch in transmission as consequences of alarms (…BER Alarm, …Demodu-
lator Fail Alarm) on the signal received from the equipment located at the other side of the link (re-
mote equipment). If active, the option:
• Enable, the switch is enabled.
• Disable, the switch is not enabled.
(3) The Transmitter Switch on Remote... notifies the switch in transmission as consequence of alarms
on the signal received from the remote equipment.
Operation available only for the equipment in 1+1 isofrequential configuration. For the 1+1 etherofre-
quential configuration, the operation is not available because the two branches (1 and 2) transmit at the
same time as the selection of the signal is made in reception.
1. Select the Equipment Menu > Equipment > General Preset command.
The General Preset contextual area opens.
2. Select the Tx Sw on Remote Alarms tab (see Fig.51).
The box:
• Check Period points out the time interval T (expressed in seconds) when the number of alarmed
seconds must be > N so that the switch in transmission takes place.
• Alarm Threshold points out the number of alarmed seconds N.
3. To modify the parameters, type the new values in the relevant boxes (Check Period box: value between
1 and 300; Alarm Threshold: value between 1 and 60).
4. Press Apply and confirm.
When the enabling status of the switch in transmission is active (Tx Switch Control), this switch is ex-
ecuted when the number of alarmed seconds is > N within a time interval T.
With number of alarmed seconds we mean the seconds when an alarm condition takes place contempo-
rarily on both the Rx of the remote equipment.
Operation available only for the equipment in 1+1 isofrequential configuration. For the 1+1 etherofre-
quential configuration, the operation is not available because the two branches (1 and 2) transmit at the
same time as the selection of the signal is made in reception.
1. Select the Equipment Menu > Equipment > General Preset command.
The General Preset contextual area opens.
2. Select the Tx Sw on Remote Alarms tab (see Fig.51).
1. Select the Equipment Menu > Equipment > General Preset command.
The General Preset contextual area opens.
Label that
identifies the
radio branch
The local/remote synchronization protocol (Synchronization Setup Protocol) is a functionality allowing the
management the change of radio configuration between two equipment connected by link, in such a way
to reduce the out-of-service time at each repartition of the available radio band and to keep the supervision
on the remote equipment active.
The local/remote synchronization protocol, when active, besides the management of the change of the ra-
dio parameters, allows managing the radio configuration of the equipment in the link when the alarm RA-
DIO... Link Telemetry Fail is present.
This alarm, if it is the only radio alarm active, points out a mismatch on the band repartition between the
two equipment.
In this condition, the modality called Rescue setup is automatically activated, which forces both the equip-
ment to the following condition:
• Modulation: 4QAM (respecting ETSI spectral masks)
• Radio traffic: all Ethernet
The activation of the Rescue setup modality is pointed out by the activation of the alarm RADIO... Rescue
Setup Active. The alarm is removed when the operator realigns the radio parameters in both the equipment
of the link.
The synchronization protocol can be enabled and disabled by the user (see pag.173). By default, the pro-
tocol is enabled.
If the user disables it, it remains disabled until the user re-enables it.
The local/remote synchronization is implemented by a proprietary protocol. It is meaningful and available
for the radio equipment of type ALCplus2 or ALplus2.
* Read and Write user profile can set only the parameters relevant to the maintenance (MAN. OP).
This command is available only if the synchronisation management is enabled (see Fig.44)
Indication of
the input
source from
which the
equipment
Input
“gets” the T0
synchronism
synchronisation
sources
for T0 (1)
Input
synchronism
sources
for T0 (1)
T0
synchronism
source (2)
(1) Each synchronization source in input is represented by a rectangle whose characteristics are illus-
trated here below.
Status and Synchronism source Forced use of
priority use of name (a) the source (d)
the source (b)
Alarms status
Source type (c) of the source (e)
a. Wording:
• TE LAN-3. Source extracted from LAN 3.
• TE LAN-4. Source extracted from LAN 4.
• T2/T3 1. Source extracted from the tributary A.
• T2/T3 2. Source extracted from tributary B or from one of the E1 of the expansion.
• RADIO (T0). Source extracted from the Radio.
• STM-1/NODAL A (T0), STM-1/NODAL B (T0). Sources extracted from the STM-1 (1 or 2)
or from the Nodal Bus (1 or 2).
• STM-1 [1] (T0) or STM-1 (T0). Source extracted from the first STM-1 tributary.
• STM-1 [2] (T0). Source extracted from the second STM-1 tributary.
• Nodal 1 (T0). Source extracted from the Nodal Bus 1.
• Nodal 2 (T0). Source extracted from the Nodal Bus 2.
• Internal Source. Source extracted from an its own internal reference (12,8MHz STRATUM 3).
The detail of the signal/configuration relevant to every single s source and the availability of the
source depending on the type/configuration of the equipment is pointed out in Tab.4.
In the boxes representing the synchronism sources in input for which the user can change the
parameters, the pointer assumes the shape of an hand.
The Internal Source synchronism source has not configuration parameters.
b. Wording:
• P: D. The synchronism source is not enabled.
• P: <1÷9>. The synchronism source is enabled and has a priority level pointed out by the
number (1: maximum priority, 9: minimum priority).
c. Wording:
• Trib. A. E1 tributary of the base board (tributary A).
• Trib. B. E1 tributary of the base board (tributary B).
• Trib. <number>. E1 tributary of the expansion.
• STM-1 <STM-1 number>. Tributary STM-1 (1 or 2)
• Nodal 1. First Nodal Bus.
• Nodal 2. Second Nodal Bus.
Not all the synchronism sources are provided with this information.
d. Colour box:
• White. The source in input has not been manually forced by the operator for the gener-
ation of the T0 synchronism.
• Light blue. The source has been manually forced (Manual Operation).
e. Colour box:
• White. There are not active alarms.
• Red. At least one source alarm has been activated.
a. Wording:
• (Locked). The input source, set for the creation of the T0 synchronism, is physically
present, the relevant signal is valid and it is used by the equipment for the creation of
the inner synchronism.
b. Colour box:
• White. The user has not forced the status of the T0 synchronism.
• Light blue. The user has forced the status of the T0 synchronism (Manual Operation).
c. Colour box:
• White. There are not active alarms.
• Red. At least one T0 alarm has been activated.
b. Move the cursor on a number comprised between 1 and 9 according to the desired priority level
to be assigned to the source (1: maximum priority, 9: minimum priority).
To disable the use of the source:
Source
alarms (1)
Status of
Status
preferential
of forced
usage of
usage of the
the source
source (2)
(3)
Usage status
and priority
level of the
source (4)
The contents
of this area
change
according to
the selected
input
synchronism
source (5)
(1) The colour of each box displays the status of the alarm:
• Grey. The alarm is not active.
• Red, orange, yellow or light blue. The alarm is active and has, respectively, severity Critical,
Major, Minor or Warning.
(2) Option:
• Forced Switch Off. The source is not forced for the generation of the internal synchronism.
• Forced Switch On. The source is forced for the generation of the internal synchronism.
(3) Option:
• Preferential Off. The synchronism source is not preferential as opposed to the other enabled
synchronism sources.
• Preferential On. The synchronism source is preferential as opposed to the other enabled syn-
chronism sources and (in absence of alarms causing its degrade or forced sources) is used
for the generation of the internal synchronism.
(4) The box Enabled points out the use status of the source. In detail, if the box is:
• Active. The source is enabled to use.
• Inactive. The source is not enabled to use.
The parameter Priority: <1÷9> points out the priority level of the source: 1 maximum priority, 9
minimum priority. The word Priority: Input points out that the source is not enabled.
The synchronism sources TE LAN-3, TE LAN-4, RADIO (T0), STM-1 [1] (T0), STM-1 [2] (T0), STM-
1 (T0) Nodal 1 (T0) and Nodal 2 (T0) are not provided with the Source area.
Operation available and meaningful only when the use of the synchronism source is active (see Fig.53).
3. To change the parameter, move the cursor on the number representing the wished priority.
The user can set a number between 1 and 9, where 1 represents the highest priority and 9 the lowest one.
4. Press Apply.
Only if you are activating the forcing a message is displayed warning that you are executing a forcing
and displaying the current setting of timeout.
Operation meaningful only when the use of the synchronism source is active (see Fig.53).
Operation available only for equipment provided with expansion IduBoard Exp. Nod. 2xSTM-1 16E1 and
if the management of the STM-1 streams and/or the management of the nodal configuration is active (see
Fig.44).
If a value is set for the source STM-1/NODAL A (T0), this value will not be available for the source
STM-1/NODAL B (T0) and vice versa.
To manage the output of synchronism (T12) on tributary A/B and set the in-
terface (output/input) of tributary A/B
The setting of the tributary (A or B) as output of synchronism T12 compromises the use of
the tributary (A or B) as traffic tributary.
3. In order to modify the parameters select, in the box relevant to the wished tributary, the option:
• NORMAL TRAFFIC. The tributary (A or B) is used for the transport of the traffic only or for the
contemporary transport of synchronism and traffic if properly set (see pag.188).
Moreover, setting this value causes the automatic setting of the value 2Mbit/s as interface for
the tributary (A or B) used as synchronism source in input.
• T2 (2Mb/s). The tributary (A or B) is used as output of synchronism T12 with interface 2Mbit/s.
Moreover, setting this value causes the automatic setting of the value 2Mbit/s as interface for
the tributary (A or B) used as synchronism source in input.
Use status of
tributary A as
output of
synchronism (T12)
and interface
(output/input)
of tributary A (1)
Use status of
tributary B as
output of
synchronism (T12)
and interface
(output/input)
of tributary B (1)
Fig.55 notes
(1) Parameters:
• NORMAL TRAFFIC. The tributary (A or B) is used for the transport of the traffic only or for
the contemporary transport of synchronism and traffic if properly set (see pag.188).
The interface for the tributary (A or B) used as synchronism source in input is 2Mbit/s.
• T2 (2Mb/s). The tributary (A or B) is used as output of synchronism T12 with interface 2Mbit/
s.
The interface for the tributary (A or B) used as synchronism source in input is 2Mbit/s.
• T3 (2MHz). The tributary (A or B) is used as output of synchronism T12 with interface 2MHz.
The interface for the tributary (A or B) used as synchronism source in input is 2MHz.
Setting the value T2 (2Mb/s) or T3 (2MHz) compromises the use of the tributary (A or B)
as traffic tributary.
To re-timing the E1s set for the contemporary transport of traffic and syn-
chronisation
Here below only the operation of re-timing of the E1s of an equipment is described. For the correct
configuration of the functionality for a radio link go to pag.188.
3. To modify a parameter select, in the E1 Retiming area relevant to the wished tributary, the option:
• Disabled. The E1 re-timing function is inactive.
• Enabled. The E1 re-timing function is active.
Tributary
(1)
Tributary
label (2)
Status of
retiming of
the tributary
(3)
(4)
Fig.55 notes
(1) Value:
• Tributary A. First E1 tributary of base board.
• Tributary B. Second E1 tributary of base board.
• Tributary <number>. E1 tributary of expansion.
(3) Value:
• Disabled. The E1 re-timing function is inactive.
• Enabled. The E1 re-timing function is active.
For more information about the E1 re-timing function and the modality to use the parameter for
the implementation of the function in a radio link go to pag.188.
(4) The Sync Alarm, when the E1 re-timing function is active, points out whether the operation failed
(alarm activated) or it was successful (alarm deactivated).
The colour of the box represents the Sync Alarm status and severity:
• Red, Orange, Yellow, Light blue. Alarm activated coupled respectively with the Critical, Ma-
jor, Minor, Warning severity.
• Grey. Alarm deactivated.
A synchronism source, in order to be used, must be enabled by the user (see pag.178).
For some synchronism sources, the type of source can be set (see Tab.4).
A priority level can be associated to every synchronism source in input (see pag.180).
The source with the highest priority level, and whose signal is valid, is used to synchronize the equipment
(if a forcing or a preferential source is not active).
The priority level of the synchronism source is pointed out by a number between 1 and 9, where 1 points
out the highest priority and 9 the lowest one.
Generally the equipment takes the synchronism from the source with the highest priority level: if this
source is missing or is degraded, the synchronism is taken from the source with priority level immediately
lower.
When the source with highest priority level returns to be valid, the equipment will automatically start to
use it to take the synchronism. If all the synchronism sources (set by the user) become unavailable, the
equipment automatically takes the synchronism from its own internal reference.
The degradation of the signal is caused by the presence of, at least, one of the following conditions:
• The source is not physically present.
• The difference between the source frequency and the internal reference source (STRATUM 3) is
greater than ± 9,2 ppm.
This function allows the user forcing a synchronism source in input as source from which the T0 synchro-
nism is taken (see pag.180).
This forcing is made without considering the status and the priority of the source.
This function must not be used for the normal operation of the synchronism. It is a maintenance operation
and remains active until the user disables it or the Timeout period of the manual operations expires (if set).
This function foresees the choice of a source to use as preferential among those enabled (see pag.180).
When the function of preferential source is not active, the internal synchronism is taken from the enabled
source with highest priority.
When the function of preferential source is activated for a source, this source will be used (in absence of
alarms causing its degradation or forced sources) to take the internal synchronism independently from its
priority level.
This condition is maintained until when the user disables the function of preferential source or the source
signal becomes degraded.
LAN-3.
TE LAN-3 LAN Eth
Source available only if the LAN is configured with electrical interface
LAN-4.
TE LAN-4 LAN Eth
Source available only if the LAN is configured with electrical interface
IduBoard (1)
T2/T3 1 E1 Tributary A with interface T2 (2Mb/s) or T3 (2MHz)
T2/T3 2 E1 Tributary B with interface T2 (2Mb/s) or T3 (2MHz) (1)
(1)
Refer to Fig.44.
(2)
If a value is set for the source STM-1/NODAL A (T0) this value will not be available for the source STM-
1/NODAL B (T0) and vice versa.
Internal synchronism T0
The synchronism source in input, which the internal synchronism T0 is extracted from, is determined by
the controller SETS of the equipment according to specific criteria:
• Forcing of the source
• Status of the source (enabled/disabled)
• Preferential source
• Source priority
• Status of the signal (valid/degraded)
The user can force the status of the internal synchronism T0 (see pag.182).
The forcing of the status Hold Over or Free Running is not the normal operation of the synchronism T0.
These forcings are maintenance operations and remain active until when the user does not disable them
or the Timeout period of the manual operation expires (if set).
The user can set that the synchronism in output is provided to tributaries A and/or B (see pag.182). In
this case the use of the tributary (A and/or B) as traffic tributary is compromised.
Moreover the use of the tributary A and/or B as output of synchronism T12 determinates the type of the
interface of the tributary (A and/or B) used as synchronism source in input (see Tab.6).
(1)
For the contemporary transport of synchronism and traffic see pag.188).
Re-timing of the E1s set for the contemporary transport of traffic and synchronisa-
tion
The function called Re-timing of E1s allows re-timing the E1s set for the contemporary transport of traffic
and synchronisation, to increase the requirements of jitter and wander even in case of operation with adap-
tive modulation (ACM).
Implementation of the function for the E1s of the base board (tributary A and B)
The tributaries of the base board can be set for the transport only of the traffic or as output of T12 syn-
chronism.
If the user wishes to use the tributary A or B for the contemporary transport of traffic and synchronisation,
in any condition of operation of the radio transport (ACM enabled), it is necessary to execute the operations
described in the following example.
Suppose you want to re-timing the tributary A used for the contemporary transport of traffic and synchro-
nisation between the local equipment and the remote equipment (see Fig.57).
SETS SETS
management management
Tributary A Tributary A
d. Set the value NORMAL TRAFFIC as output of synchronism T12 for the parameter Trib. A (see
Fig.55).
c. Set the source RADIO (T0) as synchronism source in input (see Fig.53 and Fig.54).
d. Activate the re-timing of tributary A (Tributary A - value Enabled - Fig.56).
e. Set the value NORMAL TRAFFIC as output of synchronism T12 for the parameter Trib. A (see
Fig.55).
Implementation of the function for the E1s of the expansion (tributary 1...n)
If the user wants to use their frequency for synchronisation purposes in any condition of operation of the
radio transport (ACM enabled), it is necessary to execute the operations described in the following exam-
ple.
Suppose you want to re-timing the tributary 1 used for the contemporary transport of traffic and synchro-
nisation between the local equipment and the remote equipment (see Fig.58).
SETS SETS
management management
Tributary 1 Tributary 1
d. Set the source T2/T3 2 as synchronism source in input (see Fig.53 and Fig.54).
In case you want to use this function (contemporary transport of traffic and synchronisation) on more
E1 tributaries, all the tributaries must be synchronous, moreover the re-timing must be activated for all
the tributaries and not only for the tributary used as synchronous source in input.
At the choice of Base Band option, the program displays the following commands:
• Ethernet Switch (pag.191). It manages the general configuration of the Ethernet interface.
• LAN 1, LAN 2, LAN 3, LAN 4 (pag.200). It manages the Ethernet external ports.
• Port A (pag.228). It manages the Ethernet internal port.
• Spanning Tree (pag.238). It manages the spanning tree in the network.
• TDM Tributaries (pag.243). It manages the TDM tributaries.
• Cross Connection (pag.267). It manages the cross-connection matrix.
The Cross Connection command is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-
1 32E1 or IduBoard Exp. Nod. 2xSTM-1 16E1 expansion.
The Ethernet Switch command manages the general configuration of the Ethernet interface.
In detail, it is possible:
Virtual LAN
• To verify the existing virtual Lans (pag.196).
• To create a virtual Lan (pag.197).
• To modify the configuration of a virtual Lan (pag.198).
• To delete a virtual Lan (pag.199).
For more information about the MAC Address Table, refer to pag.199.
To verify/modify the aging time of the addresses stored in the MAC Address Table
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens with the General tab active.
The MAC Addr. Aging Time parameter points out the validity period of the MAC addresses, dynamically
acquired and stored in the specific table (see Fig.59).
2. To change the parameter, set the wished value.
Emptying algorithm
of the packets
Tag 802.1p value present in the
of the packet in output queue (2)
input to a port of
the equipment (3)
This table indicates which
output queue a packet
Output queue (4) must be assigned to,
available in the depending on its
equipment (3) 802.1p priority Tag (5)
Fig.59 notes
(1) Option:
• 1522. Maximum size for standard Ethernet (IEEE Tagged Frames).
• 2048. Maximum dimension of the packet extendable up to 2048.
• 10240 (Jumbo). Maximum dimension of the packet extendable up to 10240 (Jumbo).
(2) The option:
• 8421 WRR, indicates that a part (8 messages) of the queue with highest priority is empties,
then a part of the queue with lower priority (4 messages), then a part of the queue with fur-
ther lower priority (2 messages), then a part of the queue with lowest priority (1 message)
and so on restarting from the queue with highest priority.
• Strict Priority, indicates that the queue with highest priority is completely emptied (sending
of all the messages) before sending a message of the queue with lower priority.
• Strict 3, indicates that the high priority queue 3 is completely emptied (sending of all the
messages). The other queues (2, 1, 0) are managed with a WRR 421 mechanism.
• Strict 3 and 2, indicates that the high priority queue 3 and queue 2 are completely emptied.
The other queues (1, 0) are managed with a WRR 421 mechanism.
(3) The check sign indicates which output queue (Queue…) the packet in input is associated to, whose
value of priority Tag (802.1p) corresponds to the value 0, 1, 2, 3, 4, 5, 6 or 7.
The 802.1p Priority Management table is COMMON to all the Ethernet port of the equipment.
(4) Each Ethernet port of the equipment has four output queue, which the packets in input from other
ports are sent to. Wording:
• Queue 0. Queue with 0 priority (lowest priority).
• Queue 1. Queue with 1 priority.
• Queue 2. Queue with 2 priority.
• Queue 3. Queue with 3 priority (highest priority).
(5) A packet in input from any Ethernet port of the equipment, having a valid value of priority Tag
802.1p, is automatically assigned to one of the four queues of the output port, according to what
reported in the 802.1p Priority Management table.
For example, with reference to the figures, the packets in input with Tag 802.1p equal to 0, 1, 2 or
3 will be assigned to the queue with lower priority (Queue 0), while the packets with Tag 802.1p
equal to 4, 5, 6 or 7, to the output queue with highest priority (Queue 3).
What just said is valid only if the analysis of the priority at level 3 (field PTOS/DSCP) is not active
and prioritary.
The equipment allows analysing the priority at level 2, according the standard 802.1p (values
0…7), or at level 3, through the analysis of the PTOS/DSCP field present in the header of the IP
packets (values 0…63). The priority standard can be modified by the user and can be different for
each Ethernet port.
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens with the General tab active (see Fig.59).
2. Press Mac Table clear and confirm.
The system reset the MAC Address Table.
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens with the General tab active (see Fig.59).
When the in-band supervision is active (see pag.42) and the Double Tag function is enabled (see Fig.66/
Fig.76), for the correct transit of the supervision packets it is suggested to set the value 2048 as maximum
packet size.
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens with the General tab active.
The Max Packet Size parameter points out the maximum size of the accepted packet (see Fig.59).
2. To change the parameter, select the option:
• 1522. Maximum size for standard Ethernet (IEEE Tagged Frames).
• 2048. Maximum dimension of the packet extendable up to 2048.
• 10240 (Jumbo). Maximum dimension of the packet extendable up to 10240 (Jumbo).
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens with the General tab active.
The QinQ ETH Type parameter points out the Eth Type value in the S_Tag (Service Tag) QinQ field (see Fig.59).
2. To change the parameter, type the new value.
To verify/modify the emptying algorithm of the packets present in the output queue
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens with the General tab active.
The Egress Priority Policy parameter points out the emptying algorithm of the output queues (see Fig.59).
To verify/assign the output queue to a packet, in input to any Ethernet port, accord-
ing to its Tag 802.1p
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens with the General tab active.
The 802.1p Priority Management table points out the current setting output queues - Tag 802.1p (see
Fig.59).
2. To change the parameter, select the box (the check sign is displayed) corresponding to the wished com-
bination output queue - Tag 802.1p.
For the same value of Tag 802.1p, it is possible to select only one queue at a time.
To verify/modify the time interval (Hysteresis) after which the Link Loss Forwarding
modality is activated and deactivated
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens.
Hysteresis of
the Link Loss
Forwarding
modality
The setting of the parameter is common to all the Ethernet ports of the equipment.
If the equipment belongs to an ALCplus2 node and is connected to other node elements through Ethernet
nodal Bus, the level-3 priority (analysis of field PTOS/DSCP) is not managed when the transit of the packets
takes place through the nodal interconnection (see Fig.61).
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens.
2. Select the PTOS/DSCP Config tab.
In the Queue Pri column, for each PTOS/DSCP value, the relevant output queue is displayed (see
Fig.62).
3. To modify the output queue, which a value is associated to, select, in the Filter area, the option relevant
to the IP format which the DSCP field refers to:
• IP v4 DSCP. The DSCP field is meaningful for traffic incoming in the Switch in the IPv4 format.
• IPv6 DSCP. The DSCP field is meaningful for traffic incoming in the Switch in the IPv6 format.
4. Select the output queue which the value is associated to:
• Queue 0, to assign the value to the output queue with 0 priority (high priority).
• Queue 1, to assign the value to the output queue with 1 priority.
• Queue 2, to assign the value to the output queue with 2 priority.
• Queue 3, to assign the value to the output queue with 3 priority (low priority).
5. Repeat the previous step for the output queue of all the wished value.
6. Press Apply and confirm.
IDU1
3 A
2
4
1
Ethernet nodal Bus
Switch
IDU2
List of the
possible
In these
values
boxes it is
for the
possible
PTOS/DSCP
to activate
field (1)
some filters
to the list
of value (2)
(3)
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens.
2. Select the Virtual Lan Config. tab.
The existing virtual LANs are displayed in the Virtual Lan Config. tab (see Fig.63).
List of the
virtual Lan’s
(1)
Default VLan
identifier
of each
Ethernet
port of the
equipment
(2)
(2) The default identifier of the internal (Port A) and external (Lan...) ports.
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens.
4. Type, into the VLan ID box, the identifier (within 1 and 4095) you wish to assign to the virtual LAN.
The parameter cannot be modified later.
5. Type, into the Label box, the name (alphanumeric string up to 20 characters) you wish to assign to the
virtual LAN.
When the box is selected, Vlan <identifier> is suggested as name of the virtual Lan. This name can be
changed as you wish.
6. In the box relevant to each external port (Lan 1, Lan 2, Lan 3 and Lan 4) and internal port (Port A),
select the option:
The Vlan Table can be used, in case of traffic without Tag, only if the default Vlan ID of the
input port is contained as routing row in the table itself. If this condition is not satisfied, the Vlan
Table is not meaningful for all the traffic without Tag.
• Unmodified, to enable the port to the transit of the packets with VLan ID equal to that of the
virtual Lan. The tag 802.1Q (priority and VLAN identifier) are not removed or added to the pack-
ets in output from the port.
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens.
2. Select the Virtual Lan Config. tab.
The Virtual Lan Config. tab opens (see Fig.63).
5. Type the possible new name (alphanumeric string at most of 20 characters) you wish to assign to the
virtual LAN in the Label box.
6. In the box relevant to each external port (Lan 1, Lan 2, Lan 3 and Lan 4) and internal port (Port A),
select the option:
• Disable, not to enable the port for the transit of the packets with VLan ID equal to that of the
virtual Lan.
• Untagged, to enable the port to the transit of the packets with VLan ID equal to that of the virtual
Lan. The tag 802.1Q (information of priority and VLAN identifier) is removed to the packets in
output from the port.
• Tagged, to enable the port to the transit of the packets with VLan ID equal to that of the virtual
Lan. To the packets without Tag, in output from this port, is automatically added the Tag com-
posed by the information:
• Of priority; the value is defined in the box Priority of the origin port of the packet itself.
• Of Vlan ID which corresponds to the default Vlan ID (Default Vid box) of the origin port
of the packet.
The Vlan Table can be used, in case of traffic without Tag, only if the default Vlan ID of the
input port is contained as routing row in the table itself. If this condition is not satisfied, the Vlan
Table is not meaningful for all the traffic without Tag.
1. Select the Equipment Menu > Base Band > Ethernet Switch command.
The Ethernet Switch contextual area opens.
The MAC Address Table is a table created by the Ethernet Switch to keep trace of the reachability of the
equipment present in the network.
For the editing of the MAC Address Table, the Switch uses the MAC addresses (source and destination) of
the packets in input and the number of the port through which a packet enters in the Switch as information
source.
When the Switch receives a packet, it checks its source MAC Address and, if this is not already present in
the MAC Address Table as reachable through the port where it has received the message, inserts it there.
Then it checks the destination MAC Address. If it is already present in the MAC Address Table, it transmits
the packet with the associated interface to the considered MAC Address.
If the destination MAC Address is not present in the MAC Address Table, the Switch transmits the frame
on all its own interfaces, excluding only that where the frame itself has been received.
A MAC address, once stored in the table, is automatically deleted from the table itself if it is not used within
a given time period (Aging Time).
* Read and Write user profile can set only the parameters relevant to the maintenance (MAN. OP).
The LAN 1, LAN 2, LAN 3 and LAN 4 commands manage the Ethernet external port.
On the choice of one of the commands, the LAN <number relevant to the selected Lan> contextual area
opens, where it is possible to manage the specific external port.
In detail:
Priority parameters
• To verify/modify the priority criterion used to associate the packets in input from the external
port to the output queue (Lan1, Lan2, Lan3, Lan4) (pag.210).
• To verify/modify the value to insert in the field 802.1p of the packets in input from the external
port which, in output, the Tag is added to (Lan1, Lan2, Lan3, Lan4) (pag.211).
• To verify/modify the mapping of the priority (802.1p) inside the Tag VLan (Lan1, Lan2, Lan3,
Lan4) (pag.211)
LLF parameters
• To verify/modify the enabling status of the Link Loss Forwarding modality of the external port
(Lan1, Lan2, Lan3, Lan4) (pag.218).
Loop
• To activate/deactivate the loop on line side of the external port (Lan1, Lan2, Lan3, Lan4)
(pag.219)
Laser parameters
The following operations are available only for ports LAN 3 and LAN 4 when configured as optical inter-
faces.
• To verify the current status of the laser (Lan3, Lan4 - optical interface) (pag.220)
• To verify the type of laser module (Lan3, Lan4 - optical interface) (pag.221)
• To verify/modify the enabling status of the laser (Lan3, Lan4 - optical interface) (pag.221)
• To verify/modify the transmission mode of the laser (Lan3, Lan4 - optical interface) (pag.222)
• To enable manually the laser transmission (Lan3, Lan4 - optical interface) (pag.222)
• To execute the test laser functioning status (Lan3, Lan4 - optical interface) (pag.223)
To verify/modify the enabling status of the external port (Lan1, Lan2, Lan3, Lan4)
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens with the Interface tab active (LAN 1/LAN 2). For LAN
3 and LAN 4, it is necessary to bring this tab in foreground.
The Rate Control parameter points out the enabling status of the port (see Fig.64).
(1) (2)
(3) (4)
(6)
(5) (7)
(8) (9)
(10)
Fig.64 notes
(2) Activation status of the autonegotiation between the roles of the line synchronism:
• Enable. The autonegotiation between the roles Master and Slave of the line synchronism is
automatic.
• Disable. The autonegotiation between the roles Master and Slave of the line synchronism is
forced. In this case, the role defined in the box Master/Slave is used.
Parameter available and meaningful only for ports with electrical interface for which the autonego-
tiation is active (box Speed/Duplex – value Auto).
(4) Enabling status of the automatic learning of the MAC Address in the MAC Address Table:
• Enable. The automatic learning of the MAC Address is enabled.
• Disable. The automatic learning of the MAC Address is disabled.
If the equipment belongs to an ALCplus2 node and is interconnected to other node elements
through Ethernet nodal Bus, the value Enable is forced for this parameter. The setting cannot be
changed.
(7) Activation status of the autonegotiation and, if the autonegotiation is deactivated, operating modal-
ities and transmission speed of the port.
For LAN 1, LAN 2 and LAN 3, LAN 4 configured with electrical interface, the following values are
available:
• Full-Duplex-10M. The auto negotiation is disabled, the transmission type is Full-Duplex and
the data transmission speed through the external port is 10Mbit/s.
• Half-Duplex-10M. The auto negotiation is disabled, the transmission type is Half-Duplex and
the data transmission speed through the external port is 10Mbit/s.
• Full-Duplex-100M. The auto negotiation is disabled, the transmission type is Full-Duplex and
the data transmission speed through the external port is 100Mbit/s.
• Half-Duplex-100M. The auto negotiation is disabled, the transmission type is Half-Duplex
and the data transmission speed through the external port is 100Mbit/s.
• Auto. The auto negotiation is enabled.
For LAN 3, LAN 4 configured with optical interface, the following values are available:
• Full-Duplex-100M. The auto negotiation is disabled, the transmission type is Full-Duplex and
the data transmission speed through the external port is 100Mbit/s.
• Full-Duplex-1G. The auto negotiation is disabled, the transmission type is Full-Duplex and
the data transmission speed through the external port is 1GMbit/s.
To verify/modify the inversion status of the Tx and Rx lines of the external port
(Lan1, Lan2 and Lan3, Lan4 electrical interface)
Operation available and meaningful only for ports with electrical interface for which the use of the ex-
ternal port is enabled (see pag.201).
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens with the Interface tab active (LAN 1/LAN 2). For LAN
3 and LAN 4, it is necessary to bring it in foreground.
The Cable crossover parameter points out the inversion status of the Tx and Rx lines (see Fig.64).
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens with the Interface tab active (LAN 1/LAN 2). For LAN
3 and LAN 4, it is necessary to bring it in foreground.
The Speed/Duplex parameter points out the enabling status of the auto negotiation and, if the auto
negotiation is inactive, the operation modality and the transmission speed used by the external port
(see Fig.64).
To verify/modify the enabling status of the flow control of the external port (Lan1,
Lan2, Lan3, Lan4)
If the equipment belongs to an ALCplus2 node and it is interconnected to other elements of the node
by nodal Bus Ethernet, the flow control must be DISABLED.
If it was enabled, at the opening of the window a message is displayed asking to disable the parameter. If
already disabled, the setting cannot be changed.
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens with the Interface tab active (LAN 1/LAN 2). For LAN
3 and LAN 4, it is necessary to bring it in foreground.
The Flow Control Full Dplx/Back Pressure Half Dplx parameter points out the activation status of the
flow control of the external port (see Fig.64).
In Full-Duplex modality, the flow control is regulated according to the 802.3x normative.
In Half-Duplex modality, the flow control is regulated according to the Back Pressure technique.
The MAC-based routing functionality in the Ethernet Switch is available only if enabled this function.
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens with the Interface tab active (LAN 1/LAN 2). For LAN
3 and LAN 4, it is necessary to bring it in foreground.
The MAC Learning parameter points out the enabling status of the automatic learning of the MAC Ad-
dress in the specific table (MAC Address Table) (see Fig.64).
If the equipment belongs to an ALCplus2 node and is interconnected to other elements of the node
through Ethernet nodal Bus, the automatic learning of the MAC Addresses must be enabled.
If the parameter Mac Learning has value:
• Disable, when the tab Interface is opened, the message You have to enable Mac Learning will
be displayed. Modify the value from Disable to Enable.
• Enable, it cannot be modified.
To restart the auto negotiation procedure for the external port (Lan1, Lan2, Lan3,
Lan4)
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens with the Interface tab active (LAN 1/LAN 2). For LAN
3 and LAN 4, it is necessary to bring it in foreground. Fig.64 shows an example.
2. Press Restart Auto Neg. and confirm.
The push-button is available only if the auto negotiation is enabled (Speed/Duplex and/or Flow Con-
trol... box - option Auto).
To verify/modify the operating modality of the line synchronism (role) (Lan1, Lan2
and Lan3, Lan4 electrical interface)
Operation available and meaningful only for ports with electrical interface for which the autonegotiation
is active (see pag.204).
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens with the Interface tab active (LAN 1/LAN 2). For LAN
3 and LAN 4, it is necessary to bring it in foreground.
The Master/Slave parameter points out the operating modality of the line synchronism (role) of the ex-
ternal port (see Fig.64).
Operation available and meaningful only for ports with electrical interface for which the autonegotiation
is active (see pag.204).
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens with the Interface tab active (LAN 1/LAN 2). For LAN
3 and LAN 4, it is necessary to bring it in foreground.
The M/S Autoneg. parameter points out the activation status of the autonegotiation between the roles
of the line synchronism of the external port (see Fig.64).
1. Select the Equipment Menu > Base Band > LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens with the Interface Type tab active.
The Interface Type parameter points out the interface type of the external port (see Fig.65).
(1)
Interface
type (2)
Fig.65 notes
(1) Tab available only for the external ports LAN 3 and LAN 4.
(2) Option:
• Electrical. The external port is configured with electrical interface.
• Optical. The external port is configured with optical interface.
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
2. Select the VLan(802.1Q) tab.
The Default Vid parameter points out the default Vid value of the port (see Fig.66).
The default Vid of a port is used as Vid in the field 802.1Q of the packets came from the port in subject
without Tag and destined to exit with Tag from any port of the Switch.
3. To change the parameter, type a numeric value in the box (maximum 4095).
Default
Vid value
of the port Forcing of the
Vid value of the
Control status port to the
of Tag Vlan ID default value (3)
on the messages
in input from
the port (1)
Behaviour of
the port towards
the packets in
output (2)
Ports through
which can transit
the messages in
input from the
external port (4)
Fig.66 notes
(1) Option:
• Disable 802-1Q. The external port does not analyse the Tag (802.1Q) of the packets in input.
They will be sent only to the ports indicated in the Port Based VLAN area.
• Fallback. The external port uses both the following modalities:
• If the Tag 802.1Q is present in the list of VLAN, the packet is sent to the other ports
enabled in the list for the same Tag.
• If the Tag 802.1Q is not present in the list of VLAN or if no Tag is present, the packet
will be sent to the port listed in the Port Based VLAN area.
• Secure. The external port discards the packets which have not, in their Tag, a known VLAN
identifier, that is present in the list of VLAN; furthermore it discards the packets if the port
does not belong to the VLAN itself.
(2) Option:
• Unmodified. The Tag 802.1Q (priority and VLAN identifier) is not added or removed to the
packets in output from the port.
• Untagged. The packets in output from port are deprived of the Tag 802.1Q (priority infor-
mation and VLAN identifier).
• Tagged. The VLAN identifier, if not present, is added to the packets in output from the port:
the identifier is that indicated in the Default Vid box.
• Add Double Tag. The packets in output from the port are always tagged. If the packet is al-
ready tagged, a second Tag is added. If the packet is not tagged, the Tag is added. The add-
ed Tag is composed by:
• The Vlan identifier set in the Default Vid box of the port from which the message en-
tered in the equipment.
(4) For each single Ethernet port, if the set option is:
• Disable, the packets, in input from the external port which the window refers to, are not en-
abled to transit through the specific internal or external port.
• Enable, the packets, in input from the external port which the window refers to, are enabled
to transit through the specific internal or external port
The LAN… box relevant to the external port, which the window refers to, is not displayed.
To verify/modify the control of Tag Vlan Id on the messages in input from the exter-
nal port (Lan1, Lan2, Lan3, Lan4)
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
2. Select the VLan(802.1Q) tab.
The Ingress Filtering Check parameter points out, if active, the control of Tag Vlan Id on the messages
in input from the port (see Fig.66).
3. To change the parameter, select the option:
• Disable 802-1Q. The external port does not analyse the Tag (802.1Q) of the packets in input.
They will be sent only to the ports indicated in the Port Based VLAN area.
• Fallback. The external port uses both the following modalities:
• If the Tag 802.1Q is present in the list of VLAN, the packet is sent to the other ports en-
abled in the list for the same Tag.
• If the Tag 802.1Q is not present in the list of VLAN or if no Tag is present, the packet will
be sent to the port listed in the Port Based VLAN area.
• Secure. The external port discards the packets which have not, in their Tag, a known VLAN iden-
tifier, that is present in the list of VLAN; furthermore it discards the packets if the port does not
belong to the VLAN itself.
For each configuration (selection of the option Disable 802-1Q, Fallback and Secure) the table
of Port Based VLAN must be ALWAYS configured even if the traffic management is executed only
on Tag base (see pag.209).
If you wish to obtain a bidirectional traffic routed according the Vlan table, the control of the Tag
802.1Q (Fallback or Secure) must be activated on all the ports.
To verify/modify the behaviour of the external port towards the packets in output
(Lan1, Lan2, Lan3, Lan4)
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
When the Add Double Tag value is active, besides the insertion of a Tag (Provider Tag) on
the packets in output from the considered port, the Provider Tag is always removed on the pack-
ets in input to the same port.
The Provider Tag added by the Double Tag function has an identifier (Ethernet Type) which can
be configured by the parameter QinQ ETH type.
In an ALCplus2 nodal system with the Trunking Radio modality enabled, when the option Add
Double Tag (QinQ) is active, for the traffic ports of the Switch (LAN 3, LAN 4, Port A) you must
set the value Disable 802-1Q for the parameter Ingress Filtering Check (see Fig.66/Fig.76) (the
routing of the traffic is not managed according to the VLAN table).
To force the value of Vid of the external port to the default value (Lan1, Lan2, Lan3,
Lan4)
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
To enable/disable the ports through which the messages in input from the external
port (Lan1, Lan2, Lan3, Lan4)
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
The LAN… box relevant to the external port, which the window refers to, is not displayed.
To verify/modify the priority criterion used to associate the packets in input from the
external port to the output queue (Lan1, Lan2, Lan3, Lan4)
If the equipment belongs to an ALCplus2 node and is connected to other node elements through Eth-
ernet nodal Bus, the level-3 priority (analysis of field PTOS/DSCP) is not managed when the transit of the
packets takes place through the nodal interconnection (see Fig.61).
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
Tag 802.1p
value of the
packet in
input to the
Switch
Fig.67 notes
(1) Option:
• Disable. The priority is disabled.
(2) Option:
• 0. Lowest priority
• 7. Highest priority.
(3) The priority 802.1p present in a packet in input to a port can be remapped in output from the Switch
with a different priority value.
The remapping of a priority is pointed out in the table by a check sign.
For example, as shown in the figure, a packet in input with priority 3 is remapped in output from
the Switch with priority 5.
The table is available and meaningful only if the analysis of the value of the priority 802.1p (pa-
rameter Priority set to the value 802.1P, 802.1P-IpTOS or IpTOS-802.1P) is active.
To verify/modify the value to insert in the field 802.1p of the packets in input from
the external port which, in output, the Tag is added to (Lan1, Lan2, Lan3, Lan4)
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
3. To change the parameter move the cursor to the wished value (0: lowest priority, 7: highest priority).
4. Press Apply and confirm.
To verify/modify the mapping of the priority (802.1p) inside the Tag VLan (Lan1,
Lan2, Lan3, Lan4)
Operation available and meaningful only if the analysis of the value of the priority 802.1p (parameter
Priority set to the value 802.1P, 802.1P-IpTOS or IpTOS-802.1P - see Fig.67) is active.
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
2. Select the Priority Selection tab.
If the analysis of the value of the priority 802.1p is active, the mapping of the priority in the Tag VLan
is pointed out in the tab (see Fig.67).
3. In order to modify a value, select in the table the box (the check sign is displayed) corresponding to
the wished combination: values of Tag 802.1p in input to the port - value of Tag 802.1p in output from
the Switch.
4. Press Apply and confirm.
To verify the status of the external port in relation to the Spanning Tree protocol
(Lan1, Lan2, Lan3, Lan4)
If the equipment belongs to an ALCplus2 node and it is interconnected to other elements of the node
through nodal Bus Ethernet, this operation is not available for the external ports LAN 1 and LAN 2.
Status of the
ports in
relation to the
Spanning Tree
protocol (1)
Enabling status of
the Spanning
Tree protocol for
the port (2) (4)
Port
priority (3)
Cost of the
network part
directly connected
to the port
Fig.68 notes
(1) Parameter:
• Role. Role assigned by the Spanning Tree protocol to each port of a Bridge/Switch. The role
defines the behaviour of the port according to the status of the Bridge in the network:
• Disable. Port disabled.
• root-port. Port offering the best path (lowest cost) towards the Bridge selected as
root. Each Bridge can have only one root port. When the Spanning Tree algorithm is
at steady state, each root port is in port-forwarding status.
• alternate-port. Port in alternative to the root port, as it offers an alternative path to-
wards the Bridge Root with cost higher than that of the root port. Normally the Alter-
nate port is in port-blocking status.
• designated-port. Port which does not offer paths towards the Bridge Root and is used
to propagate the information of the Bridge Root to the other bridges. Each Designated
port is in port-forwarding status.
• backup-port. Port physically connected on a Lan where a Designated port of the same
Bridge is connected. The Backup port is in port-blocking status.
• Status. Status of the port:
If the Trunking modality is enabled (see Fig.70) the value Disable is automatically set for the
parameter STP/ELP. In order to change the value, first it is necessary to disable the use of Trunking
modality.
(3) Value:
• 0. Highest priority
• 15. Lowest priority
To enable/disable the Spanning Tree protocol for the external port (Lan1, Lan2,
Lan3, Lan4)
If the equipment belongs to an ALCplus2 node and it is interconnected to other elements of the node
through nodal Bus Ethernet, this operation is not available for the external ports LAN 1 and LAN 2.
The Spanning Tree protocol cannot be enabled when the Trunking modality is enabled (see Fig.70). In or-
der to enable the STP protocol, it is first necessary to disable the use of the Trunking modality.
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
To verify/modify the priority of the external port (Lan1, Lan2, Lan3, Lan4) (SPT/ELP)
If the equipment belongs to an ALCplus2 node and it is interconnected to other elements of the node
through nodal Bus Ethernet, this operation is not available for the external ports LAN 1 and LAN 2.
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
3. To change the parameter, move the cursor on the wished value (0: highest priority, 15: lowest priority).
To verify/modify the connection cost of the external port (Lan1, Lan2, Lan3, Lan4)
(STP/ELP)
If the equipment belongs to an ALCplus2 node and it is interconnected to other elements of the node
through nodal Bus Ethernet, this operation is not available for the external ports LAN 1 and LAN 2.
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
To verify the status of the external port in relation to the Ethernet line protection
(Lan1, Lan2, Lan3, Lan4)
If the equipment belongs to an ALCplus2 node and it is interconnected to other elements of the node
through nodal Bus Ethernet, this operation is not available for the external ports LAN 1 and LAN 2.
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
Status of the
ports in
relation to the
ethernet line
protection (1)
Enabling status
of the ethernet
line protection
for the port (2) (4)
Port
priority (3)
Cost of the
network part
directly connected
to the port
(1) Parameter:
• Role. Role assigned by the Ethernet line protection to each port. The role defines the behav-
iour of the port:
• Disable. Port disabled.
• alternate-port. Port in stand-by status, as it offers an alternative path with higher cost
as opposed to the Designated port. Normally the Alternate port is in port-blocking sta-
tus.
• designated-port. Port active. Each Designated port is in port-forwarding status.
• Status. Status of the port:
(2) Value:
• Disable. Ethernet line protection disabled.
• Enable-Bridge1 - Enable-Bridge2. Ethernet line protection disabled. Spanning Tree protocol
enabled (see Fig.68).
• Enable-Protection1. The Ethernet line protection of the equipment (see pag.224) is enabled
between the considered external port and the other external port(s) of the equipment whose
parameter value is Enable-Protection1.
• Enable-Protection2. The Ethernet line protection of the equipment is enabled between the
considered external port and the other external port(s) of the equipment whose parameter
value is Enable-Protection2.
• Enable-node-Prot1. The Ethernet line protection of the node (see pag.225) is enabled be-
tween the considered external port and the other external ports of the node elements whose
value of the considered parameter is Enable-node-Prot1.
• Enable-node-Prot2. The Ethernet line protection of the node is enabled between the consid-
ered external port and the other external ports of the node elements whose value of the con-
sidered parameter is Enable-node-Prot2.
• Enable-node-Prot3. The Ethernet line protection of the node is enabled between the consid-
ered external port and the other external ports of the node elements whose value of the con-
sidered parameter is Enable-node-Prot3.
• Enable-node-Prot4. The Ethernet line protection of the node is enabled between the consid-
ered external port and the other external ports of the node elements whose value of the con-
sidered parameter is Enable-node-Prot4.
(3) Value:
• 0. Highest priority.
• 15. Lowest priority.
If the equipment belongs to an ALCplus2 node and it is interconnected to other elements of the node
through nodal Bus Ethernet, this operation is not available for the external ports LAN 1 and LAN 2.
The line Ethernet protection cannot be enabled when the Trunking modality is enabled (see Fig.70). In or-
der to enable the line Ethernet protection, it is first necessary to disable the use of the Trunking modality.
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
To verify the status of the external port in relation to the Trunking mode (Lan1, Lan2,
Lan3, Lan4)
If the equipment belongs to an ALCplus2 node and it is interconnected to other elements of the node
through nodal Bus Ethernet, this operation is not available for the external ports LAN 1 and LAN 2.
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
Status of the
ports in
relation to the
(3) Trunking
mode (1)
Enabling status
of the Trunking
mode for
the port (2)
Fig.70 notes
(1) Parameter:
• Status. Status of the port as regards the LACP (Link Aggregation Control Protocol):
• Up. Protocol active.
• Down. Protocol inactive.
• Partner Id. MAC Address of the remote equipment located at the other end of the Ethernet
connection (remote Switch).
• Tx Pck Cnt. LACP packets transmitted to the remote Switch.
• Rx Pck Cnt. LACP packets received from the remote Switch.
(2) Value:
• Disable. Trunking mode disabled.
• Enable-Trunk1. Trunking mode enabled. The considered LAN port is aggregated to the equip-
ment LAN ports, whose considered parameter has value Enable-Trunk1.
• Enable-Trunk2. Trunking mode enabled. The considered LAN port is aggregated to the equip-
ment LAN ports, whose considered parameter has value Enable-Trunk2.
• Enable-Trunk3. Trunking mode enabled. The considered LAN port is aggregated to the equip-
ment LAN ports, whose considered parameter has value Enable-Trunk3.
• Enable-Trunk4. Trunking mode enabled. The considered LAN port is aggregated to the equip-
ment LAN ports, whose considered parameter has value Enable-Trunk4.
(3) Parameters relevant to the Spanning Tree protocol and to the line Ethernet protection (see Fig.68/
Fig.69).
If the equipment belongs to an ALCplus2 node and it is interconnected to other elements of the node
through nodal Bus Ethernet, this operation is not available for the external ports LAN 1 and LAN 2.
The Trunking modality cannot be enabled when the Spanning Tree protocol or the line Ethernet protection
is enabled (see Fig.68/Fig.69). In order to enable the Trunking, it is first necessary to disable the use of
the Spanning Tree protocol or of the line Ethernet protection.
If you wish to enable the Trunking modality, it is first necessary to disable the external port (see Fig.64).
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
To verify/modify the enabling status of the Link Loss Forwarding modality of the ex-
ternal port (Lan1, Lan2, Lan3, Lan4)
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
Activating status
of the Link Loss
Forwarding
modality (1)
Fig.71 notes
(1) Option:
• Disable. The LLF modality is disabled.
• Local. The LLF modality is enabled: the port is disabled in presence of radio alarms (IDU
BRANCH... Demodulator Fail Alarm, RADIO... Link Id. Alarm) or if the internal port is disabled
(see Fig.75).
Only if the Local option is active, the activation of the check-box:
• Rem. LAN-1, points out that the port is disabled even in presence of a LOS alarm on the re-
mote LAN 1 port associated to it.
• Rem. LAN-2, points out that the port is disabled even in presence of a LOS alarm on the re-
mote LAN 2 port associated to it.
• Rem. LAN-3, points out that the port is disabled even in presence of a LOS alarm on the re-
mote LAN 3 port associated to it.
• Rem. LAN-4, points out that the port is disabled even in presence of a LOS alarm on the re-
mote LAN 4 port associated to it.
To activate/deactivate the loop on line side of the external port (Lan1, Lan2, Lan3,
Lan4)
1. Select the Equipment Menu > Base Band > LAN 1, LAN 2, LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
Loop on
line side
inactive
Loop on
line side
active
To verify the current status of the laser (Lan3, Lan4 - optical interface)
1. Select the Equipment Menu > Base Band > LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
(1)
Current status
of the laser (2)
Enabling Laser
status of the module
laser (4) type (3)
(6)
Transmission
mode of the
laser (5) (7)
Fig.73 notes
(1) The tab is available only when the port is configured with optical interfaces.
(2) Wording:
• Status On. The laser is on transmission.
• Status Off. The laser is not on transmission.
(3) Value:
• optical-100baseFX. Laser module of type 100 Base FX (Fiber).
(6) Auto Restart Time. Time (expressed by means of seconds) waited by the equipment controller be-
fore trying again the laser turning-on (when the transmission mode of the laser is Auto).
(7) Test Time. Time (expressed in seconds) during which the equipment controller turns on the laser
during the testing operation.
1. Select the Equipment Menu > Base Band > LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
To verify/modify the enabling status of the laser (Lan3, Lan4 - optical interface)
1. Select the Equipment Menu > Base Band > LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
4. Press Apply.
Only if you are disabling the laser (selection of the Off option), a message is displayed warning that
you are executing a forcing and displaying the current setting of the timeout.
1. Select the Equipment Menu > Base Band > LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
4. Press Apply.
Only if you are setting Disable, Manual or Test as transmission modality for the laser, a message is
displayed warning that you are executing a forcing and displaying the current setting of the timeout.
1. Select the Equipment Menu > Base Band > LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
4. Press Apply.
A message is displayed, warning that you are executing a forcing and displaying the current setting of
timeout.
1. Select the Equipment Menu > Base Band > LAN 3 or LAN 4 command.
The LAN <port number> contextual area opens.
3. Set, into the Test Time box, the number of seconds during which the user wants to turn on the laser.
To modify the time interval set into the box a value comprised between 1 and 100 sec. (default 90 sec.).
5. Press Apply.
A message is displayed, warning that you are executing a forcing and displaying the current setting of
timeout.
Spanning Tree is a protocol for the management of the connections, which supports the redundancy of the
path avoiding the creation of unwished loops in the network. In order that an Ethernet network operates
correctly, only an active path must exist between two stations. Multiple active paths cause loops in the
network and, as consequence, the possible replication of the messages to infinity.
The Spanning Tree protocol constitutes a tree logic network which pass through all the bridges into a com-
plex physical network forcing the possible duplicated paths (possible loops) into a stand-by status
(Blocked).
If a network segment becomes unreachable or if the cost of a path changes, the algorithm of Spanning
Tree reconfigures the topology of the network activating an alternative path.
For more information, refer to the standard IEEE:
• 802.1d (Spanning Tree Protocol).
• 802.1w (Rapid Spanning Tree Protocol).
The use of the Spanning Tree protocol must be enabled at level of single port (LAN 1, LAN 2, LAN 3,
LAN 4, Port A).
The use of the Spanning Tree protocol for the external ports (LAN...) is alternative to the use of the line
Ethernet protection or of the Trunking modality.
If the equipment belongs to an ALCplus2 node and it is interconnected to other node elements through the
nodal Bus, the use of the Spanning Tree protocol can be enabled/disabled for the Ethernet traffic ports
(LAN 3, LAN 4 and Port A).
The management of the Ethernet nodal interconnection ports (LAN 1 and LAN 2) is responsibility of the
system which ensures that no data loop is created.
Even in this case, the use of the Spanning Tree protocol for the ports LAN 3, LAN 4 and Port A is alternative
to the use of the line Ethernet protection (only external ports) or of the Trunking modality.
The Ethernet Line Protection (ELP) is a function which allows implementing a protection at physical level
(Level 2) between two or more LAN external ports.
When the user enables the Ethernet line protection, even the management of the ELP switch is enabled.
In ALCplus2 equipment, the line Ethernet protection can be enabled at equipment level (equipment ELP -
see pag.224) or at node level (node ELP - see pag.225).
This last chance is available and meaningful only for the equipment belonging to an ALCplus2 node and
which are interconnected to other node elements through the nodal Bus Ethernet.
The Ethernet line protection of the equipment allows setting in mutual protection more LAN ports of the
same equipment.
The functionality manages up to two different protection groups: Protection 1 and Protection 2.
In this way, it is possible to setting in mutual protection two, three or four LANs or setting in protection
the LANs in pairs of two.
In detail, the same protection group (Protection1) will be enable for the two, three or four LANs. In the
second case, a protection group (Protection1) will be enable for two LANs and the other protection group
(Protection2) for the remnant two.
The parameters, which determine which LAN port among those in protection must be set as operating, are
the port parameters foreseen for the management of the Rapid Spanning Tree protocol:
Only if the ELP function is enabled for one port when more ports are operating (status Designated), cost
and priority being equal, the port with the lower physical position is keep active.
The values of Role and Port Status foreseen for the management of the Rapid Spanning Tree protocol have
been used to represent in WEB LCT the status of the ports involved in the ELP switch:
The user can manage the criteria for the choice of the operating/reserve port executing the following op-
erations:
• To enable/disable the use of the LAN ports (parameter Rate Control - Fig.64)
• To enable/disable the ELP equipment functionality on the LANs you wish to protect (parameter
STP/ELP, Enable-Protection1 or Enable-Protection2 value - Fig.69).
• To set the port priority (parameter Priority - Fig.69)
• To set the port cost (parameter Path Cost - Fig.69)
If the equipment belongs to an ALCplus2 node and is interconnected to other node elements through the
nodal Bus Ethernet, the use of the equipment ELP functionality can be enabled/disabled only for the Eth-
ernet traffic ports (LAN 3 and LAN 4).
In this case, the use of the equipment ELP functionality (besides the use of the Spanning Tree protocol or
of the Trunking modality) is alternative to the use of the node ELP functionality.
Only if the equipment belongs to an ALCplus2 node and is interconnected to other node elements through
nodal Bus Ethernet, it is possible to enable the line Ethernet protection at node level (node ELP).
This ELP functionality, in fact, allows setting in mutual protection the Ethernet traffic ports (LAN 3 and LAN
4) of the equipment belonging to the node and interconnected by the nodal Bus Ethernet.
Up to 4 different protection groups can be created: Node Protection1, Node Protection2, Node Protection3
and Node Protection4.
For example, with reference to Fig.74, if you wish to set in mutual protection the port LAN 3 of A.1, A.2
and A.3, you must enable the node ELP functionality (Node Protection1) for all the three ports.
At the same time, if you wish to set in mutual protection the port LAN 4 of A.1, A.2 and A.3, you must
enable the node ELP functionality for all the above mentioned ports but not using the protection group Node
Protection1, which would insert the LAN 4 ports in the same protection group of the LAN 3 ports, but using
instead the group Node Protection2. In this way, a second node protection group is created, independent
from the first one.
The parameters, which determine which LAN port among those in protection must be set as operating, are
the port parameters foreseen for the management of the Rapid Spanning Tree protocol:
Only if the ELP function is enabled for one port when more ports have the node ELP function enabled
and are operating (status Designated), cost and priority being equal, the port with the lower physical po-
sition is keep active.
The physical position of the traffic external ports of a node is the following:
• LAN 3 of the first element of the node (lowest logic position)
• LAN 4 of the first element of the node
• LAN 3 of the second element of the node
• LAN 4 of the second element of the node
... and so on.
The values of Role and Port Status foreseen for the management of the Rapid Spanning Tree protocol have
been used to represent in WEB LCT the status of the ports involved in the ELP switch:
The user can manage the criteria for the choice of the operating/reserve port executing the following op-
erations:
• To enable/disable the use of the LAN ports (parameter Rate Control - Fig.64)
• To enable/disable the ELP node functionality on the LANs you wish to protect (parameter STP/
ELP, Enable-Node-Prot1, Enable-Node-Prot2, Enable-Node-Prot3 or Enable-Node-Prot4 value -
Fig.69).
• To set the port priority (parameter Priority - Fig.69)
• To set the port cost (parameter Path Cost - Fig.69)
The use of the node ELP function for the LAN 3 and LAN 4 ports is alternative to the use of the equipment
ELP functionality, of the Spanning Tree protocol or of the Trunking mode.
Node A
Lan 3 (1)
A.1
Lan 4
Lan 3 (1)
Lan 4
A.2
Lan 1 and Lan 2
Ethernet
(Ethernet nodal
traffic
interconnection)
Lan 3 (1)
A.3
Lan 4
Lan 3 (1)
A.4
Lan 4
Notes of Fig.74
(1) A.1, A.2, A.3 and A.4. Respectively first, second, third and fourth equipment of the node intercon-
nected to the nodal Bus Ethernet.
The Trunking mode is a functionality which allows aggregating two or more Ethernet ports.
In this way, the ports belonging to the same group (Trunk) will be considered as a single entity.
In ALCplus2 equipment, it is possible to enable the Trunking mode for the external LAN ports (Trunking
Ethernet - see pag.227) and for the internal port Port A (Trunking radio - see pag.227).
This possibility is available only for the equipment belonging to an ALCplus2 node and interconnected by
the nodal Bus Ethernet.
The Ethernet Trunking mode allows aggregating two or more physical ports (LAN) of the same equipment
to achieve a single logic channel.
The enabling of the Ethernet Trunking mode is in compliance with the standard LAG (Link Aggregation
Group) and the relevant LACP protocol (Link Aggregation Control Protocol).
For more information, refer to the standard IEEE 802.3ad (Link Aggregation).
The use of the Trunking Ethernet mode must be enabled at level of single external port (LAN 1, LAN 2,
LAN 3, LAN 4) and is in alternative to the use of the line Ethernet protection or of the Spanning Tree pro-
tocol.
If the equipment belongs to an ALCplus2 node and is interconnected to other node elements through nodal
Bus Ethernet, the use of the Trunking mode can be enabled/disabled only for the external Ethernet traffic
ports (LAN 3, LAN 4). Even in this case, the use of the Trunking mode is alternative to the use of the line
Ethernet protection or of the Spanning Tree protocol.
If the Trunking modality is active for an external port and you wish to disable it, before executing the op-
eration it is necessary to disable the port itself (see Fig.64).
This mode is available only for equipment belonging to an ALCplus2 node and interconnected by nodal
Bus Ethernet.
The radio Trunking mode allows aggregating more radio of a nodal system.
The functionality manages an aggregation group (Trunk): Enable-Trunk1.
To insert a radio port of a Switch in the Trunk, it is necessary to enable the radio Trunking mode for this
port (Enable-Trunk1).
In this mode, up to 4 radio ports can be aggregated.
The use of the radio Trunking mode is alternative to the use of the Spanning Tree protocol.
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens with the Interface tab active.
The Port parameter points out the enabling status of the internal port (see Fig.75).
2. To change the parameter, select the option:
• Disable. The internal port is not enabled to the use.
• Enable. The internal port is enabled to the use.
3. Press Apply and confirm.
Enabling
status of
the internal
port (1)
Enabling
status of the
automatic
learning of the
MAC Address in
the specific table
(MAC Table) (2)
Fig.75 notes
(1) Option:
• Disable. The internal port is not enabled to the use.
• Enable. The internal port is enabled to the use.
(2) Option:
• Enable. The automatic learning of the MAC Address is enabled.
• Disable. The automatic learning of the MAC Address is disabled.
To verify/modify the enabling status of the automatic learning of the MAC Addresses
in the MAC Address Table for the internal port
The MAC-based routing functionality in the Ethernet Switch is available only if enabled this function.
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens with the Interface tab active.
The MAC Learning parameter points out the enabling status of the automatic learning of the MAC Ad-
dress in the specific table (MAC Address Table) (see Fig.75).
If the equipment belongs to an ALCplus2 node and is interconnected to other elements of the node
through Ethernet nodal Bus, the automatic learning of the MAC Addresses must be enabled.
If the parameter Mac Learning has value:
• Disable, when the tab Interface is opened, the message You have to enable Mac Learning will
be displayed. Modify the value from Disable to Enable.
• Enable, it cannot be modified.
1. Select the Equipment Menu > Base Band > Port A command.
3. To change the parameter, type a numeric value in the box (maximum 4095).
Default
Vid value
of the port Forcing of the
Vid value of the
Control status port to the
of Tag Vlan ID default value (3)
on the messages
in input from
the port (1)
Behaviour of
the port towards
the packets in
output (2)
Ports through
which can transit
the messages in
input from the
internal port (4)
Fig.76 notes
(1) Option:
• Disable 802-1Q. The internal port does not analyse the Tag of the packets in input. They will
be sent only to the ports indicated in the Port Based VLAN area.
• Fallback. The internal port uses both the following modalities:
• If the Tag 802.1Q is present in the list of VLAN, the packet is sent to the other ports
enabled in the list for the same Tag.
• If the Tag 802.1Q is not present in the list of VLAN or if no Tag is present, the packet
will be sent to the port listed in the Port Based VLAN area.
• Secure. The internal port discards the packets which have not, in their Tag, a known VLAN
identifier, that is present in the list of VLAN; furthermore it discards the packets if the port
does not belong to the VLAN itself.
(2) Option:
• Unmodified. The Tag 802.1Q (priority and VLAN identifier) is not added or removed to the
packets in output from the port.
• Untagged. The packets in output from port are deprived of the Tag 802.1Q (priority infor-
mation and VLAN identifier).
• Tagged. The VLAN identifier, if not present, is added to the packets in output from the port:
the identifier is that indicated in the Default Vid box.
• Add Double Tag. The packets in output from the port are always tagged. If the packet is al-
ready tagged, a second Tag is added. If the packet is not tagged, the Tag is added. The add-
ed Tag is composed by:
• The Vlan identifier set in the Default Vid box of the port from which the message en-
tered in the equipment.
• The default priority of the port, which the packet is entered from, if the priority 802.1p
is disabled on this port. Otherwise by the native priority of the incoming packet if the
option 802.1p is enabled on this port.
(3) Check-box:
• Active ( ). The forcing is enabled.
• Inactive. The forcing is disabled.
To verify/modify the control of Tag Vlan Id on the messages in input from the internal
port
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
2. Select the VLan(802.1Q) tab.
The Ingress Filtering Check parameter points out, if active, the control of Tag Vlan Id on the messages
in input from the port (see Fig.76).
3. To change the parameter, select the option:
• Disable 802-1Q. The internal port does not analyse the Tag (802.1Q) of the packets in input.
They will be sent only to the ports indicated in the Port Based VLAN area.
• Fallback. The internal port uses both the following modalities:
• If the Tag 802.1Q is present in the list of VLAN, the packet is sent to the other ports en-
abled in the list for the same Tag.
• If the Tag 802.1Q is not present in the list of VLAN or if no Tag is present, the packet will
be sent to the port listed in the Port Based VLAN area.
• Secure. The internal port discards the packets which have not, in their Tag, a known VLAN iden-
tifier, that is present in the list of VLAN; furthermore it discards the packets if the port does not
belong to the VLAN itself.
For each configuration (selection of the value Disable 802-1Q, Fallback and Secure) the table of
Port Based VLAN must be ALWAYS configured even if the traffic management is executed only on
Tag base (see pag.232).
If you wish to obtain a bidirectional traffic routed according the Vlan table, the control of the Tag
802.1Q (Fallback or Secure) must be activated on all the ports.
To verify/modify the behaviour of the internal port towards the packets in output
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
When the Add Double Tag value is active, besides the insertion of a Tag (Provider Tag) on
the packets in output from the considered port, the Provider Tag is always removed on the pack-
ets in input to the same port.
The Provider Tag added by the Double Tag function has an identifier (Ethernet Type) which can
be configured by the parameter QinQ ETH type.
In an ALCplus2 nodal system with the Trunking Radio modality enabled, when the option Add
Double Tag (QinQ) is active, for the traffic ports of the Switch (LAN 3, LAN 4, Port A) you must
set the value Disable 802-1Q for the parameter Ingress Filtering Check (see Fig.66/Fig.76) (the
routing of the traffic is not managed according to the VLAN table).
To force the value of Vid of the internal port to the default value
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
2. Select the VLan(802.1Q) tab.
The Force Default VID parameter points out if the forcing of the Vid value of the internal port to the
default value is active (see Fig.76).
3. To change the parameter:
• Activate the Force Default VID ( ) check-box to enable the forcing.
• Deactivate the check-box to disable the forcing.
To enable/disable the ports through which the messages in input from the internal
port
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
If the equipment belongs to an ALCplus2 node and is connected to other node elements through Eth-
ernet nodal Bus, the level-3 priority (analysis of field PTOS/DSCP) is not managed when the transit of the
packets takes place through the nodal interconnection (see Fig.61).
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
Tag 802.1p
value of the
packet in
input to the
Switch
Fig.77 notes
(1) Option:
• Disable. The priority is disabled.
• 802.1P. The value of the 802.1p priority (level 2) is analysed for the choice of the output
queue.
• IpTOS. The value of TOS (Type Of Service) is analysed (level 3).
• 802.1P-IpTOS. The value of the 802.1p priority is analysed and, if not evaluated, the value
of TOS for the choice of the output queue.
• IpTOS-802.1P. The value of TOS is analysed and, if not evaluated, the value of 802.1p pri-
ority for the choice of the output queue.
(3) The priority 802.1p present in a packet in input to a port can be remapped in output from the Switch
with a different priority value.
The remapping of a priority is pointed out in the table by a check sign.
For example, as shown in the figure, a packet in input with priority 3 is remapped in output from
the Switch with priority 5.
The table is available and meaningful only if the analysis of the value of the priority 802.1p (pa-
rameter Priority set to the value 802.1P, 802.1P-IpTOS or IpTOS-802.1P) is active.
To verify/modify the value to insert in the field 802.1p of the packets in input from
the internal port which, in output, the Tag is added to
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
3. To change the parameter move the cursor to the wished value (0: lowest priority, 7: highest priority).
4. Press Apply and confirm.
To verify/modify the mapping of the priority (802.1p) inside the Tag VLan (internal
port)
Operation available and meaningful only if the analysis of the value of the priority 802.1p (parameter
Priority set to the value 802.1P, 802.1P-IpTOS or IpTOS-802.1P - see Fig.77) is active.
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
2. Select the Priority Selection tab.
If the analysis of the value of the priority 802.1p is active, the mapping of the priority in the Tag VLan
is pointed out in the tab (see Fig.77).
3. In order to modify a value, select in the table the box (the check sign is displayed) corresponding to
the wished combination: values of Tag 802.1p in input to the port - value of Tag 802.1p in output from
the Switch.
To verify the status of the internal port in relation to the Spanning Tree protocol
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
(1)
Status of the
ports in
relation to the
Spanning Tree
protocol (2)
Enabling status of
the Spanning
Tree protocol for
the port (3)
Port
priority (4)
Cost of the
network part
directly connected
to the port
Fig.78 notes
(1) If the equipment belongs to an ALCplus2 node and it is interconnected to other elements of the node
through nodal Bus Ethernet, the name of the considered tab is STP/Trunking and the parameter
Trunk is present in the tab (see Fig.79).
Differently, if the equipment is not a node element or is an element interconnected to other ele-
ments only through the nodal Bus TDM, the name of the tab is STP and the parameter Trunk is not
present.
(2) Parameter:
• Role. Role assigned by the Spanning Tree protocol to each port of a Bridge/Switch. The role
defines the behaviour of the port according to the status of the Bridge in the network:
• Disable. Port disabled.
• root-port. Port offering the best path (lowest cost) towards the Bridge selected as
root. Each Bridge can have only one root port. When the Spanning Tree algorithm is
at steady state, each root port is in port-forwarding status.
• alternate-port. Port in alternative to the root port, as it offers an alternative path to-
wards the Bridge Root with cost higher than that of the root port. Normally the Alter-
nate port is in port-blocking status.
• designated-port. Port which does not offer paths towards the Bridge Root and is used
to propagate the information of the Bridge Root to the other bridges. Each Designated
port is in port-forwarding status.
• backup-port. Port physically connected on a Lan where a Designated port of the same
Bridge is connected. The Backup port is in port-blocking status.
• Status. Status of the port:
(3) Value:
• Disable. STP protocol disabled
If the Trunking modality is enabled (see Fig.79) the parameter STP is automatically forced to
the value Disable. To modify the value, it is then first necessary to disable the use of the Trunking
modality.
(4) Value:
• 0. Highest priority.
• 15. Lowest priority.
The Spanning Tree protocol cannot be enabled when the Trunking modality is enabled (see Fig.79). To
enable the STP protocol, it is first necessary to disable the use of the Trunking modality.
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
2. Select the STP... tab.
The STP parameter points out the enabling status of the Spanning Tree protocol for the selected port
(see Fig.78).
3. To change the parameter, select the value:
• Disable. Protocol disabled
• Enable-Bridge1. Protocol enabled (the port belongs to Bridge 1)
• Enable-Bridge2. Protocol enabled (the port belongs to Bridge 2)
4. Press Apply and confirm.
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
3. To change the parameter, move the cursor on the wished value (0: highest priority, 15: lowest priority).
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
Operations available only if the equipment belongs to an ALCplus2 node and is interconnected to the
other node elements by the nodal Bus Ethernet.
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
(2)
Enabling status
of the Trunking
mode for
the port (1)
Fig.79 notes
(1) Value:
• Disable. Trunking mode disabled
• Enable-Trunk1. Trunking mode enabled at radio port level.
If the STP protocol is enabled (see Fig.78) the parameter Trunk is automatically forced to the
value Disable. To modify the value, it is first necessary to disable the Spanning Tree protocol.
Operations available only if the equipment belongs to an ALCplus2 node and is interconnected to other
elements of the node through nodal Bus Ethernet.
The Trunking modality cannot be enabled when the Spanning Tree protocol is enabled.
1. Select the Equipment Menu > Base Band > Port A command.
The Port A contextual area opens.
2. Select the STP/Trunking tab.
The Trunk parameter points out the enabling status of the Trunking mode for the selected port (see
Fig.79).
The change of the default values of the configuration (Hello Time, Forward Delay, Max Age) of the Span-
ning Tree protocol could damage the correct operation of the Spanning Tree protocol itself.
The Spanning Tree command manages the spanning tree in the network
In detail, it is possible:
• To verify/modify the version of the Spanning Tree protocol (pag.238)
• To verify/modify the transmission interval of the BPDU packets (Hello Time) (pag.239)
• To verify/modify the Forward Delay interval (pag.239)
• To verify/modify the maximum lifetime of the BPDU packets (Max Age) (pag.239)
• To verify the status of the Ethernet ports in relation to the Spanning Tree protocol (pag.239)
• To verify the MAC Address of a Bridge (pag.241)
• To verify/modify the priority of a Bridge (pag.241)
Moreover, if for one or more external ports (LAN 1, LAN 2, LAN 3 or LAN 4) the STP is not active, but the
Ethernet line protection is active, by means of the Spanning Tree command it is possible:
• To verify the status of the external ports in relation to the Ethernet line protection (pag.241)
1. Select the Equipment Menu > Base Band > Spanning Tree command.
The Spanning Tree contextual area opens with the Settings tab active.
The Force Version parameter points out the version of the Spanning Tree protocol to use (see Fig.80).
Version of the
Spanning Tree
protocol (1)
Transmission
interval of the
BPDU packets
Forward
Delay interval
Maximum
lifetime of the
BPDU packets
(1) Value:
• rapid-stp-802-1w. Rapid Spanning Tree protocol standard IEEE 802.1w. Protocol character-
ized by a greater speed (lower convergence time).
• stp-802-1d. Spanning Tree Protocol standard IEEE 802.1d.
1. Select the Equipment Menu > Base Band > Spanning Tree command.
The Spanning Tree contextual area opens with the Settings tab active.
The Hello Time parameter points out the time interval that passes between two consecutive transmis-
sions of the BPDU (Bridge Protocol Data Unit) packet from the Ethernet ports with the Spanning Tree
function enabled (see Fig.80).
2. To change the parameter move the cursor to the wished value. Default: 2sec.
1. Select the Equipment Menu > Base Band > Spanning Tree command.
The Spanning Tree contextual area opens with the Settings tab active.
The Forward Delay parameter points out the time interval which passes between the passage between
the port-blocking status and the port-learning status and between the port-learning status and the
port-forwarding status of the port (see Fig.80).
2. To change the parameter move the cursor to the wished value. Default: 15 sec.
1. Select the Equipment Menu > Base Band > Spanning Tree command.
The Spanning Tree contextual area opens with the Settings tab active.
The Max Age parameter points out the maximum number of switches which the packet can pass
through before expiring. The passage from a Switch to another one involves the decrease of 1 second
per equipment (see Fig.80).
2. To change the parameter move the cursor to the wished value. Default: 20 sec.
To verify the status of the Ethernet ports in relation to the Spanning Tree protocol
1. Select the Equipment Menu > Base Band > Spanning Tree command.
The Spanning Tree contextual area opens.
Status of the
Ethernet ports
in relation to the
Spanning Tree
protocol (1)
Fig.81 notes
(1) Parameter:
• LAN.../Port A. Enabling status of the Spanning Tree protocol of the specific port:
• Disable. Protocol disabled.
• Bridge 1. Protocol enabled (the port belongs to Bridge 1).
• Bridge 2. Protocol enabled (the port belongs to Bridge 2).
• Role. Role assigned by the Spanning Tree protocol to each port of a Bridge/Switch. The role
defines the behaviour of the port according to the status of the Bridge in the network:
• Disable. Port disabled.
• root-port. Port offering the best path (lowest cost) towards the Bridge selected as
root. Each Bridge can have only one root port. When the Spanning Tree algorithm is
at steady state, each root port is in port-forwarding status.
• alternate-port. Port in alternative to the root port, as it offers an alternative path to-
wards the Bridge Root with cost higher than that of the root port. Normally the Alter-
nate port is in port-blocking status.
• designated-port. Port which does not offer paths towards the Bridge Root and is used
to propagate the information of the Bridge Root to the other bridges. Each Designated
port is in port-forwarding status.
• backup-port. Port physically connected on a Lan where a Designated port of the same
Bridge is connected. The Backup port is in port-blocking status.
• Status. Status of the port:
1. Select the Equipment Menu > Base Band > Spanning Tree command.
The Spanning Tree contextual area opens.
2. Select the wished Bridge tab: Bridge 1, Bridge 2.
The MAC Address parameter points out the physical address of the specific Bridge.
Fig.82 shown an example.
Physical
address
of the
bridge
Bridge
priority
(1)
Fig.82 notes
(1) Value:
• 0. Maximum priority.
• 15. Minimum priority.
1. Select the Equipment Menu > Base Band > Spanning Tree command.
The Spanning Tree contextual area opens.
To verify the status of the external ports in relation to the Ethernet line protection
1. Select the Equipment Menu > Base Band > Spanning Tree command.
The Spanning Tree contextual area opens.
Status of
the ports in
relation to the
Ethernet line
protection (1)
Fig.83 notes
(1) Parameter:
• LAN.... Enabling status of the Ethernet line protection of the specific port:
• Disable. Ethernet line protection disabled.
• Prot1. Ethernet line protection of the equipment (see pag.224) enabled (Protection1).
• Prot2. Ethernet line protection of the equipment enabled (Protection2).
• Node Prot1. Ethernet line protection of the node (see pag.225) enabled (Node
Protection1).
• Node Prot2. Ethernet line protection of the node enabled (Node Protection2).
• Node Prot3. Ethernet line protection of the node enabled (Node Protection3).
• Node Prot4. Ethernet line protection of the node enabled (Node Protection4).
• Role. Role assigned by the Ethernet line protection to each port. The role defines the behav-
iour of the port:
• Disable. Port disabled.
• Alternate. Port in alternative to the root port, as it offers an alternative path towards
the Bridge Root with cost higher than that of the root port. Normally the Alternate
port is in port-blocking status.
• Designated. Port active. Each Designated port is in port-forwarding status.
• Status. Status of the port:
At the choice of TDM Tributaries option, the program displays the following commands:
The STM-1, VC-4 and VC-12 commands are available only for ALCplus2 equipment with IduBoard Exp.
2xSTM-1 32E1 or IduBoard Exp. Nod. 2xSTM-1 16E1 expansion when the management of STM-1 streams
is active (see Fig.44).
* Read and Write user profile can set only the parameters relevant to the maintenance (MAN. OP).
1. Select the Equipment Menu > Base Band > TDM Tributaries > E1 command.
The E1 contextual area opens, where the status of the tributaries, of the loops and of the alarms is
pointed out (see Fig.84).
Select this
arrows to
display a
different
group of
tributaries
(5)
Tributary
label
Management
of LOS alarm Inner side
when the loop
tributary is status (4)
not used (2)
Tributary
alarms
status (3)
Fig.84 notes
(1) Symbol:
• . The tributary is not active (tributary not used). In this condition, the alarms are inhib-
ited and the LOS alarm is raised or not depending on the setting of the LOS Inv box (see
next note).
• . The tributary is active (tributary used). In this condition, the controller does not inhibit
the alarms.
If the symbol relevant to tributary A and/or B is not available (grey symbol), this means that
the tributary is not available for the traffic as already used as synchronism in input and/or output
(see pag.176).
(3) The colour of box points out the status of the alarm:
• White. The alarm is not active.
• Red, orange, yellow or light blue. The alarm is active and has, respectively, severity Critical,
Major, Minor or Warning.
To verify the alarm detail, it is sufficient to move the pointer on the box. A dynamic window is dis-
played, where the status of each single alarm is displayed (the figure displays an example).
(4) Symbol:
(5) In detail, use the keys to scroll the tabs and the key to display the list of the tabs
The number of available tributaries changes according to the equipment type.
1. Select the Equipment Menu > Base Band > TDM Tributaries > E1 command.
The E1 contextual area opens, where the label of each single tributary is pointed out (see Fig.84).
4. Press Ok.
Operation not available for the tributaries A and/or B if already used for the T12 synchronism in output
(see pag.176).
1. Select the Equipment Menu > Base Band > TDM Tributaries > E1 command.
The E1 contextual area opens (see Fig.84).
A dynamic window is displayed containing the LOS Inv box. If the box is:
• the LOS alarm is NOT raised if, with tributary disabled, the signal is however connected.
• the LOS alarm is raised if, with tributary disabled, the 2Mbit/s signal is however connected.
Select the box to enable or disable the alarm management. Each time is selected, the box assumes the
status complementary to the previous one (if enabled, it changes to disabled and vice versa).
1. Select the Equipment Menu > Base Band > TDM Tributaries > E1 command.
The E1 contextual area opens (see Fig.84).
2. Select the loop to be activated (or deactivated).
The loop assumes the state complementary to the previous one (if activated, it becomes deactivated
and vice versa).
The activation of the loop on internal side automatically enables the tributary, if this is already en-
abled.
3. Press Apply.
If at least one loop is going to be activated, a message is displayed that warns that you are executing
a forcing and the current setting of the timeout.
This menu is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard Exp.
Nod. 2xSTM-1 16E1 expansion when the management of STM-1 streams is active (see Fig.44).
At the choice of STM-1 option, the program displays the following commands:
• Lim A STM-1 [x] (pag.248). It manages the configuration of the specific STM-1 stream.
The x value points out the STM-1 stream which the command is referred to (1, 2).
* Read and Write user profile can set only the parameters relevant to the maintenance (MAN. OP).
This command is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard
Exp. Nod. 2xSTM-1 16E1 expansion when the management of STM-1 stream is active (see Fig.44).
The command relevant to the STM-1 2 stream (Lim A STM-1 [2]) is available only if the protection of STM-
1 stream (MSP mode) is active or if the management of two unprotected STM-1 streams is active (MST
mode).
The Lim A STM-1 [x] command manages the configuration of the specific STM-1 stream.
In detail, it is possible:
The following operations are available only for equipment with STM-1 stream with optical interface.
The x value points out the STM-1 stream which the command is referred to (1, 2).
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens with the Settings tab active.
In the Loop And Alarms area the status of the STM-1 stream is pointed out (see Fig.85).
2. To change the status of the STM-1 stream, select the symbol that represents the stream.
The symbol assumes the status complementary to the previous one (if active, it switches to inactive
and vice versa).
Status of the
STM-1 loop on
line side (1)
Status of
the STM-1
stream (2)
Status of
the alarms
of STM-1 Status of the
stream (3) STM-1 loop on
inner side (1)
Sequence of
Enabling characters
status of transmitted
the J0 and/or
byte (4) received (5)
Fig.85 notes
(1) Symbol:
(2) Symbol:
• . The STM-1 stream is not active (unused stream). In this condition, the alarms are in-
hibited and the LOS alarm is raised, with disabled stream the STM-1 signal is however con-
nected.
• . The STM-1 stream is active (used stream). In this condition, the controller does not
inhibit the alarms.
(3) The colour of each box points out the status of the alarm:
• Grey. The alarm is not active.
• Red, orange, yellow or light blue. The alarm is active and has, respectively, severity Critical,
Major, Minor or Warning.
(5) Box:
• Sent Trace. Transmitted sequence of the control characters.
• Expected Trace. Character sequence to be controlled at reception.
• Received Trace. Character sequence in reception.
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens with the Settings tab active.
In the Loop And Alarms area the status of the STM-1 loops on line side and inner side is pointed out
(see Fig.85).
The STM-1 loops on line side and on inner side cannot be activated at the same time.
3. Press Apply.
Only if you are activating a loop a message is displayed warning that you are executing a forcing and
displaying the current setting of timeout.
4. Press Yes to continue the operation.
The activation of a loop activates the MAN. OP alarm. If the equipment is switched off and, then,
switched on, the loop is inactive, independently from the previous setting.
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens with the Settings tab active.
Into the Trace Type area the enabling status of the J0 byte used for the control of STM-1 signal is point-
ed out (see Fig.85).
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens with the Settings tab active.
Into the J0 Trace Identifier area the sequences of the characters at transmission and/or at reception
relevant to J0 byte used for the control of STM-1 signal is pointed out (see Fig.85).
2. To change the parameter, type a new string of ASCII characters into the box:
• Sent Trace, to change the transmitted sequence of the control characters.
• Expected Trace, to change the sequence of the characters to be controlled at reception.
The number of characters that has to constitute the sequence depends on the selected option push-
button into the Trace Type area (1 or 16 bytes).
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens with the Settings tab active.
In the Loop And Alarms area, the status of the STM-1 stream alarms is displayed (see Fig.85).
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens.
Intervention
threshold of
the B2 Signal
Degrade alarm
(1)
Intervention
threshold of the
B2 Excessive
BER alarm (2)
Fig.86 notes
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens.
Operation available only for equipment with STM-1 stream with optical interface.
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens.
Current
status of the
laser (1)
Enabling Laser
status of the module
laser (3) type (2)
(5)
Transmission
mode of the
laser (4) (6)
Fig.87 notes
(1) Wording:
• Status On. The laser is on transmission.
• Status Off. The laser is not on transmission.
(2) Value:
• optical-S11. S type laser module (application: Inter office-Short-haul), 1 (STM level: Stm-
1), 1 (fibber type: according to G.652 Spec.).
(5) Auto Restart Time. Time (expressed by means of seconds) waited by the equipment controller be-
fore trying again the laser turning-on (when the transmission mode of the laser is Auto).
(6) Test Time. Time (expressed in seconds) during which the equipment controller turns on the laser
during the testing operation.
Operation available only for equipment with STM-1 stream with optical interface.
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens.
Operation available only for equipment with STM-1 stream with optical interface.
Operation of maintenance (MAN. OP).
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens.
4. Press Apply.
Only if you are disabling the laser (selection of the Off option), a message is displayed warning that
you are executing a forcing and displaying the current setting of the timeout.
Operation available only for equipment with STM-1 stream with optical interface.
Operation of maintenance (MAN. OP).
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens.
If the management of STM-1 stream is active in 1+1 MSP No ALS modality (see Fig.44), the Auto-
matic Shutdown function is permanently disabled. This means that the laser transmission modality is
forced to Disable.
In this case, the change operation here below is not available.
4. Press Apply.
Only if you are setting Disable, Manual or Test as transmission modality for the laser, a message is
displayed warning that you are executing a forcing and displaying the current setting of the timeout.
5. Press Yes to continue the operation.
The selection of a modality different from Auto activates the MAN. OP alarm. If the user turns off the
equipment and then turns it on again, without taking into any account the preceding setting, the trans-
mission mode of the laser is Auto.
Operation available only for equipment with STM-1 stream with optical interface.
Operation of maintenance (MAN. OP).
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens.
4. Press Apply.
A message is displayed, warning that you are executing a forcing and displaying the current setting of
timeout.
Operation available only for equipment with STM-1 stream with optical interface.
Operation of maintenance (MAN. OP).
If the management of STM-1 stream is active in 1+1 MSP No ALS modality (see Fig.44), the Automatic
Shutdown function is permanently disabled (laser transmission modality is forced to Disable). In this case,
this operation is not available.
1. Select the Equipment Menu > Base Band > TDM Tributaries > STM-1 > Lim A STM-1 [x] com-
mand.
The Lim A STM-1 [x] contextual area opens.
3. Set, into the Test Time box, the number of seconds during which the user wants to turn on the laser.
To modify the time interval set into the box a value comprised between 1 and 100 sec. (default 90 sec.).
5. Press Apply.
A message is displayed, warning that you are executing a forcing and displaying the current setting of
timeout.
This menu is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard Exp.
Nod. 2xSTM-1 16E1 expansion when the management of STM-1 stream is active (see Fig.44).
At the choice of VC-4 option, the program displays the following commands:
• Lim A VC-4[x] (pag.257). It manages the specific VC4 virtual container configuration.
The x value points out the STM-1 stream which the command is referred to (1, 2).
This command is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard
Exp. Nod. 2xSTM-1 16E1 expansion when the management of STM-1 stream is active (see Fig.44).
The Lim A VC-4 [2] command is available only if the management of two unprotected STM-1 streams is
active (MST mode).
The Lim A VC-4 [x] command manages the specific VC4 virtual container configuration.
In detail, it is possible:
The x value points out the STM-1 stream which the command is referred to (1, 2).
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-4 > Lim A VC-4 [x] command.
The Lim A VC-4 [x] contextual area opens with the J1/Alarms tab active.
The Trace Type parameter points out the enabling status of the overhead J1 byte used for the control
of the received signal (see Fig.88).
Enabling Status of
status of VC-4
the J1 virtual
byte (1) container
alarms (3)
Sequence of
characters
transmitted
and/or
received (2)
(2) Box:
• Sent Trace. Transmitted sequence of the control characters.
• Expected Trace. Character sequence to be controlled at reception.
• Received Path Trace. Character sequence in reception.
(3) The colour of each box points out the status of the alarm:
• Grey. The alarm is not active.
• Red, orange, yellow or light blue. The alarm is active and has, respectively, severity Critical,
Major, Minor or Warning.
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-4 > Lim A VC-4 [x] command.
The Lim A VC-4 [x] contextual area opens with the J1/Alarms tab active.
In the tab the sequence of characters in transmission and/or reception relevant to the byte J1, used
for the control of the received signal, is pointed out (see Fig.88).
2. To change the parameter, type a new string of ASCII characters into the box:
• Sent Trace, to change the transmitted sequence of the control characters.
• Expected Trace, to change the sequence of the characters to be controlled at reception.
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-4 > Lim A VC-4 [x] command.
The Lim A VC-4 [x] contextual area opens with the J1/Alarms tab active.
In the Alarms area the status of the VC-4 alarms is pointed out (see Fig.88).
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-4 > Lim A VC-4 [x] command.
The Lim A VC-4 [x] contextual area opens.
Intervention
Intervention
threshold of
threshold of the
the B3 Signal
B3 Excessive
Degrade alarm
BER alarm (2)
(1)
Signal
Label
configuration
parameters
(3)
Fig.89 notes
(3) Box:
• Sent Label. Specification which the transmitted value of Signal Label refers to.
• Expected Label. Specification which the received value of Signal Label refers to.
• Received Signal Label. Specification which the received signal refers to.
The specifications, according to G.707 ITU-T Rec. are: Path UnEquipped, Tug Structure.
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-4 > Lim A VC-4 [x] command.
The Lim A VC-4 [x] contextual area opens.
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-4 > Lim A VC-4 [x] command.
The Lim A VC-4 [x] contextual area opens.
The specifications, which can be set in the Sent Label and Expected Label boxes according to G.707
ITU-T Rec. are: Path UnEquipped, Tug Structure.
This menu is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard Exp.
Nod. 2xSTM-1 16E1 expansion when the management of STM-1 stream is active (see Fig.44).
At the choice of VC-12 option, the program displays the following commands:
• VC-12 Thresholds (pag.262). It manages the intervention threshold of some VC12 alarms.
• Lim A VC-12 [x] (pag.264). It manages the configuration parameters of each VC-12 channel.
The x value points out the STM-1 stream which the command is referred to (1, 2).
This command is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard
Exp. Nod. 2xSTM-1 16E1 expansion when the management of STM-1 stream is active (see Fig.44).
The VC-12 Thresholds command manages the intervention threshold of some VC12 alarms.
In detail, it is possible:
• To verify/modify the intervention threshold of the VC12 Signal Degrade alarm (pag.262)
• To verify/modify the intervention threshold of the VC12 Excessive BER alarm (pag.263)
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-12 > VC-12 Thresholds com-
mand.
The VC-12 Thresholds contextual area opens.
The Signal Degrade Threshold parameter points out the intervention threshold of the VC12 Signal De-
grade alarm (see Fig.90).
Intervention
thresholds
of the VC12
Signal Degrade
alarm (1)
Intervention
thresholds
of the VC1
Excessive
BER alarm (2)
Fig.90 notes
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-12 > VC-12 Thresholds com-
mand.
The VC-12 Thresholds contextual area opens.
The Excessive BER Threshold parameter points out the intervention threshold of the VC12 Excessive
BER alarm (see Fig.90).
This command is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard
Exp. Nod. 2xSTM-1 16E1 expansion when the management of STM-1 stream is active (see Fig.44).
The Lim A VC-12 [2] command is available only if the management of two unprotected STM-1 streams is
active (MST mode).
The Lim A VC-12 [x] command manages the configuration parameter of each VC-12 channel.
In detail, it is possible:
• To verify/modify the control status of the J2 Trace Identifier byte of a VC-12 (pag.264)
• To verify/modify the sequence of characters transmitted and/or received as J2 Trace Identifier
of a VC-12 (pag.265)
• To verify/modify the Signal Label value of a VC-12 (pag.265)
• To verify the alarms status of a VC-12 (pag.266)
The x value points out the STM-1 stream which the command is referred to (1, 2).
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-12 > Lim A VC-12 [x] com-
mand.
The Lim A VC-12 [x] contextual area opens with the TUG-3 1 tab active (see Fig.91).
2. Select the wished VC-12 channel.
If the VC-12 channel is in TUG-3 2 or TUG-3 3, in order to select it, first it is necessary to select the
tab TUG-3 2 or TUG-3 3 and then the VC-12.
The Lim A STM-1 VC-12 <TUG3-TUG2-TUG12> window opens.
The enabling status of the byte J2 used for the control of the received signal is pointed out in the J2
Trace Identifier area. If the active option is:
• Disable. The control of the byte C2 is disabled.
• Enable. The control of the byte C2 is enabled.
VC-12
channel
(1)
(1) Each VC-12 channel is represented by a box and by the number of the channel reported into the
box.
The position of the box identifies the TUG-3 and the TUG-2 which the VC-12 belongs to.
The total status of the channel is displayed by the color of the box:
• Grey. No alarm is active.
• Red, orange, yellow or light blue. At least one alarm of channel is active and it has severity,
respectively, Critical, Major, Minor or Warning.
If there are more alarms with different severity, the color of the box will point out the most
serious alarm present in the VC-12 channel.
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-12 > Lim A VC-12 [x] com-
mand.
The Lim A VC-12 [x] contextual area opens with the TUG-3 1 tab active (see Fig.91).
3. To change the parameter, type a new string of ASCII characters into the box:
• Sent Trace, to change the transmitted sequence of the control characters.
• Expected Trace, to change the sequence of the characters to be controlled at reception.
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-12 > Lim A VC-12 [x] com-
mand.
The Lim A VC-12 [x] contextual area opens with the TUG-3 1 tab active (see Fig.91).
2. Select the wished VC-12 channel.
If the VC-12 channel is in TUG-3 2 or TUG-3 3, in order to select it, first it is necessary to select the
tab TUG-3 2 or TUG-3 3 and then the VC-12.
The Lim A STM-1 VC-12 <TUG3-TUG2-TUG12> window opens.
In the Signal Label area, the setting of the value of Signal Label (byte C2) used for the control of the
received signal is displayed. In detail, the box:
• Sent Label. Specification which the value of the transmitted byte C2 refers to.
• Expected Label. Specification which the value of the expected byte C2 refers to.
The mismatch between expected value and received value generates an alarm (VC12 Signal Label Mis-
match Alarm).
3. To change the parameter, set in the Sent Label and Expected Label box the new specification.
The specifications which can be set in the Sent Label and Expected Label boxes, according to G.707
ITU-T Rec. are: Path Unequipped, Asynchronous.
1. Select the Equipment Menu > Base Band > TDM Tributaries > VC-12 > Lim A VC-12 [x] com-
mand.
The Lim A VC-12 [x] contextual area opens with the TUG-3 1 tab active (see Fig.91).
2. Select the wished VC-12 channel.
If the VC-12 channel is in TUG-3 2 or TUG-3 3, in order to select it, first it is necessary to select the
tab TUG-3 2 or TUG-3 3 and then the VC-12.
The Lim A STM-1 VC-12 <TUG3-TUG2-TUG12> window opens.
In the Alarms area, for each alarm of the Vc12 channel, there is a box containing the alarm name. The
color of the box indicates the alarm status:
• Grey. The alarm is not active.
• Red, orange, yellow or light blue. The alarm is active and has severity, respectively, Critical, Ma-
jor, Minor or Warning.
This command is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard
Exp. Nod. 2xSTM-1 16E1 expansion.
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
2. Press Configuration.
The Cross Connection Manager window opens where the existing connections are displayed.
3. To display a connection, move the pointer on a channel used for the connection you wish to verify.
If are highlighted:
• A tributary channel (E1 expansion/VC-12 STM-1/E1 NBUS) and an E1 radio connected by a blue
line, the connection is of type Tributary-Radio.
• Two different tributary channel (E1 expansion/VC-12 STM-1/E1 NBUS) connected by a blue line,
the connection is of type Tributary-Tributary.
• The same tributary channel (E1 expansion/VC-12 STM-1/E1 NBUS/E1 radio) with a blue line
linking the channel itself, the connection is of Auto-Loop type.
Fig.93 shows an example.
Press this
push-button
to open the
window with
the detail of
the connections
(1) This area displays the (tributary and radio) channels provided on the equipment and grouped by
membership streams.
The streams displayed in this area change according to the settings made by the user in the View
area (see note 2).
When an used channel is selected, the connection is displayed represented by a blue line with a
yellow rectangle next where the connection name is reported.
A connection is named on its creation by means of a default name composed by the names of the
channels composing the connection separated by /. The default name can be modified by the user.
(2) The parameters present in the View area determine the streams displayed in the channels area.
If the selected option is:
• Tributary-Radio. The channels area contains:
• The radio stream subdivided in the group of high priority E1 channels (Radio Perma-
nent E1 (<radio branch label>) and the group of low priority E1 channels (Radio Extra
E1 (<radio branch label>).
The order used to display the Extra E1 Radio channels depends on the priority defined
by the user (seeFig.49).
• Only one stream among the available ones.
The right part of the View area displays the parameter Tributary which is used to modify the
tributary stream present in the channels area.
Selecting the arrow of the Tributary box, the list of the available streams is displayed.
Selecting a value, the central part of the channels area changes displaying the detail of the
channel for the selected tributary.
• Tributary-Tributary. The channels area contains two different tributary streams.
The top part displays the tributary stream pointed out in the box 1st Trib. The bottom part
displays the tributary stream pointed out in the box 2nd Trib.
In order to display a different tributary, select the arrow of the box 1st Trib or 2nd Trib and
select a value from the list. The list contains all the available tributaries with the exception
of the tributary set in the other box …Trib.
The boxes 1st Trib and 2nd Trib are displayed in the right part of the View area instead of
the parameter Tributary when the Tributary-Tributary option is selected.
In the boxes Tributary, 1st Trib and 2nd Trib the following values can be present:
• Expansion 16xE1. E1 channels of the expansion (equipment IduBoard Exp. Nod. 2xSTM-1
16E1).
• Expansion 32xE1. E1 channels of the expansion (equipment IduBoard Exp. 2xSTM-1 32E1).
• Expansion STM-1. VC-12 channels of STM-1 streams.
If the management of two STM-1 streams is active (see Fig.44), the values Expansion STM-
1 [1] and Expansion STM-1 [2] will be available, which respectively point out VC12 channels
of the first and of the second STM-1.
• NBUS.... E1 channels of Nodal Bus.
The available NBUS values change according to the equipment nodal configuration.The detail
is pointed out in Tab.8.
The availability of the above mentioned values depends on the type of equipment and on the
equipped tributary streams. The detail is pointed out in Tab.7.
If the user moves the pointer over a channel used for a connection and at least one of the (radio/
tributary) streams involved by the connection is not displayed in the cross-connection window, the
View area dynamically displays the connections existing between the channels and the type of con-
nection. Here below an example is reported.
(3) The key points out the colours that determines the status of the channels:
• Dark green (Auto loop req.). The channel has been selected for an Auto-Loop. The apply
command (selection of Apply push-button) has not been transmitted to the equipment yet
(Auto-Loop requested).
• Light blue (Auto loop). The channel is used for an Auto-Loop executed on the equipment (real
Auto-Loop).
• Light green (Unlinked). The channel is not used.
• Purple (Link requested). The channel has been selected for a Tributary-Tributary or Tribu-
tary-Radio connection. The apply command (selection of Apply push-button) has not been
transmitted to the equipment yet (connection requested).
• Blue (Linked). The channel is used for a Tributary-Tributary or Tributary-Radio connection
executed on the equipment (real connection).
• Grey (Linked to Trib. A/B). The channel is used for the pre-configured connection with the
Tributary A (box A) or tributary B (box B).
The pre-configured connections cannot be modified or deleted.
(4) Push-button:
• Refresh. It forces the reading of the data from the equipment.
If you have made at least one modification, to the choice of the push-button a confirmation
message is displayed. Pressing:
• Ok. The data present in the window are updated and all the changes made to the con-
nections and not confirmed yet (selection of Apply push-button) are lost.
• No. The data present in the window are not updated.
• Apply. It makes the changes operating.
(5) This area is available only if the equipment ALCplus2 with expansion IduBoard Exp. Nod. 2xSTM-1
16E1 belongs to a three-elements protected ALplus node composed by AL IDU plus equipment (pa-
rameter Node Type: ALplus, Nodal Type: 3 Element, Nodal Protection: Protected - see Fig.44).
In this condition, the user can select, in the Preferential Nodal Link area, to which element of the
node transmit in preferential mode the E1 channel (protected NBUS) cross-connected with another
channel (E1 expansion/VC-12 STM-1/E1 NBUS protected/E1 radio).
The key shows the colours determining the status of only the channels involved in this type of con-
nections:
• Dark orange (Link to IDU ... req). The channel has been selected for a connection composed
by a protected NBUS channel and another channel. The connection will be sent in preferential
mode to the IDU of the first nodal element. The apply command (selection of Apply push-
button) has not been sent yet to the equipment (requested connection).
• Light orange (Link to IDU ...). The channel is used for a connection, composed by a protected
NBUS channel and another channel, applied on the equipment (real connection). The con-
nection is sent in preferential mode to the IDU of the first nodal element.
• Bright yellow (Link to IDU ... req). The channel has been selected for a connection composed
by a protected NBUS channel and another channel. The connection will be sent in preferential
mode to the IDU of the second nodal element. The apply command (selection of Apply push-
button) has not been sent yet to the equipment (requested connection).
• Yellow (Link to IDU ...). The channel is used for a connection, composed by a protected NBUS
channel and another channel, applied on the equipment (real connection). The connection is
sent in preferential mode to the IDU of the second nodal element.
The labels of the elements (To IDU...) in the Preferential Nodal Link area and in the key below
change depending on how the nodal element, which the user is connected to, has been defined:
Node A, Node B or Node C (parameter Nodal ID - see Fig.44).
Here below an example is reported.
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
2. Select the List tab.
The tab displays the existing connections. Fig.94 shown an example.
If the List tab is not available, the list is empty.
(2)
Selected
connection
(3)
Fig.94 notes
(1) Every connection is assigned a row, where is pointed out in the column:
• Name. Name of the connection.
On the creation of the connection, a default name is assigned which can be modified later by
the user. The format of the default name is the following:
<Channel> / <Linked Ch.>
The values which Channel and Linked Ch. can assume are the same listed in the next para-
graph.
• Channel and Linked Ch. Channels composing the connection:
• Expansion 16xE1 <E1 number>. E1 channel of the expansion (equipment IduBoard
Exp. Nod. 2xSTM-1 16E1).
• Expansion 32xE1 <E1 number>. E1 channel of the expansion (equipment IduBoard
Exp. 2xSTM-1 32E1).
• Expansion STM-1 <TUG3-TUG2-TU12>. VC-12 channel of STM-1 stream.
If the management of two STM-1 streams is active, the STM-1 stream which the
channel refers to will be specified:
• Expansion STM-1 [1] <TUG3-TUG2-TU12>. VC-12 channel of the first STM-1
stream.
• Expansion STM-1 [2] <TUG3-TUG2-TU12>. VC-12 channel of the second STM-
1 stream.
• NBUS... <E1 number>. E1 channel of Nodal Bus.
The available NBUS values change according to the equipment nodal configuration.
The detail is pointed out in Tab.8.
• Radio Permanent E1 <E1 number>. High priority radio E1 channel.
• Radio Extra E1 <E1 number>. Low priority radio E1 channel.
Remember that the connection is a bidirectional path. The table considers a possible direc-
tion of the connection (Channel -> Linked Ch.) only for clarity of explanation.
(2) When the heading of a column is selected, the rows of the table are sorted in increasing alphanu-
merical order with respect to the considered column and the arrow is displayed.
On the next selection, the rows are sorted in decreasing order (the arrow is displayed) an so on.
(3) Push-button:
• Select All. It selects all the connections present in the list.
• Deselect All. It deselects all the connections present in the list.
• Delete Selected. It deletes the selected connections.
Operation available only for equipment with the radio (see Fig.44)
All the connections executed by the user are single connections. The only exceptions are the connections
where a protected NBUS channel is involved.
In this case, when the user executes a single connection, the matrix automatically executes the protection
connections creating, as fact, a protected connection.
The protected Nodal Bus is available in ALCplus2 equipment with expansion IduBoard Exp. Nod. 2xSTM-1
16E1 in protected nodal configuration.
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
2. Press Configuration.
The Cross Connection Manager window opens (see Fig.93).
3. Select the Tributary-Radio option.
4. Set, in the Tributary box, the tributary stream you wish to use for the connection.
5. Select the unused channel on tributary side (E1 expansion/VC-12 STM-1/E1 NBUS) and drag-and-drop
it on the unused channel on radio side (Radio Permanent E1/Radio Extra E1)
The two channels are linked by a blue line and the name assigned by default to the connection is dis-
played.
To modify the name of the connection go to pag.276.
The number of E1 channels available for the connections changes depending on the equipment type
and on the equipped tributary streams (see Tab.7).
6. Press Apply and confirm.
The confirmation makes effective all the changes on the cross-connection matrix.
All the connections executed by the user are single connections. The only exceptions are the connec-
tions where a protected NBUS channel is involved.
In this case, when the user executes a single connection, the matrix automatically executes the protection
connections creating, as fact, a protected connection.
The protected Nodal Bus is available in ALCplus2 equipment with expansion IduBoard Exp. Nod. 2xSTM-1
16E1 in protected nodal configuration.
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
2. Press Configuration.
4. Set, in the 1st Trib and 2nd Trib box, the tributaries streams you wish to use for the connection.
The list contains all the available tributaries with the exception of the tributary set in the other …Trib
box.
5. Select the unused tributary channel and drag-and-drop it over a different unused tributary channel.
It is possible to select two channels of two different tributaries or of the same tributary.
The two channels are linked by a blue line and the name assigned by default to the connection is dis-
played.
To modify the name of the connection go to pag.276.
The number of E1 channels available for the connections changes depending on the equipment type
and on the equipped tributary streams (see Tab.7).
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
2. Press Configuration.
The Cross Connection Manager window opens (see Fig.93).
3. Select a channel of the Tributary-Tributary and/or Tributary-Radio connection you wish to delete and
drag-and-drop it over the trash icon.
The connection is deleted.
To delete an Auto-Loop in the Cross Connection Manager window, use the procedure To disable an
Auto-Loop (pag.276).
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
2. Press Configuration.
The Cross Connection Manager window opens (see Fig.93).
To disable an Auto-Loop
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
2. Press Configuration.
The Cross Connection Manager window opens (see Fig.93).
3. Double click on the on the tributary channel (E1 expansion/VC-12 STM-1/E1 NBUS) or on the radio
channel (E1 Permanent/E1 Extra) with auto-loop enabled (light blue box) for which you wish to disable
the auto-loop.
The Auto Loop <channel> window is displayed.
5. Press Ok.
The channel changes from used to free (light green box).
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
2. Press Configuration.
The Cross Connection Manager window opens (see Fig.93).
5. Set the new name in the New Value field: alphanumeric string of, at most, 45 characters.
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
Operation available and meaningful only if the equipment ALCplus2 with expansion IduBoard Exp. Nod.
2xSTM-1 16E1 belongs to a three-elements protected ALplus node composed by AL IDU plus equipment
(parameter Node Type: ALplus, Nodal Type: 3 Element, Nodal Protection: Protected - see Fig.44).
In this particular configuration, for the connections involving a NBUS channel (single connections which are
automatically protected by the matrix - see pag.277) it is necessary to set the element of the ALplus node
which you wish to send the connection to in preferential mode.
1. Select the Equipment Menu > Base Band > Cross Connection command.
The Cross connection contextual area opens with the Matrix tab active (see Fig.92).
2. Press Configuration.
The Cross Connection Manager window opens (see Fig.93).
4. Set the NBUS stream and the tributary or the Radio stream you wish to use for the connection setting
the parameters present in the View area.
5. Select, in the Preferential Nodal Link area, the element of the node (option To IDU...) which you wish
to send the connection to in preferential mode.
6. Select the unused NBUS tributary channel and drag-and-drop it over a different unused tributary/radio
channel.
The two channels are linked by a blue line and the name assigned by default to the connection is dis-
played.
To modify the name of the connection go to pag.276.
For ALCplus2 equipment with expansion IduBoard Exp. 2xSTM-1 32E1 or IduBoard Exp. Nod. 2xSTM-1
16E1, a TDM matrix is available for the cross-connection of the E1 channels.
The number of E1 channels available for the connections changes depending on the type of equipment and
on the equipped tributary streams. The detail is pointed out in Tab.7.
Connection Type
In case of equipment without radio (radio unequipped - see Fig.44) the connection of type Tributary-
Radio is not available.
The user can display the cross-connections existing in an equipment as graphic or as table.
In the first case, the tributary and radio streams are graphically displayed in a window (Cross Connection
Manager window).
When a channel involved by a connection is selected, a line is displayed representing the connection. The
edges of the line point out the channels composing the connection (see Fig.93).
In the second case, a table is displayed with the list of the existing cross-connections (List tab).
Each row of the table represents a connection where the name, the edge channels and the connection type
are pointed out (see Fig.94).
Here below the operations which can be performed in the two displays:
• GRAPHICAL display (Cross Connection Manager window):
• To verify the connections of the equipment (one at a time)
• To execute a Tributary-Radio connection
• To execute a Tributary-Tributary connection
• To delete one or more connections
• To enable the loop of a channel (Auto-Loop)
• To disable an Auto-Loop
• To verify/modify the name of a connection
• TABLE display (List tab):
• To verify the connections of the equipment
• To delete one or more connections at the same time
• To verify/modify the name of the connections
Creation of a cross-connection
All the connections in the TDM matrix must be created by the user (see pag.274, pag.274, pag.275). It is
possible to create a connection only in the graphical display (Cross Connection Manager window - Fig.93).
It is possible to delete one or more cross-connections from the graphical display of the connections or from
the table display (see pag.275).
In both cases, the connections removed in a type of display are automatically removed even from the other
type.
The following operations automatically delete the connections where the (tributary or radio) stream, object
of the change, is terminated:
• Configuration change of the STM-1 stream (STM-1 MST Mode parameter - see Fig.44). Passage
from the:
• 1+0, 1+1 MSP, 2 x (1+0) MST or 1+1 MSP No ALS option to the None and vice versa.
• 1+0, 1+1 MSP or 1+1 MSP No ALS option to the 2 x (1+0) MST and vice versa.
• Configuration change of the TDM nodal Bus configuration (see Fig.44):
• Node Type parameter. Passage from the ALCplus2 node or ALplus node option to the No
Node.
• Nbr of TDM Elements parameter. Passage from 1÷8 option to the No Elements.
• TDM Nodal Bus Protection parameter (ALCplus2 node). Passage from the Not Protected
option to the Protected and vice versa.
• Nodal Protection parameter (ALplus node). Passage from the Not Protected option to the
Protected and vice versa.
• Radio configuration change (Radio A parameter - see Fig.44).
Passage from the 1+0, 1+1 Hot Standby or 1+1 Freq. Div option to the Unequipped and vice
versa.
• Configuration change of the E1 Radio - Permanent channel.
All those operations, executed in the Modulation & Capacity tab, which decrease the number of
high priority E1 channels (Permanent TDM Traffic) (see Fig.46).
No Node - - - -
NBUS 1 [1..63] 63 E1 channels (1÷63)
Nodal Bus 1
NBUS 1 [64..126] 63 E1 channels (64÷126)
Not protected
NBUS 2 [1..63] 63 E1 channels (1÷63)
ALCplus2 node Nodal Bus 2
NBUS 2 [64..126] 63 E1 channels (64÷126)
(1)
NBUS 1 [1..63] Protected Nodal Bus 1 63 protected E1 channels
Protected
(2)
NBUS 2 [1..63] Protected Nodal Bus 2 63 protected E1 channels
NBUS 1 [1..63] 63 E1 channels (1÷63)
Nodal Bus 1
NBUS 1 [64..126] 63 E1 channels (64÷126)
Not protected
NBUS 2 [1..63] 63 E1 channels (1÷63)
ALplus node Nodal Bus 2
NBUS 2 [64..126] 63 E1 channels (64÷126)
(3)
NBUS [1..63] Protected Nodal Bus 63 protected E1 channels
Protected
(4)
NBUS [64..126] Protected Nodal Bus 63 protected E1 channels
(1)
The first group of 63 E1 channels (1÷63) of the Nodal Bus 1 is protected by the second group of 63 E1
channels (64÷126) of the Nodal Bus 1.
The protection is hard-wired: the first channel of the first group (E1-1) is protected by the first channel of
the second group (E1-64); the second channel of the first group (E1-2) is protected by the second channel
of the second group (E1-65) and so on.
(2) The first group of 63 E1 channels (1÷63) of the Nodal Bus 2 is protected by the second group of 63 E1
(3)
The first group of 63 E1 channels (1÷63) of the Nodal Bus 1 is protected by the first group of 63 E1
channels (1÷63) of the Nodal Bus 2.
The protection is hard-wired: the first channel of the first group of the Nodal Bus 1 (NBUS 1 - E1-1) is
protected by the first channel of the first group of the Nodal Bus 2 (NBUS 2 - E1-1); the second channel
of the first group of the Nodal Bus 1 (NBUS 1 - E1-2) is protected by the second channel of the first group
of the Nodal Bus 2 (NBUS 2 - E1-2) and so on.
(4)
The second group of 63 E1 channels (64÷126) of the Nodal Bus 1 is protected by the second group of
63 E1 channels (64÷126) of the Nodal Bus 2.
The protection is hard-wired: the first channel of the second group of the Nodal Bus 1 (NBUS 1 - E1-64) is
protected by the first channel of the second group of the Nodal Bus 2 (NBUS 2 - E1-64); the second channel
of the second group of the Nodal Bus 1 (NBUS 1 - E1-65) is protected by the second channel of the second
group of the Nodal Bus 2 (NBUS 2 - E1-65) and so on.
At the choice of Radio option, the program displays the following commands:
The option Radio is available only for equipment provided with radio (see Fig.44).
* Read and Write user profile can set only the parameters relevant to the maintenance (MAN. OP).
The option Radio Branch... is available only for equipment provided with radio (see Fig.44).
For the equipment in 1+0 configuration is present the Radio Branch 1A command.
For the equipment in 1+1 configuration are present the Radio Branch 1A (branch 1 radio parameters)
and Radio Branch 2A (branch 2 radio parameters) commands.
This operation does NOT automatically modify also the RF channel of the remote equipment.
In 1+1 Hot Stand-by configuration the change is automatically done also on the other branch.
1. Select the Equipment Menu > Radio > Radio Branch command.
The Radio Branch contextual area opens.
The Tx Frequency Selector parameter points out the RF channel (see Fig.95).
2. To change the parameter, use the UP/DOWN push-buttons to increase/decrease the RF channel.
The RF channel can be modified at steps of 10 channels at a time (if the COARSE is present) or at steps
of 1 channel at a time (if the COARSE is not present).
Press Mode to activate/deactivate the display of the word.
The frequency values change according to the equipment connected with the program.
RF channel
expressed as
channel number
and relevant
frequency (1)
Resolution of the
Operating status
power received (Prx)
of the RT power
and trasmitted (Ptx)
supply (3)
(5)
Fig.95 notes
(1) If it is pointed out the wording UNAVAILABLE. Reason: Outdoor Unit Hardware Failure, check that
the connection cable between the IDU section and the ODU one is not failure or missing.
The word COARSE points out the granularity: if the word is displayed, the RF channel can be mod-
ified at steps of 10 channels at a time, while if the word is not present, the value can be modified
at steps of 1 channel at a time. To activate/deactivate the display of the word, use the Mode push-
button.
(5) Box:
• Prx. Resolution used to communicate the changes of the power received by the equipment
(Prx) to a possible external management program (trap Prx change).
For instance, if the operator sets a resolution of 2 dB and the last communicated PRx value
corresponds to -70 dBm, the equipment will communicate to the program the changing of
the transmitted power when the PRx gets a value <-72 or > -68.
• Ptx. Resolution used to communicate the changes of the power transmitted by the equip-
ment (Ptx) to a possible external management program (trap Ptx change).
For instance, if the operator sets a resolution of 2 dB and the last communicated Ptx value
corresponds to 10 dBm, the equipment will communicate to the program the changing of the
transmitted power when the Ptx gets a value < 8 or > 12.
1. Select the Equipment Menu > Radio > Radio Branch command.
The Radio Branch contextual area opens.
The Carrier Only parameter points out the modulation status of the RF carrier (see Fig.95).
3. Press Apply.
Only if you are deactivating the modulation (selection of the On option) a message is displayed warning
that you are executing a forcing and displaying the current setting of timeout.
1. Select the Equipment Menu > Radio > Radio Branch command.
The Radio Branch contextual area opens.
The Tx Transmitter parameter points out the operation of the transmitter (see Fig.95).
3. Press Apply.
Only if you are switching off the transmitter (selection of the Off option) a message is displayed warning
that you are executing a forcing and displaying the current setting of timeout.
1. Select the Equipment Menu > Radio > Radio Branch command.
The Radio Branch contextual area opens.
The RT PSU parameter points out the operation of the RT power supply (see Fig.95).
3. Press Apply.
For the equipment in 1+1 configuration, the setting of a value for the resolution of the Prx relevant to
a branch automatically modifies also the value of the Prx resolution of the other branch.
1. Select the Equipment Menu > Radio > Radio Branch command.
The Radio Branch contextual area opens.
The Prx parameter points out the resolution used to communicate the changes of the power received
by the equipment (Prx) to a possible external management program (trap Prx change) (see Fig.95).
2. To change the parameter set, into the box, the wished value.
For the equipment in 1+1 configuration, the setting of a value for the resolution of the Ptx relevant to
a branch automatically modifies also the value of the Ptx resolution of the other branch.
1. Select the Equipment Menu > Radio > Radio Branch command.
The Radio Branch contextual area opens.
The Ptx parameter points out the resolution used to communicate the changes of the power transmitted
by the equipment (Ptx) to a possible external management program (trap Ptx change) (see Fig.95).
2. To change the parameter set, into the box, the wished value.
1. Select the Equipment Menu > Radio > Radio Branch command.
The Radio Branch contextual area opens.
Maximum
output power
value at the
Operating transmitter
status of the (2)
ATPC device
(1) ATPC
regulation
value (3)
Intervention
threshold of
the ATPC (4)
(5)
Fig.96 notes
(2) The parameter affects the ATPC device as when it is in manual functioning mode as in automatic
one.
(3) This parameter defines the range of the ATPC regulation (expressed in dB) with respect to the cur-
rent value of maximum Tx output, that is intended as the upper limit of the range.
(4) Cursor:
• High: <current value> dBm. Intervention threshold of the ATPC device to decrease the
transmitted power when the received field from the local equipment is equal to or higher
than the set threshold value
• Low: <current value> dBm. Intervention threshold of the ATPC device to increase the trans-
mitted power when the received field from the local equipment is equal to or lower than the
set threshold value.
(5) Press the push-button to display the table resuming the power in transmission/reception for every
ACM profile. In detail, in the column:
• Active Modulation. ACM profile.
• Tx Power. Minimum power (Min) and maximum power (Max) in output from the transmitter
• RX Power. Minimum power (Min) and maximum power (Max) in input to the receiver.
Fig.97 shows an example.
In 1+1 Hot Stand-by system configuration the change is automatically done also on the other branch.
1. Select the Equipment Menu > Radio > Radio Branch command.
The Radio Branch contextual area opens.
In 1+1 Hot Stand-by system configuration the change is automatically done also on the other branch.
In 1+1 Freq. Div. system configuration the changes, to be active, must be set in both branches.
1. Select the Equipment Menu > Radio > Radio Branch command.
The Radio Branch contextual area opens.
3. To change the threshold move the High and/or Low cursor to the wished value. In detail, the parame-
ter:
• High: <current value> dBm. Intervention threshold of the ATPC device to decrease the trans-
mitted power when the received field from the local equipment is equal to or higher than the set
threshold value.
• Low: <current value> dBm. Intervention threshold of the ATPC device to increase the transmit-
ted power when the received field from the local equipment is equal to or lower than the set
threshold value.
1. Select the Equipment Menu > Radio > Radio Branch command.
The Radio Branch contextual area opens.
At the choice of Maintenance option, the program displays the following commands:
• Lan Statistics (pag.290). It manages the counters of the packets/bytes in input/output from
the Ethernet ports (display of all the counters subdivided by ports).
• Lan Stat. Summary (pag.293). It manages the main counters of the packets/bytes in input/
output from the Ethernet ports (contemporary display of the main counters for each port).
• OAM-FM Domain (pag.295). It manages the OAM-FM Domain which an equipment belongs to.
• OAM-FM MA/MEP (pag.305). It manages the maintenance points of the OAM-FM Domain and
allows monitoring the path of a VLAN by using the CCM, LBM and LTM messages.
• S/N Meas (pag.316). It displays the measure of the signal/noise ratio (S/N).
• Fade Margin (pag.317). It manages the calculation of the link margin (Fade Margin).
• PRBS (pag.321). It manages the PRBS device.
• Radio Loop (pag.324). It manages the radio loops.
• Radio Switch A (pag.328). It manages the radio switch.
The commands S/N Meas., Fade Margin, Radio Loop and Radio Switch A are available only for
equipment provided with radio (see Fig.44).
The command OAM-FM MA/MEP is available only if a OAM-FM Domain has been defined for the equip-
ment (see Fig.103).
Curr. Profile Monitor, Read Only, Read and Write, Station Operator, System*
* The reset of the counters result can be executed only by users Station Operator and System.
The Lan Statistics command manages the counters of the packets/bytes in input/output from the Ether-
net ports.
In detail, it is possible:
• To verify the counters of the packets/bytes in input/output from the Ethernet ports (pag.290)
• To reset the counters’ results (pag.292)
To verify the counters of the packets/bytes in input/output from the Ethernet ports
1. Select the Equipment Menu > Maintenance > Lan Statistics command.
The Lan Statistics contextual area opens.
Counter
name
Counter
value (2)
Use the
scrolling bar
to display
all the
counters
Counters
of a port
list (1)
Select the
port, which
you wish to
verify the
counters
(1) Counter:
• Dropped Frames. Total number of events (frames) in which packets were dropped by the
probe due to lack of resources.
This value is not necessarily the absolute number of discarded packets, as it represents only
the number of times that this condition occurred after the exhaustion of the memory re-
sources; the packets can be discarded also for other causes.
• Total Bytes Received. Total number of octets of data (including those in bad packets) re-
ceived on the network.
This value includes 4 FCS octects.
• Total Frames Received. Total number of packets (including bad packets, broadcast packets,
and multicast packets) received.
• Broadcast Frames Received. Total number of good packets received that were directed to
the broadcast address.
This does not include multicast packets.
• Multicast Frames Received. Total number of good packets received that were directed to a
multicast address.
This number does not include packets directed to the broadcast address.
• CRC Align Errors. Total number of packets received that had a length of between 64 and n
(parameter Max Packet Size, it can be set to 1522 or 2048) octets with bad Frame Check
Sequence (FCS) and an integral number of octets (FCS Error) or a bad FCS with a non-inte-
gral number of octets (Alignment Error).
• Undersize Frames. Total number of packets received that were less than 64 octets long and
were otherwise well formed.
• Oversize Frames. Total number of packets received that were longer than n (parameter Max
Packet Size, it can be set to 1522 or 2048) octets and were otherwise well formed.
• Fragments. Total number of packets received that were less than 64 octets in length and had
either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or
a bad FCS with a non-integral number of octets (Alignment Error).
• Jabbers. Total number of packets received that were longer than n (parameter Max Packet
Size, it can be set to 1522 or 2048) octets, and had either a bad Frame Check Sequence
(FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number
of octets (Alignment Error).
• Collisions. The best estimate of the total number of collisions on this EthLannet segment.
• Frames 64 Oct. [Sent+Rec.]. Total number of packets (including bad packets) received and
transmitted that were 64 octets in length.
• Frames 65 to 127 Oct. [Sent+Rec.]. Total number of packets (including bad packets) re-
ceived and transmitted that were between 65 and 127 octets in length inclusive.
• Frames 128 to 255 Oct. [Sent+Rec.]. Total number of packets (including bad packets) re-
ceived and transmitted that were between 128 and 255 octets in length inclusive.
• Frames 256 to 511 Oct. [Sent+Rec.]. Total number of packets (including bad packets) re-
ceived and transmitted that were between 256 and 511 octets in length inclusive.
• Frames 512 to 1023 Oct. [Sent+Rec.]. Total number of packets (including bad packets) re-
ceived and transmitted that were between 512 and 1023 octets in length inclusive.
• Frames 1024 to max pck size [Sent+Rec.]. Total number of transmitted and received pack-
ets with a length greater than 1024 octects (incorrect packets included).
• Late Collisions. Evaluation relevant to the total number of collisions detected in this EthLan-
net segment, after the transmission of more than 512 bits from the beginning of TXEnable.
• Valid Bytes Received. Total number of received bytes relevant to correct packets. This coun-
ter is increased once for every data octet of good packets (Unicast + Multicast + Broadcast)
received.
• Bytes Sent. Number of transmitted bytes.
This counter is increased once for every data octet of a transmitted good packet.
• Valid Frames Received. Number of received correct frames.
This counter is increased once for every good packet (Unicast + Multicast + Broadcast) re-
ceived.
(2) The value of the each counter refers to the moment when the relevant port is opened or the con-
textual area Lan Statistics is updated.
To update the data, press Refresh.
1. Select the Equipment Menu > Maintenance > Lan Statistics command.
The Lan Statistics contextual area opens (Fig.98).
Curr. Profile Monitor, Read Only, Read and Write, Station Operator, System*
* The reset of the counters result can be executed only by users Station Operator and System.
The Lan Stat. Summary command manages the main counters of the packets/bytes in input/output from
the Ethernet ports.
In detail, it is possible:
• To verify the summary of the main counters of the Ethernet ports (pag.293)
• To reset the counters’ results (pag.294)
1. Select the Equipment Menu > Maintenance > Lan Stat. Summary command.
The Lan Stat. Summary contextual area opens where the summary of the main counters of the Ethernet
ports is displayed (Fig.99).
Ports
of the
Switch
(1)
Main
counters
list (2)
Counter
name
Counter
value
for each
port (3)
Fig.99 notes
(1) The presence, next to the name of a port of the Switch, of the wording:
• (Brx), points out that the Spanning Tree protocol is enabled for the specific port (see Fig.68
for the external port and Fig.78 for the internal port).
The value x points out the Bridge which it belongs to.
(2) Counter:
• Byte Rx (Total Bytes Received). Total number of octets of data (including those in bad pack-
ets) received on the network. This value includes 4 FCS octects.
• Frm Rx (Total Frames Received). Total number of packets (including bad packets, broadcast
packets, and multicast packets) received.
• Bytes Tx (Bytes Sent). Number of transmitted bytes. This counter is increased once for every
data octet of a transmitted good packet.
• Frm Tx (Frames Sent). Number of transmitted frames. This counter is increased once for
every transmitted good packet.
• Drop Frm. (Dropped Frames). Total number of events (frames) in which packets were
dropped by the probe due to lack of resources. This value is not necessarily the absolute
number of discarded packets, as it represents only the number of times that this condition
occurred after the exhaustion of the memory resources; the packets can be discarded also
for other causes.
• CRC Err. (CRC Align Errors). Total number of packets received that had a length of between
64 and n (parameter Max Packet Size, it can be set to 1522 or 2048) octets with bad Frame
Check Sequence (FCS) and an integral number of octets (FCS Error) or a bad FCS with a
non-integral number of octets (Alignment Error).
(3) The value of each counter refer to the moment when the contextual area Lan Stat. Summary is
opened or updated.
To update the data, press Refresh.
1. Select the Equipment Menu > Maintenance > Lan Stat. Summary command.
The Lan Stat. Summary contextual area opens (Fig.99).
The description of the OAM-FM Ethernet functionality, implemented in the equipment managed by WEB
LCT, is at pag.296.
If the OAM-FM Domain command is not available, this means that the OAM-FM Ethernet functionality
is not enabled for the equipment. Some functionalities of the equipment are available after the enabling.
To verify the functionalities enabled select the Features Management command (pag.146).
ALCplus2 equipment manages a single Domain.
The name or the level of an OAM-FM Domain associated to an equipment cannot be modified. In order to
modify one or both the parameters, it is necessary to remove the current Domain and to define a new one.
The OAM (Operations, Administration and Maintenance) Ethernet functionality represents the set of proc-
esses, activities, rules, etc. which allow managing the operation, the monitoring and the fixing of troubles
in the Ethernet network.
These services are defined by the following reference specifications, which you must refer to for the de-
tailed description of the OAM Ethernet functionality:
• ITU-T Recommendation Y.1731 - OAM Functions and Mechanisms for Ethernet based Networks.
• IEEE Standard 802.1ag - IEEE Standard for Local and Metropolitan Area Networks – Virtual
Bridged Local Area Networks – Amendment 5: Connectivity Fault Management.
Among the above mentioned specifications, ALCplus2 equipment implement the functionality relevant to
Connectivity Fault Management (CFM).
This functionality has the purpose to monitor, in a Layer-2 Ethernet network, the end to end availability of
a service (implemented by a VLAN) and to monitor, in case of out-of-service, tools (LoopBack and Link
Trace) helping the operator in the analysis of the trouble.
• To define, for each VLAN (service) configured on the equipment, the maintenance points neces-
sary to diagnostic the connection troubles within a maintenance Domain:
• To define, for every service (VLAN), a Maintenance Association (MA - pag.297) to mon-
itor.
• To define the end points to monitor the maintenance area (MEP - pag.297).
• To define the intermediate monitoring points of the maintenance area (MIP - pag.298).
• To manage, for every local MEP, the relevant table of Remote MEPs (pag.299) (RMep table).
• To manage the Continuity Check Messages (CCM - pag.300) which allow monitoring end-to-end
a service instance (VLAN) pointing out any interruption.
• To manage the LoopBack Messages (LBM - pag.301) which, after the detection of a fault, allow
isolating the point where the fault occurred.
• To manage the Link Trace Messages (LTM - pag.302) which allow tracing the path followed by
an OAM-FM packet between two different MEPs within the same VLAN.
Here below a brief description of the above mentioned OAM-FM elements is reported together with their
management in ALCplus2 equipment.
Moreover, an example of configuration of an OAM-FM maintenance Domain for a set of ALCplus2 equipment
is reported (VLAN creation, Domain, maintenance points, etc.) (see pag.302).
OAM-FM Domain
The term OAM-FM Domain defines a network or a part of a network owned and managed by a single entity
(operator) and where the connection troubles can be managed.
All the other entities defined by OAM refer to the Domain: MA (MIP) (pag.297 - pag.298) and MEP
(pag.297).
This Domain is transparent as regards the OAM-FM messages with higher priority (messages to/from the
higher domains), while stops all the messages with lower priority (messages to/from lower domains).
MA
The term MA (Maintenance Association) identifies the service (VLAN) you wish to monitor.
Then, a Maintenance Association is coupled to an user-defined VLAN; creating a MA means enabling the
control of the specified VLAN.
Within a specific OAM-FM Domain, there are as many MAs as the VLANs the user wishes to monitor.
MEP
The term MEP (Maintenance End Point) defines the entity, associated to a specific service instance (VLAN),
representing the end point of a MA (pag.297).
Fig.100 shows an example.
MEP can generate and terminate OAM-FM messages regarding the fault management and the performance
monitoring.
In fact, MEP is the entity set for the control of the service (VLAN) as, within the OAM-FM maintenance seg-
ment, the set of MEPs created in the end points of a VLAN allows controlling the correct end to end oper-
ation of the VLANs.
The control is achieved by means of the periodic transmission, by each MEP, of the CCM (pag.300) mes-
sages and of the control of the reception of the same messages by the Remote MEPs (pag.299).
ALCplus2 equipment manages a single MEP per each MA (VLAN) and a maximum of 32 MEPs (32 MA/
VLAN).
MEP must be defined only in ALCplus2 equipment acting as end points of the same VLAN (see pag.308).
The definition of a MEP for a VLAN involves even the automatic definition of the MA, if this has not been
already done.
The definition of a MEP requires the setting of:
• A numeric identifier, which must be univocal within the network for the specific VLAN.
• The name of the relevant MA (only if not already defined).
• The time interval used for the transmission of the continuity check messages (CCM).
Once MEP has been created, the transmission of the CCM messages is disabled. They must be
enabled by the user (see pag.310).
• The port of the Ethernet Switch, where you wish to map the MEP, and the direction to which you
wish to send the CCMs:
• Direction UP ( ). The CCM messages are sent as they were in input from the considered
port to the other ports of the Switch interested by the considered VLAN.
• Direction DOWN ( ). The CCM messages are sent in output from the selected port.
ALCplus2 equipment, for every single MEP, manages the following alarms:
• MEP Fail - OAM-FM MA:<MA name> MEP Id:<local MEP identifier> Fail Alarm
The alarm becomes active when at least one of the remote MEPs present in the RMep table of
the specific local MEP is in status Start or Failed (see Fig.105).
The activation of this alarm is pointed out even in the contextual area OAM-FM ME/MEP (see
Fig.104).
• MEP Configuration Mismatch - OAM-FM MA:<MA name> MEP Id:<local MEP identifier> Config.
Mismatch Alarm.
The alarm becomes active when the local MEP receives at least one CCM message, containing
configuration data different from those set for the local MEP itself, from one of the remote MEPs.
With configuration data we mean: Domain name, MA name, CCM interval.
When this alarm is active, the remote MEP, which has raised the alarm, cannot be enabled in
the RMep table.
Domain: Test
A.1 MEP 10
A.2 A.3 MEP 11
A.4
Switch Switch MIP Switch Switch
1 1 1 1
VLAN Id: 20
A 2 MA: Vlan 20
2 A A 2 2 A
3 3 3 3
4 4 4 4
MIP
The term MIP (Maintenance Intermediate Point) defines a passive entity, associated to a specific service
instance (VLAN).
MIPs are defined on transit equipment for the monitored VLAN, intermediate among the end MEPs
(pag.297).
Fig.100 shows an example.
MIP can reply to the LoopBack (LBM - pag.301) messages, sent in unicast by a MEP (MAC Address), and
to the Link Trace (LTM - pag.302) messages, sent by a MEP, but it cannot generate requests of LoopBack
and Link Trace towards other MIP or MEP.
MIP is defined by the operator in ALCplus2 equipment which acts as intermediate points of the same
VLAN and the same OAM-FM maintenance segment.
The definition of a MIP takes place after the definition of the MA (see pag.308).
In fact, the definition of a MA within a VLAN for which a MEP is not defined, corresponds to the automatic
definition of a MIP for every single port of the Switch for which the specific VLAN is enabled.
Once a MA/MIP has been defined, its name cannot be changed. To do this, remove the MA/MIP from the
VLAN and create a new one with the new name.
The term Remote MEP (Maintenance End Point) defines entities which represent the other end points (re-
mote points) of a VLAN with respect to the local MEP.
Example
Referring to Fig.100, if you are connected by WEB LCT to equipment A.1, the local MEP will be MEP 10
while the remote MEPs will be MEP 11 and MEP 12.
Otherwise, if you are connected by WEB LCT to equipment A.4, the local MEP will be MEP 11 while the
remote MEPs will be MEP 10 and MEP 12.
A table of the remote MEPs (RMep table) is associated to every local MEP (then to every MA/VLAN).
The system records, in this table, the remote MEPs from which the local MEP waits for a CCM (pag.300)
message.
If the CCM message does not arrive within a timeout period equal to 2,5 CCM interval set for the local MEP,
the remote MEP is set to status Failed and the relevant alarm is activated (OAM-FM MA:... MEP Id:... Fail
Alarm).
Example
Referring to Fig.100, if you are connected by WEB LCT to equipment A.1, MEP 11 and MEP 12 will be
recorded in the RMep table (relevant to MEP 10).
The transmission of CCM messages is enabled at intervals of 10 sec between a transmission and the
next one.
If, after 25 sec. (2,5 times the CCM interval), MEP 10 does not receive a CCM message, for example
from MEP 11, in the RMep table MEP 11 will be set to status Failed and the alarm OAM-FM MA: Vlan 20
MEP Id: 10 Fail Alarm will be activated, pointing out that a Remote Mep in Failed is present in the RMep
table of the local MEP 10.
The remote MEP remains in status Failed until the local MEP receives a valid CCM message from the
remote MEP or the user removes the remote MEP from the table.
The recording of remote MEPs in the RMep table consists of two parts: the entry in the table and the ena-
bling of the remote MEP (operation necessary so that the remote MEPs are acknowledged as valid end
points by the local MEP).
The entry of MEP in the table takes place:
a. AUTOMATICALLY, after the reception of the first CCM sent by a remote MEP.
For these remote MEPs, the table points out the identifier of the remote MEP and the MAC Ad-
dress of the equipment which the remote MEP belongs to.
The enabling for this type of remote MEPs must be executed manually by the operator (see
Fig.101).
b. MANUALLY, after a command of the operator, who adds the remote MEP.
For these remote MEPs, the table points out the identifier of the remote MEP (provided by the
operator) while the MAC Address is set to zero.
The enabling for this type of MEP takes place automatically when the equipment receives the
first CCM message sent by the specific remote MEP.
When the first CCM is received, the field MAC Address gets the value of the MAC Address of the
remote equipment, source of CCM.
The status of a remote MEP is pointed out in the table by the parameter MEP State and can be:
• Start. Initial status of the remote MEP after its (automatic or manual) insertion in the table or
status assumed by remote MEP after it has been disabled.
The operations a user can execute when a remote MEP is in status Start and the conditions which
cause the passage of the remote MEP from a status to another one change depending on the
type of insertion of the MEP in the RMep table (automatic or manual) as depicted in Fig.101.
• Conn. Status the remote MEP reaches from the status Start after an enabling command or at
the reception of the first CCM message sent by the specific remote MEP, if previously recorded
by the operator (see Fig.101).
The operations a user can execute when a remote MEP is in status Conn and the conditions which
cause the passage of the remote MEP from a status to another one are depicted in Fig.101.
• Failed. Status the remote MEP reaches when the local MEP does not receive (for a period of 2,5
times the CCM interval) a CCM message from the specific remote MEP, as described at the be-
ginning of the chapter.
After the (automatic or manual) insertion of a remote MEP in the table, it can be removed only manually
by the operator.
In WEB LCT, the RMep table of a local MEP can be displayed only after the local MEP has been associated
to a VLAN (see pag.308).
Fig.101 OAM-FM - Management of the status of the Remote MEPs in the RMep table
Fig.101 notes
CCM
The term CCM (Continuity Check Message) defines the messages which constantly monitor the path of the
service instance pointing out the connection troubles.
CCMs are multicast messages sent by a MEP entity to the other MEP entities belonging to the same MA
(Remote MEPs - pag.299).
Moreover, CCMs are unidirectional messages (do not need a reply) and are periodically sent.
Within a MA which n MEPs belongs to, every MEP periodically sends a CCM in multicast; every MEP waits
to periodically receive n-1 CCMs.
The missed reception of a CCM by a MEP means the presence of a fault in the path of the service instance
(VLAN).
The CCM management in ALCplus2 equipment is strictly bound to the MEP management.
In fact, the configuration parameters of the CCM messages must be set when MEP is created. In detail, the
user is required to define:
• The time interval used for the transmission of CCMs (CCM interval).
For a correct operation of the CCM messages, the CCM interval must be the same for all the
MEPs of the same VLAN.
• The direction you wish to send the CCM messages to.
Once the MEP has been defined, the enabling of the transmission of CCMs is required.
Then, the user can disable and enable again the transmission of the CCM messages at his wish (see
pag.310).
The configuration parameters of the relevant (interval and direction) cannot be modified. To do this, re-
move the MEP from the VLAN and create a new one with the new values.
In ALCplus2 equipment, the CCM messages (OAM-FM packets) are routed on the VLANs only if the control
of Tag VLan Id is active (parameter Ingress Filtering Check - set value Fallback or Secure - see Fig.66).
LBM
The term LBM (LoopBack Message) defines the LoopBack messages which, once a fault has been detected
through the CCM (pag.300) messages, allow isolate the point where the fault has occurred.
The operation modalities of OAM-FM LoopBack is similar to IP ping.
From a MEP an OAM-FM packet is sent in unicast with a request of Echo Request (LoopBack Message) to a
MIP or MEP belonging to the same MA. The MEP waits for the relevant reply Echo Reply (Loopback Replies)
sent in unicast from the remote maintenance point.
The missed reply to a LBM message points out the presence of a fault between the MEP which has sent the
message and the maintenance point which has not replied to the message.
The LBM messages are sent after a command from operator (see pag.313).
The transmission of LoopBack messages requires the setting of:
• The local MEP, which you wish to send the messages from.
• The remote maintenance point, belonging to the same Domain and the same MA of the local
MEP, which you wish to send the messages to. The setting of a:
• MEP can be done choosing the MEP in the RMep table or setting the MAC Address of the
equipment where the remote MEP is defined.
• MIP can be done setting the MAC Address of the equipment where MIP is defined.
• Number of messages (OAM-FM packets - Echo Request) you wish to send in sequence with a
single sending confirmation (minimum 1 maximum 5).
At the end of the operation, a statistics is available with the number of sent packets (Sent messages), the
number of received correct packets (Valid), the number of packets received out of sequence (Out Of Order)
and the number of packets received with unknown format (Bad Msdu) (see Fig.106).
The term LTM (Link Trace Message) defines the Link Trace messages which allow determining the path
covered by an OAM-FM packet between the end-points of a service instance (VLAN).
The operating modality of OAM-FM Link Trace is similar to TraceRoute IP.
A Link Trace message is sent in multicast from a MEP (local) to a remote MEP, whose physical address must
be known.
In the Link Trace messages, the TTL (Time To Live) field, which points out the number of equipment of the
specific OAM-FM Domain the packet can pass through before being declared expired, is properly config-
ured.
The LTM messages are captured by all the MEPs-MIPs installed on the same VLAN on the equipment
touched to reach the destination MEP.
Every MEP-MIP, once the message has been intercepted, decreases the TTL field, replies to the originating
MEP with an unicast message and re-transmits the LTM message to the destination MEP.
This operation is repeated until the packet arrives to the addressee remote MEP.
At the end of the operation, the local MEP has acquired the list of the physical addresses (MAC Address) of
the equipment where the Link Trace messages have passed.
The LTM messages, to trace the path between two different MEPs of the same VLAN, are sent after a com-
mand by operator (see pag.314).
To trace a path, the operator must set the two path ends:
• Local MEP.
• Remote MEP. This setting can be done choosing the MEP from the RMep table or setting the MAC
Address of the equipment whose remote MEP has been defined.
The remote MEP, to make the operation being successful, must be in status Conn. (see Fig.101).
Then the operator must send the LTM message (Run Test).
At the end of the operation, the Link Trace (see Fig.107) will contain the list of the MAC Addresses of the
MIPs-MEPs crossed to reach the remote MEP with the indication of the distance in Hops from the origin MEP.
The LTM messages are sent in multicast (OAM-FM packets), use as:
• Destination address (Destination MAC address): 01-80-C2-00-00-3y with y from 8...0xF ac-
cording to the layer of the OAM-FM Domain.
• Source address (Source MAC address): physical address of the equipment which has generated
the Link Trace message.
Fig.101 shows an example of configuration of a maintenance OAM-FM area among four ALCplus2 equip-
ment (A.1, A.2, A.3 and A.4). This area is used to monitor the end to end availability of VLAN 20.
Domain: Test
A.1 MEP 10
A.2 A.3 MEP 11
A.4
Switch Switch MIP Switch Switch
1 1 1 1
A 2 2 A A 2 2 A
3 3 3 3
4 VLAN Id: 20 4 4 4
MA: Test 20
2. Define the OAM-FM Domain (pag.296) with name Test (see pag.304 ) and layer equal to 5.
The OAM-FM Domain must be defined in every equipment of the Domain Test and the name and the
layer of the Domain must be the same for all the equipment.
3. Associate the MA (pag.297) with name Test 20 (see pag.308 ) to the VLAN.
The MA must be associated to VLAN 20 in every equipment of Domain Test and the name of MA must
be the same for all the equipment.
5. Enable the transmission of CCM messages for the MEPs created in the previous step (see pag.310).
After some seconds, the RMep table (see Remote MEPs - pag.299) relevant to MEP 10 (equipment A.1)
records the MEP 11 in status Start and the alarm OAM-FM MA: Test 20 MEP Id: 10 Fail Alarm becomes
active.
Differently, the RMep table relevant to MEP 11 (equipment A.4) records the MEP 10 in status Start and
the alarm OAM-FM MA: Test 20 MEP Id: 11 Fail Alarm becomes active.
6. In RMep tables, enable the remote MEPs (see pag.312).
In the RMep table relevant to MEP 10 (equipment A.1), the remote MEP 11 changes to status Conn and
the OAM-FM MA: Test 20 MEP Id: 10 Fail Alarm alarm becomes inactive.
In similar mode, in the RMep table relevant to MEP 11 (equipment A.4), the remote MEP 10 changes
to status Conn and the OAM-FM MA: Test 20 MEP Id: 11 Fail Alarm alarm becomes inactive.
The configuration of the maintenance area depicted in Fig.101 is completed and the end to end monitoring
of VLAN 20 is active.
At this point, when a fault is detected (activation of the alarm OAM-FM... Fail Alarm) or in order to execute
checks on the OAM-FM path, it is possible to use the LTM (pag.302) messages to verify the path of the
VLAN or, when the Fail alarm is detected, it is possible to use the LBM (pag.301) messages for the detec-
tion of the interruption point of the VLAN.
1. Select the Equipment Menu > Maintenance > OAM-FM Domain command.
The OAM-FM Domain contextual area opens where the name and level of the OAM-FM Domain of the
equipment are displayed (see Fig.103).
OAM
domain
name
(1) OAM
domain
level (2)
Fig.103 notes
(1) If the Domain field is empty and available for the setting, this means that no OAM-FM Domain is
defined for the equipment.
In this condition even the parameter Level is available for the modification.
(2) Value:
• 0. Lowest priority.
• 7. Highest priority.
1. Select the Equipment Menu > Maintenance > OAM-FM Domain command.
The OAM-FM Domain contextual area opens (see Fig.103).
2. Into the Domain box, type the OAM-FM Domain name of the equipment (alphanumeric string with min-
imum 1 and maximum 45 characters).
3. Move the cursor Level over a number between 0 and 7 according to the priority level you wish to assign
to the OAM-FM Domain (0: lowest priority, 7: highest priority).
4. Press Create.
The equipment is associated to the set OAM-FM Domain.
In the options list, the command the OAM-FM MA/MEP (see pag.305) command is displayed below
the OAM-FM Domain command.
An OAM-FM Domain cannot be removed if at least one MA (pag.297) is present (see Fig.104).
1. Select the Equipment Menu > Maintenance > OAM-FM Domain command.
The OAM-FM Domain contextual area opens (see Fig.103).
The description of OAM-FM Ethernet functionality implemented in the equipment managed by WEB LCT
is at pag.296.
The OAM-FM MA/MEP command manages the maintenance point of OAM-FM Domain, which the equip-
ment belongs to, and allows monitoring the path of a service instance (VLAN) by using the Continuity Check
(CCM), LoopBack (LBM) and Link Trace (LTM) messages.
In details it is possible:
• To verify the status of the VLANs as regards the OAM-FM Ethernet functionality (pag.305)
• To associate a MA to a VLAN (pag.308)
• To associate a MEP to a VLAN (pag.308)
• To remove a MA/MEP from a VLAN (pag.309)
• To enable/disable the transmission of CCM messages for a MEP (pag.310)
• To verify the table of remote MEPs (RMep table) (pag.310)
• To insert a remote MEP in the RMep table (pag.311)
• To enable a remote MEP of the RMep table (pag.312)
• To disable a remote MEP from the RMep table (pag.312)
• To remove a remote MEP from the RMep table (pag.312)
• To send one or more LoopBack (LBM) messages to a remote MIP/MEP (pag.313)
• To trace the path, through the LTM messages, between the local MEP and a remote MEP of the
same VLAN (pag.314)
The OAM-FM MA/MEP command is available only if an OAM-FM Domain has been defined for the
equipment (see Fig.103).
The definition of a MIP takes place after the definition of the MA.
In fact, the definition of a MA in a VLAN, which a MEP is not defined for, corresponds to the automatic def-
inition of a MIP for every Switch port which the specific VLAN is enabled for.
To verify the status of the VLANs as regards the OAM-FM Ethernet functionality
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The OAM-FM MA/MEP contextual area opens, pointing out the status of the VLANs in relation to the
OAM-FM Ethernet functionality (see Fig.104).
List Not
of the selected
VLANs VLAN
(1)
Selected
VLAN
(2)
(3)
Fig.104 notes
(1) Every VLAN is represented by a rectangle whose characteristics are described here below.
(f)
(f)
(g)
(f)
a. VLAN identifier.
b. VLAN name.
• Blue ( ). The port is enabled to the transit of the packets with VLan ID equal to that
of the specific VLAN (port in status Tagged or Unmodif - see note d.).
• Light blue ( ). The port is not enabled to the transit of the packets with VLan ID
equal to that of the specific VLAN.
If the equipment belongs to an ALCplus2 node and is connected to other node elements
by Ethernet nodal Bus, the external ports LAN 1 and LAN 2 will be always in this status
when not available for the OAM-FM Ethernet functionality.
d. Status of the port as regards the transit of packets with VLan ID equal to that of the VLAN:
• ----, the port is not enabled to the transit of the packets with VLan ID equal to that of
the virtual Lan.
• Tagged, the port is enabled to the transit of the packets with VLan ID equal to that of the
virtual Lan. To the packets without Tag, in output from this port, is automatically added
the Tag composed by the information:
• Of priority; the value is defined in the box Priority of the origin port of the
packet itself.
• Of Vlan ID which corresponds to the default Vlan ID (Default Vid box) of the
origin port of the packet.
• Unmodif, the port is enabled to the transit of the packets with VLan ID equal to that of
the virtual Lan. The tag 802.1Q (priority and VLAN identifier) are not removed or added
to the packets in output from the port.
e. This field, meaningful only for the Ethernet ports where a MEP is mapped (ports represented by
the green box - see note c.), points out the direction where the CCM (pag.300)messages are
forwarded:
• Direction UP ( ). The CCM messages are sent as they were in input from the considered
port to the other Switch ports involved by the considered VLAN.
• Direction DOWN ( ). The CCM messages are sent in output from the selected port.
This field is empty for the ports which a MEP is not associated to (blue and light blue ports).
f. This area points out if a MA/MEP is associated to the VLAN. In detail, if word present is:
• MA... A MA (pag.297) is associated to the VLAN (VLAN which the control of the service
instance is active for - intermediate maintenance point).
• MA... + MEP... A MA and a MEP (pag.297) are associated to the VLAN (VLAN which the
control of the service instance is active for - end maintenance point).
• Unbound. No MA/MEP is associated to the VLAN (VLAN which the control of the service
instance is not active for).
g. Name of the MA associated to the VLAN.
j. Wording:
• Lbm. Select this to display the window for the management of LoopBack (Lbm - pag.301)
messages.
• Ltm. Select this to display the window for the management of Link Trace (Ltm - pag.302)
messages.
• Rmep. Select this to display the table of Remote MEPs (pag.302) (RMep table).
k. The led color points out the status of the remote MEP present in the RMep table of the specific
local MEP.
(3) Push-button:
• Bind MA. Creates a MA.
• Bind MEP. Creates a MEP.
• Unbind. Removes the MA and/or the MEP associated to the VLAN.
The availability of the push-buttons depends on the status of the selected VLAN.
If a MA or a MEP is associated to the VLAN, only the Unbind push-button will be available. On the
other hand, if no MA or MEP is associated to the VLAN, the Bind MA and Bind MEP push-buttons
will be available.
To associate a MA to a VLAN
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
2. Select the VLAN which you wish to associate the MA (pag.297) to.
3. Press Bind MA.
The contextual area OAM-FM MA/MEP displays the area MA Binding - VLAN <VLAN identifier> (<VLAN
name>).
4. Set, in the box MA Name, the name you wish to assign to the Maintenance Association (alphanumeric
string of minimum 1 and maximum 20 characters).
The system suggests, in the box, the name of the VLAN to which you are assigning the MA. This name
can be changed at one’s wish.
ALCplus2 equipment manages a single MEP per MA/VLAN and the maximum number of MEP
is 32.
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
2. Select the VLAN which you wish to associate the MEP (pag.297) to.
A MEP can be associated to a VLAN which a MA has not been associated to yet or to a VLAN which a
MA is already associated to. In this last case, the port of the Ethernet Switch which the MEP will be
4. Set, in the box MEP ID, the identifying number you wish to assign to MEP (value between 1 and 8191).
The system suggests, in the box, the identifying number of the VLAN which you are assigning the MEP
to. This value can be changed at one’s wish.
The identifying number of MEP must be univocal in the network for every specific VLAN.
5. Set, in the box MA Name, the name you wish to assign to the MA (pag.297) which MEP belongs to (al-
phanumeric string of minimum 1 and maximum 20 characters).
The system suggests, in the box, the name of the VLAN which you are assigning the MEP to. This name
can be changed at one’s wish.
If a MA has been already assigned to the VLAN (see pag.308), the parameter will be already set and
cannot be changed.
6. Set, in the box CCM Interval, the time interval used for the transmission of the continuity check mes-
sages (CCM - pag.300):
• 1 s. 1 second.
• 10 s. 10 seconds (default value).
• 1 min. 1 minute.
• 10 min. 10 minutes.
Remember that, for a correct operation of the continuity check, the set CCM interval must be the
same for the MEPs of the same VLAN.
7. Select, in the area CCM Mapping & Direction, the Ethernet port where you wish to map the MEP and
the direction where you wish to send the CCM messages.
The format used to represent the port is the same described in Fig.104.
When a port is selected, the box representing the port changes from blue to green and the transmission
direction of the messages is displayed:
• Direction UP ( ). CCM messages are sent, as they were in input from the considered port, to
the other Switch ports involved by the considered VLAN.
• Direction DOWN ( ). CCM messages are sent in output from the selected port.
In order to change the transmission direction of the messages, select the arrow. The arrow changes
direction each time is selected.
The ports of the Ethernet Switch not enabled to the transit of the packets with VLan ID equal to that
of the specific VLAN cannot be selected (disabled port - example ).
If the equipment belongs to an ALCplus2 node and is connected to other elements of the node through
Ethernet nodal Bus, the external ports LAN 1 and LAN 2, even if enabled to the transit of the packets,
cannot be selected because not available for the OAM-FM Ethernet functionality.
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
2. Select the VLAN to which you wish to remove the MA (pag.297)/MEP (pag.297).
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
2. Select the VLAN to which is associated the local MEP whose relevant list of Remote MEPs (pag.299) you
wish to display.
(2)
Selected
remote
List of the
MEP (3)
remote
MEPs (1)
Not
selected
remote
MEP
(4)
Fig.105 notes
(2) When you select the heading of the first column or of the column MAC Address, the rows of the table
are sorted in increasing alphanumerical order with respect to the considered column and the arrow
is displayed.
At the next selection, the rows are sorted in decreasing order (the arrow is displayed) and so on.
(3) Button:
• Add MEP. It adds a Remote MEP in the table.
• Cross Check. It enables a Remote MEP.
• Remove. It removes a Remote MEP from the table.
• Refresh. It updates the information present in the table.
• Cancel. It returns to the contextual area OAM-FM MA/MEP (see Fig.104).
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
2. Select the VLAN to which is associated the local MEP whose relevant list of Remote MEPs (pag.299) you
wish to display.
5. Set, in the box MEP ID, the identifying number you wish to assign to the remote MEP (value between
1 and 8191).
The identifying number of a MEP must be univocal in the network for each specific VLAN.
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
2. Select the VLAN to which is associated the local MEP whose relevant list of Remote MEPs (pag.299) you
wish to display.
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
2. Select the VLAN to which is associated the local MEP whose relevant list of Remote MEPs (pag.299) you
wish to display.
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
2. Select the VLAN to which is associated the local MEP whose relevant list of Remote MEPs (pag.299) you
wish to display.
4. Select ( ) the remote MEPs in status Failed or Start (see Fig.101) you wish to remove.
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
2. Select the VLAN to which is associated the MEP from which you wish to sent the LBM (pag.301) mes-
sage.
4. Set the maintenance point, which you wish to send the LBM message, in one of the following modes:
• Select the option Use found MEP.
Select, in the list Found MEP(s), the remote MEP which you wish to send the LBM message to.
• Select the option Use MAC address.
Set, in the box MAC Address, the physical address of the equipment where there is the remote
MEP or the MIP which you wish to send the LoopBack message to.
5. Set, in the box Messages to send, the number of LoopBack messages you wish to send (value between1
and 5).
LBM
messages
to send
LBM messages
sent
RMep
table
(1) LBM messages
received from
remote MIP/
MEP as response
to the sent LBM
(2) messages (3)
Test
status (4)
(5)
Fig.106 notes
(1) Each row represents a remote MEP. For each remote MEP is displayed in the column:
• ID. Identifier of the remote MEP.
(2) In these fields it is possible to enter the physical address of the equipment containing the remote
MEP which you wish to send the LoopBack message to.
The fields are available only when the option Use MAC address is selected.
(3) Parameter:
• Valid. Number of received valid packets.
• Out Of Order. Number of packets received out of sequence.
• Bad Msdu. Number of received packets with unknown format.
(5) Button:
• Refresh. It updates the information.
• Run Test. It starts the transmission of LBM messages.
• Cancel. It returns to the contextual area OAM-FM MA/MEP (see Fig.104).
To trace the path, through the LTM messages, between local MEP and remote MEP of
the same VLAN
1. Select the Equipment Menu > Maintenance > OAM-FM MA/MEP command.
The contextual area OAM-FM MA/MEP opens (see Fig.104).
2. Select the VLAN to which is associated the MEP from which you wish to sent the LTM (pag.302) mes-
sages to trace the path between the local MEP and a remote MEP of the same VLAN.
4. Set the remote MEP, which you wish to send the LTM messages to, in one of the following modes:
• Select the option Use found MEP.
Select, in the RMep table, the remote MEP in status Conn. which you wish to send the
LTM messages to.
If you select a MEP in status Start or Failed, the operation is refused.
• Select the option Use MAC address.
Set, in the box MAC Address, the physical address of the equipment containing the remote MEP
which you wish to send the Link Trace messages to.
(2)
RMep
table (1)
Physical address
Maintenance and identifier of
points present set remote MEP
between local which the Link
MEP and set Trace refers to
remote MEP
(3)
(4)
Fig.107 notes
(1) Each row represents a remote MEP. For each remote MEP is displayed in the column:
• ID. Identifier of the remote MEP.
• MAC Address. MAC address of the equipment where the remote MEP is present.
• State. Status of remote MEP.
The description of the status of remote MEP is the same depicted in Fig.105.
The RMep table is available only when the option Use found MEP is selected.
(2) In these fields it is possible to enter the physical address of the equipment containing the remote
MEP which you wish to send the Link Trace message to.
The fields are available only when the option Use MAC address is selected.
(3) Table with the identifiers of the RMeps which has replied to the LTM message. Column:
• [RMep] MAC. Type of maintenance point, identifier (only for MEPs) and physical address of
the equipment where the maintenance point is present. In detail:
• [*] <physical address>. Intermediate maintenance point (MIP) and MAC address of
the equipment where MIP is present.
• [<identifier>] <physical address>. End maintenance point (MEP), relevant identifier
and MAC address of the equipment containing the MEP.
• Hops. Position of the specific maintenance point with respect to the local MEP:
• 1. First maintenance point after the local MEP.
• 2. Second maintenance point after the local MEP.
• 3. Third maintenance point after the local MEP and so on.
(4) Button:
• Refresh. It updates the information.
• Run Test. It start sending the LTM messages.
• Cancel. It returns to the contextual area OAM-FM MA/MEP (see Fig.104).
Curr. Profile Monitor, Read Only, Read and Write, Station Operator, System
Command available only for equipment provided with radio (see option Radio A - Fig.44).
The S/N Meas command displays the measure of the signal/noise ratio (S/N), which allows evaluating the
quality of the radio communication channel.
1. Select the Equipment Menu > Maintenance > S/N Meas command.
The S/N Meas. contextual area opens.
The S/N parameter points out the value of the S/N measure (see Fig.108).
Value of the
S/N measure
(1)
Fig.108 notes
(1) The measure is always in progress and the value is updated at regular intervals.
The period between an update and the next one is displayed by the clock present in the Events List
area (pag.35) of the WEB LCT page. If you wish to update the value immediately, press Refresh.
For the equipment in 1+0 configuration is present the Branch 1A area.
For the equipment in 1+1 configuration are present the Branch 1A (branch 1 S/N measure) and
Branch 2A (branch 2 S/N measure) areas.
Command available only for equipment provided with radio (see option Radio A - Fig.44).
The Fade Margin command manages the calculation of the link margin (Fade Margin).
In details it is possible:
• To execute the calculation of the link margin and check/delete the results (pag.317).
• To verify the values of the power parameters stored into the equipment and used for the calcu-
lation of the Fade Margin (pag.319).
To execute the calculation of the link margin and check/delete the results (Fade Mar-
gin)
1. Select the Equipment Menu > Maintenance > Fade Margin command.
The Fade Margin contextual area opens (see Fig.109).
2. Type the expected value of Fade Margin into the Fade M. box.
This value is normally present in the document related to the branch calculation (for example in LER -
Link Engineering Report).
3. A control on the typed value and the Ptx value, stored into the controller of the equipment, is executed.
If the difference between the two value is greater of the maximum capacity of the fader internal to the
equipment, the message Max available attenuation … dB. An external attenuator is required. Continue
anyway? is displayed.
In this case, it is necessary to use an external attenuator and type, in the Ext. Att. box, the value of
attenuation externally provided, otherwise the calculation will be executed on the basis of the attenu-
ation made available by the equipment.
4. Press Start.
The calculation of the link margin is started.
The label of the Start button changes to Abort, whose choice stops the operation.
The Current Ptx area indicates, step by step, the lowering of the transmission level.
The Status box displays the progress of the operation as messages.
For the 1+1 systems, the calculation is executed using the transmitter active at the moment of the start
of the measure and relevant to both the remote receivers (see pag.320).
At the end of the check, the message Step <value> of <value> completed. Continue? is displayed on
each single branch. Press:
• No, if you wish to stop the procedure.
• Yes, if you wish to continue.
The display of the message Procedure Completed points out that the operation has been executed suc-
cessfully.
5. Press View Log File to display the power levels and the calculations executed by the system during
the calculation of the link margin.
The WEB FadeMarginViewLog page opens.
If you wish:
• To save the result, it is necessary to select and copy them into a text editor.
• To delete the result, press Reset Log File and confirm.
If the results of the Fade Margin are not deleted, at the next activation of the calculation of the
link margin (selection of the Start push-button) the data will be added to those already present.
Attenuation IP address
value, to be (SNMP agent)
inserted of the remote
before the hop equipment
calculation,
if you use an
external
attenuator
At the end of
the operation,
this area
displays the
results of
the hop
calculation (1)
(1) Column:
• Current Step. Transmitter and the receiver (radio link) which the results of the operation are
referred to.
• Real F.M. (dB). Fade Margin value, recalculated considering the really measured character-
istics of the equipment.
• Real Fade Margin Ver. Fade Margin value verified by the procedure (it is the result of the
procedure).
Message:
• Local equipment is not probably logged or Check local login
The user is not connected to the local equipment with profile System or Station Operator.
Execute the login (pag.30).
• Check remote login
The user is not connected to the local equipment with profile System or Station Operator.
Execute the login (pag.30).
• Local equipment has one or more alarms. The procedure can’t go on
The local equipment has at least one alarm active that does not allow the execution of the Fade
Margin.
Verify the active alarms (see pag.35) and operate on the equipment to clear these alarms.
• Remote equipment has one or more alarms. The procedure can’t go on
The local equipment has at least one alarm active that does not allow the execution of the Fade
Margin.
Verify the active alarms (see pag.35) and operate on the equipment to clear these alarms.
• Remote equipment is unreacheable...
The remote equipment is unreachable.
Restore the connection or wait for the restore of the connection.
• Fade Margin Procedure active on this equipment
The calculation of the link margin is already in progress.
• Adaptive modulation is active on local equipment. Turn it off and restart procedure
In the local terminal the adaptive modulation is active.
Disable the adaptive modulation (see pag.167).
• Remote Link Not Found!
In the remote equipment list there is not an equipment configured as Remote Link (equipment
type).
Add the remote equipment to the list (see pag.59).
To verify the values of the power parameters stored into the equipment and used for
the calculation of the Fade Margin
1. Select the Equipment Menu > Maintenance > Fade Margin command.
The Fade Margin contextual area opens (see Fig.109).
If the Fade Margin command is not available, this means that the calculation of the link margin is not
enabled for the equipment.
Some functionalities of the equipment are available after the enabling. To verify the functionalities en-
abled select the Features Management command (pag.146).
With calculation of the link margin, we mean the calculation of the difference between the level normally
received by the equipment and the level received on the activation of the Rx Quality Low Alarm.
The operation is automatically executed by the program using the parameters set by the user (expected
value of Fade Margin and possible external fading) and the power parameters (Ptx, rated Ptx, etc.) stored
in the equipment during the test of the equipment itself.
The calculation is executed on the radio link composed by the equipment which the Fade Margin contextual
area is referred to (local equipment) and by the equipment located on the other end of the link (remote
equipment).
When the calculation is activated, the Ptx level of the local equipment is automatically faded by 1dB at a
time. For each single fading, the Ptx value and the possible alarms are stored to a file. The Ptx level is
faded step by step until the activation of the Rx Quality Low Alarm on the remote terminal.
Before activating the calculation, the following operations are automatically executed (he operations are
executed only if the parameters are not in the indicated condition):
• In the local terminal the operation of the device for the automatic control of the transmitted
power (ATPC) is forced to manual.
• In both the terminals, the value of 1800 seconds is set as timeout for the manual operations.
At the end of the calculation, the following operations are automatically executed:
• The level of power transmitted by the local equipment is reported to the initial value (before the
activation of the calculation).
• In the local terminal the ATPC device is reported to the initial operating modality (before the
activation of the calculation).
The restore of the initial values of the above mentioned parameters is automatically executed even after
an interruption of the procedure.
* Read and Write user profile can set only the parameters relevant to the maintenance (MAN. OP).
Number of errors
detected from
the start of the
measure
Status and
Dynamically updated transitions
BER value during of the
the measure “...PRBS Fail
Alarm” (1)
Time (expressed in
day/hours/minute/
seconds) range after
the measure active
Activation
Type of pattern
status of the
used for the
measure (2)
measure (3)
Status of the
E1 signal used for
Tributary
the measure (4)
used for the
measure (5)
Fig.110 notes
(1) Box:
• Sync Loss Alarm. The colour of box points out the status of the alarm:
• Green. The alarm is not active.
• Red, orange, yellow or light blue. The alarm is active and has, respectively, severity
Critical, Major, Minor or Warning.
• Fail Alarms. Number of times that the Sync Loss Alarm activated from the start of the meas-
ure.
(5) The value is meaningful only if the Enable option in the E1 Signal area is active.
3. ONLY if the enabled the E1 signal, set the tributary in the 2 Mbit/s Selection box.
If a value is not available, the relevant tributary is used as T12 synchronism in output (see Fig.53).
Command available only for equipment provided with radio (see option Radio A - Fig.44).
1. Select the Equipment Menu > Maintenance > Radio Loop command.
The Radio Loop contextual area opens
The Loop Branch... parameter points out the current status of the loops (see Fig.111).
(2)
Loops
list (1)
Fig.111 notes
1. Select the Equipment Menu > Maintenance > Radio Loop command.
The Radio Loop contextual area opens (see Fig.111).
2. Select the option relevant to the loop that you want to activate.
It is not possible to preset more loops at the same time as the choice of a option automatically dis-
ables the preceding one.
3. Press Apply.
A message is displayed, warning that you are executing a forcing and displaying the current setting of
timeout.
1. Select the Equipment Menu > Maintenance > Radio Loop command.
The Radio Loop contextual area opens (see Fig.111).
2. Select the Loop OFF option present in the Loop Branch… area, relevant to the loop that you want to
deactivate.
3. Press Apply and confirm.
To execute the test (RF Loop) for the ALCplus2 equipment with ODU ASN
1. Operation available and meaningful only for equipment provided with ODU ASN. For more information
go to pag.326.Select the Equipment Menu > Maintenance > Radio Loop command.
The Radio Loop contextual area opens.
3. Press Apply.
A message is displayed, warning that you are executing a forcing and displaying the current setting of
timeout.
Test
status
(1)
(2)
Fig.112 notes
(1) The Test Loop bar, during the execution of the test, shows the progression of the operation.
The status of the test is pointed out by the box and the wording on the right side of the bar. In detail:
• White box - no wording. Test to execute.
• White box - wording Running. Test in progress.
• Green box - wording Passed. Test executed correctly (ODU operating).
• Red box - wording Fail. Test failed (ODU faulted).
• Red box - wording Interrupted. Test interrupted by the system.
Possible cause: the set timeout of the MAN OP is lower than the time for the execution of the
test. It is suggested to set the timeout to a value greater than that of execution of the test.
(2) For the equipment in configuration 1+0, it is present the Loop Branch 1 area. For the equipment in
configuration 1+1, there are present the Loop Branch 1 (loops branch 1) and Loop Branch 2 (loops
branch 2) areas.
In the 1+0 systems, the activation of the radio loop affects the traffic.
In the 1+1 systems, the activation of the radio loop on the active branch affects the traffic. The activation
of the radio loop on the stand-by branch does not affects the traffic. However, in this case, before executing
the loop, the receiver must be forced to the active branch (see pag.328).
Anyway, before activating a loop, it is suggested to verify that the timeout of the manual operations is set
(see pag.134). If the timeout is not active, the loop will be active until its deactivation by the user, the
switch-off/switch-on of the equipment or the equipment reset.
Test (RF Loop) for the ALCplus2 equipment with ODU ASN (more info)
The ALCplus2 equipment with ODU ASN of old generation was not provided with the RF loop, because not
designed to execute a loop in accordance with the specifications of emission of the spurious signals.
The test is a manual operation (MAN OP), so its execution is subjected to the timeout of the manual oper-
ations (see Fig.37).
If the timeout:
• Is enabled, at the end of the test the condition of Loop RF is preserved until the expiry of the
duration of the MAN OP unless it is removed immediately at the end of the test, as described in
the specific procedure.
• Is not enabled, at the end of the test it is necessary to remove the condition of Loop RF, as de-
scribed in the specific procedure.
If the test is interrupted by the system (see Fig.112), a possible reason could be that the set timeout was
lower than the execution time of the test. It is suggested to set the timeout to a value greater than that
of execution of the test.
In case of redundant systems, the activation of the test on the stand-by branch involves the degradation
or the loss of the connection of the working branch, because even on this one the same modulation is
(mandatory) set.
In detail, with:
• ACM enabled: reduction of the traffic to the test profile.
• ACM disable: loss of traffic.
In case of systems configured with constant peak (see Fig.46), it is ensured that the rated power of the
connection is not exceeded during the execution of the test.
* Read and Write user profile can set only the parameters relevant to the maintenance (MAN. OP).
Command available only for equipment provided with the radio in protected configuration (see option
Radio A - Fig.44).
• To verify the status and the configuration parameters of the radio switches (pag.328)
• To modify the management of the switching at reception (Rx Forced Switch) (pag.329)
• To modify the management of the switching at transmission (Tx Forced Switch) (pag.329)
• To modify the preferential branch for the service at transmission (Tx Preferential) (pag.330)
• To modify the Wait Time parameter (pag.330)
• To force the switch on the preferential branch without waiting for the Wait Time expiration
(pag.330)
To verify the status and the configuration parameters of the radio switches
1. Select the Equipment Menu > Maintenance > Radio Switch A command.
The Radio Switch A contextual area opens displaying the status and the radio parameters of the radio
switch (see Fig.113).
Wait Time
The choice of this period (4)
push-button allows to
force the switch on the
preferential branch
without await the expire
of the Wait Time period
(3) Tx Preferential and Tx Forced Switch parameters are available only for the equipment in isofrequen-
tial configuration 1+1. For the heterofrequential configuration 1+1, the parameters are not availa-
ble because the two branches (1 and 2) transmit at the same time because the selection of the
signal is executed at reception.
(4) Time period can be defined (Wait Time) during which the service is kept on the non-preferential
branch before being restored to the preferential branch, in such a way to avoid the continue switch
between the two branches in case of fleeting alarms.
1. Select the Equipment Menu > Maintenance > Radio Switch A command.
The Radio Switch A contextual area opens.
The Rx Forced Switch parameter points out the management of the switching in reception (see
Fig.113).
3. Press Apply.
Only if you are forcing the switching (selection of the Branch… option) a message is displayed warning
that you are executing a forcing and displaying the current setting of timeout.
1. Select the Equipment Menu > Maintenance > Radio Switch A command.
The Radio Switch A contextual area opens.
The Tx Forced Switch parameter points out the management of the switching in transmission (see
Fig.113).
3. Press Apply.
Only if you are forcing the switching (selection of the Branch… option) a message is displayed warning
that you are executing a forcing and displaying the current setting of timeout.
To modify the preferential branch for the service at transmission (Tx Preferential)
1. Select the Equipment Menu > Maintenance > Radio Switch A command.
The Radio Switch A contextual area opens.
The Tx Preferential parameter points out the management of the preferential branch in transmission
(see Fig.113).
1. Select the Equipment Menu > Maintenance > Radio Switch A command.
The Radio Switch A contextual area opens.
The Wait Time parameter points out the value of Wait Time (see Fig.113).
2. To change the parameter, type the time interval wished: value comprised between 0 and 150 sec.
To force the switch on the preferential branch without waiting for the Wait Time ex-
piration
1. Select the Equipment Menu > Maintenance > Radio Switch A command.
The Radio Switch A contextual area opens (see Fig.113).
2. Press Reset.
The radio switches (reception and transmission), for the ALCplus2 equipment in protected configuration,
generally operate in automatic mode: the equipment executes a switch when specific alarms raises on the
operating radio branch.
This function foresees the user can force a radio branch to operate independently from alarms which can
be active (see pag.328/pag.329).
This function must not be used for the normal operation of the radio switch in reception and/or transmis-
sion. It is a maintenance operation and remains active until when the user deactivates it or the timeout
period of the manual operation expires (if set).
This function provides the choice of a branch to be used in a preferential way in transmission when there
are not alarms that cause the switching (see pag.330).
In fact, when the switching is automatically managed by the controller, it executes the switching when on
the branch on service there are present some specific alarms.
When the alarms have been reset, the controller does not execute again the switching. While, if it has been
set a preferential branch when the operator resets the alarms, if the branch on service is not the prefer-
ential one, the controller executes the switching and it uses for the service the branch set by the operator
as the preferential one (naturally if the branch does not have any alarms).
Besides a time period can be defined (Wait Time) during which the service is kept on the non-preferential
branch before being restored to the preferential branch, in such a way to avoid the continue switch between
the two branches in case of fleeting alarms.
For instance, suppose that an alarm occurs causing the switch of the service from the preferential branch
to the other branch. When the alarm clears, the preferential branch is not immediately restored to service
but postponed by n seconds (Wait Time period), during which the controller verifies that the same alarm
has not occurred again on the preferential branch. At the end of the Wait Time period, if the alarm has not
occurred again, the service is restored to the preferential branch. Otherwise, the switch is delayed by other
n seconds, during which the controller verifies that the same alarm has not occurred again and so on.
In any moment the user can force the switch on the preferential branch without waiting for the Wait Time
period expiration (see pag.330).
This menu is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard Exp.
Nod. 2xSTM-1 16E1 expansion when the protection of the STM-1 stream and/or protection of the nodal
configuration is active (see Fig.44).
At the choice of Switch option, the program displays the following commands:
• STM-1 (pag.333). It manages the switch of the protected STM-1 stream.
• Nodal Bus (pag.337). It manages the switch of the protected Nodal Bus.
* Read and Write user profile can set only the parameters relevant to the maintenance (MAN. OP).
This command is available only for ALCplus2 equipment with IduBoard Exp. 2xSTM-1 32E1 or IduBoard
Exp. Nod. 2xSTM-1 16E1 expansion when the protection of the STM-1 stream is active (MSP mode - see
Fig.44).
The STM-1 command manages the switch of the protected STM-1 stream.
In detail, it is possible:
• To verify the status and the configuration parameters of the STM-1 switch (pag.333)
• To modify the management of the STM-1 switch (pag.334)
• To modify the logic of the STM-1 switch (pag.335)
• To set the primary STM-1 stream as preferential (pag.335)
• To modify the Wait Time parameter (pag.335)
• To force the switch on the preferential STM-1 stream without waiting for the Wait Time expira-
tion (pag.335)
To verify the status and the configuration parameters of the STM-1 switch
Main Secondary
stream: stream:
STM-1 1 STM-1 2
Operating
status of
the switch Management
(1) modality of
the switching
logic (3)
Management
mode of the
primary STM-1
stream as
preferential
(4) Management
modality of
Value of the the switch (2)
Wait Time
parameter (5)
(1) As displayed in the legend, the active STM-1 stream is pointed out by the green box while the stand-
by STM-1 stream by the yellow box.
(2) Option:
• Auto. The switch is automatically managed according to the presence of alarms (normal op-
eration of the switch).
• Lock Out. The equipment is forced to use the primary STM-1 stream.
• Forced. The equipment is forced to use the secondary STM-1 stream: the switch is never
executed, independently from the type of alarm that can raise.
• Manual. The equipment is forced to use the secondary STM-1 stream: the switch is executed
only in case of alarms of type Signal Fail or Signal Degrade.
(3) Option:
• Unidirectional. The switch logic (MSP protection) is managed at level of local equipment,
which commands the switch without notifying this situation to the remote equipment.
• Bidirectional. The switch logic is managed at link level: the local equipment agrees the switch
with the remote equipment.
(4) Option:
• Not revertive. The primary STM-1 stream is not preferential: after a switch (primary -> sec-
ondary) the secondary STM-1 stream remains active even when the alarms that caused the
switch clear.
• Revertive. The primary STM-1 stream is preferential: after a switch (primary -> secondary),
when the alarms clear, the primary stream is restored as active STM-1 stream.
(5) Wtr Time. Period (expressed in minutes) during which a non alarm condition must persist on the
main stream so that the service is restored on it.
3. Press Apply.
Only if you are forcing the switching (selection of the Lock Out, Forced or Manual option) a message is
displayed warning that you are executing a forcing and displaying the current setting of timeout.
To force the switch on preferential STM-1 stream without waiting for the Wait Time
expiration
The ALCplus2 equipment with expansion IduBoard Exp. 2xSTM-1 32E1 or IduBoard Exp. Nod. 2xSTM-1
16E can be configured by the user to operate with the STM-1 stream disabled, enabled or protected (see
pag.158).
When the user enables the protection of the STM-1 stream (MSP mode - Multiplex Section Protection) even
the management of the STM-1 switch is enabled.
The switch generally operates automatically: the equipment executes the switch when specific alarms raise
on the operating STM-1 stream.
When the STM-1 switch operates in automatic mode, the user can set one of the following switching logics:
• Unidirectional Logic. Only the local alarms are considered among the criteria which determine
the switch.
• Bidirectional Logic. The local equipment agrees the switch of the STM-1 stream with the remote
equipment: both the local and the remote alarms are considered among the criteria which de-
termine the switch.
This function foresees the possibility for the user to force the primary or secondary STM-1 stream to op-
erate, independently from the alarms which could be active (see pag.334).
This operation must not be used for the normal operation of the STM-1 switch. It is a maintenance oper-
ation and remains active until when the user disables it or the Timeout period of the manual operation
expires (if set).
This function foresees the choice of the primary STM-1 stream to use in preferential mode when there are
not alarms which determine the switch (see pag.335).
In fact, when the switch operates in automatic mode, the equipment executes the switch when specific
alarms raises on the STM-1 streams in service.
When the alarms clear, the controller does not execute the switch again.
If the primary STM-1 stream is set as preferential, when the switch is executed, if the STM-1 stream in
service is not the primary, the controller executes the switch and uses the primary STM-1 stream for the
service (naturally if the stream is not alarmed).
Moreover it is possible to define a time period (Wait Time) during which the service is kept on the not pref-
erential (secondary) STM-1 stream before this returns to the preferential (primary) STM-1 stream, in such
a way to avoid the continue switch between the two STM-1 streams in case of fluctuating alarms.
For example, suppose an alarm raises which determines the switch of the service from the primary STM-
1 stream to the secondary. When the alarm clears, the service is not immediately restored on the primary
(preferential) STM-1 stream, but this is postponed by n seconds (Wait Time period), during which the con-
troller verifies that the alarms has not raised again on the preferential STM-1 stream. At the end of the
Wait Time period, if the alarm has not raised again, the service is restored on the primary STM-1 stream.
On the contrary, the switch is postponed by other n seconds during which the system verifies the alarm
has not raised again and so on.
In any moment the operator can force the switch on preferential STM-1 stream without waiting for the Wait
Time period expiration (see pag.335).
* Read and Write user profile can set only the parameters relevant to the maintenance (MAN. OP).
This command is available only for ALCplus2 equipment with IduBoard Exp. Nod. 2xSTM-1 16E1 ex-
pansion when the protection of the Nodal Bus is active (see Fig.44).
The Nodal Bus command manages the switch of the protected Nodal Bus.
In detail, it is possible:
• To verify the status and the configuration parameters of the nodal switch (pag.337)
• To modify the management of the nodal switch (pag.338)
• To modify the Wait Time parameter (pag.338)
• To force the switch on the preferential NBUS connection without waiting for the Wait Time ex-
piration (pag.338)
To verify the status and the configuration parameters of the nodal switch
1. Select the Equipment Menu > Switch > Nodal Bus command.
The Nodal Bus contextual area opens, where the status and the configuration parameters of the nodal
switch is pointed out (see Fig.115).
Value of the
Wait Time
parameter (1)
Management
modality of
the switch (2)
(1) Wtr Time. Period (expressed in seconds) during which a non alarm condition must persist on the
preferential NBUS connection so that the service is restored on it.
(2) Option:
• Auto. The switch is automatically managed according to the presence of alarms (normal op-
eration of the switch).
• NBUS1. The equipment is forced to use the primary Nodal Bus.
• NBUS2. The equipment is forced to use the secondary Nodal Bus.
1. Select the Equipment Menu > Switch > Nodal Bus command.
The Nodal Bus contextual area opens.
The Forced Switch parameter points out the management mode of the nodal switch (see Fig.115).
2. To change the parameter, select the option:
• Auto. The switch is automatically managed according to the presence of alarms (normal opera-
tion of the switch).
• NBUS1. The equipment is forced to use the primary Nodal Bus.
• NBUS2. The equipment is forced to use the secondary Nodal Bus.
3. Press Apply.
Only if you are forcing the switching (selection of the NBUS1 or NBUS2 option) a message is displayed
warning that you are executing a forcing and displaying the current setting of timeout.
1. Select the Equipment Menu > Switch > Nodal Bus command.
The Nodal Bus contextual area opens.
The Wtr Time (s) parameter points out the value of Wait Time (see Fig.115).
2. To change the parameter, set the time interval wished: value comprised between 0 and 12 seconds.
To force the switch on the preferential NBUS connection without waiting for the Wait
Time expiration
1. Select the Equipment Menu > Switch > Nodal Bus command.
The Nodal Bus contextual area opens (see Fig.115).
2. Press Wtr Clear.
The primary Bus, after the clearing of the alarms that caused the switch, is immediately used for the
service. The Wtr Time period is considered elapsed.
The ALCplus2 equipment with expansion IduBoard Exp. Nod. 2xSTM-1 16E can be configured by the user
to operate with the Nodal Bus disabled, enabled or protected (see pag.155).
When the user enables the protection of the Nodal Bus even the management of the nodal switch is ena-
bled.
The switch generally operates automatically: the equipment executes the switch when specific alarms raise
on the operating Nodal Bus.
This function foresees the possibility for the user to force the primary or secondary Nodal Bus to operate,
independently from the alarms which could be active (see pag.338).
This operation must not be used for the normal operation of the nodal switch. It is a maintenance operation
and remains active until when the user disables it or the Timeout period of the manual operation expires
(if set).
When the user executes a single connection, which involves a protected NBUS channel, the matrix auto-
matically executes the protection connection creating, in fact, a protected connection.
In this case, the connection created by the user is the preferential connection (preferential NBUS connec-
tion) while the connection created by the matrix is the protection connection (protection NBUS connection).
When the switch operates in automatic modality, the equipment executes the switch when specific alarms
are present on the working NBUS connection.
When the alarms clear, the controller, if the working NBUS connection is not the preferential one, executes
the switch and uses the preferential NBUS connection to work (of course if alarms are not present on the
connection).
In this condition it is possible to define a time period (Wait Time) during which the service is kept on the
not preferential NBUS connection before this returns to the preferential NBUS connection, in such a way
to avoid the continue switch between the two connections in case of fluctuating alarms.
For example, suppose an alarm occurs causing the switch from the preferential NBUS connection to the
protection one. When the alarm clears, the service is not immediately switched to the preferential NBUS
connection, but postponed of n seconds (Wait Time period), during which the controller verifies that the
alarm on the preferential NBUS connection has not occurred again. At the end of the Wait Time period, if
the alarm has not occurred again, the switch takes place. Otherwise, the switch is postponed of other n
seconds, during which the system verifies that the alarm has not occurred again and so on.
In any moment the operator can force the switch on preferential Nodal Bus without waiting for the Wait
Time period expiration (see pag.338).
At the choice of User Input option, the program displays the following commands:
The Local User Input command manages the local user input configuration.
In detail, it is possible:
For more information on the enabling of the user input alarms go to pag.343.
1. Select the Equipment Menu > User Input > Local User Input command.
The Local User Input contextual area opens, where the status of the local user inputs is pointed out
(see Fig.116).
User input
User input name
status (1)
Rest
Status/ condition
seriousness of the user
of the alarm input (2)
created at
the activation
of the user
input (3)
Fig.116 notes
(1) The colour and the wording inside the box point out the status of the local user input:
(3) Option:
• Disable. The alarm is disabled.
• Status. The alarm is enabled; its severity is equivalent to a status signalling.
• Warning, Minor, Major, Critical. The alarm is enabled; its severity is respectively of level
Warning, Minor, Major, Critical.
1. Select the Equipment Menu > User Input > Local User Input command.
The Local User Input contextual area opens, where the name of the local user inputs is pointed out (see
Fig.116).
2. To change the name of a user input type, into the relevant text box, an alphanumeric string with min-
imum 1 and maximum 31 characters.
1. Select the Equipment Menu > User Input > Local User Input command.
The Local User Input contextual area opens, where the rest condition of the local user inputs is pointed
out (see Fig.116).
2. To change the rest condition of a user input set, into the Input Operation box, the option:
• Normally Open. The user input will be considered active (creation of the alarm event) when its
terminal is referred to ground.
• Normally Close. The user input will be considered active (creation of the alarm event) when its
terminal is open.
3. Press Apply and confirm.
To enable/disable the alarm and to define the severity level of a local user input
1. Select the Equipment Menu > User Input > Local User Input command.
The Local User Input contextual area opens, where the status/severity of the alarms of the local user
inputs is pointed out (see Fig.116).
2. To change the status/severity of a user input set, into the Severity box, the option:
• Disable, to disable the alarm created by the activation of the user input.
• Status, to:
• Enable the alarm created at the activation of the user input.
• Couple, with the input signal to the user input, a severity equivalent to a status signal.
• Warning, to:
• Enable the alarm created at the activation of the user input.
• Couple, with the input signal to the user input, a severity equivalent to an alarm with
Warning level.
• Minor, to:
• Enable the alarm created at the activation of the user input.
• Couple, with the input signal to the user input, a severity equivalent to an alarm with
Minor level.
Disabling an user input alarm means that, on the detection of the alarm, this is not recorded in the equip-
ment controller and, as consequence, is not communicated to a possible management program: as the
alarm has never occurred.
On the other hand, enabling an user input alarm means that, on the detection of the alarm, this is recorded
in the equipment controller and communicated to the management program which displays it in the current
alarms and in the alarm history.
The Remote User Input command manages the remote user input configuration.
In detail, it is possible:
It is not possible to modify the rest condition of the remote user input. The rest condition is set only
locally.
For more information about the enabling of the user input alarms go to pag.343.
1. Select the Equipment Menu > User Input > Remote User Input command.
The Remote User Input contextual area opens, where the status of the remote user inputs is pointed
out (see Fig.117).
User input
User input name
status (1)
Status/
seriousness
of the alarm
created at
the activation
of the user
input (2)
Fig.117 notes
(1) The colour and the wording inside the box display the status of the remote user input:
Colour Wording Status
Green Inactive User input alarm not activated
Green Active User input status signal activated
Light blue Active User input alarm activated and with Warning severity level
Yellow Active User input alarm activated and with Minor severity level
Orange Active User input alarm activated and with Major severity level
Red Active User input alarm activated and with Critical severity level
1. Select the Equipment Menu > User Input > Remote User Input command.
The Remote User Input contextual area opens, where the name of the remote user inputs is pointed
out (see Fig.117).
2. To change the name of a remote user input type, into the relevant text box, an alphanumeric string
with minimum 1 and maximum 31 characters.
To enable/disable the alarm and to define the severity level of a remote user input
1. Select the Equipment Menu > User Input > Remote User Input command.
The Remote User Input contextual area opens, where the status/severity of the alarms of the remote
user inputs is pointed out (see Fig.117).
2. To change the status/severity of a user input set, into the Severity box, the option:
• Disable, to disable the alarm created by the activation of the user input.
• Status, to:
• Enable the alarm created at the activation of the user input.
• Couple, with the input signal to the user input, a severity equivalent to a status signal.
• Warning, to:
• Enable the alarm created at the activation of the user input.
• Couple, with the input signal to the user input, a severity equivalent to an alarm with
Warning level.
• Minor, to:
• Enable the alarm created at the activation of the user input.
• Couple, with the input signal to the user input, a severity equivalent to an alarm with
Minor level.
• Major, to:
• Enable the alarm created at the activation of the user input.
• Couple, with the input signal to the user input, a severity equivalent to an alarm with
Major level.
• Critical, to:
• Enable the alarm created at the activation of the user input.
• Couple, with the input signal to the user input, a severity equivalent to an alarm with
Critical level.
User output
User output name
status (1)
Signal
coupled to
the user
output (2)
Functioning
mode of
the relay
contacts (3)
The choice of
The choice of this push-button
this push-button allows forcing the
allows changing activation of the
the configuration relay contacts
parameters of relevant to a
the selected user output
user output (if it is available)
Fig.118 notes
(1) The colour/wording inside the box display the status of the user output:
Colour Wording Status
Green Inactive User output not activated
Red Active User output activated (relay contacts activated)
(3) Option:
• Open. With absence of signal (alarm or user input or manual forcing), the relays contacts
are closed (rest condition), with presence of signal the contacts are open
• Close. With absence of signal (alarm or user input or manual forcing), the relays contacts
are open (rest condition), with presence of signal the contacts are closed.
2. To change the parameter type, into the text box, an alphanumeric string with minimum 1 and maxi-
mum 31 characters.
2. To change the parameter set, into the Active State box, the option:
• Open. With absence of signal (alarm or user input or manual forcing), the relays contacts are
closed (rest condition), with presence of signal the contacts are open
• Close. With absence of signal (alarm or user input or manual forcing), the relays contacts are
open (rest condition), with presence of signal the contacts are closed.
2. To change the parameter set, into the Linked to box, the Map option.
3. Press Mapping.
The Mapping window opens.
5. Press OK.
The user output has to be enabled for the forcing by operator (wording Forced by Operator into the
State field - UO status box green, wording Inactive - see Fig.118). If it is not enabled, it is necessary to
enable it (see pag.348).
The user output will remain activated until the removal of the forcing (see pag.348).
Tab.9 points out the list of the alarms relevant to the ALCplus2 equipment.
The alarms are not listed in alphabetical order but they are grouped according to the corresponding parts
of the equipment. In detail:
• Equipment
• User input
• Common
• Eth Lan
• LIM
• Node
• P.M. G.828
• P.M. G.829 B1
• P.M. G.829 B2-M1
• P.M. Rx Power
• P.M. Tx Power
• P.M. VC12 G.828
• P.M. ACM
• Plug-in module
• Radio
• RIM
• RT
• SETS
• SNTP
• STM-1
• Unit
• Vc4
• Vc12
For each alarm, the wording present in the Event List area of the WEB LCT page (see Fig.10) and the word-
ing present in the Alarm Severity Configuration contextual area (see Fig.38) are displayed.
Some alarms have some wordings in italic contained between the symbols < >. They, in the alarm dis-
played in the Event List area, represent a variable.
The symbol “-“means that the alarm is not meaningful for the Alarm Severity Configuration contextual ar-
ea.
(1)
Refer to pag.62
A
ACL
Add/remove a rule from the IP Access Control List .................................................................. 48
Enable/disable the use of the IP Access Control List ................................................................ 48
Verify the rules used by the IP Access Control List .................................................................. 47
Activate the collection of the statistic counters for an Ethernet port ...............................................149
Activation status of the autonegotiation between the roles of the line synchronism, verify/modify .....206
Adaptive modulation configuration parameters, verify .................................................................164
Alarm/status signals, save to file ..............................................................................................106
Alarms status of a VC-12, verify ...............................................................................................266
ATPC
Functioning status, verify/modify .........................................................................................285
Intervention threshold, verify/modify ...................................................................................287
Auto negotiation for the external port, restart the procedure ........................................................205
B
Behaviour of the external port towards the packets in output, verify/modify ...................................208
Behaviour of the internal port towards the packets in output, verify/modify ....................................231
Belonging of the equipment to a node, verify/modify ...................................................................159
Branches functional status, verify .............................................................................................. 28
C
Calculation of the link margin (Fade Margin), execute ..................................................................317
Characteristics of the equipment units (type, code, version and functional status), verify .................132
Communication ports, verify/modify .......................................................................................... 41
Communication stack
Modify .............................................................................................................................127
Verify ..............................................................................................................................127
Connection cost of the external port (STP/ELP), verify/modify ......................................................214
Connection cost of the internal port (STP), verify/modify .............................................................236
Control of Tag Vlan Id on the messages in input from the external port, verify/modify .....................208
Control of Tag Vlan Id on the messages in input from the internal port, verify/modify ......................231
Control status of the J0 Trace Identifier byte (STM-1), verify/modify .............................................250
Control status of the J1 Trace Identifier byte (VC-4), verify/modify ...............................................257
Control status of the J2 Trace Identifier byte (VC-12), verify/modify .............................................264
Current status of the laser (Lan3, Lan4 - optical), verify ..............................................................220
Current status of the laser (STM-1 - optical int.), verify ...............................................................252
D
Deactivate the collection of the statistic counters for an Ethernet port ...........................................149
Default Vid value of the external port, verify/modify ...................................................................207
Default Vid value of the internal port, verify/modify ....................................................................229
Delete one or more connections ...............................................................................................275
Disable an Auto-Loop ..............................................................................................................276
Display the connections of the equipment in graphic format .........................................................267
Display the enabling/disabling status of the collection of the statistic counters of the equipment Ethernet
E
E1 tributary
Activate/deactivate the loop ................................................................................................246
Activate/deactivate the use .................................................................................................245
Verify the status ................................................................................................................244
Verify/modify the label .......................................................................................................245
ELP for the external port, enable/disable ...................................................................................216
Emptying algorithm of the packets present in the output queue, verify/modify ...............................193
Enable manually the laser transmission (Lan3, Lan4 - optical) ......................................................222
Enable manually the laser transmission (STM-1 - optical int.) .......................................................254
Enable the closing of a channel on itself (Auto-Loop) ...................................................................275
Enable the new functionalities ..................................................................................................147
Enabling of Spanning Tree at level of ALCplus2 node, verify/modify ..............................................160
Enabling of the alarms
Enable/disable ..................................................................................................................137
Verify ..............................................................................................................................136
Enabling of the switch in transmission, verify/modify ..................................................................173
Enabling status of the auto negotiation and, if the auto negotiation is inactive, the operation modality and
the transmission speed used by the external port, verify/modify ...................................................204
Enabling status of the automatic learning of the MAC Addresses in the MAC Address Table for the external
port, verify/modify .................................................................................................................205
Enabling status of the automatic learning of the MAC Addresses in the MAC Address Table for the internal
port, verify/modify .................................................................................................................229
Enabling status of the external port, verify/modify ......................................................................201
Enabling status of the flow control of the external port, verify/modify ............................................204
Enabling status of the internal port, verify/modify .......................................................................228
Enabling status of the laser (Lan3, Lan4 - optical), verify/modify ..................................................221
Enabling status of the laser (STM-1 - optical int.), verify/modify ...................................................253
Enabling status of the LLF modality of the external port, verify/modify ..........................................218
Equipment configuration
Save to file .......................................................................................................................106
Verify ............................................................................................................................... 28
Equipment connection status, verify ........................................................................................... 28
Equipment firmware
Switch the functioning of the memory benches ......................................................................125
Update .............................................................................................................................124
Verify the version ..............................................................................................................123
Equipment functional status, verify ............................................................................................ 28
Equipment identifier
Modify .............................................................................................................................. 39
Verify ............................................................................................................................... 28
Equipment login/monitor status, verify ....................................................................................... 28
Equipment properties (type, MIB version, identifier, addresses, reference date/time), verify .............. 38
Equipment reference date/time, align to the PC date/time ............................................................ 40
Equipment software reset .............................................................................................39, 47, 128
Equipment type, verify ............................................................................................................. 28
Eth Type value in the S_Tag QinQ field, verify/modify .................................................................193
Ethernet Line Protection
Verify the status of the external ports ..................................................................................241
Execute a Tributary-Radio connection .......................................................................................274
Execute a Tributary-Tributary connection ...................................................................................274
Execute an E1 NBUS E1 connection (AlPlus/3 Element/Protected) ................................................277
Execute the login of the user .................................................................................................... 30
Execute the logout of the user .................................................................................................. 31
Execute the test "laser functioning status" (Lan3, Lan4 - optical) ..................................................223
F
Fade Margin results, delete ......................................................................................................317
Fade Margin results, verify ......................................................................................................317
Forwarding of the trap of the alarm
Enable/disable ..................................................................................................................137
Verify ..............................................................................................................................136
Functionalities enabled for the equipment, verify ........................................................................146
H
Hysteresis of the LLF modality, verify/modify .............................................................................194
I
Identifier of the equipment in the ALCplus2 node, verify/modify ...................................................160
Identifier of the equipment in the ALplus node, verify/modify .......................................................161
Input synchronism sources
Enable/disable the use .......................................................................................................178
Force the use ....................................................................................................................180
Set a source as preferential ................................................................................................180
Set the E1 tributary used as synchronism source for T2/T3 2 ..................................................181
Set the source type used as synchronism for STM-1/NODAL A (T0) or STM-1/NODAL B (T0) ........181
Verify the alarms status .....................................................................................................181
Verify the status ................................................................................................................176
Verify/modify the use priority ..............................................................................................180
Interface type of the external port (Lan3, Lan 4), verify/modify ....................................................206
Intervention threshold of the B2 Excessive BER alarm (STM-1), verify/modify ................................252
Intervention threshold of the B2 Signal Degrade alarm (STM-1), verify/modify ...............................251
Intervention threshold of the B3 Excessive BER alarm (VC-4), verify/modify ..................................259
Intervention threshold of the B3 Signal Degrade alarm (VC-4), verify/modify .................................258
Intervention threshold of the VC12 Excessive BER alarm (VC-12), verify/modify .............................263
Intervention threshold of the VC12 Signal Degrade alarm (VC-12), verify/modify ............................262
Inversion status of the Tx and Rx lines of the external port, verify/modify ......................................203
IP address of remote users, set ................................................................................................144
IP address of the agent SNMP of the equipment, modify ............................................................... 39
L
Lan Statistics
Reset the counters’ results ......................................................................................... 292, 294
Verify the counters ............................................................................................................290
Verify the summary of the main counters of the Ethernet ports ................................................293
Link identification number, verify/modify ...................................................................................168
Local user input
Enable/disable the alarm and to define the severity ...............................................................342
Name, verify/modify ..........................................................................................................342
Rest condition, verify/modify ..............................................................................................342
Status, verify ....................................................................................................................341
Logout of a user, force ............................................................................................................140
Loop on line side of the external port, activate/deactivate ............................................................219
Lower threshold of the modulation, verify/ modify ......................................................................168
N
Network password and timeout, modify .....................................................................................143
Nodal switch
Force the switch on the preferential NBUS connection without waiting for the Wait Time expiration ....
338
Modify the switch management ...........................................................................................338
Modify the Wait Time parameter ..........................................................................................338
Verify the configuration parameters .....................................................................................337
Verify the switch status ......................................................................................................337
Number of E1 streams assigned to an ACM profile (low priority streams), verify/modify ...................168
Number of elements of the ALCplus2 node interconnected with Ethernet nodal Bus, verify/modify .....159
Number of elements of the ALCplus2 node interconnected with TDM nodal Bus, verify/modify ...........161
Number of equipment of the ALplus node, verify/modify ..............................................................162
Number of high priority E1 streams, verify/modify ......................................................................168
O
OAM
VLAN, verify the status as regards the OAM Ethernet functionality ............................................305
OAM-FM
Associate a MA to a VLAN ...................................................................................................308
Associate a MEP to a VLAN ..................................................................................................308
Characteristics of the OAM-FM Domain of an equipment, verify ................................................304
Disable a remote MEP of the RMep table ...............................................................................312
Enable a remote MEP of the RMep table ................................................................................312
Enable/disable the CCM messages for a MEP .........................................................................310
Insert a remote MEP in RMep table ......................................................................................311
OAM-FM Domain of an equipment, define .............................................................................304
OAM-FM Domain of an equipment, remove ...........................................................................304
Remove a MA/MEP from a VLAN ..........................................................................................309
Remove a remote MEP from RMep table ...............................................................................312
Send one or more Loop Back messages (LBM) to a remote MIP/MEP ........................................313
Trace the path, through the LTM messages, between local MEP and remote MEP of the same VLAN ...
314
Verify the table of the remote MEPs (RMep table) ..................................................................310
Operating modality of the line synchronism (role), verify/modify ..................................................205
Operating status of the adaptive modulation
Modify .............................................................................................................................167
Verify ..............................................................................................................................164
Operation of the RT power supply, verify/modify ........................................................................284
Operation of the transmitter, verify/modify ................................................................................284
Operations executed by the users, save to file ............................................................................106
Operations list stored into the equipment controller, delete ..........................................................109
Output queue of a packet according to its Tag 802.1p, verify/assign .............................................194
Q
Queue to which the packet must be assigned to depending on its PTOS/DSCP field (level 3),
verify/modify .........................................................................................................................195
R
Radio branch label, verify/modify .............................................................................................174
Radio configuration, verify/modify ............................................................................................155
Radio loop
Activate ...........................................................................................................................325
Deactivate ........................................................................................................................325
Verify the status ................................................................................................................324
Radio parameters, verify .......................................................................................................... 28
Radio switch
Force the switch on the preferential branch without waiting for the Wait Time expiration .............330
S
S/N measure, verify ...............................................................................................................316
Save the equipment configuration, the alarm/status signals and the operations executed by the users to
file .......................................................................................................................................106
Save the whole equipment configuration (configuration backup) ...................................................130
SD memory card
Automatic equipment restart from SD memory in case of replacement of IDU unit .....................117
Automatic update of the equipment sw from SD memory ........................................................118
Copy the equipment sw from SD memory to controller (Sw Dwl SD) .........................................120
Delete the configuration data and/or the equipment sw from SD memory .................................119
Disable the automatic equipment restart from SD memory (data + sw) ....................................120
Disable the deletion of the equipment sw present in the standby memory bench after an automatic sw
update from SD memory ....................................................................................................120
Force the restore, from SD memory to controller, of the configuration data and of the equipment sw .
120
Status and configuration, verify ................................................................................... 115, 119
Sequence of characters transmitted and/or received as J0 Trace Identifier (STM-1), verify/modify ....250
Sequence of characters transmitted and/or received as J1 Trace Identifier (VC-4), verify/modify ......258
Sequence of characters transmitted and/or received as J2 Trace Identifier (VC-12), verify/modify .....265
Severity level of the alarm
Modify .............................................................................................................................138
Verify ..............................................................................................................................136
Signal Label value (VC-12), verify ............................................................................................265
T
T and N parameters, verify/modify ...........................................................................................174
T0 synchronisation
Force the status ................................................................................................................182
Verify the alarms status .....................................................................................................182
T12 synchronisation
Manage the output of synchronism (T12) on tributary A/B and define the interface (output/input) of
tributary A/B ....................................................................................................................182
Table resuming the minimum/maximum power in transmission/reception for every ACM profile,
display ..................................................................................................................................287
Table summarizing the radio transport, display ...........................................................................166
U
Upper threshold of the modulation, verify/modify .......................................................................168
User list
Add a user ........................................................................................................................142
Delete a user ....................................................................................................................143
Modify a user ....................................................................................................................142
Verify ..............................................................................................................................141
User output
Enable the forced activation of the relays contact from operator ..............................................348
Force the activation ...........................................................................................................348
Functioning mode of the relay contacts, verify/modify ............................................................347
Name, verify/modify ..........................................................................................................347
Remove the forcing ...........................................................................................................348
Signal coupled, verify/modify ..............................................................................................347
Status, verify ....................................................................................................................346
User profile, verify ................................................................................................................... 28
Users connected to the equipment, verify ..................................................................................139
V
Value to insert in the field 802.1p of the packets in input from the external port which, in output, the Tag
is added to, verify/modify ........................................................................................................211
Value to insert in the field 802.1p of the packets in input from the internal port which, in output, the Tag
is added to, verify/modify ........................................................................................................234
Values of the Ptx parameters stored in the equipment controller and used for the calculation of the Fade
Margin, verify ........................................................................................................................319
Verify/modify the connection label ............................................................................................276
Vid of the external port to the default value, force ......................................................................209
Vid of the internal port to the default value, force .......................................................................232
VLan
Create a virtual Lan ...........................................................................................................197
Delete a virtual Lan ...........................................................................................................199
Modify a virtual Lan ...........................................................................................................198
Verify the existing virtual LANs ............................................................................................196
W
Wake Up functionality
Activate ...........................................................................................................................112
Deactivate ........................................................................................................................113
Set the execution parameters .............................................................................................112
Verify the status ................................................................................................................112
WEB LCT
Update .............................................................................................................................126
Verify the version ........................................................................................................ 30, 125
Fragments ...............................................291
Frame Egress Mode .......................... 209, 231 L
Frames 1024 to max pck size .....................291
Frames 128 to 255 Oct. ............................291 LAN 1 ............................................. 200, 242
Frames 256 to 511 Oct. ............................291 LAN 1,2 - 3,4 (electrical int.)
Cable crossover ...................................203
Frames 64 Oct. ........................................291
M/S Autoneg. ......................................206
Frames 65 to 127 Oct ...............................291 Master/Slave ......................................205
Frames Sent .................................... 292, 294 LAN 1,2,3,4
Frm Rx ...................................................294 802.1Q
Frm Tx ....................................................294 Default Vid ....................................207
Force Default VID ...........................209
FTP, protocol ............................................ 11 Frame Egress Mode .........................209
Ingress Filtering Check ....................208
Port Based VLAN ............................209
G ELP
Role ..............................................215
G828 E1 Line Side (PM) ............................. 83 SPT/ELP ........................................216
G828 E1 Radio Side (PM) ........................... 87 Status ...........................................215
Version .........................................215
G828 Radio (PM) ....................................... 79
Flow Control Full Dplx/
G829 MstB2M1 STM-1 (PM) ........................ 75 Back Pressure Half Dplx ........................204
G829 RstB1 STM-1 .................................... 70 Line Loop ...........................................219
LLF ....................................................218
MAC Learning ......................................205
U
Undersize Frames .....................................291
Unmodified ..............................................197
Untagged ................................................197
Upper Modulation .....................................168
User
NMS5UX .............................................145
Read and Write ...................................142
For more information, refer to the section relevant to the technical support on the Internet site of the com-
pany manufacturing the product.