Product Description For SDH: Optix Imanager T2000 V200R007C03
Product Description For SDH: Optix Imanager T2000 V200R007C03
Product Description For SDH: Optix Imanager T2000 V200R007C03
V200R007C03
Issue 01
Date 2009-06-30
Website: http://www.huawei.com
Email: [email protected]
and other Huawei trademarks are the property of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but the statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Contents
2 New Features...............................................................................................................................2-1
2.1 What's New in T2000 V200R007C03.............................................................................................................2-2
2.2 Updates in the T2000 V200R007C03 for SDH Equipment............................................................................2-3
5 System Architecture...................................................................................................................5-1
5.1 Standard Client/Server Structure.....................................................................................................................5-2
5.1.1 Hardware Connection.............................................................................................................................5-2
5.1.2 Software Structure..................................................................................................................................5-3
5.1.3 Configuration Requirement....................................................................................................................5-6
5.2 Extended Structure of Multiple Servers........................................................................................................5-10
5.2.1 Hardware Connection...........................................................................................................................5-10
5.2.2 Software Structure................................................................................................................................5-11
5.2.3 Configuration Requirement..................................................................................................................5-14
5.3 HA System (Veritas Hot Standby)................................................................................................................5-18
5.3.1 Hardware Connection...........................................................................................................................5-18
5.3.2 Software Structure................................................................................................................................5-19
5.3.3 Configuration Requirements................................................................................................................5-20
5.3.4 Principles of Switching........................................................................................................................5-21
5.4 HA System (Veritas Warm Standby) ...........................................................................................................5-22
5.4.1 Hardware Connection...........................................................................................................................5-22
5.4.2 Software Structure................................................................................................................................5-22
5.4.3 Configuration Requirements................................................................................................................5-23
5.4.4 Principles of Switching........................................................................................................................5-24
5.5 HA System (Huawei 1:N Cold Standby)......................................................................................................5-24
5.5.1 Hardware Connection...........................................................................................................................5-25
5.5.2 Software Structure................................................................................................................................5-25
5.5.3 Configuration Requirement..................................................................................................................5-26
5.5.4 Principles of Switching........................................................................................................................5-27
5.6 External Interfaces.........................................................................................................................................5-28
6 Reliability....................................................................................................................................6-1
6.1 HA System......................................................................................................................................................6-3
6.2 Distributed System..........................................................................................................................................6-3
6.3 DCN Protection...............................................................................................................................................6-4
6.4 Disk Mirroring.................................................................................................................................................6-5
6.5 Data Backup....................................................................................................................................................6-5
7 Technical Specifications...........................................................................................................7-1
7.1 Performance Indexes.......................................................................................................................................7-2
7.2 Management Capability..................................................................................................................................7-3
Figures
Tables
Purpose
The OptiX iManager T2000 Product Description for SDH describes the position, functional
characteristics, system architecture and networking mode of the T2000, appended with standards
that the T2000 complies with, and performance indexes.
This document provides guides for getting the features and functionalities of the T2000.
Related Versions
The following table lists the product versions related to this document.
Intended Audience
The intended audiences of this document are:
Organization
This document consists of following chapters and is organized as follows.
Chapter Description
Chapter 1 System Overview This chapter describes the position and characteristics
of T2000 and its manageable equipment.
Chapter 2 New Features This chapter describes new features of this version.
Chapter Description
Chapter 3 Features and This chapter describes main functions of this version.
Functions
Chapter 4 Networking and This chapter describes the networking structure for
Application T2000 interconnection with transmission network
equipment and other transmission NMS.
Chapter 7 Technical This chapter describes the performance indexes and the
Specifications methods to evaluate management capabilities.
Appendix A Standards Followed This part lists the standards that the T2000 complies
with.
Appendix B Glossary This part lists the glossary used in the document.
Appendix C Acronyms and This part lists the abbreviations, acronyms and terms
Abbreviations used in the document.
Conventions
Symbol Conventions
The following symbols may be found in this document. They are defined as follows
Symbol Description
General Conventions
The general conventions that may be found in this document are defined as follows.
Convention Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Keyboard Operations
The keyboard operations that may be found in this document are defined as follows.
Format Description
Key Press the key. For example, press Enter and press Tab.
Key 1+Key 2 Press the keys concurrently. For example, pressing Ctrl+Alt
+A means the three keys should be pressed concurrently.
Key 1, Key 2 Press the keys in turn. For example, pressing Alt, A means
the two keys should be pressed in turn.
Mouse Operations
The mouse operations that may be found in this document are defined as follows.
Action Description
Click Select and release the primary mouse button without moving
the pointer.
Drag Press and hold the primary mouse button and move the
pointer to a certain position.
Update History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Descriptions of the 1:N cold standby system are added, and descriptions of the HA system (Sun
Cluster) are deleted.
Chapter 6 Reliability
Descriptions of the 1:N cold standby system are added, and descriptions of the HA system (Sun
Cluster) are deleted.
1 System Overview
This topic describes the position of the T2000 in the telecommunication management network
(TMN) hierarchy, the product characteristics, and the manageable equipment of the T2000
V200R007C03.
The T2000 is a subnetwork management system (SNMS). In the TMN architecture, SNMS is
located between the NE layer and network layer. The T2000 supports all functions of the NE
layer and some of the network layer management functions. Figure 1-1 shows the position of
the T2000 in the TMN architecture.
NE NE ... NE NE NE NE
NE NE NE
NOTE
The T2100 is a network management system (NMS), and manages the subnetwork management system
(SNMS).
l Uniformly manage multiple types of equipment and services, including SDH, WDM, PTN,
RTN, submarine cable system, Ethernet, ATM, ASON, and SAN.
l Provide the Network Management System Maintenance Suite to complete the T2000
deployment and expansion, fault data collection, and northbound interface configuration.
l Deploy the processes of the NE management service, network service, and NBI service
independently.
l As a subnetwork management system (SNMS), provide all element management functions
and some network management functions.
l Support end-to-end trail management.
l Support both Windows, Solaris and SUSE Linux platforms, on which the same operations
are provided.
l Support distributed deployment.
l Support several open external interfaces, such as CORBA, SNMP, and MML.
l Provide Java-based graphical user interface, in a structure of "tree on the left and table on
the right".
l Provide powerful equipment search function, with which the user can search for and then
create NEs and fibers in batches.
l Provide complete alarm, configuration, performance and security (FCPS) management
functions.
l Support the IP, OSI and ECC communication protocols.
l Provide three high availability solutions, including Veritas hot standby, Veritas warm
standby, and 1:N cold standby.
l Provide several tools and methods for data backup and restoration , to ensure network data
security.
l Provide various reports and drawings.
Table 1-1, Table 1-2 and Table 1-3 lists the SDH equipment that the T2000 V200R007C03
manages.
OptiX OSN 2500 REG STM-16 regenerator OptiX OSN 2500 REG
2 New Features
T2000 Deployment
l The T2000 server supports the SUSE Linux + Sybase platform.
l The T2000 server supports the distributed deployment on the Solaris and SUSE Linux.
Specifically, the functions includes deleting and migrating instances from a slave server,
monitoring the NMS status of a slave server, starting and stopping the T2000 on the master
server and slave servers simultaneously.
l The T2000 client supports the Windows Vista.
l The T2000 supports the blade server that can run on SUSE Linux and Windows.
l The T2000 supports the installation of single servers on Solaris and SUSE Linux in a
distributed manner.
l The T2000 supports the installation of the HA system (Veritas hot standby) in a distributed
manner.
l The MSuite supports the fault analysis tool for the T2000.
l The MSuite supports the functions of downloading the dump files and downloading files
from the server.
l The MSuite client can be automatically upgraded by using the CAU tool.
Other Changes
l Based on the original upgrade scheme, the T2000 supports a new upgrade scheme, to
achieve a quick version upgrade.
NOTE
The new upgrade scheme is only applicable to an upgrade from T2000 V200R007C01, T2000
V200R007C02 to T2000 V200R007C03 by the database upgrade mode.
With the preceding changes, the only difference between the operations on the T2000 for single server
and HA system schemes is in the operations to start and stop the T2000. The other operations to start
and stop the service processes of the T2000 between the two schemes are the same.
l In the function of backing up the NMS information (include the deployment information
about the T2000 and the database of the T2000). After the backup operation, the backup
data is saved simultaneously in the backup directory on the client of the NMS maintenance
suite.
l In the function of restoring the NMS information (include the deployment information
about the T2000 and the database of the T2000). In addition, cross-operating system, cross-
scheme (HA scheme or single server scheme) restoration is supported. In this case,
however, only the deployment information about the T2000 can be restored. The data of
the database cannot be restored.
l The T2000 supports the ability to import and export script files by subnet.
l The networkwide maintenance status indicator is optimized. When the maintenance status
indicator is on, no query is performed before a specific status category is specified for query.
l The T2000 supports the ability to manage DC user login.
l The T2000 supports the ability to modify the NE ID on the T2000.
l The T2000 supports the ability to configure the equipment to automatically enable LCT
access rights after the communication between the equipment and T2000 stops.
New Equipment
The T2000 V200R007C03 supports no new equipment.
New Boards
Table 2-1 lists the new boards supported in the T2000 V200R007C03.
Equipment Board
New Features
The T2000 V200R007C03 supports the following new features:
The T2000 provides all management functions at the NE layer, and some of the management
functions at the network layer.
l Dynamic alarm correlation analysis: You can suppress non-root alarms and adjust their severities.
l Static alarm correlation analysis: You can filter non-root alarms only, but not suppress these alarms
and adjust their severities.
l Set the alarm notification. When the T2000 receives alarms, it sends alarm details to the
user by mobile phone short messages or email, according to the user settings.
NOTE
Currently, short messages can be sent in the following three ways:
l The T2000 sends short messages through the E-TEK TD-8011 GSM MODEM.
l Using the DKU-5 cable, the T2000 sends short messages through NOKIA 6610 mobile phones.
l Using infrared ray, the T2000 sends short messages through NOKIA 6610 mobile phones.
l Customize the alarm attribute templates. A maximum of 16 attribute templates can be set
in addition to the default template.
l Set the filtering status of alarms.
l Set NE alarm attributes in a quick manner by using an alarm attribute template.
l Set other attributes of NE alarms, including:
– Saving mode
– Reversion mode
– Correlative suppressing switch (NE layer)
– Delay switch
– Alarm occurring hold-off time
– Alarm ending hold-off time
l Set the attributes of T2000 alarms, including:
– Alarm severity
– Filter status
l Set alarm severity and automatic reporting.
l Set the alarm suppression.
l Set the alarm reversion.
l Set the ATM connection alarm suppression.
l Set the AIS insertion switch.
l Set the UNEQ insertion switch.
l Set the bit error alarm threshold.
l Edit alarm remarks.
l Save alarm data by printing a report or exporting a text file.
l Support the alarm sound indication in the case of the client disconnection.
l Support selecting the type of lower order alarm monitoring on a board.
l Support querying the root alarm suppression pairs of the NE.
l Support setting the insertion mode when the board is not configured with services.
l Support the correctness check of data in the T2000 database and the reporting of system
database data fragment clearing alarm of the T2000.
l Support backing up history alarms to a flash card.
l Support clearing the audible and visual alarm indication of an NE cabinet permanently.
Alarm Browsing
By using the T2000, a user can perform the following operations:
l View the current alarms on the T2000, including NE and NM alarms.
l View the history alarms on the T2000, including NE and NM alarms.
l View abnormal events.
l Query current alarms from NE.
l Query history alarms from NE.
Alarm Deletion
By using the T2000, a user can delete current NE alarms.
Alarm Synchronization
The T2000 can manually or automatically synchronize alarms between NEs and the T2000. By
using the T2000, a user can perform the following operations:
l Manually synchronize alarm information networkwide.
l Manually synchronize alarm information of NE(s).
l Manually synchronize the NM alarms.
l Automatically synchronize networkwide alarms under different conditions, such as at
startup and when the T2000 LCT user exits the T2000 LCT.
Alarm Statistics
You can use the T2000 to collect statistics on the number of alarms, average alarm
acknowledgement time, and average alarm clearing time.
l The supported statistical items include alarm severity, alarm type and alarm status.
l The supported statistical conditions include alarm name, alarm severity, acknowledgement
status, clearing status, alarm type, rising time, cleared time, and other conditions.
Alarm Dumping
By using the T2000, a user can save the history alarm data to a file automatically or manually.
The following items should be set for a manual dump: Conditions for an immediate dump
The following items should be set for an automatic dump:
l Conditions for an overflow dump
l Conditions for a periodical dump
l Dump location
Fault Diagnosis
The T2000 guides the user to diagnose and analyze alarms according to the preset diagnosis
rules until the fault source is located.
Before diagnosis, the diagnosis rules, and the alarms allowed to be diagnosed should be set. The
T2000 has default fault diagnosis rules. Users may add, delete or modify these rules as required.
Alarm Insertion
By using the T2000, a user can manually insert an alarm into a service to help users locate the
fault point.
Time localization ensures that the time on the T2000 is correctly displayed when the T2000
crosses time zones and daylight saving time (DST).
Basic NE Configuration
By using the T2000, a user can perform the following operations:
l Modify NE attributes such as:
– NE name
– NE ID
– NE Extended ID
– Remarks
– NE pre-configuration
NOTE
In the case of the NE whose ID needs to be set through the DIP switch, you can modify the NE ID
on the T2000.
l Synchronize NE time: Align all NEs with the system time of the T2000 server. The user
can configure the T2000 to automatically synchronize the NE time by specifying the
automatic synchronization period.
l Query physical resources in the following lists:
– NE list
– Board manufacturer information
– Board list
– Cabinet list
– Subrack list
– Equipment room list
l Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
l Replace a board. The user can replace a board with a board of another type on the T2000.
– The user can replace board A with board B whose rate is the same as the rate of board
A and where the number of ports is the same as the number of ports on board A.
– The user can also replace board A with board B whose rate is lower than the rate of
board B and where the number of ports is less than the number of ports on board A.
l Automatically disable the NE functions: You can set to periodically disable some NE
functions that may affect services, such as loopback and automatic laser shutdown (ALS).
When the time expires, these operations automatically stop.
l Environment monitoring information. You can set the following items:
– PMU interface
– EMU interface
– CAU interface
– NE fan speed
l Virtual NE management
– Create a virtual NE.
– Add a board.
– Create fibers between the virtual NE and other NEs.
– Create SDH services.
– Create protection subnets.
– Search for and create trails on the virtual NE.
l Support the replacement of the boards.
l Supports the management of inband DCN.
Orderwire Configuration
l Set and query the orderwire phone numbers, call waiting time and orderwire phone port
availability.
l Set and query the networkwide conference call number.
l Set and query the subnet No. length and the related subnet of the optical interface.
l Set and query the SDH NNI connection for orderwire.
l Set and query the F1 data port.
l Set and query the broadcast data port.
– Flow configuration
– CAR configuration
– CoS configuration
– Flow shaping management
– Port shaping management
– Configuring the differentiated service (DiffServ) domains
– Port policy
– CAR policy
– Port WRED Policy
– V-UNI ingress policy
– V-UNI egress policy
– PW policy
– Weighted random early detection (WRED) congestion and discarding policy of services
– QinQ policy
– Weighted fair queuing (WFQ) schedule policy
l Test frame receiving and transmitting on Ethernet boards, including the EGT, EFT, EGS,
EFS and EMS boards.
l Support the ability to query the opposite NE of the data services on these boards for the
Metro 1000V3.
l Configure OAM for Ethernet services.
l Configure OAM for Ethernet ports.
l Configure the LCAS attributes such as hold-off time, WTR time and protocol mode.
l Use QoS template to simplify the QoS configuration for Ethernet services.
l Support the automatic reporting of RMON performance of Ethernet boards.
l Support the dumping of history RMON performance of Ethernet boards.
l Support the automatic creation of OAM for Ethernet trails.
l Support the protocol diagnosis function.
l Support the configuration of IGMP static multicast table items.
l Support the standard LPT bearer mode.
l Support the setting of the LCAS alarm threshold.
l Support the alarm function in the case of no traffic at Ethernet ports.
l Support the Ethernet port mirroring.
l Support the unidirectional LPT function.
l Support setting and querying the MAC address of a data board.
l Support the LPT and port traffic statistics functions for a board.
l Support creating flows in batches for a board.
l Support the setting of the LPT restoration time and the point to multi-point LPT
management in the three scenarios of IP->VCTrunk(s), VCTrunk->IP(s), and VCTrunk(s)-
>VCTrunk(s) for a board.
l Support the ability to manage multiprotocol label switching (MPLS) for multi-service
transmission platform (MSTP) equipment. The MSTP equipment builds an label switched
path (LSP) with a PE router, identifies LSP labels and service priorities, and encapsulates
LSPs into virtual concatenation groups (VCGs) for transmission.
l Supports the management of the virtual Ethernet interface
l Supports the control plane for configuring the static routes and address resolution.
l Supports the packet Ethernet services including E-Line service, E-LAN service, E-AGGR
service and clock service.
RPR Management
By using the T2000, a user can perform the following operations:
l Modify resilient packet ring (RPR) node information.
l Set and query the node information of an NE in the RPR.
l Set the RPR link information of an NE.
l Query the topology of the RPR that the NE belongs to.
l Query the protection status, switching status and switching position of the RPR that an NE
belongs to.
l Set forced switch, manual switch or clear switch in the RPR that an NE belongs to.
Clock Configuration
By using the T2000, a user can perform the following operations:
l Query the clock synchronization status.
l Set clock source priority tables, including:
– System clock source priority list
– Priority table for phase-locked sources of 1st external clock output
– Priority table for phase-locked sources of 2nd external clock output
l Set clock source switching, including:
– Clock source restoration parameters
– Clock source switching condition
– Clock source switching
l Configure clock subnets, including:
– Clock subnet
– Clock quality
– Synchronization status message (SSM) output control
– Clock ID status
l Set phase-locked sources output by external clock, including:
– External clock output phase-locked source
– 2 Mbit/s phase-locked source external clock attributes
l Support the IEEE 1588 clock management. Configure the network that is based on
IEEE1588 protocol for the high precision time transmission.
By using the T2000, a user can configure the 802.3 ah Ethernet OAM as follows:
l Query remote OAM parameters.
l Set link monitoring parameters. This function can help you to detect the events of frame
error, frame error period, and frame error seconds.
l Perform remote loopback.
l Start or stop the MSP protocol of the MSP subnet, including enable or disable the MSP
protocols networkwide or the MSP protocol for a single node.
l For 1+1 MSP, the T2000 automatically generates the service of the protection channel
according to the service of the working channel.
l Adjust the bandwidth dynamically. You can dynamically adjust the MSP bandwidth
according to the service demands and how the network bandwidth is used currently to
improve the utilization of network bandwidth. For example, for an STM-16 MSP of an 8
x VC4 bandwidth, if the 6 x VC4 bandwidth is enough, then you can change the protection
bandwidth from 8 x VC4 to 6 x VC4 bandwidth and save 4 x VC4 for the use of non-MSP-
protected services.
l Expand the capacity of an MSP ring and a linear MSP chain. Expand the link capacity by
replacing the line boards on both sides of the link without interrupting active services. For
example, upgrade an STM-16 MSP ring to STM-64 smoothly.
l Modify the reversion mode, single-ended or dual-ended mode of linear MSP protection
without restarting the protocol.
l Expand and add nodes to multiple types of protection subnets, including MSP, SNCP, PP,
NP ring, NP chain and their combinations.
l Query the name, type and status of all protection subnets.
l Query and set the switching status, wait-to-restore (WTR) time and the trigger condition
of the protection subnet.
l Query all the isolated nodes and delete useless nodes.
l Set and view SDH NNIs.
l Query the relevant trail by protection subnet.
l Manage the entire RPR ring network. An RPR ring can be created, deleted, and searched.
RPR ring protection parameters and link parameters can also be managed. RPR ring
topology can be displayed through a view.
l Support the ability to count protection subnets, and display the rate levels of the protection
subnets.
l The two-fiber bidirectional MS SPRing and four-fiber bidirectional MS SPRing support
the transoceanic protocol.
l Support the ability to query the protection subnet related to a topology object or an optical
interface alarm.
Trail Management
By using the T2000, you can perform the following operations:
l Create and maintain an SDH trail.
– Create an SDH trail, designate a timeslot, and select the protection priority strategy and
the resource usage strategy. The service level includes VC12, VC3, VC4, VC4 server
trail, VC4-4C, VC4-8C, VC4-16C and VC4-64C.
– Activate or deactivate, lock or unlock an SDH trail.
– Join or split, enable or disable VC4 server trails.
– During search of SDH trails, the T2000 retains the attributes of the existing ones as they
are.
– Upgrade an SDH trail to an ASON trail.
– Query the service status station by station according to SDH trails.
– Manage Optical power: Query input power, output power, and power thresholds for
SDH boards.
– Set and query the overhead bytes of all NEs on the trail, such as the trace byte.
– Prompt users to configure trace bytes when timeslot out-of-sequence occurs to the MS.
– Query the status of the low-order service.
– Set overhead pass-through or termination of all NEs on the trail.
– Insert alarms into the trails of MS and VC4 levels, such as AIS and RDI.
– Set loopback on any nodes of the trail, including VC4 loopback, tributary loopback,
optical interface loopback and cross-connection loopback.
– Perform pseudo-random binary sequence (PRBS) test on the trail.
– Modify the add/drop ports of the trail and the timeslot occupied by the trail in-service.
– Partially adjust the original route by changing the NE, board or timeslot the trail passes.
– Modify the route for concatenated services in-service.
– Set SNCP switching on the trail.
– Automatically generate dual-fed SDH services for 1+1 linear MSP.
– Copy an SDH trail for creating trails in batch.
– Manage discrete SDH services. Including query or analyze discrete services.
– Support the ability to analyze connectivity of an SDH trail.
– Support the ability to adjust the capacity of a link from STM-16 to STM-64 by using
the expansion wizard.
– Support ATM trails for the MSTP equipment.
– Support the ability to manage SDH platinum services.
– Support the ability to manage fiber/cable pipes.
– Support the ability to automatically refresh valid routes.
l Manage the alarms and performance events related to an SDH trail.
– Set alarm suppression or alarm reversion for a trail.
– Query current alarms, history alarms, current performance data, history performance
data, UAT and performance threshold-crossing records of an SDH trail.
– Set performance parameters of an SDH trail.
– Query the SDH trails and customer information affected by the alarm.
– Display the R_LOS alarms in the Transmission Media Layer Route view.
– Support the service alarm analysis function.
– Support the ability to set, on a per-trail basis, the alarm thresholds of the source or sink
end of the trail.
– Support the ability to set, on a per-trail basis, performance monitoring status and
automatic reporting of the source or sink end of the trail.
– Support the ability to query, on a per-trail basis, the performance events of the source
or sink end of the trail.
l Create and maintain an Ethernet trail.
– Create trunk links at VC12, VC3, VC4, VC4-4C, VC4-8C and VC4-16C levels.
– Create an unterminated trunk link.
– Create an Ethernet trail. The service includes EPL, EVPL, unterminated EPL, EPLAN,
EVPL based on QinQ, EVPL based on RPR and EVPLAN based on RPR.
NOTE
For release 4.0 NEs, the SDH NNI needs to be created on Ethernet line boards.
– Activate or deactivate an Ethernet trail.
– During search of Ethernet trails, the T2000 retains the attributes of the existing ones as
they are.
– Manage discrete Ethernet services. Including query or analyze discrete services.
l Manage the alarms and performance events related to an Ethernet trail.
– Query the Ethernet trails and customer information affected by the alarm.
– Query current alarms, history alarms of an Ethernet trail.
– Support the function of alarm affected ETH trails.
– Support the service alarm analysis function.
l Search for trails. According to the NE configuration data, at the NE layer, or the fiber
connection data, protection subnet information at the network layer, the T2000 generates
the network layer information about end-to-end trails, including SDH trails and Ethernet
trails.
l Automatically name trails.
l Filter trails in three ways.
– Filter all: filter all trails and only display the qualified trails in a network.
– Secondary filter: filter those trails that have been displayed in the interface according
to the filter conditions. This is secondary filter.
– Incremental filter: filter the newly added trails and display the new qualified trails
together with the currently displayed ones. This is incremental filter.
Expansion Wizard
l Change board.
l Add extended subracks.
l Add nodes to a protection subnet.
l Delete a node for expansion.
l Upgrade link capacity.
Topology Management
By using the T2000, a user can perform the following operations:
l Automatically discover ASON topologies and resources.
l Synchronize NEs in a domain: the T2000 can obtain the topology of the network through
the active NE.
l Automatically upload the configurations of NEs that have been created.
l Set the active and standby NEs.
l Synchronize cross-connections for NEs.
l Manage domains as follows:
– Create domains.
– Delete domains.
– Change the domain name.
l Query the enable status of the ASON NE software.
l Query the ASON NE software version.
l Search for ASON discrete signaling.
l Enable or disable the ASON feature of an ASON NE.
l Support SDH ASON clocks.
l Support managing node IDs on an ASON NE.
l Support managing the running status of the ASON software.
l The windows of SDH TE Link Management, Control Link Management, and ASON
Trail Management are changed to be selected from a drop-down list box that is located
in the Resource panel.
l Enable or disable the OVPN status of the NE.
TE Link Management
By using the T2000, a user can perform the following operations:
l Synchronize networkwide links by domain.
l Filter links by domain, source/sink information or OVPN customer.
l View TE links.
l Create virtual TE links.
l Delete virtual TE links.
l Create fibers.
l Filter relevant ASON services by domain, name, original route, shared MESH restoration
trail, created time, planned time, OVPN customer, type, activation status, managed
identifier, class or whether original route is active.
l Synchronize networkwide ASON trails by domain or attributes.
l View ASON trails.
l Create an ASON server trail of the diamond, gold, silver, or copper class.
l Create an ASON trail of the diamond, gold, silver, copper or iron class.
l Create an ASON association trail of the silver or copper class.
l Query the synchronization status of associated services of different source nodes.
l Manage SDH UNI services.
l Set OVPN customer of an ASON trail.
l Duplicate ASON trails.
l Activate or deactivate ASON trails.
l Apply planning data to an ASON trail.
l Delete an ASON trail.
l Delete an ASON trail from NM.
l Synchronize ASON trails.
l View the alarm suppression information for the selected control link.
l Set the alarm suppression for the selected WDM ASON trail.
UNI Management
By using the T2000, a user can perform the following operations:
l Specify the included route for ASON services when creating an ASON-SDH trail. That is,
an ASON-SDH trail includes an SDH trail and an ASON trail.
l View SDH and ASON trails at the same time in SDH trail management.
l Manage overhead bytes, alarms and performance of a joint trail in a unified manner.
l Query related ASON trails from an SDH trail.
l Query related SDH trails from an ASON trail.
l Degrade an ASON trail to an SDH trail.
l Upgrade SDH services to ASON services.
l Set the revertive attributes when an SDH trail is being migrated to an ASON trail.
l Create dual fed and selectively received VC4 ASON server trails.
l Create lower order diamond trails.
l Calculate working and protection routes using the SPC First policy.
l The alarm in the ASON section of an ASON-SDH trail supports the alarm statistics
function.
l Support an SNCP access scheme.
– Set the SNCP access attributes of an ASON trail.
– Query the SNCP protection switching status of the ASON trail.
– Switch the SNCP access point of the ASON trail.
OVPN Management
By using the T2000, a user can perform the following operations:
PPPoE
The T2000 supports PPPoE out-band control link scheme.
Performance Monitoring
By using the T2000, you can perform the following operations:
l View the SDH current performance data, history performance data, UAT and threshold
crossing events.
l Monitor the ATM port performance in real time, and view ATM port history performance
data.
l Monitor the ATM VP and VC performance in real time, and view ATM VP and VC history
performance data.
l Monitor Ethernet port performance in real time, and view the Ethernet port history
performance data.
l View the Ethernet performance data in the form of a graph or a table.
l Monitor the Ethernet RMON performance.
l Support lower order performance management in the case of a board.
The following item should be set for a manual dump: Conditions for an immediate dump
Authentication Management
NM user authentication
l Log in to the T2000 with a legal user name and password.
l Enable the Access Control List (ACL) function by setting client access control conditions.
l Switch the login user.
l Switch between the single-user mode and the multi-user mode.
l Force a user to log out.
l Lock the terminal.
l Manage the remote maintenance user.
NE security management
l Manage NE users.
l Manage NE login.
l Manage DC users login.
l Lock NE login.
l Lock NE configuration.
l Set the LCT access control to determine whether the LCT is allowed to access an NE.
The NE Explorer supports all the security functions of a single NE. Users can perform operations
related to a single NE using the NE Explorer. The Main Menu in the Main Topology, however, allows
users to perform operations on multiple NEs.
The detailed functions of NE security management in the NE Explorer depend on the type of NEs.
l Manage the LCD password. If you forget the LCD password, you can change it using the
T2000.
NOTE
OptiX Metro 100 equipment supports the LCD control panel. You can use the control panel to set and
query parameters. Log in to the LCD control panel as an Admin or a Guest. Enter the password as Admin.
You can use the T2000 to set and change this password.
l Query all users of an NE.
l Configure the NE Syslog protocol.
l Perform NE security log auditing.
l Support NE basic ACL rule and advanced ACL rule.
l Support the encryption function of user name and password when the T2000 logs in to an
NE.
l Support the Warning Screen function of displaying messages during NE login.
l Support the change of NE user passwords in batches.
Authority Management
l Create operation sets to realize user authority grouping management.
l Create equipment sets to realize management object grouping management.
l Create user groups, and assign operation set and equipment set authorities to user groups.
l Create users and assign them to user groups. Set the access control switch for NM users,
and fine-tune NM user authorities.
l Query the operation authorities for the remote maintenance user.
l Configure the operation authorities for the remote maintenance user.
l Set the validity period for the remote maintenance user.
l Support encrypting the user name and password that are used to log in to an NE.
NE Security Log
l View NE security logs.
l Forward NE security logs to the Syslog server.
NE Database Management
l Back up NE database to the SCC board.
l Back up the NE database manually or automatically to the CF card.
l Restore the NE database form the SCC board or the CF card.
l Back up NE database to a local server or a remote server.
– Start manually backup.
– Set periodical backup task.
l Restore NE database from a local server or a remote server.
The T2000 provides users with single layer management network solutions for small and
medium transmission networks. Together with the upper level network management system
(through the standard external interfaces), the T2000 can assist the network layer management
system and the service layer management system in managing large transmission networks.
Single layer management network does not mean that there is only one network management system in
the entire network.
......
T2000 T2000
NOTE
NMS/OSS
DCN
T2000 T2000
...... NMS
T2000 Server
NOTE
When NMSs from many vendors access an upper level NMS at the same time, use a separate switch or
LAN at the T2000 client or server end, to avoid information interference of the NMSs from different
vendors.
......
NMS
DDN, 2M,
ISDN, PSTN
T2000 Server
NOTE
A minimum of 2 Mbit/s bandwidth must be available for the communication between the T2000 server
and the NMS server.
Huawei
Intranet
Customer
Customer
T2000 server
Intranet
Transport
network
5 System Architecture
NOTE
Client/server structure
The client/server structure refers to a structure where multiple terminals are connected with the server through
LAN or WAN. Users can operate on the clients, while a set of data saved on the server is shared networkwide.
The client of the T2000 implements the workstation function (WSF) of TMN for users to operate and manage
the transmission network.
The server of the T2000 implements the operating system function (OSF) of TMN, saving network data and
providing various management functions for the transmission network.
WSF and OSF
WSF is a concept related to the TMN architecture and enables conversion of the TMN information so that it can
be understood by users.
OSF is a concept related to the TMN architecture and enables the processing of telecom management
information, to monitor and control telecom functions (including the management function).
T2000 Client 1
...... T2000 Client N
T2000 Server
A maximum of 100 clients can access one server and be operated on at the same time. The
number of clients accessed to one server is related to not only the authority assigned by license
but also the hardware of the server. For the maximum number of clients connected to different
servers, refer to Table 7-2.
NOTE
The recommended number of clients for configuration should not be more than five, and other clients
should be mainly used for monitoring, to lower the probability of operation conflict among multiple clients.
l For operations on a per-NE basis, when different clients operate on different NEs, the number of clients
that can operate at the same time depends on the number of clients defined in the license only. For
operations of monitoring and querying, such as alarm monitoring, the number of clients that can operate
at the same time depends on the number of clients defined in the license only, and the maximum possible
number is 100.
l For operations at the network level, such as trail searching, trail creation, configuration data uploading,
consistency check of configuration data, and networkwide alarm synchronization, when one client
operates, the operated network resource is locked and other clients cannot perform the same operation
at the same time. In this way, data consistency is ensured.
Sysmonitor Client
End-to-End Trail
Fault
Configuration
Performance
Security
Common
Servers
NMS/Other
MDP NBI Servers
Systems
Web Server
Sysmonitor Server
T2000 Server
Transport Network
Module Function
Module Function
System Sysmonitor Server Manages and monitors all T2000 server processes
Monitor except MDP.
NOTE
Deploy the NEMgr servers, domain NM servers, ASON servers, and NBI servers as required.T2000
provides the network management system maintenance suite to deploy network management systems.
The Database refers to the database management software adopted for the T2000. On Windows,
the database software is SQL Server. In SUSE Linux and Solaris, the database software is Sybase.
The T2000 manages transport network equipment through the Qx interface, and communicates
with the upper layer NMS through the MML, SNMP or CORBA interface. For the details about
external interfaces, refer to 5.6 External Interfaces.
Server
NOTE
In the preceding table, Quantity refers to the quantity of the required hardware when the T2000 adopts
the corresponding Reference Model.
Table 5-3 Recommended hardware configurations for the server on SUSE Linux
NOTE
If the count of NEs managed by the T2000 is not less than 6,000 equivalent nodes, the OceanStor S3100
disk array should be configured for the primary and secondary nodes to enhance the management capability,
and also the installation disk of the OceanStor Manager Suite should be prepared for both nodes.
IBM X3200M2 1
IBM X3500 1
IBM X3650 1
IBM X3850M2 1
Client
Operation system- 1
Windows Vista
Business (SP1)
Compatibility
SUSE Linux Sybase 12.5 Supported Not supported Only the T2000
Enterprise server can run
Server 10 SP1 on this platform.
......
T2000 Client 1 T2000 Client 2 T2000 Client N
The user can choose any client to log in to any server. The user can also query, configure, and
maintain the subnets managed by the server. By selecting the server to log in, the user has a
broad range in which to view and manage networks.
It should be noted that by using this method (logging in by using a single client), the user cannot
simultaneously log in to two or more servers to query or manage subnets managed by the servers.
Therefore, if the user needs to manage a network with a broad range, hierarchical network
management scheme should be used.
Sysmonitor Client
End-to-End Trail
Fault
Configuration
Performance
Security
Common
Servers
NMS/Other
MDP NBI Servers
Systems
Web Server
Sysmonitor Server
T2000 Server
Transport Network
Module Function
Module Function
System Sysmonitor Server Manages and monitors all T2000 server processes
Monitor except MDP.
NOTE
Deploy the NEMgr servers, domain NM servers, ASON servers, and NBI servers as required.T2000
provides the network management system maintenance suite to deploy network management systems.
The Database refers to the database management software adopted for the T2000. On Windows,
the database software is SQL Server. In SUSE Linux and Solaris, the database software is Sybase.
The T2000 manages transport network equipment through the Qx interface, and communicates
with the upper layer NMS through the MML, SNMP or CORBA interface. For the details about
external interfaces, refer to 5.6 External Interfaces.
Server
NOTE
In the preceding table, Quantity refers to the quantity of the required hardware when the T2000 adopts
the corresponding Reference Model.
Table 5-15 Recommended hardware configurations for the server on SUSE Linux
NOTE
If the count of NEs managed by the T2000 is not less than 6,000 equivalent nodes, the OceanStor S3100
disk array should be configured for the primary and secondary nodes to enhance the management capability,
and also the installation disk of the OceanStor Manager Suite should be prepared for both nodes.
IBM X3200M2 1
IBM X3500 1
IBM X3650 1
IBM X3850M2 1
Client
Operation system- 1
Windows Vista
Business (SP1)
Compatibility
SUSE Linux Sybase 12.5 Supported Not supported Only the T2000
Enterprise server can run
Server 10 SP1 on this platform.
DCN
GNE
T2000 Client
GCO GCO
VCS VCS
VVR,VxVM VVR,VxVM
Solaris Solaris
Solaris/Windows Solaris/Windows
GCO: Stands for VERITAS Global Cluster Option that is used for in-service monitoring of
system and application services. When the T2000 server program in the active node is
unavailable, the T2000 server program in the standby node is started immediately.
VVR: Stands for VERITAS Volume Replicator that is used to copy the T2000 data of the active
node to the standby node to synchronize data between the two nodes.
VCS: Stands for VERITAS Cluster Server that is used to monitor system and application services
in real time. When the hardware or software fails, the VCS restarts or closes the application
service.
VxVM: Stands for VERITAS Volume Manager that is used to manage the disk and the data
volume.
Server
NOTE
If the count of NEs managed by the T2000 HA system (Veritas hot standby) is not less than 6,000 equivalent
nodes, the OceanStor S3100 disk array should be configured for the primary and secondary nodes to
enhance the management capability, and also the installation disk of the OceanStor Manager Suite should
be prepared for both nodes.
Client
Refer to the Table 5-20 and Table 5-21 in section "5.2.3 Configuration Requirement".
Compatibility
SUSE Linux Sybase 12.5 Supported Not supported Only the T2000
Enterprise server can run
Server 10 SP1 on this platform.
It is the same as the hardware connection of the HA system (Veritas hot standby) .
The software architecture of the T2000 HA system (Veritas Warm Standby) is shown in Figure
5-7.
VVR,VxVM VVR,VxVM
Solaris Solaris
Solaris/Windows Solaris/Windows
VVR: Stands for VERITAS Volume Replicator that is used to copy the T2000 data of the active
node to the standby node to synchronize data between the two nodes.
Server
NOTE
If the count of NEs managed by the T2000 HA system (Veritas warm standby) is not less than 6,000
equivalent nodes, the OceanStor S3100 disk array should be configured for the primary and secondary
nodes to enhance the management capability, and also the installation disk of the OceanStor Manager Suite
should be prepared for both nodes.
Client
Refer to the Table 5-20 and Table 5-21 in section "5.2.3 Configuration Requirement".
Compatibility
SUSE Linux Sybase 12.5 Supported Not supported Only the T2000
Enterprise server can run
Server 10 SP1 on this platform.
T2000 client
DCN
Gateway NE
Primary node1
T2000 client
T2000 server
Gateway NE
Primary node2
Disk Array
……
T2000 client
DCN
Gateway NE
Primary nodeN
Figure 5-9 shows the software structure of the T2000 HA system (Huawei 1:N cold standby).
Msuite Msuite
Sybase database Sybase database
Solaris Solaris
Server
NOTE
The secondary site of Sun SPARC Enterprise T5220 or M4000 requires one OceanStor S3100 disak array.
T2000 Client
Refer to Table 5-20 and Table 5-21 in 5.2.3 Configuration Requirement.
Compatibility
SUSE Linux Sybase 12.5 Supported Not supported Only the T2000
Enterprise server can run
Server 10 SP1 on this platform.
management system maintenance suite, in combination with the Zones function provided by the
Solaris 10 operating system. In this way, the standby function of Huawei 1:N cold standby is
achieved. On normal conditions, a primary site backs up the database to the secondary site by
using the T2000 management tool at the scheduled time. When you perform deployment
operations on the primary site, the network management system maintenance suite automatically
synchronizes files to the secondary site.
In the HA system (Huawei 1:N cold standby), data is not backed up in real time and switching
is also performed manually. When a fault occurs on a primary site, you need to manually switch
the primary site to the secondary site. On the secondary site, by using the T2000 database
management tool, you can restore database backup files to the databases of the secondary site
and start the T2000 of the secondary site. The HA system (Huawei 1:N cold standby) is in the
switching state at this time. In this case, other primary sites still allow backup of data and files,
but do not allow switching. When the faulty primary site restores, you need to immediately
switch the application back to the primary site. Hence, the secondary site provides the
redundancy service for the primary site normally.
If faults occur in two or more primary sites, you need to specify the primary site to switch
according to the priorities of services.
Figure 5-10 shows the communication interfaces between the T2000 and the external system.
T2100
Other vendor's
MML NMS
CORBA/SNMP
T2000
Qx
Qx
The Qx interface uses the internal OptiX private management protocol of Huawei. It enables the
T2000 to connect the OptiX series equipment.
MML
The MML interface, one of the interfaces for NE-level NM and network-level NM, provides
functions such as information report, query and management of various operations. Based on
TCP/IP, MML interface takes the binary byte stream as the carrier, and the syntax format is the
unified command line format of Huawei. The MML interface provided by the T2000 is used to
connect with the T2100.
With least overhead, the MML interface is easy to use, but the disadvantage is that it is a supplier-
specific standard and not an industry standard.
The T2000 with a standard configuration provides MML interface for information report, query
and management of various operations.
CORBA
The CORBA interface is one of the universal standard interfaces in the telecommunication field.
Through the CORBA interface, the EMS and NMS of different manufacturers can be
interconnected to implement the management function.
TMF multi-technology network management (MTNM) defines the CORBA based interface
between NMS and EMS, and has been recognized by more and more equipment vendors.
The northbound CORBA interface provided by the T2000 is in compliance with the TMF513,
TMF608, and TMF814 recommendations.
SNMP
The simple network management protocol (SNMP) is one of the standard interfaces used in the
industry. Through the SNMP interface, the iManager T2000 can connect to the upper level
management system of the carrier or another vendor. The T2000 provides the alarm reporting
function.
The SNMP interface provided by the T2000 is compliant with the SNMP V1, V2 and V3
standards.
6 Reliability
In reliability design, measures are taken to reduce potential risks, so that the product can operate
in a safer manner.
The T2000 may encounter some risks when applied in the network. Although the probability of
risks is very low, the following measures listed in Table 6-1 should be taken to ensure that the
system runs safely.
Software Database crash and network data Restore the T2000 data from the
failure loss backed up database.
6.1 HA System
The high availability (HA) system helps you improve the running reliability of the T2000 server.
6.2 Distributed System
A distributed system consists of the master server and slave servers, which compose a site to
implement the functions of the T2000 server.
6.3 DCN Protection
You can use a DCN to connect the T2000 to a standby GNE. This improves the reliability of the
communication connection between the T2000 and equipment.
6.4 Disk Mirroring
The disk mirroring function helps you improve the reliability of disk data on the T2000 server.
6.5 Data Backup
The data backup function helps you improve the reliability of important T2000 data.
6.1 HA System
The high availability (HA) system helps you improve the running reliability of the T2000 server.
For better stability and risk resistance capability, the server uses a 1+1 or 1:N standby scheme.
If the active server fails, the T2000 can be switched to the standby server so that the T2000
application is not interrupted. Such a T2000 structure is called an HA system.
l Database synchronization and backup between the active and standby servers
l Switching the application software between the active and standby servers
l HA system (Veritas hot standby): for remote hot standby, featuring automatic switching.
l HA system (Veritas warm standby): for remote warm standby, featuring manual switching.
l HA system (Huawei 1:N cold standby): for HA system cold standby, featuring manual
switching.
To lower the CPU usage and memory occupancy of the master server, the T2000 server can
adopt the distributed system structure. The master server is the core of a distributed system,
because the database server and the core subsystems of the T2000 are running on the master
server. The non-core subsystems of the T2000 are running on the slave server. In this way, the
CPU usage and the memory occupancy on the master server are lowered and the load is balanced
between the master server and slave servers.
The distributed system helps to improve the management capability of the T2000 server and is
mainly used in the following two scenarios.
l You can dynamically add blade servers to improve the management capability of the
T2000 server.
l By using the existing computers with lower configuration, you can create a distributed
system to manage a large-scale network.
NEs communicate with the T2000 through the GNE. Active and standby GNEs can be preset
for every NE on the T2000. When communication between the active GNE and the T2000 fails,
the T2000 automatically switches to communicate with the standby GNE to ensure that the
communication between the NE and the T2000 is not interrupted. When communication is
restored, whether the active GNE is used again is determined according to the restoration mode
preset.
DCN
The T2000 communicates with the standby GNE through internal communication in the
transmission network, or through other DCNs. For example, 2 Mbit/s private line, digital data
network (DDN) private line, ISDN, PSTN, or Ethernet.
NOTE
l The recommended number of non-gateway NEs (including non-gateway NEs that connects to the GNE
by using the extended ECC) that connect to each GNE is fewer than 50. Once the limit is exceeded,
the number of GNEs should be increased.
l Each T2000 supports a maximum of 2000 GNEs. Once the limit is exceeded, the number of GNEs
should be decreased.
Table 6-2 describes the bandwidth required for the T2000 system and equipment management.
7 Technical Specifications
This section describes the technical specifications of the T2000, including performance indexes
and management capability.
Resources CPU used rate Normally, not more than 10% of the CPU is
occupied used.
Processing Response speed of alarm Normally, the time interval from the
capacity handling generation of an alarm on the equipment until
it is displayed on the T2000 is not more than
10 seconds.
Alarm handing capacity Normally, 100 (not more than 400 at most)
pieces of alarms can be handled per second.
Time taken to search for a Generally, it takes not more than 20 seconds
trail to search for a trail.
IBM X3500 2 64
HP DL 580 10 100
HP DL 380 6 100
HP ML 350 2 64
HP ML 110 0.6 24
HP 570 2 48
DELL PE 6800 2 48
DELL 6850 2 48
DELL 2800 1 24
NOTE
a: If the count of NEs managed by the T2000 is not less than 6000 equivalent nodes, the disk array should
be configured.
NE Equivalent coefficient
OptiX 155S 1
OptiX 155/622B 2
OptiX 2500 3
OptiX OTU40000 1
NE Equivalent coefficient
A Standards Followed
Standard Description
ITU-T G.707 Network node interface for the synchronous digital hierarchy (SDH)
ITU-T G.774 (01, 02, Synchronous Digital Hierarchy (SDH) management information
03, 04) model for the NE view
ITU-T G.853.1 Common elements of the information viewpoint for the management
of a transport network
Standard Description
ITU-T M.3101 Managed Object Conformance statements for the generic network
information model
B Glossary
AIS insertion If there are excessive errors in a channel, AIS can be inserted in this
channel to indicate it is unavailable. For a line board, you can set
whether to insert AIS when there are excessive errors in the B1, B2
and B3 bytes. For a tributary board at the E1 or T1 level, you can set
whether to insert AIS when there are excessive errors in BIP-2. For a
tributary board at the E3 level or higher, you can set whether to insert
AIS when there are excessive errors in the B3 byte.
Alarm correlation In the case alarm2 is raised within five seconds after alarm1 is raised,
analysis and alarm2 complies with the conditions defined in the alarm
correlation analysis rule, you can either suppress the alarm2 or raise
its severity level according to the behavior defined in the alarm
correlation rule. Such a process is called alarm correlation analysis.
Alarm reversion For the port that has already been configured but not actually loaded
with services, this function can be used to avoid generating relevant
alarm information, thus preventing alarm interference.
Alarm suppression The suppressed alarm of a specific object is not reported. The object
here may be the networkwide equipment, a specific NE, a specific
board and even a specific function module of a specific board.
ATM protection An ATM protection group refers to the logically bound ATM VP
group network or subnetwork connections that share the same physical
transmission channel. In the VP group (VPG), a pair of VP
connections (working connection and its protection connection) is
used for monitoring the automatic protection switching, called
monitoring connections (APS VPCs). If the monitoring connections
switch over, the whole VPG will switch over to quicken the ATM
protection switching (as quick as the protection switching of the SDH
layer.
Automatic switching When the active board or path fails, the standby one can automatically
take over the job of the active one.
Bit error alarm When the bit error reaches a specific limit, the equipment will report
threshold an alarm. This limit is the bit error alarm threshold. The threshold can
be divided into crossing threshold and defect threshold.
Check alarms The check feature compares one (or more) uncleared alarm on the
T2000 with that on the NE. If an alarm is included in the current alarms
on the NE, it is kept on the T2000. If not, it will be removed from the
T2000.
Clock View The Clock View provides a visible platform to enable:1. NE clock
settings2. Networkwide clock synchronisation status query3. Clock
tracing and search functions
Configuration data The data that configures the NE hardware for coordination between
this NE and other NEs in the entire network and operation of specified
services. Configuration data is the instruction file of NEs, and it is the
key for efficient network running. The typical configuration data
includes board configuration, clock configuration and protection
relationship.
Connection point A reference point where the output of a trail termination source or a
connection is bound to the input of another connection, or where the
output of a connection is bound to the input of a trail termination sink
or another connection. The connection point is characterized by the
information which passes across it. A bidirectional connection point
is formed by the association of a contradirectional pair.
Current alarms Alarms that do not clear, or has cleared but is not acknowledged.
Current performance The performance data stored in the current register is called current
data performance data. The current 15-minute or 24-hour register (only
one for each) is applied to collect the performance data in the current
monitoring period. It changed within the monitor period.
DCC Within an STM-N signal there are two DCC channels, one is the 192
kbit/s DCC-R channel composed of bytes D1-D3, and the other is the
576 kbit/s DCC- channel composed of bytes D4-D12. All NEs can
communicate with one another through the DCC-R. The DCC-M is
not the regenerator section overhead and does not support
communications among regenerators, and it is used to support
communication channels of more universal purpose. For example, it
supports TMN as a physical channel of ECC.
Domain The domain of the T2000 specifies the scope of address or functions
which are available to a certain user.
Failure The fault cause persisted long enough to consider the ability of an
item to perform a required function to be terminated. The item may
be considered as failed; a fault has now been detected.
Forced switch This command performs the ring switch from working channels to the
protection channels. This switch occurs regardless of the state of the
protection channels, unless the protection channels are satisfying a
higher priority bridge request.
History performance The performance data stored in the history register and the auto-report
data performance data stored on the T2000 are called history performance
data in a unified way.
Intermediate office It refers to the equipment used for optical fibre management and
dispatch in the metropolitan area. It has multiple pairs of interfaces
for the optical fibre connection. Every two interfaces in a pair are
connected with each other to form a longer physical optical fibre path.
The physical optical fibre path connecting the transmission equipment
can comprise two or more sections of optical fibre cascaded via the
intermediate office. There is an intermediate office information list
for some fibre & cable connections, which shows the section
information about the fibre & cable.
LCT Local Craft Terminal. The LCT provides the user with single-layer
management network solutions to the transmission network of up to
five NEs to realise integrated management of multi-service
transmission network. Usually it uses the cross-over cable or serial
port cable to connect one NE, so as to configure and maintain a single
NE. See also T2000 LCT.
Lock NE login This function prohibits the users at lower levels from logging in NE
and forces logged NE users with lower level to log out.
Main Topology The default T2000 client interface and all topology management
functions are accessed here.
Manual switch When the protection channel is efficient and there is no higher-level
switching request, this mode switches the service from the working
channel to the protection channel, thus testing whether network still
has the protection capability.
NE database There are three types of database on NE SCC board as following: (1)
DRDB: a dynamic database in a dynamic RAM, powered by battery;
(2) SDB: a static database in a power-down RAM; (3) FDB0, FDB0:
permanently saved databases in a Flash ROM. In efficient operation,
the NE configuration data is saved in DRDB and SDB at the same
time. Backing up an NE database means backing up the NE
configuration data from SDB to FDB0 and FDB1.
NE Explorer NE Explorer is the main operation interface of the T2000. For easy
navigation, the NE Explorer window presents an expandable
directory tree (Function Tree) in the lower left pane. The
configuration, management and maintenance of the equipment are
accessed here.
NNI Network Node Interface. NNI identifies the interface between the
ATM network nodes. See also SDH NNI.
Path protection The working principle of path protection: When the system works in
path protection mode, the PDH path uses the dual-fed and signal
selection mode. Through the tributary unit and cross-connect unit, the
tributary signal is sent simultaneously to the east and west lines.
Meanwhile, the cross-connect matrix sends the signal dually sent from
the opposite end to the tributary board through the active and standby
buses, and the hardware of the tributary board will selectively receive
the signal from the two groups of buses automatically according to
the AIS number of the lower order path.
Performance register Performance register is the memory space for performance event
counts, including 15-min current performance register, 24-hour
current performance register, 15-min history performance register,
24-hour history performance register, UAT register and CSES
register.
Performance Performance events usually have upper and lower thresholds. When
threshold the performance event count value exceeds the upper threshold, a
performance threshold-crossing event is generated; when the
performance event count value is below the upper threshold for a
period of time, the performance threshold-crossing event is ended. In
this way, performance jitter caused by some sudden events can be
shielded.
Protection path A specific path that is part of a protection group and is labeled
protection.
Protection strategy In case the service route provides multiple service protections,
different protection strategies can be selected as required. Protection
strategy refers to the protection mode given the priority in use for the
trail: protection, no protection, and extra traffic. Of the above, the
protection preference is divided into trail protection and sub-network
connection protection.
Protection subnet The resources that form a protection subnetwork include NEs and
fiber cables. The creation of the protection subnetwork actually means
that corresponding logical system is configured for each NE by means
of creating the protection subnetwork, the optical interfaces (or VC4)
of each board are mapped into the logical system, and then these
independent logical systems are connected with one another to form
a complete network structure.
Route The IP route selection is in table driving mode. In each host and each
router of the Internet, there is a routing table that contains information
about how the service is transmitted from the source to the sink,
providing a basis for route selection. Ethernet static routing in ET1
refers to the mapping relationship between the Ethernet port and the
bound path. Its routing type includes port routing and VLAN routing.
Port routing: It means configuring a route between the Ethernet port
and the bound path port, which is usually used for point-to-point
networking communication; VLAN routing: It means configuring a
route between the Ethernet port and the bound path port based on the
VLAN service. It can be used flexibly in point-to-point, point-to-
multipoint or multipoint-to-multipoint communication. The
implementation is to divide and converge the data stream according
to the VLAN flag of the packet. As a VLAN flag can be added to the
Ethernet port, the equipment can be applied more flexibly.
Script file It is the text file describing the physical information and configuration
information of the entire network, including the NE configuration file,
port naming file, end-to-end configuration file, NE physical view
script file, NM information file and service implementation data script
file.
Subnet mask Also referred to as the network mask off code, it is used to define
network segments, so that only the computers in the same network
segment can communicate with one another, thus suppressing
broadcast storm between different network segments.
Support The frame on the bottom of a cabinet, when installing the cabinet on
the antistatic floor.
Synchronise NE time Send the system time of the T2000 server to NEs so as to synchronise
all NEs with the server.
T2100 The T2100 is a network level management system for the optical
transmission network, and is located in the network management layer
(NML) in the telecommunication management network (TMN)
architecture.
TDA clock source TDA is short for Tone Data Access. For the 2500+ NE equipment, it
can be installed with the external TDA board for which the clock
source must be set so that the TDA board can switch according to the
set clock source sequence when clock source switching occurs.
Trail management A network level management function of the T2000. Through trail
function management, you can configure end-to-end services, view graphic
interface and visual routes of a trail, query detailed information of a
trail, filter, search and locate a trail quickly, manage and maintain
trails in a centralised manner, manage alarms and performance data
by trail, and print a trail report.
Tributary loopback A fault can be located for each service path by performing loopback
to each path of the tributary board. There are three kinds of loopback
modes: No loopback, Outloop and Inloop.
UNI UNI is the abbreviation for User Network Interface. It identifies the
interface between the user and the ATM network node.
Upload Report all or part of the configuration data of the NE to the NM and
overwrite the configuration data saved in the NE layer on the NM
side.
User group User set refers to the set of NMS users with the same management
authorities. The default user group includes: system administrator,
system maintainer, system operator and system supervisor. The
attributes of user set include name and detailed description.
User The user of the T2000 client, and the user and his/her password define
the corresponding authority of operation and management of the
T2000.
VC4 loopback The fault of each VC4 path on the optical fibre can be located by
setting loopback for each VC4 path of the line. There are three kinds
of loopback modes: No loopback, Outloop, Inloop.
VC4 server trail The path rate of the VC4 server trail is 150.336Mbit/s. The VC4 server
trail provides transparent channels (that is, circuit group) for circuit-
layer network nodes (for example, a switch) in a path-layer network,
and acts as the basic unit of inter-office communication path. When
the VC4 server trail is configured, only the higher order cross-
connection of VC4 is generated in the intermediate NE, but no cross-
connection is generated at the two ends, that is, no service is added/
dropped. Therefore, the VC4 server trail is not a traditional service.
It is only the basis for VC3 and VC12 trail creation.
VCI The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in
both NNI cell or UNI cell. It indicates the virtual channel in the path.
The VPI and VCI together indicate a virtual connection.
Virtual fibre A virtual fibre is created between SDH equipment that has WDM
equipment in between. From SDH equipment perspective, creation of
virtual fibres disassociates its fibre connection with WDM equipment
and prevents impact on the auto fibre search function, ensuring
independence of SDH trail management.From WDM equipment
perspective, its service bearer layer is a virtual fibre instead of a true
one after the virtual fibre is created. Deletion of the true fibre does
not affect trail management.
VLAN ID Namely, it is the virtual LAN identifier. One Ethernet port can support
4K VLAN routes, and one NE can support up to 8K VLAN routes.
VPI The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the
NNI cell, and 8 bits in the UNI cell.
Web LCT In the TMN architecture, the Web LCT is located in the NE
management level, which can manage the RTN series and NG WDM
series equipment.
Working path A specific path that is part of a protection group and is labelled
working.
WTR time A period of time that must elapse before a - from a fault recovered -
trail/connection can be used again to transport the normal traffic
signal and/or to select the normal traffic signal from.
CC Continuity Check
HA High-Availability
ID IDentification
IP Internet Protocol
LB Loopback
LT Link Trace
Mgr Manager
MO Managed Object
MS Multiplex Section
NE Network Element
PC Personal Computer
PP Path Protection
RS Regenerator Section
TM Terminal Multiplexer
VB Virtual Bridge
WTR Wait-to-Restore