Product Description (Super, Compatible With X86) : Imaster Nce V100R019C00
Product Description (Super, Compatible With X86) : Imaster Nce V100R019C00
Product Description (Super, Compatible With X86) : Imaster Nce V100R019C00
V100R019C00
Issue 06
Date 2020-03-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: [email protected]
Purpose
This document describes the network position, highlights, architecture,
configuration, functions and features, and usage scenarios of iMaster NCE. With
this document, you can obtain an overall understanding of this product.
Intended Audience
This document is intended for:
● Network planning engineers
● Data configuration engineers
● System maintenance engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Command Conventions
The command conventions that may be found in this document are defined as
follows.
Convention Description
Change History
Issue Date Description
Contents
2 New Features......................................................................................................................... 16
3 Architecture............................................................................................................................ 18
3.1 Solution Architecture........................................................................................................................................................... 18
3.2 Software Architecture.......................................................................................................................................................... 21
3.3 External Interfaces................................................................................................................................................................ 23
3.3.1 NBIs........................................................................................................................................................................................ 24
3.3.1.1 SNMP NBI......................................................................................................................................................................... 25
3.3.1.2 RESTful NBI...................................................................................................................................................................... 25
3.3.2 SBIs......................................................................................................................................................................................... 27
4 Deployment Schemes........................................................................................................... 30
4.1 On-Premises Deployment.................................................................................................................................................. 30
4.1.1 Deployment on Virtual Machines................................................................................................................................ 30
4.2 Deployment on Private Clouds.........................................................................................................................................34
4.3 EasySuite Deployment Tool............................................................................................................................................... 36
5 Configuration Requirements.............................................................................................. 37
5.1 Server Hardware Configurations for On-Premises Deployment...........................................................................37
5.2 VM Configurations for Private Cloud Deployment....................................................................................................37
5.3 Server Software Configurations....................................................................................................................................... 39
5.4 Client Configurations........................................................................................................................................................... 40
5.5 Bandwidth Configurations................................................................................................................................................. 41
7 Usage Scenarios...................................................................................................................101
7.1 Private Line........................................................................................................................................................................... 101
7.1.1 IP RAN Private Line........................................................................................................................................................ 101
7.1.2 SPTN Private Line............................................................................................................................................................ 118
7.1.3 Comprehensive Multi-Domain Private Line........................................................................................................... 126
7.1.4 Optical Multi-Domain Private Line........................................................................................................................... 141
7.1.5 Multi-Cloud Interconnect............................................................................................................................................. 147
7.2 IP+Optical Solution............................................................................................................................................................ 148
8 High Availability..................................................................................................................166
8.1 Local HA................................................................................................................................................................................ 167
8.2 Disaster Recovery Solutions............................................................................................................................................ 170
9 Security.................................................................................................................................. 178
9.1 Security Architecture......................................................................................................................................................... 178
9.2 Security Functions.............................................................................................................................................................. 179
11 Specifications..................................................................................................................... 184
11.1 System-Wide Performance Specifications............................................................................................................... 184
11.2 NE Management Capabilities and Maximum Concurrent Client Connections...........................................187
11.3 Service Management Capabilities.............................................................................................................................. 188
A Appendix............................................................................................................................... 210
A.1 Standards Compliance...................................................................................................................................................... 210
A.2 Glossary................................................................................................................................................................................. 216
1 Introduction
1.1 Positioning
1.2 Highlights
1.1 Positioning
Trends and Challenges
With the rapid development of the Internet industry and the advent of the cloud
era, new business models are emerging one after another, and enterprises are
moving towards cloudification and digitalization. The telecom industry, as a digital
transformation enabler for various industries, faces both challenges and new
business opportunities.
Service cloudification results in great flexibility and uncertainty in service
applications. However, there is a huge gap between carriers' infrastructure
networks and various applications.
● A large number of legacy networks coexist with newly-built software-defined
networking/network functions virtualization (SDN) networks, making it
difficult or costly to adapt to new services. Especially, deploying enterprise
private line services encounters long time to market, slow customer response,
and inflexible packages.
● With the migration of enterprise applications to the cloud and the
development of new services such as the telecom cloud, the network traffic in
carriers' pipes is more dynamic and unpredictable, making traditional network
planning and optimization impracticable and posing high requirements on
Service Level Agreement (SLA).
● With the continuous increase in the network scale and complexity, O&M
complexity is intensified. Carriers urgently need to take automatic deployment
measures to reduce the skill requirements for O&M personnel and effectively
control the operating expense (OPEX) in a long term.
Therefore, an intelligent adapter layer (that is, a brand-new management, control,
and analysis system) needs to be established between the service applications and
the infrastructure networks. The system must be able to abstract network
resources and capabilities, implement automatic and centralized scheduling, and
Product Positioning
As an NCE component, NCE (Super) works as a hybrid network controller to
enable network service automation and self-optimization across layers, domains,
and vendors.
Traditionally, a carrier network is divided into different domains (from technical or
management perspectives), and these domains are managed independently like
isolated islands. It is difficult and time-consuming to create, deploy, and maintain
E2E network services.
NCE (Super) helps carriers eliminate information, management, and operations
silos and accelerate their migration to flexible, hybrid, and multi-vendor networks.
NCE (Super) has the following key features:
● Open Intent API: shields network complexity, simplifies network parameters,
and accelerates OSS/orchestrator integration.
● Model-driven design: combines different basic models into E2E service
templates, which accelerates the development and deployment of new
services.
● Multi-domain multi-layer orchestration: reduces manual errors and repetitive
manual operations and improves service quality.
– SLA assurance and the orchestration engine enable automation and self-
optimization of E2E B2B private line services.
– IP+optical synergy enables E2E multi-layer optimization and simulation.
● Cloud broker: enables one-stop provisioning of cloud+network services
through multi-cloud pre-integration.
● No vendor lock-in: quickly integrates third-party controllers and NMSs
through a multi-vendor integration framework and various plugins.
NCE (Super) applies to a wide range of scenarios, such as B2B private line, IP
+optical, and cloud broker scenarios, allowing carriers to design and deliver high-
quality services more quickly and easily.
1.2 Highlights
NCE is a network lifecycle automation platform that integrates management,
control, and analysis. It focuses on service self-adaptation, O&M automation, and
network autonomy to support carriers' transformations to network cloudification
and digital operations.
implements panoramic display and in-depth analysis of the quality and traffic
data of the entire network, to ensure that the network is running stably and
accurately implementing its users' intent.
NCE adopts a cloud service architecture, and its management, control, and
analysis modules can be deployed on demand to meet different customer
requirements in different scenarios.
Manual full or Site, NE, port, and link NCE (IP Domain),
incremental NOTE NCE (Transport
synchronization Manual full or Domain), NCE
incremental (Management Plane),
synchronization can U2000,
also be used to collect
OCh, OTN line, and NokiaNSP, FiberHome
tunnel information. controller, and ZTE
controller
Batch import Site, NE, port, and link NCE (IP Domain),
NCE (Transport
Domain), NCE
(Management Plane),
U2000,
NokiaNSP, FiberHome
controller, and ZTE
controller
● Resource planning
Resource planning includes NE role definition, domain division, and inter-
domain link planning.
– NE role definition: An NE can play different roles, such as autonomous
system boundary router (ASBR), superstratum provider edge (SPE), cell
site gateway (CSG), aggregation site gateway (ASG), and radio service
gateway (RSG), in different usage scenarios.
– Domain division: A domain can contain network devices that support
multiple protocols and operate at different rates. An NE can belong to
multiple domains. For example, a device located in the intersected or
tangent point of an access ring and the core ring belongs to two
forwarding domains.
Domains and NE roles are often used for resource identification and
filtering.
preset intra-domain path planning rules. You can also manually plan
paths.
● Policy management
QoS and routing policies synchronized from domain controllers can have
differences from networks or vendors masked in service design. After SLA
policies are formulated and quantitative service requirements are provided,
NCE (Super) automatically monitors service status accordingly.
Policy Description
least hop, least delay, and least distance. You can select the optimal path
based on the path computation result.
e. The user clicks Provision to provision the service. NCE (Super) delivers
service connection segments to the corresponding domain controllers
based on the path computation result.
● Service verification
After the service is provisioned successfully, the user can perform connectivity
and throughput tests to verify the delivered service.
● Resource discovery
Resource discovery refers to the process of synchronizing resource data from
domain controllers or EMSs in one click. Currently, NCE (Super) supports the
following resource discovery modes:
– Manual full or incremental synchronization: synchronizes resource data
from domain controllers or EMSs in full or incremental mode through a
scheduled resource discovery task.
– Batch import: imports resource data to NCE (Super) in batches.
– Synchronization from specific NEs: synchronizes resource data from NEs
specified on NCE (Super).
– Manual or automatic inter-domain link discovery: discovers inter-domain
links through an inter-domain link discovery task according to the
corresponding inter-domain link discovery policy.
● Resource planning
– Cross link management: A cross link refers to a link between an IP NE
and a transport NE. Cross link management plays a key role in IP+optical
synergy. It records connections between routers and transport devices and
bridges the IP layer and optical layer.
Scenario Description
Multi-Layer Monitoring
Multi-layer monitoring enables multi-layer visualization for unified management
and display of IP and optical networks. Multi-layer monitoring provides the
following functions.
● Displays the IP+optical network topology in a unified manner.
● Provides the multi-layer topology view, multi-layer fault view, multi-layer
performance view, and multi-layer analysis view to integrate information from
different dimensions.
● Uses new protocols to synchronize network topology information in real time.
These protocols include southbound protocols such as BGP-LS and OSPF-TE
and northbound protocols such as RESTCONF, WebSocket, and SSE.
● Displays a 3D topology.
Multi-Layer Optimization
● Multi-layer network BOD: NCE (Super) provides traffic load analysis results
and allows you to perform multi-layer link BOD to quickly expand network
capacity on demand. If the traffic rate of a multi-layer link reaches the preset
threshold, you can quickly expand the network capacity without changing the
IP network topology. When the traffic rate of a multi-layer link decreases, you
can restore the original link bandwidth to release resources. Manual and
automatic BOD are both supported.
● Multi-layer reoptimization: If a device port goes down, the E2E status of the
corresponding tunnel also changes to down, resulting in SLA deterioration. In
this case, NCE (Super) can perform multi-layer reoptimization for the severely
affected TE tunnel, enabling rapid service recovery.
For details about NBIs, see NCE V100R019C00 REST NBI API Developer Guide.
Feature Customization
NCE applies to various service scenarios and vendor devices. Scenarios and
vendors require different features and parameters. To improve openness, NCE
(Super) provides the feature customization capability, enabling on-demand service
parameter customization.
Feature customization is a new function provided by NCE (Super) for further
openness. This function allows you to customize parameters for customer
networks and services without developing or releasing new versions.
2 New Features
This section describes the changes in key features compared with the previous
NCE version.
3 Architecture
● IT/OSS/application layer
The IT/OSS/application layer is a platform for carriers to implement digital
operation transformation. In addition to traditional OSS and BSS, the IT/OSS/
application layer also includes service orchestrator, policy generators based on
big data analysis and artificial intelligence, and e-commerce portals that
support self-service. The IT/OSS/application layer provides functions such as
network infrastructure resource presentation, service path presentation, and
service policy management to implement end-to-end operation of the entire
network. Carriers provide application services to customers through this layer,
including traditional services such as broadband, video, and B2B enterprise
private line services and emerging services such as cloud computing and
vertical industry IoT.
● NCE
In the southbound, NCE implements centralized management, control, and
analysis of network infrastructure, enables cloud-based resources, full lifecycle
automation, and intelligent closed-loop driven by data analysis for business
and service intension. In the northbound, NCE provides open network APIs for
quick integration with IT systems, helping carriers accelerate service
innovation and implement e-commerce operations.
● Design studio (shown on the left of the preceding figure): This framework is
responsible for designing and verifying multi-domain services offline or
Figure 3-3 Functions and features of external interfaces for NCE (Super)
3.3.1 NBIs
NCE offers network monitoring information, such as the alarm, performance, and
inventory information, for OSSs through NBIs. The NBIs support network
management, control, and analysis functions, such as service configuration and
diagnostic tests. Through the NBIs, NCE can integrate with different OSSs flexibly.
The devices of each product domain support different NBI functions. For details,
see the following tables.
Supported √
Not supported ×
SNMP Alarm √ × × √
RESTfu Performanc √ √ √ ×
l e
Inventory √ √ √ √
Configurati √ √ √ ×
on
Performance Indicators
Functions
The SNMP NBI supports the following functions:
● Alarm reporting
● Synchronization of active alarms
● Alarm acknowledgment
● Alarm unacknowledgment
● Alarm clearance
● Heartbeat alarm reporting
● Setting of alarm filter criteria
● Alarm maintenance status reporting
between clients and servers. RESTful software is simpler and more hierarchical,
and facilitates the implementation of the cache mechanism.
Performance Indicators
Indicator Description
Number of concurrent 10
requests for a single
interface
Super Functions
● Resource inventory
– Query of NE, port, and link data
● Service inventory
– Query of L0/L1/L2/L3 hybrid services
– Query of service definition templates
● Service provisioning and configuration
– Provisioning of composite services (L0/L1/L2/L3 hybrid services)
● Fault management
– Alarm subscription
– Alarm reporting
– Alarm synchronization
– Alarm acknowledgment/unacknowledgement
– Query of static alarm information
Restrictions and limitations:
The models and IDs of interfaces for the Super domain are not unified with those
for the transport and IP domains.
3.3.2 SBIs
Using SBIs, NCE can interconnect with physical-layer network devices and other
management and control systems to implement management and control
functions.
4 Deployment Schemes
Based on whether Huawei provides E2E support for software and hardware, NCE
supports two deployment modes: on-premises and private cloud.
Figure 4-1 NCE (Super) system networking (virtual machine, single site)
● The management DCNs of the primary and secondary sites can be isolated from each
other or not.
● The DR system requires high bandwidth. A replication link must be configured between
the primary and secondary sites.
● The management DCNs of the primary and secondary sites can be isolated from each
other or not.
● The DR system requires high bandwidth. A replication link must be configured between
the primary and secondary sites.
Figure 4-6 NCE (Super) system networking (private cloud, single site)
The DR system requires high bandwidth. A replication link must be configured between the
primary and secondary sites.
Basic Concept
EasySuite is a green web-based engineering tool provided by Huawei. It covers
complex engineering scenarios such as planning, installation, and migration. Using
EasySuite to create an NCE installation project simplifies installation and
deployment operations and improves efficiency.
5 Configuration Requirements
NCE has specific requirements on the hardware, software, client, and bandwidth to
ensure the stable running of the system.
5.1 Server Hardware Configurations for On-Premises Deployment
5.2 VM Configurations for Private Cloud Deployment
5.3 Server Software Configurations
5.4 Client Configurations
5.5 Bandwidth Configurations
Configuration Constraints
● Do not configure CPU, memory, or storage overcommitment. Otherwise, NCE
performance will deteriorate.
Configuration Requirements
DR arbitration - 1 4 8 150
Type Requirements
PC Minimum Configuration:
● CPU: 2 Core, 2.6GHz
● Memory: 4GB
● Hard disk: 8GB
Recommended Configuration:
● CPU: 4 Core, 3.1GHz
● Memory: 8GB
● Hard disk: 8GB
Type Requirements
Web ● Recommended:
browser – Google Chrome 70 or later (32-bit or 64-bit)
– Firefox ESR 61.0.1 or later (32-bit or 64-bit)
● Compatible:
– Google Chrome 57 or later (32-bit or 64-bit)
– Firefox ESR 52 or later (32-bit or 64-bit)
NOTE
● In the IP+optical scenario, visual experience may be deteriorated in the main
topology display of NCE (Super) when you use Firefox (affected by the
graphics card driver). Therefore, you are advised to use Google Chrome.
Network delay ● Between NCE and external systems (client, NE, and
third-party arbitration site): < 50 ms
● Between NCE and OSS: < 20 ms
● Between NCE VM nodes: < 10 ms
● Between the primary and secondary sites of the DR
system: < 50 ms
Packet loss rate ● Between NCE and external systems (client, NE, OSS,
and third-party arbitration site): < 1%
● Between NCE VM nodes: < 0.2%
● Between the primary and secondary sites of the DR
system: < 1%
Type Requirements
Bandwidth between The bandwidth between each OSS and the NCE NBI is 10
the server and OSS Mbit/s or above.
Bandwidth for communication between the server and
OSSs = Bandwidth for communication between the
server and each OSS × Number of OSSs For example, if
three OSSs are connected to the REST NBI of the same
NCE, the required bandwidth is 3 x 10 Mbit/s or above. If
there are two OSSs, one is connected to the REST NBI of
NCE, and the other is connected to the SNMP NBI of
NCE, the required bandwidth is 10 Mbit/s +10 Mbit/s or
above.
Type Requirements
System Interconnection
● Southbound interconnection: Integrated with Huawei or third-party systems
to quickly access NEs or virtual resources and obtain NE resources, alarm and
performance data, and virtual resources required for NCE service provisioning
or assurance. This improves interconnection efficiency.
– Configuring and managing southbound drivers: Before interconnecting
NCE with a southbound system, users need to import external drivers by
means of driver lifecycle management and configure SNMP parameters
so that SNMP alarms can be reported to quickly adapt to NEs and service
models (resources, alarms, and performance) of the interconnected
system. This achieves quick driver access and improves interconnection
efficiency. Users can also query driver types and monitor and delete
driver instances for unified driver management.
System Configuration
● Time synchronization: NCE nodes are managed and maintained in a unified
mode. Therefore, the Coordinated Universal Time (UTC) on each node must
be the same to ensure that NCE can properly manage services and data on
the nodes. An NTP-based external clock source is required to serve as the NTP
server of NCE so that the system time can be adjusted at any time without
manual intervention.
– A maximum of 10 NTP servers can be added on NCE. Only one active
NTP server can be configured, and the active NTP server is mandatory. In
a disaster recovery (DR) system, the primary and secondary sites must
use the same NTP server to ensure time consistency between the two
sites.
– After an active NTP server is configured, the OMP node synchronizes time
with the active NTP server preferentially. Service nodes then synchronize
time with the OMP node.
– When the active NTP server fails, NCE selects an available NTP server
from the standby NTP servers within 15 minutes and sets it as the active
NTP server. If multiple NTP servers configured on NCE become invalid,
the OMP node cannot synchronize time with the NTP server, and service
nodes will no longer synchronize time with the OMP node.
● License management: Updating and maintaining a license allow the system
to properly run based on the features, versions, capacity, and validity period
authorized in a license file.
License management allows users to initially load, update, and routinely
maintain licenses.
– Initially loading a license
After the system is deployed, you need to load a license by importing
license files so that you can use the system properly.
– Updating a license
During O&M, you need to update a license file under any of the following
conditions:
▪ Automatic mode: The O&M personnel set the message content and
message sending rules. Then, NCE automatically sends alarms and
reports to relevant personnel in the form of SMS messages or emails
through the short message service gateway (SMSGW) or mail server
connected to NCE.
System Monitoring
Global monitoring capability is supported to monitor NCE resource indicators such
as services, processes, nodes, and databases. This helps conduct predictive analysis
and detect potential risks in time. For key resources, the administrator can set
thresholds to trigger alarms and handle exceptions promptly.
● Service and process monitoring: Monitors the service running status and
indicators such as the CPU usage, memory usage, and number of handles.
When a process in a service stops abnormally or becomes faulty, NCE
attempts to restart the process. A maximum of 10 consecutive restarts are
allowed. If the number is exceeded, an alarm is generated, requesting users to
process the exception manually.
● Node monitoring: Monitors node indicators such as the CPU, virtual memory,
physical memory, and disk partitions. If any resource of the node encounters
an exception, the node is displayed as abnormal. If a key resource remains
abnormal within a sampling period, an alarm is generated.
● Database monitoring: Monitors database indicators such as the space,
memory, and disks. If any resource of the database encounters an exception,
the database is displayed as abnormal. If a key resource remains abnormal
within a sampling period, an alarm is generated.
System Maintenance
● System backup and restore: Backs up and restores the dynamic data, OS,
database, management plane, or application software of NCE. Data is backed
up in a timely manner. If any backup object is abnormal, you can use the
corresponding backup file to recover the object to the normal state.
● O&M management: Provides system maintenance and management
functions to help O&M personnel learn the health status of the system during
system running and reduce running risks. If a system fault occurs, fault
information can be collected for fault demarcation and locating to facilitate
repair and reduce losses.
– Health check: Checks and evaluates hardware, OSs, databases, networks,
and NCE services to learn the health status, detect abnormal check items,
and determine whether operation or running risks exist in NCE.
– Data collection: Provides data collection templates based on fault
scenarios, services, and directories. When a system fault occurs, O&M
personnel can collect logs and database tables as required and analyze
and locate the fault.
– Quick fault demarcation: Each service operation in the system is
implemented by invoking one or more services. During service operations,
the system automatically collects statistics on service operation status,
memory usage, and CPU usage for O&M personnel to quickly demarcate
faults and analyze resource consumption.
– Quick fault locating: This function provides default locating templates for
automatic fault locating. O&M personnel select templates based on fault
scenarios. This helps O&M personnel quickly obtain solutions and shorten
the fault locating time.
– System guard: System guard forwards critical and major alarms and
alarms (including common alarms, OS alarms, hardware server alarms,
and OMP alarms) that potentially affect the stable running of NCE from
the O&M plane to the management plane, and displays a pop-up
window to remind O&M personnel to view alarm details and handle
alarms in a timely manner on the System Guard page, ensuring the
normal running of NCE.
– Unified Monitoring: The unified monitoring function monitors the real-
time and historical data of NCE and compares and analyzes the data in
multiple dimensions to provide data reference for O&M personnel.
Help System
NCE provides a layered design for the help system adapting to user needs in
diverse scenarios. The help system supports anytime, anywhere, and on-demand
learning. A variety of help forms such as tooltips, panels, question mark tips, and
Information Center are provided. All necessary information is directly displayed on
the GUI. Information that is closely related to the current operation is folded. You
can expand the information if necessary. Systematic learning information is placed
in the Information Center.
Alarm severity
Alarm severities indicate the severities of faults. Alarms need to be handled
depending on their severity. Alarm severities can also be redefined, as shown in
Table 6-2.
Different handling policies apply to different alarm severities. You can change the
severity of a specific alarm as required.
The severity of an alarm needs to be adjusted when the impact of the alarm becomes
larger or smaller.
Alarm statuses
Table 6-3 lists the alarm statuses. Figure 6-2 lists the alarm status relationship.
Acknowledged and cleared alarms are moved to the historical alarm list, and a
non-historical alarm is called a current alarm. Table 6-4 shows the definition of
an alarm.
Alarms or events are displayed on the page when NEs, services, and
interconnected third-party systems detect their exceptions or significant status
changes. Table 6-6 describes the types of alarms and events.
Operation alarm Alarms generated when the required services cannot run
properly due to problems such as service unavailability,
faults, or incorrect invocation. Example: service rejection,
service exit, and procedural errors.
Type Description
File transfer status Alarms or events reported when the file transfer succeeds
or fails.
Alarm merging To help you improve the efficiency of monitoring and handling
rule alarms, alarm management provides alarm merging rules.
Alarms with the same specified fields (such as location
information and alarm ID) are merged into one alarm. This
rule is used only for monitoring and viewing alarms on the
Current Alarms page and takes effect only for current alarms.
The specific implementation scheme is as follows:
● If a newly reported alarm does not correspond to any
previous reported alarm that meets the merging rule, the
newly reported alarm is displayed as a merged alarm and
the value of Occurrences is 1.
● If the newly reported alarm B and the previous reported
alarm A meet the merging rule, alarm B and alarm A are
merged into one alarm record and are sorted by clearance
status (uncleared alarms are displayed first) and occurrence
time in descending order.
If alarm A is displayed on top, it is still regarded as a
merged alarm, and the Occurrences value of the merged
alarm increases by one. Alarm B is regarded as an individual
alarm.
If alarm B is displayed on top, it is regarded as a merged
alarm, and the Occurrences value of the merged alarm
increases by one. Alarm A is regarded as an individual
alarm.
In the alarm list, click Occurrences of an alarm, you can
view the detailed information about the merged alarm and
individual alarm.
● If a merged alarm is cleared, it is converted into an
individual alarm. All individual alarms will be sorted by
clearance status (uncleared alarms are displayed first) and
occurrence time in descending order. The first one is
regarded as a merged alarm.
● If a merged alarm or individual alarm is cleared and
acknowledged, the alarm will be converted to a historical
alarm and the value of Occurrences decreases by one.
Mechanism Description
Alarm dump To avoid excessive alarm database data, the system processes
rule events, masked alarms, and historical alarms every two
minutes according to the following rules. The dumped alarms
or events cannot be queried in the alarm or event list.
● If the database space usage reaches 80%, alarm
management dumps the data in the database to files
according to the sequence of occurrence time and data
table type (event, masked alarm, or historical alarm). When
the space usage after dumping reaches 80% of the usage
before dumping, the dumping is stopped.
● The dumped file will be deleted after 180 days.
● If the total size of the dumped files exceeds 1 GB or the
total number of files exceeds 1000, the system deletes the
earliest files.
Function Description
Function Description
For details about how to monitor alarms or events and handle alarms, see Table
6-9.
Monitoring and O&M personnel can monitor alarms and view alarm or event
Viewing Alarms information in alarm management in real time.
or Events ● Alarm or event list
– Provides a current alarm list to push alarms to the
Current Alarms page. O&M personnel can monitor and
handle alarms in real time using the list.
– Provides an alarm log list. You can view current and
historical alarms. By default, 20,000 alarms can be
displayed.
– Provides an event log list, which presents the event
messages sent by devices to the system. By default,
20,000 events can be displayed.
● Statistics panel
On the Current Alarms page, the statistics panel is
provided to display the following statistics:
– Top 10 Alarms: Collects statistics on the top 10 alarms
that are most frequently reported.
– Duration: Collects statistics on the number of current
alarms by duration.
– Top 10 Alarm Sources: Collects statistics on the top 10
alarm sources with the largest number of current
alarms.
– Severity: Collects statistics on the total number of
current alarms and the number of current alarms at
each alarm severity.
– Status: Collects statistics on the number of alarms by
acknowledgement and clearance status.
● Alarm or event name group
You can add multiple alarm or event names to a name
group to perform operations on them at a time.
● Object group
You can add multiple alarm or event sources to an object
group to perform operations on them at a time.
● Alarm sounds and indicators
When a new alarm is reported, alarm management plays
a sound. The alarm indicator that corresponds to the
severity of the alarm starts to flash to remind you to
handle alarms in a timely manner.
● Filter
You can set criteria to filter alarms that require special
attention.
● Browsing alarms by status or severity
A page is divided into four areas to display current alarms
by status or severity.
Function Description
Table 6-10 describes the routine maintenance functions such as alarm data
management.
User Management
● User
– Information about a user includes a user name, password, and
permissions.
– User admin is the default user in the system, that is, the system
administrator. User admin can manage all resources and has all
operation rights. This user is attached to both the Administrators and
SMManagers roles.
– The user who has the User Management permission in the default
region is a security administrator.
– The Administrators role has all the permissions except User
Management. The user attached to this role is an administrator.
● Role
Users attached to a role have all the permissions granted to the role. You can
quickly authorize a user by attaching the user to a role, facilitating permission
management. Figure 6-3 shows role information.
Users attached to a role have all the permissions granted to the role and can
manage all the resources managed by the role. A user can be attached to
multiple roles. If a user is attached to multiple roles, this user has all the
permissions granted to the roles and can manage all the resources managed
by the roles.
Default roles cannot be deleted and their permissions cannot be modified
because the permissions are granted by the system. The system provides the
following default roles:
NOTICE
Administrators The user group has all the permissions except User
Management, Query Security Log, View Online Users,
and Query Personal Security Log. The user attached to
this role is an administrator.
The role to The user group has the Invoke Southbound APIs
invoke permission.
southbound
APIs
NBI User Group The user group has the permission to configure the
northbound interfaces such as SNMP, CORBA, XML,
OMC, TEXT, and RESTful NBIs.
Guest The domain of this user group is All Objects, and it has
operation rights for default monitor operation sets. They
can perform query operations, such as querying statistics,
but cannot create or configure objects.
Maintenance The domain of this user group is All Objects, and it has
Group operation rights for default maintenance operation sets.
In addition to the rights of the Guests and Operator
Group groups, users in this group have the rights to
create services and perform configurations that affect
the running of the NCE and NEs. For example, they can
search for protection subnets and trails, delete composite
services, and reset boards.
Operator Group The domain of this user group is All Objects, and it has
operation rights for default operator operation sets. In
addition to the rights of the Guests group, users in this
group have the rights to modify, (rights to perform
potentially service-affecting operations are not involved).
For example, they can change alarm severities.
Permission Management
A permission defines what operations a user can perform on what objects.
Permission elements include an operator, operation objects, and operations as
shown in Figure 6-4.
● Permission
– Users act as operators.
– Operation objects include the system and resources (physical and virtual
resources, such as servers, network devices, and VMs) where users
perform operations.
– Operations include application operations and device operations.
Application operations are performed on the system. Device operations
are performed on resources.
● Authorization mechanism
Authorization is a process of granting permissions on certain objects to users.
Authorization mechanism of User Management is as follows:
– To authorize a user with an object on which this user needs to perform
operations, add this object to the managed objects of the role that this
user is attached to.
● Users can perform application operations and device operations. If only managed
objects are configured for a role but no device operation is configured, users of this
role can view the managed objects after logging in to the system but do not have
the operation rights for the managed objects.
● If Assign rights to users directly is selected, permissions can be directly granted to
users.
● Authorization method
The authorization method of user management grants permissions by
attaching a user to a role. After the security administrator sets role
permissions (including managed objects and operation rights), the security
administrator attaches the user to a role so that the user has the permissions
of this role. If Assign rights to users directly is selected, permissions can be
directly granted to users.
User authorization allows security administrators to implement authorization
for all users in a post at one time. If the employees of a post are changed,
security administrators can delete the original user from the role and add the
new user to authorize the new user.
● Secondary authorization
Secondary authorization policies are required to ensure that users can
cautiously perform operations that are dangerous or have major impact.
Regions Management
Regions can be classified by geographic location or resource usage. Users can be
authorized based on regions.
The permissions and managed objects set for a region administrator on the
Mandate-Operation Rights and Mandate-Managed Objects tab pages can
be assigned by the region administrator to roles in the region.
● When users modify their personal data, such as mobile numbers and email
addresses, they are obligated to take considerable measures, in compliance with
the laws of the countries concerned and the user privacy policies of their company,
to ensure that the personal data of users is fully protected.
● To ensure the security of personal data, such as mobile numbers and email
addresses, these data is anonymized on the GUI, and HTTPS encryption
transmission channels are used.
● Resetting a User Password: If a user other than admin loses the password or
cannot change the password, this user needs to contact security
administrators to reset the password.
NOTICE
● You are not allowed to reset the password of user admin. If you forget the
password of user admin, it cannot be retrieved and you can only reinstall
the system. Therefore, ensure that you memorize the password of user
admin.
● For account security purposes, it is recommended that third-party system
access users contact the security administrator to periodically reset their
passwords.
Security Policies
Security Policies allow you to set access control rules for users. This function
improves O&M efficiency and prevents unauthorized users from performing
malicious operations in the system to ensure system security. The security policy
function allows you to set account policies, password policies, login IP address
control policies, and login time control policies.
● Account policies: An account policy includes the minimum user name length
and user login policies. Appropriate setting of an account policy improves
system access security. The account policy is set by security administrators
and takes effect for all users.
● Password policies: A password policy includes the password complexity,
change interval, and character limitation. Appropriate setting of a password
policy prevents users from setting weak passwords or using a password for a
long period of time, improving system access security. The password policy is
set by security administrators and takes effect for all users. A new password
policy does not affect the configured password.
● Login IP address control policies: A client IP address control policy provides a
control mechanism for checking the accessibility of the IP address used by an
external access request during system operation. After an IP address control
policy is set and applied, users are allowed to log in to the system only using
IP addresses within a specified IP address range.
● Login time control policies: A login time control policy provides a control
mechanism for checking the validity time of an external access request during
system operation. After a login time control policy is set and applied, users
are allowed to log in to the system only within the specified period.
Scenario
Log Management is used when you need to perform routine maintenance, locate
and troubleshoot faults, trace historical logs, and query operation logs across
systems.
● Routine maintenance
You need to view logs during routine maintenance. If there are logs recording
failed, partially successful, or unknown operations, or logs in Risk level,
analyze the exception causes and troubleshoot the faults.
● Fault locating and troubleshooting
To locate and troubleshoot faults occurring during system running, you can
analyze logs to detect whether risk-level operations or operations that affect
system security are performed.
● Historical log tracing
Logs are stored in the database after being generated. The system periodically
dumps logs from the database to a hard disk for sufficient database space.
The system periodically deletes the dumped logs from the hard disk for
sufficient disk space. To ensure the integrity and traceability of logs, you can
forward these logs to the Syslog server.
● Cross-system operation log query
If you need to query operation logs meeting the same criteria on different
systems, you can set filter criteria on one of the systems, save these criteria as
a template, and import the template to other systems.
Log types
Log Management allows the system to automatically record the information
about operations performed by users in the system and the system running status.
Log Management records five types of logs. Table 6-11 describes the log types.
Log Management
When operations are performed by users in the system or events are triggered by
the system, Log Management records logs and saves the logs to the Log
Management database for users to view on the GUI. In addition, Log Management
can automatically dump the logs from the database to the hard disk.
To trace user operations, system operations, and system tasks, you can forward
concerned logs to the Syslog server.
Log Forwarding
Log Forwarding Settings is used when users need to trace the logs recorded by Log
Management, and query and analyze the logs recorded by Log Management and
the logs of other functions in real time.
● Users need to permanently store the logs recorded by Log Management so
that they can trace the logs to locate problems or rectify faults.
● Users need to query and analyze the logs recorded by Log Management and
the logs of other functions in real time on Syslog servers so that they can
centrally manage the logs and detect and handle potential security risks in a
timely manner.
Figure 6-8 shows the principles of Log Forwarding Settings.
Usage Scenarios
The Private Line Analysis and Assurance app is applicable to the scenario where a
private line is provisioned by NCE (Super) and the private line service needs to be
monitored.
Currently, IP RAN site-to-site private line scenarios are supported.
Features
The Private Line Analysis and Assurance app focuses on the objects on NCE
(Super). For example, the app manages only E2E and segmented services. It does
not process internal service details.
The Private Line Analysis and Assurance app provides the following functions:
● TP and CPE monitoring
NCE (IP Domain) is informed to monitor the TP and CPE indicators over a
northbound interface (NBI), and then sends the monitoring results to NCE
(Super) through Kafka.
● Private line SLA monitoring
The Private Line Analysis and Assurance app on NCE (Super) delivers E2E
monitoring requests. The app automatically determines whether to deliver
TWAMP or Y.1731 tests, and instructs NCE (IP Domain) to create test cases
through an NBI. NCE (IP Domain) sends the test results to NCE (Super)
through Kafka.
● Availability monitoring for private lines
According to the SLA detection result, if the packet loss rate is above the
threshold, the private line is considered unavailable and the availability of this
private line is calculated.
● Fault demarcation for private lines
Through path restoration, the hop-by-hop path of a private line is displayed.
The PW Trace or LSP Trace test is used to detect the connectivity of each hop.
In addition, the traffic of devices on each hop and the CPU or memory usage
are displayed, helping fault demarcation.
● Alarm reporting for private lines
SLA alarms, with information about access points of both ends, can be
reported to NCE (Super) based on private lines and connections.
If the SLA indicators (delay, jitter, and packet loss rate) do not exceed the
upper threshold but the traffic suddenly becomes low, the system reports
sudden traffic drop alarms based on private lines and connections.
Table 6-14 KPIs of the Private Line Analysis and Assurance app
Resource Type KPI Description
Feature Restrictions
The restrictions on the Private Line Analysis and Assurance app are as follows:
● Currently, only IP RAN site-to-site private lines scenarios are supported.
● The Y.1731 test does not support real-time detection.
● For site-to-site private lines, only the Option A multi-domain L2VPN+L3VPN
private line supports detection of VPN segments.
● Third-party devices are not supported.
used to help you make optimal decisions. In the network simulation analysis field,
what-if analysis simulates possible network changes (such as node or link failure,
traffic change, TE tunnel constraint configuration modification, multi-layer link
activation or deactivation) and analyzes the impact of these changes on services.
This helps O&M personnel understand the impact scope of failures and link
activation or deactivation, traffic change risks, and control path computation
simulation results after TE tunnel parameters are changed, and analyze and
formulate necessary solutions to improve service reliability.
What-if analysis parses and infers the entire network topology and protocols
based on regularly synchronized live-network configuration, network topology,
and traffic information. You can set key node or link failures, modify TE tunnel
constraint configuration parameters, optimize traffic, and activate or deactivate
multi-layer links to simulate or analyze the impact of these changes on services.
The key functions of what-if analysis are topology restoration, traffic simulation
analysis, TE simulation analysis, failure simulation analysis, and link activation and
deactivation analysis.
For details about the maximum management capability of What-if analysis, see
What-if Analysis Management Capabilities in 11.3 Service Management
Capabilities.
Traffic simulation analysis, TE simulation analysis, fault simulation analysis, and link
activation and deactivation simulation analysis are different application scenarios of what-if
analysis. You can set traffic simulation parameters, modify TE tunnel constraint
configuration parameters, set failures, and activate or deactivate multi-layer links to
perform simulation analysis in multiple scenarios.
Controller, and Analyzer of NCE (IP Domain), NCE (Super), and NCE (Transport
Domain). In addition, you can select an NCE (IP Domain) system and an NCE
(Transport Domain) system respectively to synchronize data based on different
deployment scenarios.
The following table lists the data to be prepared for what-if analysis in different
application scenarios.
The major differences between flow data and load data are as follows:
● Flow data: E2E service traffic data, including the IP addresses of source and
destination devices, and traffic volume.
● Load data: throughput data of each interface in a certain period.
● Set the flow volume or percentage to prepare for simulating network load
change after the flow is added or adjusted.
● Analyzes changes in the flows carried on a tunnel before and after constraint
configuration of the TE tunnel is modified, helping you identify whether the
flows carried on the key tunnels are changed.
Figure 6-21 Flows carried on the tunnel after the constraints of the tunnel
have been modified
Only optical nodes and optical-electrical nodes can be set as failures. Electrical nodes
cannot be set as failures.
● Changes to the flows carried on links or TE tunnels before and after failures
occur, helping users check whether the flows carried on key links or TE
tunnels have changed
after IF definition on the What-If Analysis app. Based on the simulation results,
you can analyze link load threshold crossing, tunnel and flow multi-layer path
Based on the simulation results, you can analyze link load threshold crossing,
tunnel and flow multi-layer path changes, multi-layer link rerouting, interruption,
degrade, adding and deleting, and tunnel path, delay, and hop count changes
before and after the IF definitions occur.
● Load traffic maps before and after IF definitions, helping users identify
overloaded links after IF definitions
● Simulation statistics reports in Excel or on the GUI. The report displays the
number of flow changes, flow interruptions, tunnel interruptions, overloaded
links, and interrupted, rerouted, added and deleted multi-layer links.
7 Usage Scenarios
Background
The legacy private line bearer networks cannot provide high MSTP bandwidth or
support advanced technologies. Though OTN networks can provide flexible access
for SDH services and support Layer 2 Ethernet services such as E-Line and E-LAN,
they are weak at Layer 3 and have difficulty in providing access for private lines
due to their positions.
IP RANs are strong at Layer 3 because they have routers, which is suitable for
complex mesh networking. In addition, IP RANs feature comprehensive coverage.
Therefore, carriers prefer to use IP RANs to provision private line services.
Carriers' IP RANs are deployed by city. One IP RAN is deployed in each city. If a city
uses devices from two vendors, two IP RANs will be deployed. Enterprise branches
in different cities need to interconnect with each other across different IP RAN
networks. Therefore, they need multi-domain multi-vendor IP RAN private lines.
Solution
Scenario 1: Option C Site-to-Site Private Line Service
This service allows enterprise branches to communicate with each other in the
following scenarios:
● An enterprise has two branches 1 and 2 in the same city and needs to apply
for a private line service to connect the branches. This scenario requires an
intra-city site-to-site private line service.
● An enterprise has branch 1 in city A and branch 3 in another city and needs to
apply for a private line service to connect the two branches. This scenario
requires an inter-city site-to-site private line service.
Figure 7-1 Option C site-to-site private line service (separated CPE management)
Flexible CEs can be single-homed to CPEs through VLANs, and CPEs can
access be single-homed to CSGs through static PWs.
modes CEs can be single-homed to CPEs through VLANs, and CPEs can
be dual-homed to CSGs through static PWs.
CEs can be single-homed to CPEs through VLANs, and CPEs can
be single-homed to ASGs through static PWs.
CEs can be single-homed to CPEs through VLANs, and CPEs can
be dual-homed to ASGs through static PWs.
The two IP RANs accessed by CPEs are provided by different vendors. One CPE
connects to the IP RAN managed by NCE (IP Domain), and the other CPE connects
to a third-party IP RAN managed by a third-party controller. This scenario is
similar to a common inter-city Option C scenario. The only difference is that one
IP RAN belongs to a third party.
Figure 7-6 CPE+MS-PW+CPE site-to-site private line across the IP RAN domain
Figure 7-9 shows a private line between two enterprise sites, and services are
transmitted across the provincial backbone network (core domain).
NCE (Super) interconnects with NCE (IP Domain) in the southbound direction, and
NCE (IP Domain) synchronizes inventory data from the core domain, the access
and aggregation domains as well as CPE devices. The working and protection
paths correspond to the primary and secondary PWs, respectively.
Scenario 9: Option A Inter-City Site-to-Site Private Line Service
Enterprise A needs to interconnect its branches (Branch 1 and Branch 2) in two
different cities. NCE (Super) interconnects with NCE (IP Domain), or a third-party
controller in the southbound direction to manage devices in the core domain.
In centralized CPE management scenarios, CPEs and devices in the IP RAN domain
are managed by the same controller. In separate CPE management scenarios, CPEs
and devices in the IP RAN domain are managed by different controllers.
A CPE can access the IP RAN domain in either of the following ways:
1. Static PW: A static PW is directly configured on the CPE.
2. VLAN: The CPE is classified as a single-NE domain for service provisioning.
This scenario has the following characteristics:
● The Option A solution is also called the back-to-back solution. As shown in
Figure 7-10, the ASG and ASBR serve as an access points for each other and
an inter-domain link needs to be created in between.
● The five-segment VPN service refers to the service divided into five service
domains according to the service integrity principle.
● ASGs are fully meshed with nodes in the access and aggregation domains.
This scenario provides the following extended capabilities.
Extended Description
Capability
From the perspective of users, the purpose of the service is to access the Internet.
Therefore, this service is called the site-to-Internet service.
This scenario has the following characteristics:
1. The service is a circuit cross connect (CCC) service. NCE (Super) manages only
the CCC service on CPE1 and service in IP RAN domain.
2. A large-capacity PW is provisioned between CSG1 and ASG1. Multiple users
under the same CPE share the same PW.
3. The site-to-Internet private line is provisioned in a nested manner. That is, the
intra-domain server-layer service is provisioned before the client-layer service.
The client-layer service directly uses the server-layer service.
4. The server-layer service does not have bandwidth limits. The client-layer
service, however, has a bandwidth limit on the UNI side of the CPE domain.
5. The existing OSS/BSS provisions service configurations on the BRAS/CR.
Scenario 12: IP RAN Access to the Backbone MS-PW Cloud/IoT Private Line
Figure 7-16 shows a site-to-cloud private line used by CEs to access the cloud DC.
NCE (Super) interconnects with NCE (IP Domain) to manage CPEs, IP RAN devices,
and provincial backbone devices.
The networking scenario of the IoT private line is the same as that of the site-to-
cloud private line, but their PW protection configurations are slightly different.
Figure 7-16 IP RAN Access to the Backbone MS-PW Cloud/IoT Private Line
NCE (Super) manages services from the BRAS to PEs. The BRAS belongs to the
metro network, and the PEs connect to the cloud and belong to the converged
cloud backbone network.
If the IP RAN for city A and the converged cloud backbone network are managed
by the same set of NCE (IP Domain), NCE (Super) processes the service as a
single-domain L3VPN service.
Scenario 14: PON+Seamless MPLS VPWS Site-to-Cloud Private Line
Figure 7-21 PON+seamless MPLS VPWS site-to-cloud private line (single domain)
If the IP RAN for city A and the converged cloud backbone network are managed
by the same set of NCE (IP Domain), NCE (Super) processes the service as a
single-domain L2VPN service.
The two enterprise sites are interconnected using SRv6 BE. MPLS does not need to
be enabled on the IPv6 network, which greatly simplifies network configuration.
In this scenario, an enterprise site accesses the network through a CPE. The IPv6
network is established between CPEs through pre-configuration. SRv6 BE is
enabled for services to establish E2E IPv6 forwarding paths for interconnection.
Benefits
This feature offers the following benefits:
Key Features
Feature Name
ID
Background
To meet future service development requirements and facilitate O&M on the live
network, the packet transport network (PTN) must be further evolved. The
centralized management and control architecture provides superb evolution
performance for software-defined networking (SDN), making it possible for the
PTN to combine the advanced concepts of SDN with carrier-class reliability and
high service quality and smoothly evolve to the SDN PTN (SPTN).
Solution
Scenario 1: Group Customer Private Line
In this networking scenario, the SPTN private line solution uses NCE (Super) to
manage multiple sets of NCE (IP Domain) to implement automatic provisioning
and management of the multi-domain E2E Layer 2 private line.
Benefits
The SDN-based SPTN feature provides the following benefits:
Key Features
1. Policy-based Intelligent Path Selection
Most service paths on the live network are computed on the OMC. The route
selection policy is relatively simple and cannot meet the requirements for flexible
route selection in multiple scenarios because of the universality of the OMC.
Therefore, the intelligent routing capability needs to be introduced into the SPTN
system, so that service paths that meet route selection constraints and
requirements are selected.
During service provisioning, routes that comply with the routing policy need to be
selected based on route selection requirements. Routing policies are divided into
the following types:
● Default policy: The working and protection paths are carried over different
fibers. To be specific, the paths are carried over different devices, different
boards, and different links. The default policy is automatically applied during
the path computation and does not need to be specified.
● Basic policy: includes the shortest path, the networking load balancing, and
the shortest delay policies. You can specify a basic policy during path
computation. If no basic policy is specified, the shortest path policy is used by
default.
● Advanced policy: Aggregation nodes are not deployed in the same equipment
room, and cannot be deployed on other access rings. The protection and
working paths are carried over different fibers. The advanced policy is based
on inventory information on the network and the method to obtain inventory
information needs to be further researched.
The detailed requirements for different routing policies are as follows:
● The working and protection paths are carried over different fibers: Service
protection is the most important reliability method of the PTN, ensuring that
Figure 7-25 Working and protection paths carried over different fibers
● Shortest path: After this policy is selected, paths are selected based on the
principle that the minimum number of hops are passed. If you do not specify
any basic policy, the shortest path policy is used by default.
● Network load balancing: After this policy is selected, paths are selected based
on the link load (planned CIR) to avoid links planned with overloaded
bandwidth.
Network load balancing is implemented in the following scenarios:
a. If multiple links are deployed between two nodes, different services are
load-balanced on different links.
b. On a ring network, different services are load-balanced in different
directions of the ring.
● Shortest delay (not supported in the current version): When service paths are
selected based on the configured bandwidth and the link delay and node
delay measured on the network, the E2E service path with the shortest delay
is selected.
The intelligent routing policies are applicable to the service provisioning phase and these
routing policies are not used during the rerouting process caused by a channel fault.
The display of the performance and quality of a private line is implemented by third-party
apps.
● Route re-optimization
For service protection purposes, the live network has a primary LSP and a backup
LSP. However, they may share the same optical fiber (co-routed). When a fault
occurs on an NE or port along the fiber, both the primary and backup LSPs
become unavailable, interrupting services.
Route re-optimization can identify the co-routed services in advance and optimize
the routes to prevent co-routing and improve service security.
Re-optimization can be performed on a faulty service tunnel to generate two
disjoint paths.
The service paths can be modified to solve the co-routing problem for the primary
and backup LSPs.
Background
A carrier may use multiple technologies and networks on the access and
aggregation sides to carry customers' private lines, so as to provide various access
modes and meet service requirements at different levels. For example, a carrier
may use a GPON, microwave, or CPE network on the access side, and an IP RAN
or OTN on the aggregation side. If a service needs to be provisioned across
technologies, domains, and network segments, it is necessary to use multiple
controllers.
Solutions
Scenario 1: CPE+OTN Site-to-Site Private Line
Figure 7-33 Protection scenario where the port type is MC-LAG or LAG
As shown in Figure 7-36, one end of the enterprise network connects to the IP
RAN through a CPE, and the branch in another city connects to the optical
aggregation network through an ACC. The OTN in the local city of the IP RAN
serves as a pipe to connect the IP RAN to the IP core network. The ACC access
point and OTN communicate with the IP core network in back-to-back mode.
During service provisioning, NCE (Super) manages one CPE access domain
(including the ACC), one IP RAN domain, one OTN domain, and one IP core
domain. Tenant services are CPE+IP RAN+ACC multi-domain services.
The service type is VLAN-based L2VPN on the CPE (including ACC), VLL in the IP
RAN domain, EVPL in the MS-OTN domain, and VLL or L3VPN in the IP core
domain.
Scenario 6: E2E Microwave Site-to-Site Private Line (Remote Access Nodes Are
Used by the IP RAN to Extend Private Line Coverage)
As shown in the following figure, an enterprise site uses CPEs as access points to
connect to the IP RAN through a microwave network. It then communicates with
enterprise sites in other locations, or accesses the Internet over the IP core
network. The microwave network is an E-LAN that uses the hub-spoke
networking. The microwave NEs connecting to CPEs are spoke nodes, and the
microwave NE connecting to the IP RAN is a hub node. During service
provisioning, the microwave service is processed as a nested server-layer service,
and the E2E service is processed as a client-layer service.
NCE (Super) manages one CPE access domain, one microwave domain, one IP
RAN domain, and some other network domains (such as MS-OTN and IP core).
NCE (Super) provisions the E2E service across these domains.
Benefits
This feature offers the following benefits:
Key Features
Feature Name
ID
Background
The optical multi-domain private line solution is an E2E service provisioning and
management solution for multiple domains and vendors in the transport domain.
Traditional transport services are configured in an E2E manner using a vendor's
NMS. The NMS of a vendor can manage the networks and services of only one
city or one vendor. To meet network simplification requirements, customers want
to transform separated provisioning and management into service-oriented E2E
management. In response to this, the optical multi-domain private line solution
comes into place.
Solutions
Scenario 1: Single-Domain Scenario
As shown in Figure 7-41, NCE (Super) manages an optical domain. This domain
can be a core domain or an access (metro) domain.
Commonly used access services include SDH, Ethernet, SAN storage, OTN, and
video services. The provincial/municipal network can interconnect with the
national backbone network through line boards that provide OTU gray-light
signals or tributary boards that provide client-side gray-light signals.
The cascading scenario is used when the national backbone network and
provincial subnets of a carrier operate independently. Two sets of NCE (Super) are
deployed in cascading mode to manage intra-province, provincial, and multi-
province services, and also to implement carrier slice management. The cascading
scenario helps customers quickly decouple the network O&M architecture,
simplifies service design across large business domains, shortening the time for
provisioning multi-domain services. In cascading scenarios, services are managed
as follows:
Upper-layer NCE (Super) and lower-layer NCE (Super) is used to distinguish the two sets of
NCE (Super).
● Lower-layer NCE (Super) manages intra-province services. As shown in the
following figure, the provincial subnet on the left manages services of the
current province through NCE (Super) of the provincial backbone network.
● Upper-layer NCE (Super) manages inter-province services. The provincial NCE
(Super) and group NCE (Transport Domain) controllers are invoked for unified
management.
Benefits
The optical multi-domain private line solution offers the following benefits:
● Provides E2E service GUIs from the user perspective to display service
dynamics clearly, enabling you to quickly identify the domain or vendor
whose services are interrupted.
● Allows you to provision multiple services based on a service template
designed in advance, reducing configuration workload while ensuring
consistent service provisioning.
● Reduces the difficulty of service provisioning and enables one-click service
provisioning across domains and scenarios, improving service provisioning
efficiency.
Key Features
Background
Global industry digitalization is sweeping all industries, making enterprise
application cloudification an irresistible trend. Moving enterprise applications to
the cloud inevitably requires multiple types of private line services. Multi-cloud
interconnection, also called site-to-cloud, is a type of private line service provided
by carriers.
Solution
In scenarios where access to the public cloud (such as Alibaba Cloud) over a
private line is needed, after the physical private line is implemented, you still need
to create boundary routers, router interfaces, and configure routes. Such
configurations are complex and require high technical skills. Multi-cloud
interconnect orchestrates and integrates all the preceding configuration
operations, realizing instant access to Alibaba Cloud. Currently, the integrated
orchestration capability supports mainstream public clouds both in and outside
China, such as Alibaba Cloud, Tencent Cloud, and AWS.
Deployment Process
● The carrier creates a network management service template for cloud
interconnection nodes on NCE (Super) and defines the network service, link,
and resource allocation information for the cloud interconnect service
platform.
● A tenant orders a site-to-cloud private line service on the cloud side after
applying for a VPN service from the carrier and a cloud service from the cloud
management platform.
● The site-to-cloud private line service calls the NCE (Super) NBI to activate
connections on the network and cloud sides and configure VLANs.
Benefits
The SDN-based multi-cloud interconnect feature provides cloud-network synergy,
which facilitates service configuration and enables automated deployment of
cloud and network services based on the API capabilities provided by NCE (Super).
Key Features
Feature Name
ID
Background
An IP network is composed of two layers: an IP layer formed by routers and an
optical layer formed by wave-division multiplexing (WDM) devices. The IP network
focuses on user service processing, whereas the optical network focuses on traffic
transmission. Simply put, the optical network extends the link transmission
distance of the IP network.
The router platform, which possesses strong packet processing and traffic
management capabilities, is ideal for service management. The optical network
focuses on reducing the cost per bit and improving network reliability. It carries
router services by means of wavelength multiplexing to support large-capacity
and long-distance transmission.
The IP and optical layers, in terms of planning, operation, and maintenance, have
been developing independently for a long time. Carriers have separate
departments to plan, design, deploy, and maintain IP and optical networks.
Frequent inter-department collaboration results in duplicate investments, low
resource utilization, and low work efficiency. As a result, the IP network is hard to
deploy and maintain. In general, the legacy IP network faces the following
challenges:
● Long network planning and deployment time and difficult network
adjustment
The network planning process is complex and time-consuming. For example,
network expansion planning at carrier T usually takes more than one year.
The IP and optical network deployment process is complex and typically
needs to be adjusted several times. As a result, it usually takes several months
to provision a new service.
Inefficient inter-department collaboration and heavy manual workload further
add to service provisioning difficulties.
figure, the planned network usage is balanced (assuming that the usage rate
is 50% for each link). In the real-world scenario, however, the network usage
remains unbalanced for a long time. Some links are heavily loaded (70%),
and some links are lightly loaded (30%). It is difficult to change such an
unbalanced situation.
Solution
The NCE-based IP+optical solution provided by Huawei reshapes the resource
configuration pattern of traditional networks. This solution achieves effective
synergy between IP and optical networks through software-based network
configuration control, simplifying network O&M and improving network
intelligence and automation.
As optical network techniques develop and the GMPLS control plane is introduced
to optical networks, these networks can now dynamically schedule resources. Most
commonly used optical network techniques are ROADM (Reconfigurable Optical
Add/Drop Multiplexer) and OTN (Optical Transport Network).
Huawei has defined a new network architecture featuring NCE-based IP+optical
synergy in this solution. Specifically, Huawei has defined:
● A new network architecture, which consists of a series of integrated software
modules for network planning and control, network traffic analysis, policy
management, service provisioning
● Relationships and interfaces between software modules and between
software modules and network layers
● A collaboration mechanism between IP and optical networks
The NCE-based IP+optical solution uses the SDN architecture to effectively
synergize IP/MPLS and optical resources on backbone networks, improve resource
utilization, increase O&M efficiency, and reduce TCO (Total Cost of Operation).
As shown in Figure 7-46, this solution uses a hierarchical architecture consisting of
the application layer, network management and control layer, and infrastructure
network layer. In this solution, NCE (Super) works with NCE (IP Domain) and NCE
(Transport Domain) to provide capabilities absent from traditional O&M solutions,
such as multi-layer network planning, visualization, provisioning, protection,
optimization, and simulation. This solution significantly improves resource
utilization, network reliability, and multi-layer O&M efficiency without affecting
the existing network.
Component Function
The Open API & Tool app provides the definition and usage description of
NCE open APIs.
Benefits
The SDN-based IP+optical solution meets the requirements of backbone network
traffic in the cloud era, adapts to new information consumption modes, quickly
responds to changes, reduces O&M costs, and improves customer experience.
Key Features
The NCE-based IP+optical solution mainly applies to IP+optical networks. NCE, a
full lifecycle O&M platform, provides functions such as automated multi-layer
network discovery, visualization, and deployment, multi-layer protection, multi-
layer optimization, and multi-layer what-if analysis.
● Transport devices must support SDN and have this function enabled. If SDN is
disabled, only OSN 1800s with old system control boards (such as TNF1SCCs) can
provide some visualization capabilities
● Routers must support SDN and run SDN-related protocols, such as BGP-LS and
PCEP. Routers that do not run SDN-related protocols can provide only some
visualization capabilities.
● When tributary-line boards are used for interconnection, only visualization-related
functions are available. Service provisioning-related functions cannot be used. For
example, links cannot be activated or deactivated based on physical ports, multi-
layer algorithm-based multi-layer rerouting does not work, and MLR-P and MLR-N
cannot use port redundancy.
Automatic discovery of cross links interconnecting IP and transport devices is
essential to the IP+optical solution. Huawei's IP+optical solution provides
several methods as below for automatically discovering cross link.
In the LLDP Snooping solution, only the TNG1T401 board of 9800M24 is supported.
● Multi-layer network visualization
Traditionally, IP and optical networks are managed separately. The network
information of different domains is managed and displayed by different
network management systems. The topology, alarm, and traffic data of a
domain is independent of each other. Network topology information cannot
be dynamically updated in real time due to technical limitations.
Huawei's IP+optical solution provides multi-layer visualization for unified IP
and optical network management and display. Specifically, this solution offers
the following multi-layer visualization capabilities:
a. Displays the IP+optical network topology in a unified manner.
b. Provides important views such as the multi-layer topology view, fault
view, and performance view to integrate information from different
dimensions.
c. Uses new protocols to synchronize network topology information in real
time. These protocols include southbound protocols such as BGP-LS,
OSPF-TE, and Telemetry and northbound protocols such as RESTCONF,
WebSocket, and SSE.
d. Displays a 3D topology.
With the preceding capabilities, the IP+optical solution provides a simple and
real-time multi-layer network visualization system to improve O&M efficiency.
3 Traffic 1. This view allows you to check the L3 NCE can use
view traffic and L1 wavelength usage of a either SNMP to
multi-layer link in real time and collect traffic
shows wavelength usage statistics. statistics from
2. Links are classified into three levels devices.
based on traffic loads. The defining
thresholds can be customized.
3. This view is associated with the multi-
layer link BOD module, allowing you
to perform BOD either manually or
automatically.
Table 7-27 describes the protection switching modes of different MLR means.
simulation in the IP+optical solution to analyze the impact on the IP and optical
layers based on real-time network topology and services.
What-if analysis parses and restores the entire network topology and protocols
based on inventory and traffic information on the live network. What-if analysis
can simulate faults on specified key NEs and links and simulate and analyze the
impact of these faults on services. For example, it can analyze changes in traffic
forwarding, paths, and delay, tunnel path status and delay, and link loads before
and after these faults occur.
The following table lists the simulation capabilities provided by the IP+optical
solution.
8 High Availability
8.1 Local HA
In the on-premises scenario, NCE provides detailed HA protection solutions for the
hardware, virtualization layer, and application layer of a single site. These
solutions can prevent unknown risks caused by hardware or software faults and
ensure secure and stable running of NCE.
8.2 Disaster Recovery Solutions
Disaster Recovery solutions are provided to prevent unknown risks on the entire
system and ensure secure and stable running of NCE.
8.1 Local HA
In the on-premises scenario, NCE provides detailed HA protection solutions for the
hardware, virtualization layer, and application layer of a single site. These
solutions can prevent unknown risks caused by hardware or software faults and
ensure secure and stable running of NCE.
Hardware Availability
If a fault occurs on the hardware with redundancy protection, the hardware
automatically switches to the normal component to ensure that the NCE OS and
application services are running properly.
RAID ● If the server has eight hard disks, the first and second hard
disks are configured as RAID 1, the third, fourth, fifth, and sixth
hard disks are configured as RAID 10, the seventh hard disk is
configured as RAID 0, and the eighth hard disk is used for full
backup and restoration.
● If the server has 12 hard disks, the hard disks are configured as
RAID 10.
Protection Description
Solution
HA of Application Layer
Data HA Backup and restore: The backup and Restoration duration <=
restore function is provided for data. 60 minutes
Data is backed up in time. If data
becomes abnormal, users can restore
them to the normal state by using
backup files.
Notes:
1. Recovery Point Objective (RPO): A service switchover policy that ensures the
least data loss. It tasks the data recovery point as the objective and ensures
that the data used for the service switchover is the latest backup data.
2. Recovery Time Objective (RTO): The maximum acceptable amount of time
for restoring a network or application and regaining access to data after an
unexpected interruption.
Notes:
1. Recovery Point Objective (RPO): A service switchover policy that ensures the
least data loss. It tasks the data recovery point as the objective and ensures
that the data used for the service switchover is the latest backup data.
2. Recovery Time Objective (RTO): The maximum acceptable amount of time
for restoring a network or application and regaining access to data after an
unexpected interruption.
Historical performance data is not synchronized between the primary and secondary sites.
Automatic There are two equipment rooms, and the statuses of the
switchover (without primary and secondary sites need to be monitored in real
the arbitration time. After a site-level fault occurs, an active/standby
service) switchover needs to be quickly implemented to restore
services. In addition, services can bear the risks caused by
the dual-active state.
Manual switchover There are two equipment rooms, and the statuses of the
primary and secondary sites are manually monitored.
After a site-level fault occurs, the system does not have
high requirements on the fault rectification time. Manual
O&M plane can be performed.
DR Solution Scenario
Manual switchover There are two equipment rooms, and the statuses of the
primary and secondary sites are manually monitored.
After a site-level fault occurs, the system does not have
high requirements on the fault rectification time. Manual
O&M can be performed.
Manual Switchover
Solution introduction:
The primary and secondary sites communicate with each other through heartbeat
links and detect the status of the peer site in real time. The primary site
synchronizes product data to the secondary site in real time through the data
replication link to ensure product data consistency between the primary and
secondary sites.
When a disaster occurs at the primary site, perform the takeover operation at the
secondary site. The secondary site becomes the active site and provides services
externally. The primary site becomes standby.
In the DR scenario where premium broadband is deployed, the system cannot automatically
replicate the raw performance data stored in the HDFS in remote HA mode. After the
active/standby switchover is complete, the system automatically collects data from NEs for
service analysis.
The DR network can reuse the original network of NCE to reduce the network
configuration of the primary and secondary sites.
To obtain NCE Process and Service List, perform the following steps:
● For carrier users, log in to https://support.huawei.com/carrier. Search for
"Network Cloud Engine" on the Product Support tab page. On the Network
Cloud Engine page, search for "Common Documents". Process and Service
List is contained in Common Documents.
● For enterprise user, log in to https://support.huawei.com/enterprise. Search
for Network Cloud Engine on the homepage. On the Network Cloud Engine
page, search for "Common Documents". Process and Service List is contained
in Common Documents.
– If the service network (southbound or northbound network) is faulty due
to a network port fault on the server, the system automatically triggers a
switchover.
– If all database instances are faulty, the system automatically triggers a
switchover.
When multiple arbitration services are deployed at a third-party site, the OS of the
third-party site can trace only one external clock source. To ensure that the time of the
third-party site is the same as that of all primary and secondary sites, the clocks of
multiple DR systems must be the same.
● NCE in Manager+Controller+Analyzer deployment scenarios adopts five-node
arbitration service deployment. The arbitration service is deployed at three
sites in 2+2+1 mode.
– Two arbitration nodes are deployed at both the primary site and
secondary site. It is recommended that the two arbitration nodes be
deployed on the Common_Service node. The arbitration nodes between
the two sites are mutually protected. One arbitration node is deployed at
the third-party site.
The DR network can reuse the original network of NCE to reduce the network
configuration of the primary and secondary sites.
9 Security
NCE uses the security architecture design that complies with industry standards
and practices to ensure system, network, and application security from multiple
layers.
9.1 Security Architecture
9.2 Security Functions
User NCE can manage the roles, permissions, and access policies
management of system users.
NOTE
NCE (Super) supports rights and domain-based management of
functions and features. For example, only an administrator has the
permission to add, delete, and modify service templates. For details,
see Permission Management in NCE Configuration Guide (WAN
Services).
Log NCE can manage operation logs, system logs, security logs,
management NE logs, and northbound logs and, dump Syslog logs.
Security Description
Function
10 Privacy Protection
The preceding figure shows the personal data and usage in the current NCE
version. For details about the personal data scope and protection measures, see
NCE V100R019C00 Personal Data Description.
NCE complies with the following seven principles when processing personal data:
● Lawfulness, fairness and transparency: Personal data shall be processed
lawfully, fairly and in a transparent manner in relation to the data subject.
● Purpose limitation: Personal data shall be collected for specified, explicit and
legitimate purposes and not further processed in a manner that is
incompatible with those purposes.
● Data minimization: Personal data shall be adequate, relevant and limited to
what is necessary in relation to the purposes for which they are processed.
Huawei shall apply anonymization or pseudonymization to personal data if
possible to reduce the risks to the data subjects concerned.
● Storage limitation: Personal data shall be kept for no longer than is
necessary for the purposes for which the personal data is processed.
● Integrity and confidentiality: Personal data shall be processed in a manner
that ensures appropriate security of the personal data, including protection
against unauthorized or unlawful processing and against accidental loss,
destruction or damage, using appropriate technical or organizational
measures.
● Accuracy: Personal data shall be accurate and, where necessary, kept up to
date; Proper measures must be taken to promptly delete or correct inaccurate
personal data based on the purpose of data processing.
● Accountability: The data controller must be responsible for and demonstrate
compliance with the preceding principles.
11 Specifications
Alarm response speed In normal circumstances, alarms are displayed on NCE within
10 seconds after they are generated on NEs.
Table 11-3 Relationship between the alarm capacity and the NE management scale
Management Maximum Current Alarms (unit: Maximum Historical Alarms (unit:
Scale 10,000) 10,000)
6000 5 200
15000 10 400
50000 20 800
100000 30 1200
For details about the NE management scale of NCE, see 11.2 NE Management
Capabilities and Maximum Concurrent Client Connections.
Topology Capabilities
Indicator Value
Subnets The number of subnets is not limited. Each subnet can contain a
maximum of 500 physical NEs at a maximum of six layers. 200
physical NEs are recommended.
Users ≤ 2000
NBI Capabilities
CORBA 4
XML 20
RESTful 10
For CORBA, XML, and REST, the number of concurrent requests refers to the maximum
number of interfaces that OSSs can invoke. The number is collected among all OSSs and
interfaces. For example, if the number is 4, it is probable that one OSS invokes four
interfaces (a, b, c, d) at the same time, or four OSSs invoke one interface (a) at the same
time.
TEXT ● As the FTP client, NCE transmits files to only one OSS.
● As the FTP server, NCE can be accessed by a maximum
of three OSSs.
For SNMP and TEXT, the number of NCE connections is collected by OSS.
Table 11-6 Maximum NE management capability and client connection indicators (Super)
Sub- Component Maximum Physical Maximum Maximum
domain NEs Equivalent Concurrent
NEs Client
Connections
Table 11-7 Maximum NE management capability and client connection indicators (NCE-
CrossDomain)
Sub-domain Component Maximum Physical Maximum
NEs Equivalent NEs
Maximum
Concurrent Client
Connections
Indicator Value
Definition
● Equivalent NE: a uniform criterion used to describe and calculate the
management capabilities of NCE. This criterion is needed because different
types of NEs occupy different system resources to support different functions,
features, cross-connect capacities, and numbers of boards, ports, and
channels. Therefore, different types of NEs and ports must be converted to
equivalent NEs based on the number of system resources they occupy. An
equivalent NE occupies as many system resources as an STM-1 transport NE.
● Equivalent coefficient: Resources occupied by physical NEs or ports/Resources
occupied by equivalent NEs
Calculation
The number of equivalent NEs that NCE can manage is calculated according to
the following rules:
For example, if there are 5 OptiX OSN 9500s (equivalent coefficient: 10), 10 OptiX OSN
7500s (equivalent coefficient: 6.5), and 100 OptiX OSN 3500s (equivalent coefficient: 4.5),
then: Number of equivalent NEs in the transport domain = 5 x 10 + 10 x 6.5 + 100 x 4.5 =
565
Table 11-8 describes the equivalent coefficients for NEs in the transport domain.
OptiX OSN 80 2
OptiX 155/622H 1
OptiX 2500 3
OptiX 2500+ 3
OptiX OTU40000 1
PFE 1670 1
PFE 1670 G4 1
HUAWEI OSN902 1
NEC 5000S 1
PTP 250 1
PTP 500 1
PTP 650 1
PMP 450 1
X-1200 1
Layer 2 Virtual NE 1
Layer 3 Virtual NE 1
3rd-Party NE 1
For example, if there are 5 NE5000Es (equivalent coefficient: 10), 200 S5300s (equivalent
coefficient: 1.25), and 1000 CX200s (equivalent coefficient: 0.625), then:
Number of equivalent NEs in the IP domain = 5 x 10 + 200 x 1.25 + 1000 x 0.625 = 925
Equivalent coefficients of NEs in the IP domain are shown in Table 11-9 describes
the equivalent coefficients for NEs in the IP domain.
NE05E-S/NE05E-M 0.5
NE08E-S/NE08E-M 1.0
NE20/NE20E 1.25
NE20E-S4 0.5
NE20E-S8/S16/S8A/S16A 1.0
NE20E-M2E/NE20E-M2F 0.5
NE40/NE80 5.0
NE40E-X1 0.5
NE40E-X2 1.0
NE40E-X3/X3A 1.25
NE40E-4 1.25
NE40E-X8/X8A 2.5
NE40E-8 2.5
NE40E-X16/X16A 5.0
NE40E-M2E/NE40E-M2F/ 0.5
NE40E-M2H/NE40E-M2K
NE40E-F1A 0.5
NE80E 5.0
NE5000E 10.0 x N
N indicates the number
of chassis.
AR150 0.125
AR200 0.125
AR1200/AR2200/AR3200/ 0.25
AR3600
NE16EX 0.25
R series 1.0
NE9000/NE9000-20 10.0
NE9000-8 5.0
RM9000 1.0
S9300X-4 6.0
S9300X-8 6.0
S9300X-12 9.0
S9703 2.0
S9706 3.5
S9712 6.0
CE16808 8.0
CE16816 10.0
CE12804 6.0
CE12808 8.0
CE12812 10.0
PTN6900-F1A 0.5
PTN6900-M8C 0.5
PTN6900-M2K/M2E/M2F 0.5
PTN6900-2-M8A/M16A 1.0
PTN6900-2/PTN6900-2-M8/ 1.0
PTN6900-2-M14/PTN6900-2-
M16
PTN6900-3/3A 1.25
PTN6900-8/8A 2.5
PTN6900-16/16A 5.0
Layer 2 Virtual NE 1
Layer 3 Virtual NE 1
CX600-X1 0.5
CX600-X2 1.0
CX600-X3 1.25
CX600-4 1.25
CX600-X8 2.5
CX600-8 2.5
CX600-X16 5.0
CX600-16 5.0
CX600-M2E/CX600-M2F/ 0.5
CX600-M2H/CX600-M2K
CX600-F1A 0.5
CX6620 10.0
CX6601/CX6602 0.5
CX6608 5.0
NGFW 0.75
NE40E-FW 4.0
NE80E-FW 8.0
USG9120 4.0
USG9310 4.0
USG9320 8.0
USG9520 1.5
USG9560 4.0
USG9580 8.0
USG3000 0.25
USG50 0.25
SIG9820 8.0
SIG9800-X3 1.5
SIG9800-X8 4.0
SIG9800-X16 8.0
SeMG9811-X8 4.0
SeMG9811-X16 8.0
NE80E-DPI 8.0
SVN2200 0.25
SVN5300 0.75
SVN5500 0.75
ASG2200 0.25
ASG2600 0.75
ASG2800 0.75
BGW9916 5.0
For the equivalent coefficient of each protocol route, see Equivalent coefficients
of protocol routes.
For example, if there are 10,000 direct routes, 20,000 static routes, 100,000 OSPF
routes, 30,000 IS-IS routes, 20,000 BGP routes, 150,000 VPN routes, and 50,000 FIB
routes, then the number of equivalent routes is calculated as follows based on the
equivalent coefficients of protocol routes listed in Table 11-10:
Direct 1
Static 1
OSPF 1.5
IS-IS 1.5
BGP 1.6
VPN 1.6
FIB 1
On a network, there are different node roles such as PEs, CEs, and UPEs. Calculate
the total number of equivalent routes on the network as follows:
Finally, compare the estimated number of equivalent routes with the maximum
number of equivalent routes (10 million) supported.
If there are 500 PEs, 1000 CEs, and 2000 UPEs on a network and the numbers of
equivalent routes of a PE, CE, and UPE are A, B, and C respectively, the total
number of equivalent routes on the network is estimated based on the formula as
follows: 500 x A + 1000 x B + 2000 x C.
12 Version Requirements
● The New Version column lists the NE versions newly supported by the current NCE
version.
● The Compatible Version column lists the NE versions supported by earlier NCE versions.
Unless otherwise specified, the current NCE version also supports these NE versions.
CommonSBI V100R018C00
U2000 V200R017C60
V200R018C50
V200R018C60
NokiaNSP NRCT_18.7
Multi-Cloud Interconnect
IP+Optical Solution
A Appendix
Standard/Protocol Name
Standard/Protocol Name
ITU-T G.774 (01, 02, 03, Synchronous digital hierarchy (SDH) - Management
04) information model for the network element view
Standard/Protocol Name
Standard/Protocol Name
Standard/Protocol Name
Standard/Protocol Name
Standard/Protocol Name
A.2 Glossary
Numerics
3G See Third Generation.
802.1Q in 802.1Q A VLAN feature that allows the equipment to add a VLAN tag to a tagged
(QinQ) frame. The implementation of QinQ is to add a public VLAN tag to a frame
with a private VLAN tag to allow the frame with double VLAN tags to be
transmitted over the service provider's backbone network based on the
public VLAN tag. This provides a layer 2 VPN tunnel for customers and
enables transparent transmission of packets over private VLANs.
A
ACL See Access Control List.
ADMC automatically detected and manually cleared
ADSL See asymmetric digital subscriber line.
ADSL2+ asymmetric digital subscriber line 2 plus
ANCP See Access Node Control Protocol.
API See application programming interface.
APS automatic protection switching
AS See autonomous system.
ASBR See autonomous system boundary router.
ASN.1 See Abstract Syntax Notation One.
ASON automatically switched optical network
Abstract Syntax A syntax notation type employed to specify protocols. Many protocols
Notation One (ASN. defined by the ITU-T use this syntax format. Other alternatives are standard
1) text or Augmented Backus-Naur Form (ABNF).
Access Control List A list of entities, together with their access rights, which are authorized to
(ACL) access a resource.
Access Node Control An IP-based protocol that operates between the access node (AN) and the
Protocol (ANCP) network access server (NAS), over a DSL access and aggregation network.
application An application programming interface is a particular set of rules and
programming specifications that are used for communication between software programs.
interface (API)
asymmetric digital A technology for transmitting digital information at a high bandwidth on
subscriber line existing phone lines to homes and businesses. Unlike regular dialup phone
(ADSL) service, ADSL provides continuously-available, "always on" connection.
ADSL is asymmetric in that it uses most of the channel to transmit
downstream to the user and only a small part to receive information from
the user. ADSL simultaneously accommodates analog (voice) information
on the same line. ADSL is generally offered at downstream data rates from
512 kbit/s to about 6 Mbit/s.
autonomous system A network set that uses the same routing policy and is managed by the
(AS) same technology administration department. Each AS has a unique
identifier that is an integer ranging from 1 to 65535. The identifier is
assigned by IANA. An AS can be divided into areas.
autonomous system A router that exchanges routing information with other autonomous system
boundary router boundary routers.
(ASBR)
B
B/S Browser/Server
BFD See Bidirectional Forwarding Detection.
BGP Border Gateway Protocol
BIOS See basic input/output system.
BITS See building integrated timing supply.
BOD bandwidth on demand
BRA See basic rate access.
BRAS See broadband remote access server.
BSS Business Support System
BWS backbone wavelength division multiplexing system
Bidirectional A fast and independent hello protocol that delivers millisecond-level link
Forwarding failure detection and provides carrier-class availability. After sessions are
Detection (BFD) established between neighboring systems, the systems can periodically send
BFD packets to each other. If one system fails to receive a BFD packet
within the negotiated period, the system regards that the bidirectional link
fails and instructs the upper layer protocol to take actions to recover the
faulty link.
basic input/output Firmware stored on the computer motherboard that contains basic input/
system (BIOS) output control programs, power-on self test (POST) programs, bootstraps,
and system setting information. The BIOS provides hardware setting and
control functions for the computer.
basic rate access An ISDN interface typically used by smaller sites and customers. This
(BRA) interface consists of a single 16 kbit/s data (or "D") channel plus two
bearer (or "B") channels for voice and/or data. Also known as Basic Rate
Access, or BRI.
broadband remote A new type of access gateway for broadband networks. As a bridge
access server (BRAS) between backbone networks and broadband access networks, BRAS
provides methods for fundamental access and manages the broadband
access network. It is deployed at the edge of network to provide broadband
access services, convergence, and forwarding of multiple services, meeting
the demands for transmission capacity and bandwidth utilization of
different users. BRAS is a core device for the broadband users' access to a
broadband network.
building integrated In the situation of multiple synchronous nodes or communication devices,
timing supply (BITS) one can use a device to set up a clock system on the hinge of telecom
network to connect the synchronous network as a whole, and provide
satisfactory synchronous base signals to the building integrated device. This
device is called BITS.
C
CAS See Central Authentication Service.
CBU See cellular backhaul unit.
CC See continuity check.
CCC circuit cross connect
CES See circuit emulation service.
CIR committed information rate
CLEI common language equipment identification
CLI See command-line interface.
CORBA See Common Object Request Broker Architecture.
CPE See customer-premises equipment.
CPU See Central Processing Unit.
CSV See comma separated values.
Central A single sign-on protocol for the web. Its purpose is to permit users to
Authentication access multiple applications by providing their credentials (such as user
Service (CAS) names and passwords) only once. It also allows web applications to
authenticate users without gaining access to the users' security credentials
(such as passwords). CAS also refers to a software package that implements
this protocol.
Central Processing The computational and control unit of a computer. The CPU is the device
Unit (CPU) that interprets and executes instructions. The CPU has the ability to fetch,
decode, and execute instructions and to transfer information to and from
other resources over the computer's main data-transfer path, the bus.
D
DB database
DC data center
E
E-LAN See Ethernet local area network.
E-Line See Ethernet line.
E2E end to end
ECC See embedded control channel.
EDFA See erbium-doped fiber amplifier.
EPL See Ethernet private line.
F
FCAPS fault, configuration, accounting, performance, security
FDN fixed dialing number
FIB See forwarding information base.
FPGA See field programmable gate array.
FRR See fast reroute.
FTP See File Transfer Protocol.
FTTB See fiber to the building.
FTTC See fiber to the curb.
FTTH See fiber to the home.
File Transfer A member of the TCP/IP suite of protocols, used to copy files between two
Protocol (FTP) computers on the Internet. Both computers must support their respective
FTP roles: one must be an FTP client and the other an FTP server.
fast reroute (FRR) A technology which provides a temporary protection of link availability
when part of a network fails. The protocol enables the creation of a
standby route or path for an active route or path. When the active route is
unavailable, the traffic on the active route can be switched to the standby
route. When the active route is recovered, the traffic can be switched back
to the active route. FRR is categorized into IP FRR, VPN FRR, and TE FRR.
fiber to the building A fiber-based networking scenario. There are two types of FTTB scenarios:
(FTTB) multi-dwelling unit (MDU) and business buildings. Each scenario includes
the following service types: FTTB to the MDU and FTTB to the business
buildings.
fiber to the curb A fiber-based networking scenario. The FTTC scenario provides the
(FTTC) following services: asymmetric broadband services (such as digital
broadcast service, VOD, file download, and online gaming), symmetric
broadband services (such as content broadcast, email, file exchange,
distance education, and distance medical care), POTS, ISDN, and xDSL
backhaul services.
fiber to the home A fiber-based networking scenario. The FTTH scenario provides the
(FTTH) following services: asymmetric broadband services (digital broadcast
service, VoD, file download, and online gaming), symmetric broadband
services (content broadcast, email, file exchange, distance education, and
distance medical care), POTS, and ISDN services.
field programmable A semi-customized circuit that is used in the Application Specific Integrated
gate array (FPGA) Circuit (ASIC) field and developed based on programmable components.
FPGA remedies many of the deficiencies of customized circuits, and allows
the use of many more gate arrays.
forwarding A table that provides information for network hardware (bridges and
information base routers) for them to forward data packets to other networks. The
(FIB) information contained in a routing table differs according to whether it is
used by a bridge or a router. A bridge relies on both the source (originating)
and destination addresses to determine where and how to forward a
packet.
G
GNE See gateway network element.
GRE See Generic Routing Encapsulation.
GUI See graphical user interface.
Generic Routing A mechanism for encapsulating any network layer protocol over any other
Encapsulation (GRE) network. GRE is used for encapsulating IP datagrams tunneled through the
Internet. GRE serves as a Layer 3 tunneling protocol and provides a tunnel
for transparently transmitting data packets.
gateway network An NE that serves as a gateway for other NEs to communicate with a
element (GNE) network management system.
graphical user A visual computer environment that represents programs, files, and options
interface (GUI) with graphical images, such as icons, menus, and dialog boxes, on the
screen.
H
HA See high availability.
HFC See high-level foundation classes.
HMAC See hash-based message authentication code.
HQoS See hierarchical quality of service.
HSL See high-level script language.
HTTP Hypertext Transfer Protocol
HTTPS See Hypertext Transfer Protocol Secure.
HVPLS hierarchical virtual private LAN service
Hypertext Transfer An HTTP protocol that runs on top of transport layer security (TLS) and
Protocol Secure Secure Sockets Layer (SSL) for secured transactions. It is used to establish a
(HTTPS) reliable channel for encrypted communication and secure identification of a
network web server. HTTPS consists of communication over Hypertext
Transfer Protocol (HTTP) within a connection encrypted by Transport Layer
Security, or its predecessor, Secure Sockets Layer. The main motivation for
HTTPS is authentication of the visited website and protection of the privacy
and integrity of the exchanged data.
hash-based message In cryptography, a keyed-hash message authentication code (HMAC) is a
authentication code specific type of message authentication code (MAC) involving a
(HMAC) cryptographic hash function (hence the 'H') in combination with a secret
cryptographic key. As with any MAC, it may be used to simultaneously
verify both the data integrity and the authentication of a message. Any
cryptographic hash function, such as MD5 or SHA-1, may be used in the
calculation of an HMAC; the resulting MAC algorithm is termed HMAC-
MD5 or HMAC-SHA1 accordingly. The cryptographic strength of the HMAC
depends upon the cryptographic strength of the underlying hash function,
the size of its hash output, and on the size and quality of the key.
hierarchical quality A type of QoS that controls the traffic of users and performs the scheduling
of service (HQoS) according to the priority of user services. HQoS has an advanced traffic
statistics function, and the administrator can monitor the usage of
bandwidth of each service. Hence, the bandwidth can be allocated
reasonably through traffic analysis.
high availability A scheme in which two modules operate in active/standby mode to achieve
(HA) high availability. When the active module fails, the standby module
automatically takes over the system functions of the active module.
high-level A group of encapsulated function databases provided by the iSStar. You can
foundation classes use the provided functions to accelerate script editing.
(HFC)
high-level script A script language. Based on python, the HSL syntax is simple, clear, and
language (HSL) extendable.
I
IANA See Internet Assigned Numbers Authority.
ICMP See Internet Control Message Protocol.
IDC See Internet Data Center.
IDN See integrated digital network.
IETF Internet Engineering Task Force
IGP See Interior Gateway Protocol.
IOPS input/output operations per second
IP See Internet Protocol.
IP RAN See IP radio access network.
IP radio access A network that uses IP technology to achieve data backhaul on a radio
network (IP RAN) access network.
IPTV See Internet Protocol television.
IPv4 See Internet Protocol version 4.
IPv6 See Internet Protocol version 6.
ISDN Integrated Services Digital Network
ISP See Internet service provider.
ITU-T International Telecommunication Union-Telecommunication Standardization
Sector
Interior Gateway 1. A routing protocol that is used within an autonomous system. The IGP
Protocol (IGP) runs in small-sized and medium-sized networks. The IGPs are RIP, IGRP,
EIGRP, OSPF, and IS-IS. 2. The routing protocol spoken by the routers
belonging to an Autonomous system. Abbreviated as IGP. Each Autonomous
System has a single IGP. Separate Autonomous Systems may be running
different IGPs.
Internet Assigned A department operated by the IAB. IANA delegates authority for IP address-
Numbers Authority space allocation and domain-name assignment to the NIC and other
(IANA) organizations. IANA also maintains a database of assigned protocol
identifiers used in the TCP/IP suite, including autonomous system numbers.
Internet Control A network layer protocol that provides message control and error reporting
Message Protocol between a host server and an Internet gateway.
(ICMP)
Internet Data The telecommunications sector uses available Internet communication lines
Center (IDC) and bandwidth resources to establish a standard and carrier-class
equipment environment in which comprehensive services such as server
hosting, renting, and other value-added services are provided for enterprises
and governments.
Internet Protocol The protocol within TCP/IP that governs the breakup of data messages into
(IP) packets, the routing of the packets from sender to destination network and
station, and the reassembly of the packets into the original data messages
at the destination. IP runs at the internetwork layer in the TCP/IP model—
equivalent to the network layer in the ISO/OSI reference model. The IP
provides a connectionless datagram network layer and allows an
application to communicate transparently across several connected
networks.
Internet Protocol A system that provides TV services over the IP network. In the IPTV system,
television (IPTV) media streams from satellites, terrestrial, and studios are converted by the
encoder to the media streams applicable to the IP network. Then the media
streams are transmitted to the terminal layer on the IP network. Media
content is displayed on a TV set after media streams are processed by
specified receiving devices (for example, an STB).
Internet Protocol The current version of the Internet Protocol (IP). IPv4 utilizes a 32bit
version 4 (IPv4) address which is assigned to hosts. An address belongs to one of five classes
(A, B, C, D, or E) and is written as 4 octets separated by periods and may
range from 0.0.0.0 through to 255.255.255.255. Each IPv4 address consists
of a network number, an optional subnetwork number, and a host number.
The network and subnetwork numbers together are used for routing, and
the host number is used to address an individual host within the network or
subnetwork.
Internet Protocol An update version of IPv4, which is designed by the Internet Engineering
version 6 (IPv6) Task Force (IETF) and is also called IP Next Generation (IPng). It is a new
version of the Internet Protocol. The difference between IPv6 and IPv4 is
that an IPv4 address has 32 bits while an IPv6 address has 128 bits.
Internet service An organization that offers users access to the Internet and related services.
provider (ISP)
integrated digital A set of digital nodes and digital links that uses integrated digital
network (IDN) transmission and switches to provide digital connections between two or
more defined points.
K
KPI key performance indicator
L
L2VPN Layer 2 virtual private network
L3VPN Layer 3 virtual private network
LAG See link aggregation group.
LAN See local area network.
LB See loopback.
LLDP See Link Layer Discovery Protocol.
LSA link-state advertisement
LSR See label switching router.
M
MA maintenance association
MAC See Media Access Control.
MBB mobile broadband
MD See maintenance domain.
MDF See main distribution frame.
MDU See multi-dwelling unit.
ME See managed element.
MEP maintenance association end point
MIB See management information base.
MIP maintenance association intermediate point
MO managed object
MOS mean opinion score
MPLS See Multiprotocol Label Switching.
multiprotocol label An Internet Protocol (IP) virtual private network (VPN) based on the
switching virtual multiprotocol label switching (MPLS) technology. It applies the MPLS
private network technology for network routers and switches, simplifies the routing mode of
(MPLS VPN) core routers, and combines traditional routing technology and label
switching technology. It can be used to construct the broadband Intranet
and Extranet to meet various service requirements.
N
NBI See northbound interface.
NE See network element.
NETCONF See Network Configuration Protocol.
NGFW See Next-Generation Firewall.
NML See network management layer.
NMS See network management system.
NNI network node interface
NSAP See network service access point.
NT1 See network termination 1.
NTP See Network Time Protocol.
Network NETCONF is the communication management protocol. It uses XML-based
Configuration data encoding for the configuration data and protocol messages, and
Protocol (NETCONF) provides a mechanism for installing, operating, and deleting NEs.
Network Time The Network Time Protocol (NTP) defines the time synchronization
Protocol (NTP) mechanism. It synchronizes the time between the distributed time server
and the client.
Next-Generation The Next Generation Firewall is a line-speed device specific to network
Firewall (NGFW) security. It integrates intelligent interworking with other network devices,
visual application identification and control, and legacy firewall functions,
fulfilling the needs of enterprises on network security.
network element An entity that contains hardware and software. An NE has at least one
(NE) main control board that manages and monitors the entire network
element. The NE software runs on the main control board.
network A management layer which is responsible for the management of network
management layer elements on an individual or collective basis.
(NML)
network A system in charge of the operation, administration, and maintenance of a
management network.
system (NMS)
network service A network address defined by ISO, at which the OSI Network Service is
access point (NSAP) made available to a Network service user by the Network service provider.
network A type of terminal device that provides U-interface and S/T interface, used
termination 1 (NT1) to connect the ISDN terminals and ISDN exchange equipment. It mainly
performs code switch between the U-interface and the S/T interface, such
as the code switch between the 2B1Q and the AMI in Chinese standards.
The NT1 mostly work at only the physical layer, without software
intelligence; the devices, however, support functions of line maintenance
and performance monitoring, and ensure the clock synchronization
between the ISDN terminals and the network.
northbound An interface that connects to the upper-layer device to provision services
interface (NBI) and report alarms and performance statistics.
O
OAM See operation, administration and maintenance.
OCS optical core switching
OCh optical channel with full functionality
ODN optical distribution network
ODU Optical channel Data Unit
ODUk optical channel data unit - k
OLA optical line amplifier
OLT optical line terminal
OMS optical multiplex section
ONT See optical network terminal.
ONU See optical network unit.
OPEX See operating expense.
OPS See optical physical section.
OSI open systems interconnection
OSN optical switch node
OSNR See optical signal-to-noise ratio.
OSPF See Open Shortest Path First.
OSPF-TE Open Shortest Path First-Traffic Engineering
OSS operations support system
OTN optical transport network
OTS See optical transmission section.
OTT over the top
Open Shortest Path A link-state, hierarchical interior gateway protocol (IGP) for network routing
First (OSPF) that uses cost as its routing metric. A link state database is constructed of
the network topology, which is identical on all routers in the area.
P
P2MP point-to-multipoint
PE See provider edge.
PER packed encoding rules
PKI See public key infrastructure.
PMS performance management system
PON passive optical network
POTS See plain old telephone service.
PRA See primary rate access.
PSN See packet switched network.
PTN packet transport network
PVC permanent virtual channel
PW See pseudo wire.
PWE3 See Pseudowire Emulation Edge-to-Edge.
Q
QinQ See 802.1Q in 802.1Q.
R
RAID redundant array of independent disks
RAN See radio access network.
REG See regenerator.
REST See Representational State Transfer.
RESTCONF See RESTCONF.
RESTCONF An HTTP-based protocol that provides a programmatic interface for
(RESTCONF) accessing data defined in YANG, using the datastore concepts defined in the
Network Configuration Protocol (NETCONF).
RESTful RESTful is a software architecture style rather than a standard. It provides a
set of software design guidelines and constraints for designing software for
interaction between clients and servers. RESTful software is simpler and
more hierarchical, and facilitates the implementation of the cache
mechanism.
S
SAML See Security Assertion Markup Language.
SAN See storage area network.
SBU See single business unit.
SDH See synchronous digital hierarchy.
SDN See software-defined networking.
T
TCA threshold crossing alert
U
UNI See User-to-Network Interface.
UPE user-end provider edge
URL See Uniform Resource Locator.
V
VDSL2 See very-high-speed digital subscriber line 2.
VE virtual Ethernet interface
VLAN See virtual local area network.
VLL virtual leased line
VP See virtual path.
VPLS virtual private LAN segment
VPN virtual private network
VRF VPN routing and forwarding
VRRP See Virtual Router Redundancy Protocol.
VXLAN Virtual Extensible LAN
Virtual Router A protocol designed for multicast or broadcast LANs such as an Ethernet. A
Redundancy group of routers (including an active router and several backup routers) in
Protocol (VRRP) a LAN is regarded as a virtual router, which is called a backup group. The
virtual router has its own IP address. The host in the network communicates
with other networks through this virtual router. If the active router in the
backup group fails, one of the backup routers in this backup group becomes
active and provides routing service for the host in the network.
VoIP voice over IP
very-high-speed An extension of the VDSL technology, which complies with ITU G.993.2,
digital subscriber supports multiple spectrum profiles and encapsulation modes, and provides
line 2 (VDSL2) short-distance and high-speed access solutions to the next-generation FTTx
access service.
virtual local area A logical grouping of two or more nodes which are not necessarily on the
network (VLAN) same physical network segment but which share the same IP network
number. This is often associated with switched Ethernet.
virtual path (VP) A bundle of virtual channels, all of which are switched transparently across
an ATM network based on a common VPI.
W
WAN wide area network