Download 8dg42227daaar9.6.3_v1_1350 Oms Pkt Guide...
Title page
1350 OMS | 9.6 1350 OMS PKT Guide 8DG42227DAAA Issue 3 | December 2012
Legal notice Legal notice
Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright © 2012 Alcatel-Lucent. All rights reserved. Notice
Every effort was made to ensure that the information in this document was complete and accurate at the time of printing. However, information is subject to change. Warranty
Alcatel-Lucent provides a limited warranty for this product. For more information, consult your local Alcatel-Lucent customer support team. Ordering information
The ordering number for this document is 8DG42227DAAA. To order 1350 OMS information products, contact your local Alcatel-Lucent customer support team. Technical support
For technical support, contact your local customer support team. You can reach them through the Web at the Alcatel-Lucent Customer Support web site (http://www. alcatel-lucent.com/support) or the customer support telephone number listed at the Alcatel-Lucent Contact Us web site (http://www.alcatellucent.com/contact). Information product support
For questions or concerns about this or any other Alcatel-Lucent information product, please contact us at one of the following numbers: (888) 727-3615 (for the continental United States), +1 (630) 713-5000 (for all countries).
Contents
About this document Purpose
......................................................................................................................................................................................... lxix lxix
Reason for reissue ..................................................................................................................................................................... lxix lxix Safety information
.................................................................................................................................................................... lxix lxix
Intended audience
...................................................................................................................................................................... lxx lxx
How to use this information product ................................................................................................................................... lxx Related documentation ......................................................................................................................................................... lxxiii lxxiii Ordering information How to comment
............................................................................................................................................................ lxxiii lxxiii
.................................................................................................................................................................... lxxiv lxxiv
Part I: Introduction 1
Product Overview Overview ...................................................................................................................................................................................... 1-1 1-1 1350 OMS Overview ............................................................................................................................................................... 1-2 1-2 1350 OMS Modules for System Resiliency and Northbound Communication ................................................. 1-5 1-5
2
Introduction to Administration Application Administration ................................................................................................................................................... 2-1 2-1 View Application Release Information ............................................................................................................................. 2-4 2-4
Part II: Administration 3
1350 OMS PKT Configuration Overview ...................................................................................................................................................................................... 3-1 3-1 1350 OMS PKT Configuration ............................................................................................................................................ 3-2 3-2 Access the System Configuration Window and Configure 1350 OMS PKT
..................................................... 3-3 3-3
.................................................................................................................................................................................................................................... 1350 OMS iii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Integrate the 1350 OMS PKT with Other NMSs
.......................................................................................................... 3-8 3-8
Integrate 1350 OMS PKT Client Workstations with the Master Workstation .................................................... 3-9 3-9 4
1350 OMS PKT Process Monitoring Overview ...................................................................................................................................................................................... 4-1 4-1 Process Monitoring Overview .............................................................................................................................................. 4-2 4-2 Run Levels ................................................................................................................................................................................... 4-5 4-5
5
1350 OMS PKT User Management Overview ...................................................................................................................................................................................... 5-1 5-1 User Profiles
............................................................................................................................................................................... 5-2 5-2
Construction Macro Functions and Default User Profiles ......................................................................................... 5-3 5-3 MPLS Macro Functions and Default User Profiles ...................................................................................................... 5-7 5-7 Ethernet Macro Functions and Default User Profiles .................................................................................................. 5-9 5-9 6
1350 OMS PKT System Log Management Overview ...................................................................................................................................................................................... 6-1 6-1 SMF/Commands/Event Log File Overview
................................................................................................................... 6-2 6-2
Failure Management Log File Overview ......................................................................................................................... 6-5 6-5 Trace Management Overview 7
.............................................................................................................................................. 6-6 6-6
1350 OMS PKT Parameters Overview ...................................................................................................................................................................................... 7-1 7-1 Parameter Overview
................................................................................................................................................................ 7-2 7-2
1350 OMS PKT Parameters for Core NMA ................................................................................................................... 7-3 7-3 1350 OMS PKT Parameters for GUI NMA .................................................................................................................... 7-4 7-4 1350 OMS PKT Parameters for MW-INT ....................................................................................................................... 7-5 7-5 1350 OMS PKT Parameters for Oracle Management ................................................................................................. 7-6 7-6 Set PKT Parameters
................................................................................................................................................................. 7-7 7-7
1350 OMS PKT Parameter List ........................................................................................................................................... 7-9 7-9 8
1350 OMS PKT Ethernet Multi-Manager Management Configurations Overview ...................................................................................................................................................................................... 8-1 8-1
.................................................................................................................................................................................................................................... 1350 OMS iv 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Multi-Manager Management Overview ........................................................................................................................... 8-2 8-2 Operational Guidelines 9
........................................................................................................................................................... 8-3 8-3
1350 OMS PKT MIB Realignment and the ISA Board Overview ...................................................................................................................................................................................... 9-1 9-1 MIB Alignment and ISA Board Overview
...................................................................................................................... 9-2 9-2
Realign an ISA Board MIB ................................................................................................................................................... 9-4 9-4 10
1350 OMS PKT AlignDBSDHPathID Tool Overview
................................................................................................................................................................................... 10-1 10-1
AlignDBSDHPathID Overview ........................................................................................................................................ 10-2 10-2 Run AlignDBSDHPathID Tool
......................................................................................................................................... 10-3 10-3
Part III: Basic Functions 11
Generalities Overview
................................................................................................................................................................................... 11-1 11-1
About 1350 OMS PKT application Main features ............................................................................................................................................................................ 11-3 11-3 Management Layers
.............................................................................................................................................................. 11-5 11-5
Main concepts .......................................................................................................................................................................... 11-6 11-6 Network architecture overview
......................................................................................................................................... 11-7 11-7
Ethernet Services Attributes ............................................................................................................................................. 11-12 11-12 Classification of Ethernet Services ................................................................................................................................ 11-15 11-15 Definition of Ethernet Services by MEF ..................................................................................................................... 11-27 11-27 Network Topology Description ....................................................................................................................................... 11-30 11-30 How to access the application Web access .............................................................................................................................................................................. 11-38 11-38 The graphical interface (MS-GUI)
................................................................................................................................ 11-39 11-39
Confirm the action ............................................................................................................................................................... 11-40 11-40 The application interfaces Software interfaces .............................................................................................................................................................. 11-42 11-42 .................................................................................................................................................................................................................................... 1350 OMS v 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Multi-Manager environment ............................................................................................................................................ 11-44 11-44 Functional Domain Overview about functional domains Network Topology Construction
............................................................................................................................. 11-45 11-45
.................................................................................................................................... 11-47 11-47
Traffic Management ............................................................................................................................................................ 11-53 11-53 MPLS Management
............................................................................................................................................................ 11-65 11-65
Maintenance Management ................................................................................................................................................ 11-69 11-69 User Profile Management 12
................................................................................................................................................. 11-71 11-71
Managing your Network Overview
................................................................................................................................................................................... 12-1 12-1
Network configuration Create the network objects .................................................................................................................................................. 12-3 12-3 External Network Reference ............................................................................................................................................ 12-14 12-14 Create Physical Connection
............................................................................................................................................. 12-20 12-20
Create LAG ............................................................................................................................................................................ 12-24 12-24 Create Domain Create Domain
...................................................................................................................................................................... 12-27 12-27
Assign resource to Domain
.............................................................................................................................................. 12-31 12-31
Define NE ............................................................................................................................................................................... 12-35 12-35 Traffic categories Create Traffic Descriptor ................................................................................................................................................... 12-39 12-39 Create Traffic Classifier ..................................................................................................................................................... 12-43 12-43 L2 Encapsulation .................................................................................................................................................................. 12-46 12-46 NML-EML synchronization 1350 OMS PKT resynchronization ............................................................................................................................... 12-60 12-60 Alignment after deletion and recreation of SDH Path ............................................................................................ 12-61 12-61 VPWS Ethernet PM management procedure PM feature for the ISA ES1 1.0 board
......................................................................................................................... 12-62 12-62
.................................................................................................................................................................................................................................... 1350 OMS vi 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Provider network operating as a distributed MAC Bridge Single-Customer, No-VLAN, RSTP provisioning Provisioning procedure (MAC-SC-NV-RSTP)
................................................................................... 12-67 12-67
.................................................................................................. 12-69 12-69
........................................................................................................ 12-70 12-70
VLAN configuration scenario VLAN configuration ........................................................................................................................................................... 12-75 12-75 MAC Bridge Network Configuration MAC Bridge Basics ............................................................................................................................................................ 12-77 12-77 13
Network Organization Management Overview
................................................................................................................................................................................... 13-1 13-1
Managing Subnetworks Overview about Subnetworks ............................................................................................................................................ 13-5 13-5 View the list of subnetworks .............................................................................................................................................. 13-7 13-7 Create a Subnetwork
............................................................................................................................................................. 13-8 13-8
Modify a Subnetwork ......................................................................................................................................................... 13-10 13-10 Delete a Subnetwork ........................................................................................................................................................... 13-13 13-13 View the details of the subnetworks
............................................................................................................................. 13-14 13-14
Managing Domains Overview about Domains
................................................................................................................................................. 13-15 13-15
View the list of Domains ................................................................................................................................................... 13-17 13-17 Description of the list of Domains ................................................................................................................................. 13-18 13-18 Create a Domain ................................................................................................................................................................... 13-20 13-20 Modify a Domain ................................................................................................................................................................. 13-22 13-22 Delete a Domain ................................................................................................................................................................... 13-24 13-24 View the details of the domain ........................................................................................................................................ 13-25 13-25 Details of a Domain
............................................................................................................................................................ 13-26 13-26
Assign resources to a Domain ......................................................................................................................................... 13-27 13-27 Assign a NE to a Domain .................................................................................................................................................. 13-29 13-29 Deassign a NE from a Domain
....................................................................................................................................... 13-30 13-30
.................................................................................................................................................................................................................................... 1350 OMS vii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
View the inventory of NE in a Domain
....................................................................................................................... 13-31 13-31
View the inventory of Transport Links in a Domain
.............................................................................................. 13-32 13-32
View the inventory of VT Queue Profiles in a Domain ......................................................................................... 13-33 13-33 Create Topological View in a Domain
......................................................................................................................... 13-34 13-34
Assign an Ethernet Physical Port to a Domain
......................................................................................................... 13-35 13-35
Deassign an Ethernet Physical Port from a Domain ............................................................................................... 13-36 13-36 Managing service nodes Overview about service nodes
........................................................................................................................................ 13-37 13-37
View the inventory of NE in a Service Node
............................................................................................................ 13-38 13-38
View the list of service nodes .......................................................................................................................................... 13-39 13-39 Managing Network Elements Overview about Network Elements
.............................................................................................................................. 13-40 13-40
View the list of Network Elements ................................................................................................................................ 13-42 13-42 Define a NE ............................................................................................................................................................................ 13-43 13-43 Add a NE to a Subnetwork ............................................................................................................................................... 13-46 13-46 Modify a NE
.......................................................................................................................................................................... 13-49 13-49
View the details of the NEs .............................................................................................................................................. 13-52 13-52 View the list of available Network Elements ............................................................................................................. 13-53 13-53 Upload the Ethernet physical ports Upload the TDM terminations
............................................................................................................................... 13-54 13-54
........................................................................................................................................ 13-57 13-57
Upload the Links Over TDM ........................................................................................................................................... 13-59 13-59 Audit the TDM terminations ............................................................................................................................................ 13-62 13-62 Synchronize the TDM terminations .............................................................................................................................. 13-64 13-64 View the list of TDM terminations ................................................................................................................................ 13-66 13-66 View the details of the TDM terminations .................................................................................................................. 13-67 13-67 Acknowledge the NE LAC state .................................................................................................................................... 13-68 13-68 Show the equipment view ................................................................................................................................................. 13-70 13-70 View the inventory of VT Queue Profiles in a NE .................................................................................................. 13-73 13-73 Upload the Links Over Cable .......................................................................................................................................... 13-74 13-74 .................................................................................................................................................................................................................................... 1350 OMS viii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Upload the Radio Ports ...................................................................................................................................................... 13-75 13-75 Create VT Queue Profile ................................................................................................................................................... 13-76 13-76 Create Topological View from NE or ENE ................................................................................................................ 13-77 13-77 Managing External Network Elements Overview about External Network Elements
............................................................................................................ 13-78 13-78
View the list of External Network Elements .............................................................................................................. 13-80 13-80 Description of the list of ENE ......................................................................................................................................... 13-81 13-81 Create an ENE ....................................................................................................................................................................... 13-82 13-82 Modify an ENE ..................................................................................................................................................................... 13-85 13-85 Delete an ENE ....................................................................................................................................................................... 13-87 13-87 View the details of the ENEs ........................................................................................................................................... 13-88 13-88 Details of an ENE ................................................................................................................................................................ 13-89 13-89 View the list of ETPs .......................................................................................................................................................... 13-90 13-90 Description of the list of ETPs ........................................................................................................................................ 13-91 13-91 Create an ETP
....................................................................................................................................................................... 13-92 13-92
Delete an ETP
....................................................................................................................................................................... 13-94 13-94
Managing Ethernet Physical ports View the list of Ethernet Physical ports ....................................................................................................................... 13-96 13-96 Description of the list of Ethernet physical ports ..................................................................................................... 13-97 13-97 Configure an Ethernet physical port Modify an Ethernet Physical Port
............................................................................................................................. 13-99 13-99
.............................................................................................................................. 13-104 13-104
Assign a Port to Network Access Domain
............................................................................................................... 13-106 13-106
View the details of the Ethernet physical ports
...................................................................................................... 13-108 13-108
Details of an Ethernet Physical Port ........................................................................................................................... 13-109 13-109 View the list of Equipment ports .................................................................................................................................. 13-111 13-111 Description of the list of Equipment ports
............................................................................................................... 13-112 13-112
Managing Link Aggregation (LAG) ports Description of Link Aggregation (LAG) function ................................................................................................. 13-113 13-113 View the list of LAG ports ............................................................................................................................................. 13-116 13-116 .................................................................................................................................................................................................................................... 1350 OMS ix 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Description of the list of LAG ports ........................................................................................................................... 13-117 13-117 Create a LAG port ............................................................................................................................................................. 13-118 13-118 Modify a LAG port ........................................................................................................................................................... 13-120 13-120 Assign LAG port to Network Access Domain
....................................................................................................... 13-125 13-125
View the details of the LAG ports ............................................................................................................................... 13-126 13-126 Details of a LAG port
...................................................................................................................................................... 13-127 13-127
View the ports member of a LAG
............................................................................................................................... 13-128 13-128
Description of the list of LAG ports ........................................................................................................................... 13-129 13-129 Network Access Domain (NAD) Management View the list of NADs ...................................................................................................................................................... 13-130 13-130 Description of the list of NADs Create a NAD
................................................................................................................................... 13-131 13-131
..................................................................................................................................................................... 13-132 13-132
Modify a NAD .................................................................................................................................................................... 13-133 13-133 Delete a NAD
..................................................................................................................................................................... 13-134 13-134
Managing Jumbo Frames (through NAV) Overview about Jumbo Frames
.................................................................................................................................. 13-135 13-135
Workflow to configure Interfaces for Jumbo Traffic ............................................................................................ 13-137 13-137 Particular configuration procedures Managing ports on 1678MCC Network Elements ................................................................................................ 13-140 13-140 ISA BCE Ethernet Board ................................................................................................................................................ 13-146 13-146 14
Transport Link Management Overview
................................................................................................................................................................................... 14-1 14-1
Overview about Transport links Transport link definition
...................................................................................................................................................... 14-4 14-4
Transport link classification
............................................................................................................................................... 14-5 14-5
Concatenated VC management ....................................................................................................................................... 14-11 14-11 Setting parameters of Transport Links ......................................................................................................................... 14-12 14-12 Implicit configuration ......................................................................................................................................................... 14-14 14-14 .................................................................................................................................................................................................................................... 1350 OMS x 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Managing Links Over TDM Overview ................................................................................................................................................................................. 14-17 14-17 Introduction ............................................................................................................................................................................ 14-18 14-18 View the list of Links Over TDM .................................................................................................................................. 14-19 14-19 Create Link Over TDM
..................................................................................................................................................... 14-21 14-21
Delete a Link Over TDM .................................................................................................................................................. 14-24 14-24 Configure a Link Over TDM ........................................................................................................................................... 14-25 14-25 Get the Link Over TDM Extremities ............................................................................................................................ 14-27 14-27 Remove inconsistent TDM paths ................................................................................................................................... 14-29 14-29 Assign a Link Over TDM to a Domain
....................................................................................................................... 14-30 14-30
Deassign a Link Over TDM from a Domain Assign NAccess Domain
............................................................................................................. 14-31 14-31
.................................................................................................................................................. 14-32 14-32
View the details of the Links Over TDM .................................................................................................................... 14-34 14-34 Get the Fault Localization
................................................................................................................................................ 14-36 14-36
Managing Links Over Cable Overview about Link Over Cables ................................................................................................................................ 14-38 14-38 View the list of Links Over Cables ................................................................................................................................ 14-41 14-41 Create a Link Over Cable
................................................................................................................................................. 14-42 14-42
Modify a Link Over Cable Delete a Link Over Cable
............................................................................................................................................... 14-44 14-44
................................................................................................................................................. 14-46 14-46
Get the Link Over Cable extremities ............................................................................................................................ 14-48 14-48 View the details of the Link Over Cables
................................................................................................................... 14-50 14-50
Link Over Cable Split/Join ............................................................................................................................................... 14-52 14-52 Configure Split/Join ............................................................................................................................................................ 14-54 14-54 Configure a Link Over Cable
.......................................................................................................................................... 14-57 14-57
Assign NAD ........................................................................................................................................................................... 14-58 14-58 Get the Fault Localization
................................................................................................................................................ 14-59 14-59
Assign a Link Over Cable to a Domain ....................................................................................................................... 14-60 14-60 Deassign a Link Over Cable from a Domain ............................................................................................................. 14-61 14-61 .................................................................................................................................................................................................................................... 1350 OMS xi 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Managing LAG Links Over Cable View the list of LAG Links Over Cables .................................................................................................................... 14-62 14-62 Create a LAG Link Over Cable from extremities .................................................................................................... 14-63 14-63 Create a LAG Link Over Cable from Links ............................................................................................................... 14-66 14-66 Create a LAG Link VCG from extremities ................................................................................................................ 14-69 14-69 Create a LAG Link VCG from Links ........................................................................................................................... 14-72 14-72 Modify a LAG Link Over Cable .................................................................................................................................... 14-75 14-75 Delete a LAG Link Over Cable ...................................................................................................................................... 14-77 14-77 Get the LAG Link Over Cable extremities ................................................................................................................. 14-79 14-79 View the details of the LAG Link Over Cables ........................................................................................................ 14-80 14-80 Details of the list of LAG Link Over Cables ............................................................................................................. 14-81 14-81 Managing links over WDM Overview about links over WDM .................................................................................................................................. 14-82 14-82 View the list of links over WDM ................................................................................................................................... 14-83 14-83 Get the Link Over WDM extremities ........................................................................................................................... 14-84 14-84 Description of a Link Over WDM Extremities ......................................................................................................... 14-85 14-85 View the details of the links over WDM ..................................................................................................................... 14-86 14-86 Managing links over MPLS Overview about links over MPLS
................................................................................................................................. 14-88 14-88
View the list of links over MPLS ................................................................................................................................... 14-89 14-89 Get the Link Over MPLS extremities ........................................................................................................................... 14-90 14-90 View the details of the links over MPLS ..................................................................................................................... 14-91 14-91 Managing Link over Radio View the list of links over Radio .................................................................................................................................... 14-93 14-93 Managing links over T-MPLS Overview about links over T-MPLS
............................................................................................................................. 14-94 14-94
View the list of links over T-MPLS ............................................................................................................................... 14-95 14-95 Get the Link Over T-MPLS extremities ....................................................................................................................... 14-96 14-96 View the details of the links over T-MPLS
................................................................................................................ 14-97 14-97
.................................................................................................................................................................................................................................... 1350 OMS xii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Managing MPLS/T-MPLS infrastructure Overview about MPLS/T-MPLS infrastructure ........................................................................................................ 14-99 14-99 View the list of T-MPLS sections ................................................................................................................................ 14-100 14-100 Get the T-MPLS section extremities ........................................................................................................................... 14-101 14-101 View the details of the links over T-MPLS .............................................................................................................. 14-102 14-102 Managing Transport Links by Domain View the list of Transport Links ................................................................................................................................... 14-104 14-104 15
MPLS Provisioning Management Overview
................................................................................................................................................................................... 15-1 15-1
Managing Traffic Descriptors (MPLS) ....................................................................................................................................................................................................... 15-4 15-4
Overview about Traffic Descriptors (MPLS) ............................................................................................................... 15-5 15-5 View the list of Traffic Descriptors (MPLS) ................................................................................................................ 15-6 15-6 Description of the list of Traffic Descriptors ................................................................................................................ 15-7 15-7 Create a Traffic Descriptor (MPLS) ................................................................................................................................ 15-8 15-8 Modify a Traffic Descriptor (MPLS) ............................................................................................................................ 15-12 15-12 Delete a Traffic Descriptor (MPLS) .............................................................................................................................. 15-15 15-15 View the details of the Traffic Descriptors (MPLS) ................................................................................................ 15-16 15-16 Details of a Traffic Descriptor ......................................................................................................................................... 15-17 15-17 Get the Traffic Descriptor inventory list (MPLS) .................................................................................................... 15-18 15-18 Description of the Traffic Descriptor inventory
....................................................................................................... 15-19 15-19
Managing Transport Links (MPLS) Overview ................................................................................................................................................................................. 15-20 15-20 Overview about Transport Links .................................................................................................................................... 15-21 15-21 View the list of Transport Links ..................................................................................................................................... 15-23 15-23 Define the Transport Link characteristics ................................................................................................................... 15-25 15-25 Get the Transport Link extremities ................................................................................................................................ 15-28 15-28 Description of the list of Transport Link Extremities ............................................................................................. 15-30 15-30 .................................................................................................................................................................................................................................... 1350 OMS xiii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
View the details of the Transport Links ....................................................................................................................... 15-31 15-31 Details of a Transport Link ............................................................................................................................................... 15-32 15-32 View the bandwidth load of Transport Links View the inventory of Transport Links
........................................................................................................... 15-33 15-33
........................................................................................................................ 15-36 15-36
Description of the Transport Link Inventory ............................................................................................................. 15-38 15-38 Managing LSP Tunnels (MPLS) Overview ................................................................................................................................................................................. 15-39 15-39 Overview about LSP Tunnels .......................................................................................................................................... 15-40 15-40 View the list of LSP tunnels ............................................................................................................................................. 15-41 15-41 Description of the list of LSP Tunnels Create an LSP tunnel
.......................................................................................................................................................... 15-43 15-43
Modify an LSP tunnel Delete an LSP tunnel Allocate LSP tunnel
......................................................................................................................... 15-42 15-42
........................................................................................................................................................ 15-45 15-45
.......................................................................................................................................................... 15-47 15-47
............................................................................................................................................................ 15-48 15-48
Deallocate LSP tunnel ........................................................................................................................................................ 15-51 15-51 List the constraints of an LSP tunnel
........................................................................................................................... 15-53 15-53
Description of constraints of LSP tunnel Add a constraint to an LSP tunnel
.................................................................................................................... 15-55 15-55
................................................................................................................................. 15-56 15-56
Delete a constraint from an LSP tunnel ....................................................................................................................... 15-58 15-58 View the details of the LSP tunnel constraints .......................................................................................................... 15-60 15-60 Details of a LSP Tunnel Constraint ............................................................................................................................... 15-62 15-62 View the list of cross connections .................................................................................................................................. 15-63 15-63 Description of the list of LSP cross connections ...................................................................................................... 15-64 15-64 Implement an LSP tunnel .................................................................................................................................................. 15-65 15-65 Get the LSP tunnel extremities
....................................................................................................................................... 15-67 15-67
Description of the list of LSP Tunnel Extremities
.................................................................................................. 15-69 15-69
View the details of the LSP tunnels ............................................................................................................................... 15-70 15-70 Details of a LSP Tunnel ..................................................................................................................................................... 15-71 15-71 View the inventory of VC-LSPs ..................................................................................................................................... 15-72 15-72 .................................................................................................................................................................................................................................... 1350 OMS xiv 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Description of the LSP Tunnel Inventory
................................................................................................................... 15-73 15-73
View the bandwidth load of LSPs .................................................................................................................................. 15-74 15-74 View the route of LSP Tunnels
...................................................................................................................................... 15-77 15-77
View the list of the Transport Links related to an LSP Tunnel
........................................................................... 15-79 15-79
Description of the LSP Tunnel inventory .................................................................................................................... 15-80 15-80 Managing VC-LSP (MPLS) Overview ................................................................................................................................................................................. 15-81 15-81 Overview about VC-LSP
.................................................................................................................................................. 15-82 15-82
View the list of VC-LSPs .................................................................................................................................................. 15-83 15-83 Description of the list of VC-LSPs ................................................................................................................................ 15-84 15-84 Create a VC-LSP .................................................................................................................................................................. 15-85 15-85 Modify a VC-LSP ................................................................................................................................................................ 15-89 15-89 Delete a VC-LSP .................................................................................................................................................................. 15-91 15-91 Implement a VC-LSP
......................................................................................................................................................... 15-92 15-92
De-implement a VC-LSP .................................................................................................................................................. 15-94 15-94 Commission a VC-LSP ...................................................................................................................................................... 15-96 15-96 De-commission a VC-LSP
............................................................................................................................................... 15-98 15-98
Get the VC-LSP extremities ............................................................................................................................................. 15-99 15-99 Description of the list of VC-LSP Extremities
....................................................................................................... 15-101 15-101
View the details of the VC-LSPs ................................................................................................................................. 15-102 15-102 Details of a VC-LSP ......................................................................................................................................................... 15-103 15-103 16
T-MPLS Provisioning Management Overview
................................................................................................................................................................................... 16-1 16-1
Managing T-MPLS PHB profile Overview about PHB profile management View the list of PHB profiles (T-MPLS)
.................................................................................................................. 16-5 16-5
....................................................................................................................... 16-6 16-6
Description of the list of T-MPLS PHB Profiles Create a PHB profile (T-MPLS)
........................................................................................................ 16-7 16-7
....................................................................................................................................... 16-8 16-8
Modify a PHB profiles (T-MPLS)
................................................................................................................................... 16-9 16-9
.................................................................................................................................................................................................................................... 1350 OMS xv 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Delete a PHB profile (T-MPLS) ..................................................................................................................................... 16-11 16-11 View the details of the PHB profiles (T-MPLS)
...................................................................................................... 16-13 16-13
Managing Transport Links (T-MPLS) Overview about Transport Links .................................................................................................................................... 16-14 16-14 View the list of Transport Links ..................................................................................................................................... 16-16 16-16 Description of the list of T-MPLS Transport Links ................................................................................................. 16-17 16-17 Define the Transport Link characteristics ................................................................................................................... 16-18 16-18 Get the Transport Link extremities ................................................................................................................................ 16-20 16-20 Description of the list of Transport Link Extremities ............................................................................................. 16-22 16-22 View the details of the Transport Links ....................................................................................................................... 16-23 16-23 Details of a T-MPLS Transport Link
............................................................................................................................ 16-24 16-24
View the bandwidth load of Transport Links View the inventory of Transport Links
........................................................................................................... 16-25 16-25
........................................................................................................................ 16-28 16-28
Description of the inventory of Transport Links ...................................................................................................... 16-30 16-30 Managing Virtual Transport (T-MPLS) Overview about Virtual Transports
............................................................................................................................... 16-31 16-31
View the list of Virtual Transports ................................................................................................................................. 16-33 16-33 Description of the list of Virtual Transports ............................................................................................................... 16-34 16-34 Create a Virtual Transport ................................................................................................................................................. 16-35 16-35 Modify a Virtual Transport ............................................................................................................................................... 16-37 16-37 Delete a Virtual Transport ................................................................................................................................................. 16-39 16-39 View the details of the Virtual Transport ..................................................................................................................... 16-40 16-40 Details of a Virtual Transport
.......................................................................................................................................... 16-41 16-41
Configuration of a Virtual Transport Implement a Virtual Transport
........................................................................................................................... 16-42 16-42
........................................................................................................................................ 16-44 16-44
De-implement a Virtual Transport ................................................................................................................................. 16-46 16-46 View the Virtual Transport extremities ........................................................................................................................ 16-48 16-48 Description of the list of Virtual Transports ............................................................................................................... 16-49 16-49
.................................................................................................................................................................................................................................... 1350 OMS xvi 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Managing Pseudo Wires (T-MPLS) Overview about Pseudo Wires
........................................................................................................................................ 16-50 16-50
View the list of Pseudo Wires .......................................................................................................................................... 16-51 16-51 Description of the list of Pseudo Wires ........................................................................................................................ 16-52 16-52 Create a Pseudo Wire .......................................................................................................................................................... 16-53 16-53 Modify a PseudoWire ......................................................................................................................................................... 16-55 16-55 Delete a Pseudo Wire .......................................................................................................................................................... 16-57 16-57 View the details of the Pseudo Wires
........................................................................................................................... 16-58 16-58
Details of a Pseudo Wire ................................................................................................................................................... 16-59 16-59 Configuration of the route of a Pseudo Wire ............................................................................................................. 16-60 16-60 Delete a constraint from a Pseudo Wire
...................................................................................................................... 16-62 16-62
Configuration of PHB profile of a Pseudo Wire ....................................................................................................... 16-64 16-64 Configuration of Layer-2 encapsulation of a Pseudo Wire ................................................................................... 16-66 16-66 Allocate Pseudo Wire ......................................................................................................................................................... 16-67 16-67 De-allocate Pseudo Wire ................................................................................................................................................... 16-70 16-70 Implement a Pseudo Wire ................................................................................................................................................. 16-72 16-72 De-implement a Pseudo Wire .......................................................................................................................................... 16-74 16-74 List the constraints of a Pseudo Wire
.......................................................................................................................... 16-76 16-76
Description of the list of Pseudo Wire Constraints .................................................................................................. 16-77 16-77 View the details of the Pseudo Wire constraints ....................................................................................................... 16-78 16-78 Details of a Pseudo Wire Constraint ............................................................................................................................. 16-79 16-79 View the list of cross connections .................................................................................................................................. 16-80 16-80 Description of the list of PW Cross Connections ..................................................................................................... 16-81 16-81 View the Pseudo Wire extremities ................................................................................................................................. 16-82 16-82 Description of the list of PW Extremities ................................................................................................................... 16-83 16-83 View the section inventory from Pseudo Wire .......................................................................................................... 16-84 16-84 Description of the T-MPLS section Inventory
.......................................................................................................... 16-85 16-85
View the bandwidth load of Pseudo Wire ................................................................................................................... 16-86 16-86 View the route of Pseudo Wires
.................................................................................................................................... 16-87 16-87
.................................................................................................................................................................................................................................... 1350 OMS xvii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
View the Pseudo Wires crossing a Pseudo Wire ....................................................................................................... 16-88 16-88 Description of the list of Pseudo Wires ........................................................................................................................ 16-89 16-89 T-MPLS tunnel schema T-MPLS tunnel schema
..................................................................................................................................................... 16-90 16-90
Ethernet Services in the T-MPLS Domain
................................................................................................................ 16-93 16-93
Managing T-MPLS tunnels T-MPLS tunnel description
.............................................................................................................................................. 16-97 16-97
View the list of T-MPLS tunnels .................................................................................................................................... 16-99 16-99 Description of the list of T-MPLS tunnels
............................................................................................................... 16-100 16-100
Create a T-MPLS tunnel .................................................................................................................................................. 16-101 16-101 Modify a T-MPLS tunnel ................................................................................................................................................ 16-104 16-104 Delete a T-MPLS tunnel .................................................................................................................................................. 16-106 16-106 View the details of the T-MPLS tunnels
................................................................................................................... 16-107 16-107
Details of a T-MPLS tunnel ........................................................................................................................................... 16-108 16-108 Configuration of the route of a T-MPLS tunnel ..................................................................................................... 16-109 16-109 Delete a constraint from a T-MPLS tunnel ............................................................................................................... 16-111 16-111 Configuration of PHB profile of a T-MPLS tunnel ............................................................................................... 16-113 16-113 Configuration of Layer-2 encapsulation of a tunnel ............................................................................................. 16-115 16-115 Allocate T-MPLS tunnel
................................................................................................................................................. 16-117 16-117
De-allocate T-MPLS tunnel ........................................................................................................................................... 16-120 16-120 Implement a T-MPLS tunnel ......................................................................................................................................... 16-122 16-122 De-implement a T-MPLS tunnel .................................................................................................................................. 16-124 16-124 List the constraints of a T-MPLS tunnel
.................................................................................................................. 16-126 16-126
Description of the list of T-MPLS tunnel Constraints .......................................................................................... 16-127 16-127 View the details of the T-MPLS tunnel constraints ............................................................................................... 16-128 16-128 Details of a T-MPLS tunnel Constraint ..................................................................................................................... 16-129 16-129 View the list of cross connections ............................................................................................................................... 16-130 16-130 Description of the list of T-MPLS tunnel Cross Connections ........................................................................... 16-131 16-131 View the T-MPLS tunnel extremities ......................................................................................................................... 16-132 16-132 .................................................................................................................................................................................................................................... 1350 OMS xviii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Description of the list of T-MPLS tunnel Extremities
......................................................................................... 16-133 16-133
View the section inventory from T-MPLS tunnel .................................................................................................. 16-134 16-134 Description of the Inventory of sections ................................................................................................................... 16-135 16-135 View the bandwidth load of T-MPLS tunnel ........................................................................................................... 16-136 16-136 View the route of T-MPLS tunnels
............................................................................................................................ 16-137 16-137
View the Pseudo Wires crossing a T-MPLS tunnel ............................................................................................... 16-138 16-138 Description of the list of Pseudo Wires ..................................................................................................................... 16-139 16-139 Tunnel protection Tunnel protection create .................................................................................................................................................. 16-140 16-140 T-MPLS Routing display ................................................................................................................................................ 16-144 16-144 Tunnel switch commands ............................................................................................................................................... 16-147 16-147 Other info on T-MPLS routing display ...................................................................................................................... 16-152 16-152 MAC Flushing Protection Overview
.............................................................................................................................................................................. 16-156 16-156
MAC flushing protection description
........................................................................................................................ 16-157 16-157
MAC flushing protection creation ............................................................................................................................... 16-158 16-158 MAC flushing protection list
........................................................................................................................................ 16-160 16-160
Attributes of MAC-flushing protection ..................................................................................................................... 16-161 16-161 Interconnection Scheme list ........................................................................................................................................... 16-162 16-162 Attributes of Interconnection Schemes
..................................................................................................................... 16-163 16-163
TMPLS EVC: Force MAC flushing ........................................................................................................................... 16-164 16-164 Tunnel Redundancy Overview
.............................................................................................................................................................................. 16-165 16-165
Description ........................................................................................................................................................................... 16-166 16-166 Create one-to-one-open protection .............................................................................................................................. 16-173 16-173 Create Dual-point-to-point Protection
....................................................................................................................... 16-175 16-175
Create MAC Flushing Protection Schema EVC setup
.............................................................................................................. 16-177 16-177
............................................................................................................................................................................ 16-178 16-178
.................................................................................................................................................................................................................................... 1350 OMS xix 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
17
EVC over T-MPLS Overview
................................................................................................................................................................................... 17-1 17-1
Create T-MPLS Structure Create Link over Cable T-MPLS tunnel create
........................................................................................................................................................ 17-2 17-2
........................................................................................................................................................ 17-14 17-14
T-MPLS-Create PW ............................................................................................................................................................ 17-21 17-21 EVC on T-MPLS Create EVC over T-MPLS wizard ................................................................................................................................. 17-27 17-27 List the T-MPLS EVC ........................................................................................................................................................ 17-32 17-32 Description of the list of T-MPLS EVC
...................................................................................................................... 17-33 17-33
Create EVC over T-MPLS EVPL bottom up ............................................................................................................. 17-34 17-34 Create EVC over T-MPLS EVPL top down ............................................................................................................... 17-55 17-55 Create EVC over T-MPLS EVPLAN ........................................................................................................................... 17-72 17-72 Create EVC over T-MPLS BTV ..................................................................................................................................... 17-86 17-86 Create EVC over T-MPLS HSI ....................................................................................................................................... 17-90 17-90 Alarms EVC T-MPLS
........................................................................................................................................................ 17-94 17-94
Delete NE with EVC over T-MPLS What to do deleting a NE .................................................................................................................................................. 17-97 17-97 Delete NE detailed procedure .......................................................................................................................................... 17-98 17-98 Verify create EVC over T-MPLS Verify create EVC over T-MPLS ................................................................................................................................. 17-114 17-114 18
End to End Ethernet Provisioning Management Overview
................................................................................................................................................................................... 18-1 18-1
IP DSCP/TOS and EtherType Classification of the frames ................................................................................................................................................ 18-6 18-6 Managing Customer Overview about Customer
.................................................................................................................................................. 18-8 18-8
Display the Customer List ................................................................................................................................................... 18-9 18-9 .................................................................................................................................................................................................................................... 1350 OMS xx 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Description of the list of Customers
............................................................................................................................. 18-10 18-10
Create a Customer ................................................................................................................................................................ 18-11 18-11 Modify a Customer Delete a Customer
............................................................................................................................................................. 18-12 18-12
............................................................................................................................................................... 18-14 18-14
Get Details of the Customer ............................................................................................................................................. 18-15 18-15 Details of a Customer ......................................................................................................................................................... 18-16 18-16 Managing Ethernet Services Overview about Ethernet Services
................................................................................................................................ 18-17 18-17
Display the Service List ..................................................................................................................................................... 18-20 18-20 Description of the list of Services .................................................................................................................................. 18-21 18-21 Create a Service .................................................................................................................................................................... 18-22 18-22 Service Setup ......................................................................................................................................................................... 18-24 18-24 Modify a Service .................................................................................................................................................................. 18-30 18-30 Delete a Service .................................................................................................................................................................... 18-32 18-32 Get details of the Service Details of a Service
.................................................................................................................................................. 18-33 18-33
............................................................................................................................................................. 18-35 18-35
Display the Services of a Customer
.............................................................................................................................. 18-36 18-36
Managing ETS Ethernet Virtual Connections (EVC) Overview about ETS Ethernet Virtual Connections ................................................................................................ 18-37 18-37 Resource Reservation for Private Services ................................................................................................................. 18-39 18-39 Display the list of Connection Oriented EVC ........................................................................................................... 18-42 18-42 Description of the list of EVCs ....................................................................................................................................... 18-43 18-43 Create a Connection Oriented EVC .............................................................................................................................. 18-44 18-44 Modify an ETS EVC Delete an ETS EVC
.......................................................................................................................................................... 18-47 18-47
............................................................................................................................................................ 18-49 18-49
Get the EVC properties ...................................................................................................................................................... 18-51 18-51 Details of a EVC
.................................................................................................................................................................. 18-53 18-53
Allocate ETS EVC
.............................................................................................................................................................. 18-54 18-54
Deallocate ETS EVC .......................................................................................................................................................... 18-55 18-55 .................................................................................................................................................................................................................................... 1350 OMS xxi 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Implement ETS EVC .......................................................................................................................................................... 18-56 18-56 Deimplement ETS EVC .................................................................................................................................................... 18-57 18-57 Commission ETS EVC ...................................................................................................................................................... 18-58 18-58 Decommission ETS EVC
................................................................................................................................................. 18-59 18-59
List the EVC terminations ................................................................................................................................................ 18-60 18-60 Description of the list of terminations .......................................................................................................................... 18-61 18-61 Delete an EVC Termination ............................................................................................................................................. 18-62 18-62 Get the EVC termination properties .............................................................................................................................. 18-63 18-63 Details of a Termination
.................................................................................................................................................... 18-65 18-65
Add an EVC termination ................................................................................................................................................... 18-66 18-66 EVC Fault Localization ..................................................................................................................................................... 18-68 18-68 Description of the list of Fault Localization Description of the list of Alarms Start PM on an EVC
.............................................................................................................. 18-69 18-69
.................................................................................................................................... 18-70 18-70
........................................................................................................................................................... 18-71 18-71
Stop PM on an EVC ............................................................................................................................................................ 18-72 18-72 Synchronize PM on an EVC ............................................................................................................................................ 18-73 18-73 Show PM on an EVC
......................................................................................................................................................... 18-74 18-74
View the Routing Display on an EVC
......................................................................................................................... 18-75 18-75
Managing End-to-End Ethernet Virtual Connections (E2E EVC) Overview about E2E Ethernet Virtual Connections ................................................................................................ 18-76 18-76 Display the list of E2E EVC ............................................................................................................................................ 18-78 18-78 Description of the list of EVCs ....................................................................................................................................... 18-79 18-79 Create an E2E EVC ............................................................................................................................................................. 18-80 18-80 Create a full E2E EVC ....................................................................................................................................................... 18-84 18-84 Create a raw E2E EVC
...................................................................................................................................................... 18-86 18-86
Modify a full E2E EVC ..................................................................................................................................................... 18-87 18-87 Join E2E EVC
....................................................................................................................................................................... 18-89 18-89
Managing an E2E EVC
..................................................................................................................................................... 18-91 18-91
.................................................................................................................................................................................................................................... 1350 OMS xxii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
EVC over SDH Structure for EVC over SDH ........................................................................................................................................... 18-93 18-93 Assign ports to domain .................................................................................................................................................... 18-102 18-102 EVC over SDH ................................................................................................................................................................... 18-106 18-106 Alarms EVC T-MPLS ...................................................................................................................................................... 18-118 18-118 Full EVC Takeover Overview about Full EVC Takeover procedure ..................................................................................................... 18-121 18-121 Full EVC Takeover Procedure ...................................................................................................................................... 18-122 18-122 T-MPLS Takeover T-MPLS Takeover description ...................................................................................................................................... 18-130 18-130 Takeover procedure for T-MPLS ................................................................................................................................. 18-131 18-131 Managing Color Profiles Overview about Color Profiles ..................................................................................................................................... 18-133 18-133 Display the Color Profile list ......................................................................................................................................... 18-134 18-134 Create a Color Profile
...................................................................................................................................................... 18-135 18-135
Modify a Color Profile Delete a Color Profile
.................................................................................................................................................... 18-136 18-136
...................................................................................................................................................... 18-139 18-139
Get the Color Profile Properties ................................................................................................................................... 18-140 18-140 Managing Traffic Descriptors Overview about Traffic Descriptor
............................................................................................................................. 18-142 18-142
Display the Traffic Descriptor list ............................................................................................................................... 18-144 18-144 Description of the list of Traffic Descriptors ........................................................................................................... 18-145 18-145 Create a Traffic Descriptor ............................................................................................................................................. 18-146 18-146 Modify a Traffic Descriptor ........................................................................................................................................... 18-149 18-149 Delete a Traffic Descriptor ............................................................................................................................................. 18-152 18-152 Get the Traffic Descriptor Properties Details of a Traffic Descriptor
......................................................................................................................... 18-153 18-153
...................................................................................................................................... 18-155 18-155
.................................................................................................................................................................................................................................... 1350 OMS xxiii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Managing Traffic Classifiers Overview about Traffic Classifiers
............................................................................................................................. 18-156 18-156
Display the Traffic Classifier list ................................................................................................................................. 18-158 18-158 Description of the list of Traffic Classifiers ............................................................................................................. 18-159 18-159 Create a Traffic Classifier ............................................................................................................................................... 18-160 18-160 Modify a Traffic Classifier ............................................................................................................................................. 18-162 18-162 Delete a Traffic Classifier ............................................................................................................................................... 18-164 18-164 Get the Traffic Classifier Properties ........................................................................................................................... 18-165 18-165 Details of a Traffic Classifier ........................................................................................................................................ 18-167 18-167 Managing Ethernet ETS Edge Physical Ports Overview about Ethernet edge physical ports
....................................................................................................... 18-168 18-168
Display the ETS edge port list ...................................................................................................................................... 18-169 18-169 Modify an edge port
......................................................................................................................................................... 18-170 18-170
Configure an ETS Edge Port ......................................................................................................................................... 18-172 18-172 Get the ETS Edge Port Properties ............................................................................................................................... 18-175 18-175 Display the traffic parameter list .................................................................................................................................. 18-177 18-177 Description of the list of Traffic Parameters
........................................................................................................... 18-178 18-178
Details of Traffic Parameters ......................................................................................................................................... 18-179 18-179 Navigation to equipment ................................................................................................................................................. 18-180 18-180 Show PM on an Edge Port ............................................................................................................................................. 18-182 18-182 Show External Termination Point
............................................................................................................................... 18-183 18-183
Managing Ethernet Transport Links Overview about Ethernet Transport Links
............................................................................................................... 18-184 18-184
Display the Ethernet ETS Transport Link list ......................................................................................................... 18-186 18-186 Description of the list of ETS Transport Links ....................................................................................................... 18-187 18-187 Configure an ETS Transport Link ............................................................................................................................... 18-188 18-188 Get the Transport Link extremities Get the Transport Link properties
............................................................................................................................. 18-190 18-190
............................................................................................................................... 18-193 18-193
Details of ETS Transport Links .................................................................................................................................... 18-195 18-195 .................................................................................................................................................................................................................................... 1350 OMS xxiv 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Display the Transport Link bandwidth load
............................................................................................................ 18-196 18-196
Managing Ethernet Segments Overview about Ethernet Segments Display the Ethernet Segment list
........................................................................................................................... 18-197 18-197
............................................................................................................................... 18-199 18-199
Description of the list of Ethernet Segments ........................................................................................................... 18-200 18-200 Create an Ethernet Segment
.......................................................................................................................................... 18-202 18-202
Modify an Ethernet Segment Delete an Ethernet Segment
........................................................................................................................................ 18-205 18-205
.......................................................................................................................................... 18-208 18-208
Associate a Traffic Classifier to an Ethernet Segment ......................................................................................... 18-209 18-209 Disassociate a Traffic Classifier to an Ethernet Segment Add a constraint to an Ethernet Segment
................................................................................... 18-211 18-211
................................................................................................................. 18-213 18-213
List the constraints related to an Ethernet Segment .............................................................................................. 18-216 18-216 Description of the list of Constraints .......................................................................................................................... 18-217 18-217 Delete an Ethernet Segment Constraint
.................................................................................................................... 18-218 18-218
Get the Ethernet Segment Constraint Properties .................................................................................................... 18-219 18-219 Details of an Ethernet Segment Constraint .............................................................................................................. 18-221 18-221 Modify a Constraint .......................................................................................................................................................... 18-222 18-222 VLAN Push/Pop at ETS NNI Interface
.................................................................................................................... 18-225 18-225
Allocate an Ethernet Segment ....................................................................................................................................... 18-226 18-226 Deallocate an Ethernet Segment
................................................................................................................................. 18-227 18-227
Implement an Ethernet Segment .................................................................................................................................. 18-229 18-229 Deimplement an Ethernet Segment Configure an Ethernet Segment
............................................................................................................................ 18-231 18-231
................................................................................................................................... 18-233 18-233
Get the Ethernet Segment extremities ........................................................................................................................ 18-235 18-235 Description of the list of Ethernet Segment Extremities ..................................................................................... 18-239 18-239 Get the Ethernet Segment properties .......................................................................................................................... 18-240 18-240 Details of an Ethernet Segment .................................................................................................................................... 18-241 18-241 Display the route of an Ethernet Segment ................................................................................................................ 18-242 18-242 Display the connectivity view of an Ethernet Segment ....................................................................................... 18-244 18-244 .................................................................................................................................................................................................................................... 1350 OMS xxv 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Managing VLAN types Overview about VLAN types
....................................................................................................................................... 18-246 18-246
Display the VLAN type list ........................................................................................................................................... 18-247 18-247 Create a VLAN type ......................................................................................................................................................... 18-248 18-248 Modify a VLAN type ....................................................................................................................................................... 18-251 18-251 Delete a VLAN type ......................................................................................................................................................... 18-253 18-253 19
Bridge Network Management Overview
................................................................................................................................................................................... 19-1 19-1
Connection Less Networks Bridge Network Management ............................................................................................................................................ 19-4 19-4 Bridge Traffic Management ................................................................................................................................................ 19-6 19-6 Spanning Tree Instance Management ............................................................................................................................. 19-8 19-8 VLAN management ............................................................................................................................................................ 19-10 19-10 EVC Data Plane .................................................................................................................................................................... 19-11 19-11 The EVC life cycle .............................................................................................................................................................. 19-13 19-13 Layer-2 Control Protocol Processing ............................................................................................................................ 19-16 19-16 Bandwidth Profile per UNI
.............................................................................................................................................. 19-18 19-18
View the list of bridge NEs
.............................................................................................................................................. 19-22 19-22
Description of the list of Bridge NEs View the list of bridge ENEs
........................................................................................................................... 19-23 19-23
........................................................................................................................................... 19-24 19-24
Description of the list of Bridge ENEs
........................................................................................................................ 19-25 19-25
View the Provider Bridge Flows of an EVC .............................................................................................................. 19-26 19-26 Connection Less Transport Link Management Display the Ethernet Bridge Transport Link list ....................................................................................................... 19-27 19-27 Description of the list of Bridge Transport Links Configure a transport Link
.................................................................................................... 19-29 19-29
............................................................................................................................................... 19-30 19-30
Get the Transport Link extremities ................................................................................................................................ 19-34 19-34 Description of the list of Transport Link extremities .............................................................................................. 19-37 19-37 Get the Transport Link properties .................................................................................................................................. 19-38 19-38 .................................................................................................................................................................................................................................... 1350 OMS xxvi 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Details of an ETB Transport Link .................................................................................................................................. 19-40 19-40 Activate a Bridge Transport Link ................................................................................................................................... 19-41 19-41 Deactivate a Bridge Transport Link .............................................................................................................................. 19-42 19-42 View the list of Bridge Edge Ports
................................................................................................................................ 19-43 19-43
Description of the list of Bridge Edge Ports Activate a Bridge Edge Port
.............................................................................................................. 19-44 19-44
............................................................................................................................................ 19-45 19-45
Deactivate a Bridge Edge Port ........................................................................................................................................ 19-46 19-46 Connection Less EVC Management View the Connection Less EVC list .............................................................................................................................. 19-47 19-47 Description of the list of Bridge EVCs ........................................................................................................................ 19-48 19-48 Create a Bridge EVC .......................................................................................................................................................... 19-49 19-49 Modify a Bridge EVC ........................................................................................................................................................ 19-53 19-53 Delete a Bridge EVC .......................................................................................................................................................... 19-56 19-56 Get the EVC properties ...................................................................................................................................................... 19-58 19-58 Details of a Bridge EVC .................................................................................................................................................... 19-60 19-60 Configure a Bridge or an ETS EVC .............................................................................................................................. 19-61 19-61 Add bridge Transport Link to EVC ............................................................................................................................... 19-62 19-62 Remove bridge Transport Link to EVC ....................................................................................................................... 19-63 19-63 Inventory of bridge Transport Links of an EVC ....................................................................................................... 19-64 19-64 EVC Fault Localization ..................................................................................................................................................... 19-65 19-65 Description of the list of Fault Localization Description of the list of Alarms
.............................................................................................................. 19-68 19-68
.................................................................................................................................... 19-69 19-69
Navigation to AS .................................................................................................................................................................. 19-70 19-70 Bridge EVC Termination Management View the list of EVC terminations ................................................................................................................................. 19-72 19-72 Description of the list of EVC Terminations
............................................................................................................. 19-73 19-73
Add Connection Less EVC Termination ..................................................................................................................... 19-74 19-74 Delete a Bridge EVC Termination ................................................................................................................................. 19-81 19-81 Configure a Bridge EVC Termination .......................................................................................................................... 19-83 19-83 .................................................................................................................................................................................................................................... 1350 OMS xxvii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Get the EVC termination properties .............................................................................................................................. 19-85 19-85 Details of an EVC Termination ....................................................................................................................................... 19-87 19-87 Workflow for Bridge Management Overview about Workflow
.............................................................................................................................................. 19-88 19-88
Create a Domain ................................................................................................................................................................... 19-90 19-90 Add NE to a Domain
.......................................................................................................................................................... 19-91 19-91
Domain Configuration Domain Modification
....................................................................................................................................................... 19-94 19-94
......................................................................................................................................................... 19-96 19-96
Configure a Network Element
........................................................................................................................................ 19-98 19-98
Link Over TDM configuration
..................................................................................................................................... 19-100 19-100
NE Ethernet Physical Port Configuration ................................................................................................................. 19-102 19-102 Create a Customer ............................................................................................................................................................. 19-104 19-104 Create an Ethernet Service ............................................................................................................................................. 19-107 19-107 Traffic Descriptor Definition ......................................................................................................................................... 19-109 19-109 EVC Allocation and Implementation
......................................................................................................................... 19-111 19-111
EVC Bandwidth Management Dynamic change capability ............................................................................................................................................ 19-112 19-112 Function Description ........................................................................................................................................................ 19-113 19-113 Service Delimiting Vlan Push/Pop On Provider Bridge UNI/IWI Management
............................................................................. 19-117 19-117
Spanning Tree Show the Spanning Tree Instance of EVC ............................................................................................................... 19-119 19-119 Show the Spanning Tree Instance
............................................................................................................................... 19-120 19-120
Spanning Tree Instance configuration
....................................................................................................................... 19-121 19-121
Spanning Tree Instance Implementation ................................................................................................................... 19-123 19-123 Spanning Tree Instance Deimplementation ............................................................................................................. 19-124 19-124 20
Provider Backbone Bridge Network Management Overview
................................................................................................................................................................................... 20-1 20-1
.................................................................................................................................................................................................................................... 1350 OMS xxviii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Provider Backbone Bridge (PBB) Networks Provider Backbone Bridge Management ....................................................................................................................... 20-5 20-5 PBB EVC provisioning ........................................................................................................................................................ 20-8 20-8 Ethernet Ring Protocol (ERP) ......................................................................................................................................... 20-10 20-10 Network Configuration Network Configuration ...................................................................................................................................................... 20-11 20-11 PBB Domain Create ............................................................................................................................................................ 20-12 20-12 Define NE ............................................................................................................................................................................... 20-14 20-14 Provisioning Provisioning hardware reference .................................................................................................................................... 20-17 20-17 Transport link
....................................................................................................................................................................... 20-20 20-20
Create Ethernet Physical Connection
........................................................................................................................... 20-21 20-21
Assign Link over Cable to PBB domain
..................................................................................................................... 20-24 20-24
ERP configuration Create ERP Ring
.................................................................................................................................................................. 20-30 20-30
Create an ERP Instance ...................................................................................................................................................... 20-38 20-38 Backbone VLAN ID B-VID configuration ........................................................................................................................................................... 20-46 20-46 EVC-EVPLAN Service in PBB/ERP Additional Info on PBB/ERP Service
.......................................................................................................................... 20-52 20-52
PBB EVC Termination Management Add PBB EVC Termination ............................................................................................................................................. 20-56 20-56 Remove PBB EVC Termination ..................................................................................................................................... 20-59 20-59 Provider Backbone Bridge EVC Management Overview ................................................................................................................................................................................. 20-60 20-60 View the PBB EVC list ...................................................................................................................................................... 20-61 20-61 Description of the list of PBB EVCs ............................................................................................................................ 20-62 20-62 Create PBB EVC .................................................................................................................................................................. 20-63 20-63 .................................................................................................................................................................................................................................... 1350 OMS xxix 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Allocate PBB EVC .............................................................................................................................................................. 20-65 20-65 Deallocate PBB EVC
......................................................................................................................................................... 20-67 20-67
Implement PBB EVC ......................................................................................................................................................... 20-68 20-68 Deimplement PBB EVC .................................................................................................................................................... 20-70 20-70 Add Termination on implemented PBB EVC
........................................................................................................... 20-71 20-71
Remove Termination on implemented EVC .............................................................................................................. 20-72 20-72 Configure PBB EVC
.......................................................................................................................................................... 20-73 20-73
Bridge Flows of PBB EVC
.............................................................................................................................................. 20-74 20-74
PBB EVC Broadcast Domain Containment ............................................................................................................... 20-76 20-76 Enable Broadcast Domain Containment
..................................................................................................................... 20-77 20-77
Disable Broadcast Domain Containment .................................................................................................................... 20-78 20-78 Automatic association UNI port - default VT ........................................................................................................... 20-79 20-79 Manual association UNI port - user VT
...................................................................................................................... 20-80 20-80
Configuration of the DEI bit ............................................................................................................................................ 20-81 20-81 B-VID Management Overview ................................................................................................................................................................................. 20-82 20-82 View the B-VID list
............................................................................................................................................................ 20-83 20-83
Create PBB B-VID .............................................................................................................................................................. 20-84 20-84 Delete PBB B-VID .............................................................................................................................................................. 20-86 20-86 Allocate PBB B-VID .......................................................................................................................................................... 20-87 20-87 Deallocate PBB B-VID ...................................................................................................................................................... 20-88 20-88 Implement PBB B-VID
..................................................................................................................................................... 20-89 20-89
Deimplement PBB B-VID ................................................................................................................................................ 20-91 20-91 Domain Wide VID distribution ....................................................................................................................................... 20-93 20-93 Ring Association to a B-VID ........................................................................................................................................... 20-95 20-95 Ring Dissociation from B-VID ....................................................................................................................................... 20-97 20-97 Change ERP of a B-VID
................................................................................................................................................... 20-99 20-99
List ERP instances of a B-VID ..................................................................................................................................... 20-101 20-101 Association of Transport Link to B-VID .................................................................................................................. 20-102 20-102 .................................................................................................................................................................................................................................... 1350 OMS xxx 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Dissociation of Transport Link to B-VID ................................................................................................................. 20-104 20-104 Ethernet Ring Protection (ERP) Management Overview
.............................................................................................................................................................................. 20-107 20-107
View the ERP ring list
..................................................................................................................................................... 20-108 20-108
Description of the list of ERP ....................................................................................................................................... 20-109 20-109 Create/delete ERP Ring ................................................................................................................................................... 20-110 20-110 Implement/deimplement the ERP ERP Switch Command
............................................................................................................................... 20-112 20-112
.................................................................................................................................................... 20-113 20-113
ERP Switch Command From Port ............................................................................................................................... 20-114 20-114 Add/remove Transport Link in a Ring ....................................................................................................................... 20-115 20-115 Add/remove Node in a Ring .......................................................................................................................................... 20-116 20-116 Create/delete ERP Ring bundle .................................................................................................................................... 20-117 20-117 Add/remove ERP Ring in a bundle ............................................................................................................................. 20-118 20-118 ERP Instance Management Overview
.............................................................................................................................................................................. 20-120 20-120
View the ERP instance list
............................................................................................................................................. 20-121 20-121
Description of the list of ERP instances .................................................................................................................... 20-122 20-122 Create/delete ERP instance ............................................................................................................................................ 20-123 20-123 Implement/deimplement the ERP instance Associate OAM to the ERP instance
............................................................................................................. 20-125 20-125
......................................................................................................................... 20-126 20-126
Get a graphical view of the ERP instance
............................................................................................................... 20-127 20-127
Modify Defined ERP instance ...................................................................................................................................... 20-129 20-129 Modify implemented ERP instance
............................................................................................................................ 20-131 20-131
PBB Fault Management Overview
.............................................................................................................................................................................. 20-133 20-133
PBB Fault Localization and navigation to AS ........................................................................................................ 20-134 20-134 Workflow for PBB Management Overview about Workflow
............................................................................................................................................ 20-135 20-135
Create a PBB Domain ...................................................................................................................................................... 20-137 20-137 .................................................................................................................................................................................................................................... 1350 OMS xxxi 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Add NE to a Domain ........................................................................................................................................................ 20-138 20-138 Add Transport Link to a Domain ................................................................................................................................. 20-139 20-139 ERP provisioning ............................................................................................................................................................... 20-141 20-141 Configure B-VID
............................................................................................................................................................. 20-143 20-143
Create a PBB EVC ............................................................................................................................................................ 20-144 20-144 PBB EVC traffic classification ..................................................................................................................................... 20-153 20-153 Traffic Descriptor Definition ......................................................................................................................................... 20-154 20-154 EVC Allocation and Implementation ......................................................................................................................... 20-155 20-155 In Band Management Overview
.............................................................................................................................................................................. 20-156 20-156
Address Configuration of the Network Elements .................................................................................................. 20-157 20-157 Lag Port Creation (Via Zic) ........................................................................................................................................... 20-165 20-165 NMS Start Supervision (NE Not Defined On NMS) 21
........................................................................................... 20-183 20-183
Broadcast TV Service Management Overview
................................................................................................................................................................................... 21-1 21-1
Section I: Introduction Overview
................................................................................................................................................................................... 21-3 21-3
Overview about Broadcast TV
.......................................................................................................................................... 21-4 21-4
Managing Broadcast TV Elements
.................................................................................................................................. 21-5 21-5
View the list of Broadcast TV Elements ........................................................................................................................ 21-6 21-6 Create a BTV Element .......................................................................................................................................................... 21-8 21-8 Modify a BTV Element
..................................................................................................................................................... 21-11 21-11
Delete a BTV Element ....................................................................................................................................................... 21-14 21-14 View the details of the BTV Elements ......................................................................................................................... 21-16 21-16 Details of a BTV Elements
............................................................................................................................................. 21-17 21-17
View the list of ETPs belonging to a BTV Element ................................................................................................ 21-18 21-18 Description of the list of BTV ENE inventory .......................................................................................................... 21-19 21-19 Create an ETP in a BTV Element
.................................................................................................................................. 21-20 21-20
Delete an ETP in a BTV Element
.................................................................................................................................. 21-22 21-22
.................................................................................................................................................................................................................................... 1350 OMS xxxii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Section II: Workflow for BTV construction Overview ................................................................................................................................................................................. 21-24 21-24 Create path on 1350 OMS SDH application .............................................................................................................. 21-25 21-25 Create Broadcast TV Element ......................................................................................................................................... 21-26 21-26 Create Link Broadcast TV ................................................................................................................................................ 21-29 21-29 Section III: Workflow for BTV Service Management Overview ................................................................................................................................................................................. 21-33 21-33 Create a Customer
.............................................................................................................................................................. 21-34 21-34
Create Ethernet Service
..................................................................................................................................................... 21-35 21-35
Create a Connection Oriented EVC .............................................................................................................................. 21-37 21-37 Section IV: Bridge Based BTV Service Overview ................................................................................................................................................................................. 21-40 21-40 Overview about the Services
........................................................................................................................................... 21-41 21-41
IGMP Snooping Management ......................................................................................................................................... 21-42 21-42 IGMP Snooping State Management .............................................................................................................................. 21-44 21-44 22
Network Supervision Overview
................................................................................................................................................................................... 22-1 22-1
Managing alarms Overview about alarms ......................................................................................................................................................... 22-2 22-2 Alarms from ISA E/FE/GE board Alarms from ISA ES1/4 board
.................................................................................................................................... 22-3 22-3
.......................................................................................................................................... 22-4 22-4
Alarms from ISA ES16 board ............................................................................................................................................ 22-6 22-6 Alarms or Events on SDH paths from 1350 OMS SDH .......................................................................................... 22-8 22-8 Alarm status management ................................................................................................................................................... 22-9 22-9 Alarm correlation and generation toward AS
............................................................................................................ 22-11 22-11
Managing Fault Localization Display the Fault Localization list ................................................................................................................................. 22-12 22-12 Description of Fault Localization
.................................................................................................................................. 22-14 22-14
.................................................................................................................................................................................................................................... 1350 OMS xxxiii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Manual Synchronization of Alarms on NE
................................................................................................................ 22-15 22-15
Specific Behavior Client Signal Fail Alarm Management ......................................................................................................................... 22-16 22-16 23
Network Utilities Overview
................................................................................................................................................................................... 23-1 23-1
Audit, Alignment, Reservation, Recovery Overview
................................................................................................................................................................................... 23-2 23-2
The AAR procedure
............................................................................................................................................................. 23-3 23-3
NE Audit tool ........................................................................................................................................................................... 23-6 23-6 Results of Audit ....................................................................................................................................................................... 23-8 23-8 Reservation tool .................................................................................................................................................................... 23-13 23-13 Align Up of Ethernet Domain Data ............................................................................................................................... 23-15 23-15 Start the audit, alignment, reserve procedure
............................................................................................................ 23-16 23-16
Stop the audit, alignment, reserve procedure ............................................................................................................. 23-17 23-17 View the list of auditable NEs ......................................................................................................................................... 23-18 23-18 Description of the list of auditable NEs ....................................................................................................................... 23-19 23-19 Perform an audit on a NE .................................................................................................................................................. 23-20 23-20 View the list of Audited NEs
........................................................................................................................................... 23-22 23-22
Description of the list of Audited NEs ......................................................................................................................... 23-23 23-23 View the results of an audit .............................................................................................................................................. 23-24 23-24 Perform an alignment on a NE ........................................................................................................................................ 23-26 23-26 NE Alignment tool Overview ................................................................................................................................................................................. 23-27 23-27 Workflow to align up Ethernet Data
............................................................................................................................. 23-28 23-28
ISA Board Replacement Procedure ............................................................................................................................... 23-30 23-30 Perform a reservation on a NE ........................................................................................................................................ 23-32 23-32 Restore procedure for ISA board .................................................................................................................................... 23-33 23-33
.................................................................................................................................................................................................................................... 1350 OMS xxxiv 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
24
Operation, Administration, and Maintenance (OAM) Management Overview
................................................................................................................................................................................... 24-1 24-1
Ethernet OAM OAM main functions
............................................................................................................................................................ 24-3 24-3
Create OAM Domain ............................................................................................................................................................ 24-7 24-7 List OAM Domains
............................................................................................................................................................... 24-8 24-8
Description of the list of OAM MD OAM Domain Properties
................................................................................................................................ 24-9 24-9
.................................................................................................................................................. 24-10 24-10
Details of OAM MD ........................................................................................................................................................... 24-11 24-11 Modify OAM Domain
....................................................................................................................................................... 24-12 24-12
Configure OAM Domain
.................................................................................................................................................. 24-13 24-13
Deimplement OAM Domain
........................................................................................................................................... 24-14 24-14
Inventory of OAM items from MD ............................................................................................................................... 24-15 24-15 Inventory of OAM monitored objects from MD ...................................................................................................... 24-16 24-16 Maintenance Association (MA) Maintenance Associations
................................................................................................................................................ 24-17 24-17
List Maintenance Association (MA) ............................................................................................................................. 24-18 24-18 Description of the list of OAM MA .............................................................................................................................. 24-19 24-19 Properties of Maintenance Association (MA) ........................................................................................................... 24-20 24-20 Details of the OAM MA .................................................................................................................................................... 24-21 24-21 Modify Maintenance Association (MA) ...................................................................................................................... 24-22 24-22 Configure Maintenance Association (MA)
............................................................................................................... 24-23 24-23
Enable/Disable Continuity Check (CC) ....................................................................................................................... 24-24 24-24 Deimplement OAM MA
................................................................................................................................................... 24-25 24-25
Inventory of OAM items from MA ............................................................................................................................... 24-26 24-26 Inventory of OAM monitored objects from MA ...................................................................................................... 24-27 24-27 Maintenance Activation Maintenance Activation on EVC
................................................................................................................................... 24-28 24-28
.................................................................................................................................................................................................................................... 1350 OMS xxxv 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Loopback Loopback activation ............................................................................................................................................................ 24-29 24-29 Linktrace Linktrace activation ............................................................................................................................................................. 24-31 24-31 Delay measurement and Loss measurement Overview ................................................................................................................................................................................. 24-33 24-33 Packet Delay measurement
.............................................................................................................................................. 24-34 24-34
Packet Loss measurement ................................................................................................................................................. 24-35 24-35 Configure Maintenance End Points ............................................................................................................................... 24-36 24-36 List the OAM ETH DM Tool
.......................................................................................................................................... 24-38 24-38
List the OAM ETH SLM Tool ........................................................................................................................................ 24-40 24-40 Create ETH DM Tool ......................................................................................................................................................... 24-42 24-42 Create ETH SLM Tool ....................................................................................................................................................... 24-44 24-44 Activate/Deactivate OAM ETH DM Tool .................................................................................................................. 24-46 24-46 Activate/Deactivate OAM ETH SLM Tool ................................................................................................................ 24-47 24-47 Inventory from OAM ETH DM Tool ........................................................................................................................... 24-48 24-48 Inventory from OAM ETH SLM Tool ......................................................................................................................... 24-49 24-49 Configure OAM ETH DM Tool ..................................................................................................................................... 24-50 24-50 Configure OAM ETH SLM Tool ................................................................................................................................... 24-52 24-52 25
Circuit Emulation Service Management Overview
................................................................................................................................................................................... 25-1 25-1
CES Overview Circuit Emulation Services definition ............................................................................................................................. 25-4 25-4 TDM client synchronization ............................................................................................................................................... 25-8 25-8 Protection setup after link creation
.................................................................................................................................. 25-9 25-9
CAC tolerance and modulation mode
.......................................................................................................................... 25-11 25-11
Resource assignment to Packet Radio domain .......................................................................................................... 25-12 25-12 Resource assignment to T-MPLS domain ................................................................................................................... 25-14 25-14 .................................................................................................................................................................................................................................... 1350 OMS xxxvi 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Packet Radio domain OAM and protections Packet Radio performance monitoring
............................................................................................................. 25-17 25-17
........................................................................................................................ 25-19 25-19
Packet Radio protection group ........................................................................................................................................ 25-20 25-20 Loopback management ...................................................................................................................................................... 25-21 25-21 T-MPLS domain OAM and protections ....................................................................................................................... 25-22 25-22 Packet Radio domain QoS management
..................................................................................................................... 25-24 25-24
Packet Radio domain inter-working .............................................................................................................................. 25-25 25-25 T-MPLS domain inter-working ....................................................................................................................................... 25-26 25-26 Circuit Emulation Service Management
..................................................................................................................... 25-27 25-27
MEF8 CES terminated service ........................................................................................................................................ 25-33 25-33 Generic Circuit Emulation implementation
............................................................................................................... 25-36 25-36
MEF8 Circuit Emulation Service implementation
.................................................................................................. 25-38 25-38
SATOP Circuit Emulation Service implementation ................................................................................................ 25-43 25-43 Generic Circuit Emulation Service OAM and protections ................................................................................... 25-45 25-45 MEF8 Circuit Emulation Service OAM and protections ...................................................................................... 25-46 25-46 SATOP Circuit Emulation Service OAM and protections
................................................................................... 25-48 25-48
Circuit Emulation AAR Network Operation .............................................................................................................. 25-50 25-50 CES Takeover description
................................................................................................................................................ 25-52 25-52
CES Procedures .................................................................................................................................................................................................... 25-53 25-53
Circuit Emulation Service graphical inventory ......................................................................................................... 25-55 25-55 View the list of CES Domains (Packet Radio) .......................................................................................................... 25-58 25-58 View the details of CES Domain (Packet Radio) ..................................................................................................... 25-59 25-59 Inventory from CES Domain (Packet Radio) ............................................................................................................ 25-60 25-60 Create CES Domain (Packet Radio) ............................................................................................................................. 25-61 25-61 Assign/Deassign resources to Packet Radio Domain ............................................................................................. 25-62 25-62 Assign/Deassign resources to T-MPLS Domain
...................................................................................................... 25-63 25-63
View the list of CES NEs .................................................................................................................................................. 25-64 25-64 Description of the list of CES NEs ................................................................................................................................ 25-65 25-65 .................................................................................................................................................................................................................................... 1350 OMS xxxvii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
View the details of CES NE ............................................................................................................................................. 25-66 25-66 Details of CES NE ............................................................................................................................................................... 25-67 25-67 Inventory from CES NE .................................................................................................................................................... 25-68 25-68 Inventory from Protection Group ................................................................................................................................... 25-70 25-70 View the list of CES Transport Links ........................................................................................................................... 25-71 25-71 Description of the list of CES Transport Links ......................................................................................................... 25-72 25-72 View the details of CES Transport Link ...................................................................................................................... 25-73 25-73 Details of the CES Transport Link
................................................................................................................................ 25-74 25-74
Inventory from CES Transport Link ............................................................................................................................. 25-75 25-75 Inventory from CES Transport Link extremity ......................................................................................................... 25-76 25-76 View the list of CES PDH Ports ..................................................................................................................................... 25-78 25-78 Description of the list of CES PDH Ports ................................................................................................................... 25-79 25-79 View the details of CES PDH Port ................................................................................................................................ 25-82 25-82 Details of CES PDH Port .................................................................................................................................................. 25-83 25-83 Inventory from CES PDH Port List CES Edge Ports
....................................................................................................................................... 25-84 25-84
........................................................................................................................................................... 25-85 25-85
Description of the list of CES Port ................................................................................................................................ 25-86 25-86 View the details of CES Edge Port ................................................................................................................................ 25-87 25-87 Details of CES Port ............................................................................................................................................................. 25-88 25-88 Inventory from CES Edge Port ....................................................................................................................................... 25-89 25-89 View the list of CES Links Over Radio ....................................................................................................................... 25-90 25-90 Description of the list of CES Links Over Radio ..................................................................................................... 25-91 25-91 View the details of CES Link Over Radio .................................................................................................................. 25-92 25-92 Details of CES Link Over Radio .................................................................................................................................... 25-93 25-93 Inventory from CES Link Over Radio ......................................................................................................................... 25-94 25-94 Synchronization of CES Link Over Radio
................................................................................................................. 25-96 25-96
View the list of CES Radio Ports ................................................................................................................................... 25-97 25-97 Description of the list of CES Radio Ports ................................................................................................................. 25-98 25-98 View the details of CES Radio Port .............................................................................................................................. 25-99 25-99 .................................................................................................................................................................................................................................... 1350 OMS xxxviii 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Details of CES Radio Port .............................................................................................................................................. 25-100 25-100 Inventory from CES Radio Port ................................................................................................................................... 25-101 25-101 View the list of CES VLAN Paths
.............................................................................................................................. 25-102 25-102
Description of the list of CES VLAN Paths ............................................................................................................ 25-103 25-103 Join CES tunnels ................................................................................................................................................................ 25-104 25-104 Stitch CES tunnels
............................................................................................................................................................ 25-105 25-105
View the list of Circuit Emulation Services ............................................................................................................. 25-106 25-106 Description of the list of Circuit Emulation Services
.......................................................................................... 25-107 25-107
View the list of CES Terminations .............................................................................................................................. 25-114 25-114 Description of the list of CES Terminations ............................................................................................................ 25-115 25-115 Create Circuit Emulation Service ................................................................................................................................ 25-122 25-122 Inventory from CES Configure CES
........................................................................................................................................................ 25-126 25-126
.................................................................................................................................................................. 25-127 25-127
Routing display of CES ................................................................................................................................................... 25-130 25-130 Configure CES terminations
......................................................................................................................................... 25-131 25-131
Takeover procedure for MEF8 CES ........................................................................................................................... 25-132 25-132 Takeover procedure for SATOP CES ......................................................................................................................... 25-134 25-134
Part IV: Advanced Functions 26
TSS-320 versus TSS-40 with packet ring Overview
................................................................................................................................................................................... 26-1 26-1
Create T-MPLS Tunnel and PW (SNI) Create T-MPLS tunnel 320-40 (SNI) .............................................................................................................................. 26-2 26-2 Create T-MPLS PW 320-40 (SNI) ................................................................................................................................. 26-14 26-14 Create T-MPLS Tunnel and PW (DNI) Create T-MPLS tunnel 320-40 (DNI) ........................................................................................................................... 26-21 26-21 Create T-MPLS PW 320-40 (DNI) ................................................................................................................................ 26-33 26-33 Create EVC over T-MPLS 320-40 Create EVC over T-MPLS 320-40 ................................................................................................................................. 26-40 26-40 .................................................................................................................................................................................................................................... 1350 OMS xxxix 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Verify creation of EVC over T-MPLS 320-40 ........................................................................................................... 26-58 26-58 27
Performance Monitoring Overview
................................................................................................................................................................................... 27-1 27-1
PM in EVC create PM in EVC create
.................................................................................................................................................................. 27-2 27-2
Performance Monitoring activate PM activate ............................................................................................................................................................................... 27-7 27-7 PM consistency PM consistency ..................................................................................................................................................................... 27-12 27-12 PM Reports create PM Reports create
............................................................................................................................................................... 27-15 27-15
PM report generate PM report generate .............................................................................................................................................................. 27-19 27-19 28
Enhanced Procedures Overview
................................................................................................................................................................................... 28-1 28-1
TSS 5 In Band Management Overview
................................................................................................................................................................................... 28-3 28-3
T-MPLS Subnetwork topology .......................................................................................................................................... 28-4 28-4 In-band configuration
........................................................................................................................................................... 28-8 28-8
Resources reservation for In fiber Inband ................................................................................................................... 28-11 28-11 Ethernet Linear Protection Overview ................................................................................................................................................................................. 28-16 28-16 Link Over EVC ..................................................................................................................................................................... 28-18 28-18 Link over EVC: unlock EVC
.......................................................................................................................................... 28-20 28-20
Link over EVC creation ..................................................................................................................................................... 28-22 28-22 Link over EVC deletion ..................................................................................................................................................... 28-24 28-24 Link over EVC: Alarms ..................................................................................................................................................... 28-25 28-25 Link over EVC: OAM ........................................................................................................................................................ 28-26 28-26 .................................................................................................................................................................................................................................... 1350 OMS xl 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
Link over EVC: assign and deassign ............................................................................................................................ 28-27 28-27 Link over EVC: Transport Link configuration .......................................................................................................... 28-28 28-28 Link over EVC: activation and deactivation .............................................................................................................. 28-29 28-29 Link over EVC: Usage within an EVC
....................................................................................................................... 28-30 28-30
Link over EVC: AAR ......................................................................................................................................................... 28-31 28-31 Link over EVC: Routing Display
.................................................................................................................................. 28-32 28-32
Link over EVC: Inventory ................................................................................................................................................ 28-33 28-33 Ethernet Linear Protection (ELP)
.................................................................................................................................. 28-34 28-34
Add protection to PB EVC ............................................................................................................................................... 28-39 28-39 Remove protection from EVC
........................................................................................................................................ 28-41 28-41
Configure protection ........................................................................................................................................................... 28-42 28-42 ELP Protection properties
................................................................................................................................................ 28-43 28-43
Description of the properties
........................................................................................................................................... 28-44 28-44
Send APS command to protection group
.................................................................................................................... 28-45 28-45
Manual alignment of protection group ......................................................................................................................... 28-47 28-47 Implement a protected EVC ............................................................................................................................................. 28-48 28-48 Deimplement a protected EVC ....................................................................................................................................... 28-49 28-49 Disabled operations ............................................................................................................................................................. 28-50 28-50 Alarm propagation for protected EVCs ....................................................................................................................... 28-51 28-51 OAM on protected EVC .................................................................................................................................................... 28-52 28-52 Inventory of Transport Link from protected EVC ................................................................................................... 28-54 28-54 Inventory of MA from protected EVC ......................................................................................................................... 28-55 28-55 Routing Display of protected EVC A
............................................................................................................................... 28-56 28-56
Use script changeNeShOperatorLabel.sh Use the script changeNeShOperatorLabel.sh to change NEShOperator
B
............................................................ A-1 A-1
Application Limits Limits ............................................................................................................................................................................................ B-1 B-1
.................................................................................................................................................................................................................................... 1350 OMS xli 8DG42227DAAA 9.6 Issue 3 December 2012
Contents ....................................................................................................................................................................................................................................
C
List of Abbreviations Abbreviations
............................................................................................................................................................................ C-1 C-1
Index
.................................................................................................................................................................................................................................... 1350 OMS xlii 8DG42227DAAA 9.6 Issue 3 December 2012
List of tables
11-1
EVPL /ETS and ETB Provider Bridge .......................................................................................................... 11-16
11-2
EVPL /ETB Virtual Bridge
11-3
EVPL /ETB MAC Bridge .................................................................................................................................. 11-16
11-4
EPTL /ETS
11-5
EPTL /ETB Provider Bridge ............................................................................................................................. 11-17
11-6
EPTL /ETB Virtual Bridge
11-7
EPTL /ETB MAC Bridge
11-8
EPL /ETS and ETB Provider Bridge
11-9
EPL /ETB Virtual Bridge
.............................................................................................................................................................. 11-17 11-17
11-10 EPL /ETB MAC Bridge 11-11
............................................................................................................................... 11-16
................................................................................................................................ 11-17
.................................................................................................................................. 11-17 ............................................................................................................. 11-18
................................................................................................................................... 11-18
..................................................................................................................................... 11-18
EVPLAN /ETS and ETB Provider Bridge
11-12 EVPLAN /ETB Virtual Bridge 11-13 EVPLAN /ETB MAC Bridge
.................................................................................................. 11-19
........................................................................................................................ 11-19
.......................................................................................................................... 11-19
11-14 Extended EVPL /ETS and ETB Provider Bridge ...................................................................................... 11-20 11-15 Extended EVPL /ETB Virtual Bridge 11-16 Extended EVPL /ETB MAC Bridge
........................................................................................................... 11-20
.............................................................................................................. 11-20
11-17 Extended EVPLAN /ETS and ETB Provider Bridge 11-18 Extended EVPLAN /ETB Virtual Bridge 11-19 Extended EVPLAN /ETB MAC Bridge
.............................................................................. 11-21
.................................................................................................... 11-21
...................................................................................................... 11-21
11-20 HSI /ETS and ETB Provider Bridge .............................................................................................................. 11-22 11-21 HSI /ETS Multicast
.............................................................................................................................................. 11-23 11-23
11-22 HSI /ETB Virtual Bridge .................................................................................................................................... 11-23 .................................................................................................................................................................................................................................... 1350 OMS xliii 8DG42227DAAA 9.6 Issue 3 December 2012
List of tables ....................................................................................................................................................................................................................................
11-23 HSI /ETB MAC Bridge 11-24 BTV /ETS Multicast
...................................................................................................................................... 11-23
............................................................................................................................................ 11-24 11-24
11-25 BTV /ETB Provider Bridge 11-26 BTV /ETB Virtual Bridge 11-27 BTV /ETB MAC Bridge 11-28 Broadcast /ETS
.............................................................................................................................. 11-24
.................................................................................................................................. 11-25
.................................................................................................................................... 11-25
...................................................................................................................................................... 11-26 11-26
11-29 Broadcast /ETB Provider Bridge 11-30 Broadcast /ETB Virtual Bridge 11-31 Broadcast /ETB MAC Bridge
.................................................................................................................... 11-26
........................................................................................................................ 11-26
.......................................................................................................................... 11-26
13-1
Network Elements supporting the Link Aggregation ............................................................................ 13-114
15-1
MPLS traffic contract and traffic parameter dependencies
15-2
ISA boards and MPLS traffic parameter dependencies
18-1
Connection Oriented Service Type relations
18-2
Class of services and traffic parameters dependencies ......................................................................... 18-142
18-3
ISA boards and Ethernet traffic parameters dependencies .................................................................. 18-143
18-4
Allowed combination of Traffic Classification criteria ........................................................................ 18-156
19-1
L2 Control Protocols
19-2
Service Type, Type, Resource Sharing relations
22-1
ISA E/FE/GE alarms
22-2
ISA ES1/4 alarms or events ................................................................................................................................. 22-4
22-3
ISA ES16 alarms or events
22-4
SDH Path Alarm management
24-1
Terminology Mapping
25-1
Allowed interface type, depending on link technology
25-2
Relation between CES transport type and encapsulation type
25-3
CoS supported vs. T-MPLS PHB Profile
25-4
E1 service bandwidth occupation for MPR R1.3/R1.4 ........................................................................... 25-34
25-5
E1 service bandwidth occupation since MPR R2.1
25-6
MEF8 CES termination alarms ........................................................................................................................ 25-46
..................................................................... 15-8
............................................................................ 15-8
............................................................................................. 18-40
........................................................................................................................................... 19-16 ....................................................................................... 19-49
.............................................................................................................................................. 22-3 22-3
.................................................................................................................................. 22-6 ........................................................................................................................... 22-8
........................................................................................................................................... 24-4 .......................................................................... 25-25 ............................................................. 25-29
..................................................................................................... 25-29
................................................................................. 25-35
.................................................................................................................................................................................................................................... 1350 OMS xliv 8DG42227DAAA 9.6 Issue 3 December 2012
List of tables ....................................................................................................................................................................................................................................
25-7
SATOP CES termination alarms
25-8
Generic Tunnel attributes.
25-9
Packet Radio Tunnel attributes
..................................................................................................................... 25-48
................................................................................................................................. 25-55 ........................................................................................................................ 25-56
25-10 Generic Tunnel segment attributes 25-11 Generic Tunnel Xconn attributes 25-12 CE transport link attributes
................................................................................................................. 25-56
.................................................................................................................... 25-57
............................................................................................................................... 25-74
25-13 9500MPR PDH port attributes ......................................................................................................................... 25-79 25-14 TSS-5C PDH port attributes
............................................................................................................................. 25-80
25-15 The CES port attributes
...................................................................................................................................... 25-86
25-16 Ethernet port attributes
....................................................................................................................................... 25-88 25-88
25-17 Link over radio attributes ................................................................................................................................... 25-91 25-18 Link over radio attributes ................................................................................................................................... 25-93 25-19 radio port properties ............................................................................................................................................. 25-98 25-20 radio port properties
.......................................................................................................................................... 25-100
25-21 Generic CES attributes 25-22 MEF8 CES attributes
..................................................................................................................................... 25-108
........................................................................................................................................ 25-109
25-23 SATOP CES attributes
...................................................................................................................................... 25-110
25-24 Generic CES termination attributes 25-25 MEF8 CES termination attributes
............................................................................................................. 25-115
................................................................................................................ 25-116
25-26 SATOP CES termination attributes .............................................................................................................. 25-117 28-1
EVC attributes for ELP
...................................................................................................................................... 28-36
B-1
Limits for Subnetworks
.......................................................................................................................................... B-1
B-2
Limits for Service Nodes
B-3
Limits for Domains
B-4
Limits for NEs
B-5
Limits for ENEs
B-6
Limits for ETPs in an ENE
B-7
Limits for LSPs .......................................................................................................................................................... B-2 B-2
B-8
Limits for Customers ............................................................................................................................................... B-2 B-2
....................................................................................................................................... B-1
.................................................................................................................................................. B-1 B-1
........................................................................................................................................................... B-1 B-1 ........................................................................................................................................................ B-2 B-2 ................................................................................................................................... B-2
.................................................................................................................................................................................................................................... 1350 OMS xlv 8DG42227DAAA 9.6 Issue 3 December 2012
List of tables ....................................................................................................................................................................................................................................
B-9
Limits for Ethernet Services
................................................................................................................................. B-2
B-10
Limits for Ethernet Virtual Connections
B-11
Limits for Ethernet Transport Links
B-12
Limits for Ethernet Segments ............................................................................................................................... B-3
B-13
Limits for Ethernet edge physical ports ............................................................................................................ B-3
B-14
Limits for Ethernet Traffic Descriptors
............................................................................................................ B-3
B-15
Limits for Ethernet Traffic Classifiers
.............................................................................................................. B-3
B-16
Limits for Ethernet Color Profiles
B-17
Limits for Ethernet switches
B-18
Limits for VLAN Types
B-19
Limits for MPLS Transport Links
B-20
Limits for MPLS Traffic Descriptors
B-21
Limits for MPLS VC-LSPs
B-22
Limits for each board
.......................................................................................................... B-2
.................................................................................................................. B-2
...................................................................................................................... B-3
................................................................................................................................. B-3
......................................................................................................................................... B-4 ...................................................................................................................... B-4 ................................................................................................................ B-4
................................................................................................................................... B-4
.............................................................................................................................................. B-4 B-4
.................................................................................................................................................................................................................................... 1350 OMS xlvi 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures
4-1
Process Monitoring Window
................................................................................................................................. 4-2
11-1
Global Network view ............................................................................................................................................. 11-8
11-2
Example of Bundling ........................................................................................................................................... 11-12
11-3
Example of Service Multiplexing on UNI A
11-4
Point to Point Topology
11-5
Hub & spoke Topology ....................................................................................................................................... 11-32
11-6
Hub & spoke with multi level aggregation topology ............................................................................... 11-33
11-7
Full meshed topology
11-8
Ring Topology
11-9
Interface description
.............................................................................................. 11-14
...................................................................................................................................... 11-30
.......................................................................................................................................... 11-34
....................................................................................................................................................... 11-36 11-36 ............................................................................................................................................ 11-42 11-42
11-10 Ethernet Service delivered using different technologies 11-11
Inner ENE
........................................................................ 11-45
................................................................................................................................................................ 11-49 11-49
11-12 Customer Edge ....................................................................................................................................................... 11-50 11-50 11-13 Ethernet Frame Format
....................................................................................................................................... 11-54
11-14 Q-Tag Prefix Format ............................................................................................................................................ 11-55 11-15 Ethernet Frame Hierarchy
................................................................................................................................. 11-56
11-16 Customer VLAN Removal
................................................................................................................................ 11-59
11-17 Provider VLAN Removal
.................................................................................................................................. 11-60
11-18 Provider VLAN Addition ................................................................................................................................... 11-60 11-19 Provider VLAN Addition and Removal 11-20 Provider Tunneling Mode
....................................................................................................... 11-61
.................................................................................................................................. 11-61
11-21 Customer Tunneling Mode ................................................................................................................................ 11-62 .................................................................................................................................................................................................................................... 1350 OMS xlvii 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
11-22 Protocol Type configuration for multiple destinations ............................................................................ 11-63 11-23 Low Cost solution ................................................................................................................................................. 11-63 11-63 11-24 Protocol Type configuration for single destination
.................................................................................. 11-64
12-1
Actions>Create Subnetwork
............................................................................................................................... 12-4
12-2
Create Subnetwork box ......................................................................................................................................... 12-5
12-3
Create Subnetwork: Assign Children Nodes ................................................................................................. 12-6
12-4
Node to assign to subnetwork ............................................................................................................................. 12-7
12-5
Confirm subnetwork creation
12-6
Subnetwork present in the map
12-7
Actions>Modify subnetwork ............................................................................................................................ 12-10
12-8
Modify subnetwork
12-9
Select the node to add
............................................................................................................................. 12-8 .......................................................................................................................... 12-9
.............................................................................................................................................. 12-11 ......................................................................................................................................... 12-12
12-10 Modify subn: adding a node
............................................................................................................................. 12-13
12-11 Actions>Physical>Create External Network .............................................................................................. 12-14 12-12 Create Ext Netw. dialog box ............................................................................................................................. 12-15 12-13 Actions>Modify subnetwork ............................................................................................................................ 12-16 12-14 Modify subnetwork .............................................................................................................................................. 12-17 12-15 Modify Subn box: new added node 12-16 New added node in the target map 12-17 Create>Physical Connection 12-18 Physcon create
............................................................................................................... 12-18
................................................................................................................. 12-19
............................................................................................................................ 12-20
....................................................................................................................................................... 12-21 12-21
12-19 Physcon create: port selection .......................................................................................................................... 12-22 12-20 Physcon list: Eth physcon defined .................................................................................................................. 12-23 12-21 Link over Cable list .............................................................................................................................................. 12-23 12-23 12-22 Actions>Packet>Construction>Create LAG Port ..................................................................................... 12-24 12-23 Create LAG Port
................................................................................................................................................... 12-25 12-25
12-24 LAG port and LAG port detail
........................................................................................................................ 12-26
12-25 Actions>Packet>Construction>Create Domain 12-26 Create Domain MAC-802.1D
........................................................................................ 12-27
.......................................................................................................................... 12-28
.................................................................................................................................................................................................................................... 1350 OMS xlviii 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
12-27 Create Domain
....................................................................................................................................................... 12-29 12-29
12-28 Search>Packet>Construction>Domains
...................................................................................................... 12-29
12-29 Domain list .............................................................................................................................................................. 12-30 12-30 12-30 Search>Packet>Construction>Network Elements>Defined NEs ....................................................... 12-31 12-31 NE: Search>Ethernet Physical Ports 12-32 Eth Ports: the port is now busy
............................................................................................................. 12-32
........................................................................................................................ 12-32
12-33 LoC: Actions>Assign Resources to Domain 12-34 Assign Resources to Domain 12-35 Defined NEs list
.............................................................................................. 12-33
........................................................................................................................... 12-34
.................................................................................................................................................... 12-35 12-35
12-36 Port Administrative state=DOWN .................................................................................................................. 12-36 12-37 Actions>Packet>Construction>Define Network Element ..................................................................... 12-37 12-38 Define Network Element
................................................................................................................................... 12-38
12-39 Actions>Packet>Services>Create Traffic Descriptor .............................................................................. 12-40 12-40 Create Traffic Descriptor:Regulated
.............................................................................................................. 12-41
12-41 Create Traffic Descriptor: Best Effort
........................................................................................................... 12-42
12-42 Actions>Packet>Services>Create Traffic Classifier 12-43 Create Traffic Classifier 12-44 Traffic Classifier list
............................................................................... 12-43
..................................................................................................................................... 12-44 12-44
............................................................................................................................................ 12-45 12-45
12-45 Create T-MPLS Tunnel step1
........................................................................................................................... 12-47
12-46 Create T-MPLS Tunnel step2
........................................................................................................................... 12-48
12-47 Tunnel list
................................................................................................................................................................ 12-49 12-49
12-48 Tunnel:Search>T-MPLS Segments ................................................................................................................ 12-49 12-49 T-MPLS segment:Search>T-MPLS L2 Encapsulation Profiles ........................................................... 12-50 12-50 Default L2 Encapsulation profile .................................................................................................................... 12-50 12-51 Actions>Packet>T-MPLS>Create T-MPLS L2 Encapsulation Profile ............................................. 12-51 12-52 Create T-MPLS L2 Encapsulation Profile 12-53 L2 Encapsulation Profiles list
................................................................................................... 12-52
.......................................................................................................................... 12-53
12-54 T-MPLS Segment: Actions>Configure ......................................................................................................... 12-53 12-55 T-MPLS Segment configuration
..................................................................................................................... 12-54
.................................................................................................................................................................................................................................... 1350 OMS xlix 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
12-56 Segment:Search>T-MPLS L2 Encapsulation Profiles
............................................................................ 12-55
12-57 L2 Encapsulation Profiles list
.......................................................................................................................... 12-55
12-58 Create T-MPLS Pseudo Wire
........................................................................................................................... 12-56
12-59 Create T-MPLS PW step2 12-60 PW list
................................................................................................................................. 12-57
...................................................................................................................................................................... 12-57 12-57
12-61 PW: Search>T-MPLS Segments
..................................................................................................................... 12-58
12-62 PW segment: Actions>Configur
..................................................................................................................... 12-58
12-63 T-MPLS Segment configuration box for PW 12-64 T-MPLS L2 Encapsulation Profiles for PW
............................................................................................. 12-59
............................................................................................... 12-59
12-65 Provider network operating as a distributed MAC Bridge
.................................................................... 12-67
12-66 Provider network operating as a distributed MAC Bridge
.................................................................... 12-68
12-67 Single-Customer, No-VLAN, RSTP-enabled
............................................................................................ 12-69
13-1
Subnetwork levels ................................................................................................................................................... 13-5 13-5
13-2
Subnetwork Creation window
13-3
Subnetwork Modification window
13-4
Domain management chain ............................................................................................................................... 13-16
13-5
Domain management chain ............................................................................................................................... 13-18
13-6
Define a Network Element ................................................................................................................................ 13-44
13-7
NE Adding window
13-8
Network Element Modification window ...................................................................................................... 13-50
13-9
Show Equipment View
............................................................................................................................ 13-9 ................................................................................................................. 13-11
............................................................................................................................................. 13-47
....................................................................................................................................... 13-71
13-10 ENE management chain
..................................................................................................................................... 13-79
13-11 External Network Element Creation window 13-12 ETP Creation window
............................................................................................ 13-83
......................................................................................................................................... 13-93
13-13 Ethernet Physical Port Config. window (for PR EA or ES16 electrical board) 13-14 Ethernet Physical Port Config. window (for ES1 or ES4 electrical board)
.......................... 13-101
.................................. 13-102
13-15 Ethernet Physical Port Config. window (for ES1 or ES4 optical board) ....................................... 13-103 13-16 Ethernet Physical Port Assign NAD window 13-17 Scheme of a Link Aggregation
.......................................................................................... 13-107
...................................................................................................................... 13-114
.................................................................................................................................................................................................................................... 1350 OMS l 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
13-18 Jumbo frame configuration pattern .............................................................................................................. 13-135 13-19 Jumbo frame configuration pattern .............................................................................................................. 13-138 13-20 Create a port on 1678MCC NE ..................................................................................................................... 13-142 13-21 Remove port on 1678MCC NE ..................................................................................................................... 13-144 14-1
Link Over TDM between Q3 NEs
14-2
Link Over TDM between Q3 NE and SNMP NE
14-3
Link Over TDM between 2 SNMP NEs
14-4
Link Over Cable between SNMP NE and ENE ........................................................................................... 14-8
14-5
Link Over MPLS between 2 SNMP NEs
14-6
Link Over MPLS between SNMP NE and ENE based on VC-LSP
14-7
Network Element Supervision: Concatenated VC management
14-8
SDH Path Creation window .............................................................................................................................. 14-22
14-9
Link Over TDM Configuration window
14-10 Assign NAD window
.................................................................................................................... 14-6
......................................................................................................... 14-7
....................................................................................................... 14-9 .................................................. 14-10
......................................................... 14-11
...................................................................................................... 14-26
.......................................................................................................................................... 14-33
14-11 Link Over Cable Modification window 14-12 Link Over Cable Extremities window 14-13 Start Join window
....................................................................................... 14-6
....................................................................................................... 14-45
.......................................................................................................... 14-49
................................................................................................................................................. 14-53 14-53
14-14 Configure Split window
..................................................................................................................................... 14-55
14-15 Link Over Cable Creation window
................................................................................................................ 14-64
14-16 Link Over Cable Creation window
................................................................................................................ 14-67
14-17 Link VCG Creation window ............................................................................................................................. 14-70 14-18 LAG Link VCG Creation window
................................................................................................................. 14-73
15-1
Traffic Descriptor management chain
............................................................................................................. 15-5
15-2
Traffic Descriptor Creation window
15-3
Traffic Descriptor Modification window
15-4
MPLS Transport Link management chain ................................................................................................... 15-22
15-5
TL Characteristic Definition window (based on Link Over Cable)
15-6
TL Characteristic Definition window (based on Link Over TDM) .................................................... 15-27
15-7
Transport Link Extremities window
.............................................................................................................. 15-10 ..................................................................................................... 15-13
................................................... 15-26
.............................................................................................................. 15-29
.................................................................................................................................................................................................................................... 1350 OMS li 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
15-8
Transport Link Over TDM Bandwidth Load window
............................................................................ 15-34
15-9
Transport Link Over Cable Bandwidth Load window ............................................................................ 15-35
15-10 Transport Link Inventory List window ......................................................................................................... 15-37 15-11 27 LSP Tunnel management chain
................................................................................................................. 15-40
15-12 LSP Tunnel Modification window (for an LSP tunnel defined) .......................................................... 15-46 15-13 Constraint List related to an LSP tunnel
...................................................................................................... 15-54
15-14 Add Constraint to an LSP tunnel window
................................................................................................... 15-57
15-15 LSP Tunnel Constraint Properties window 15-16 LSP Tunnel Implementation window 15-17 The LSP Tunnel Extremity window
................................................................................................. 15-61
............................................................................................................ 15-66
.............................................................................................................. 15-68
15-18 LSP Tunnel (Best Effort) Bandwidth Load window ................................................................................ 15-75 15-19 LSP Tunnel (Assured Forwarding) Bandwidth Load window
............................................................. 15-75
15-20 LSP Tunnel (Expedited Forwarding) Bandwidth Load window 15-21 LSP Tunnel Route window
......................................................... 15-76
............................................................................................................................... 15-78
15-22 VC-LSP management chain .............................................................................................................................. 15-82 15-23 VC-LSP Creation window ................................................................................................................................. 15-87 15-24 VC-LSP Modification window ........................................................................................................................ 15-90 15-25 VC-LSP Extremities window
........................................................................................................................ 15-100
16-1
T-MPLS Transport Link management chain
.............................................................................................. 16-15
16-2
Transport Link Extremities window
16-3
Transport Link Over TDM Bandwidth Load window
16-4
Transport Link Over Cable Bandwidth Load window ............................................................................ 16-27
16-5
Transport Link Inventory List window ......................................................................................................... 16-29
16-6
Layering
16-7
Tunnel entities ........................................................................................................................................................ 16-91 16-91
16-8
PW entities
16-9
DH EVPLINE infrastructure
.............................................................................................................. 16-21 ............................................................................ 16-26
................................................................................................................................................................... 16-90 16-90
.............................................................................................................................................................. 16-92 16-92 ........................................................................................................................... 16-95
16-10 Tunnel MAIN: Actions>T-MPLS Tunnel Protection Management ................................................. 16-141 16-11 T-MPLS Tunnel Protection Management .................................................................................................. 16-142 .................................................................................................................................................................................................................................... 1350 OMS lii 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
16-12 T-MPLS tunnel list
............................................................................................................................................ 16-143 16-143
16-13 T-MPLS tunnel: Search>Routing display
................................................................................................. 16-143
16-14 Search>Packet>T-MPLS>T-MPLS>Tunnels ........................................................................................... 16-144 16-15 T-MPLS tunnel: Actions menu ...................................................................................................................... 16-145 16-16 T-MPLS tunnel: Search>Routing display 16-17 T-MPLS Protection Group 16-18 Tunnel Switch: Actions
................................................................................................. 16-146
.............................................................................................................................. 16-147
.................................................................................................................................... 16-148
16-19 Tunnel:Actions>Remove Protection(keeping Main)
............................................................................ 16-149
16-20 Spare tunnel routing display ........................................................................................................................... 16-149 16-21 Don't care protection role and protection state 16-22 Main tunnel routing display
........................................................................................ 16-150
........................................................................................................................... 16-151
16-23 T-MPLS Node PHB Profile ............................................................................................................................ 16-152 16-24 T-MPLS Node Traffic Descriptor ................................................................................................................. 16-153 16-25 T-MPLS Segment ............................................................................................................................................... 16-154 16-26 T-MPLS Port
........................................................................................................................................................ 16-155 16-155
16-27 Tunnel Redundancy Reference network
.................................................................................................... 16-166
17-1
Physical map
............................................................................................................................................................. 17-3 17-3
17-2
Search>Packet>Construction>Network Elements>Defined NEs
17-3
NE: Search>Ethernet Physical Ports ................................................................................................................ 17-4
17-4
Ethernet Physical Ports
17-5
Create Physcon-basic ............................................................................................................................................. 17-6 17-6
17-6
Create Physcon: End Points
17-7
Physcon list
17-8
Search>Packet>Construction>Transport Links>Link over Cable
17-9
Link over Cable list
......................................................... 17-4
......................................................................................................................................... 17-5 17-5
................................................................................................................................ 17-7
............................................................................................................................................................... 17-8 17-8 ........................................................ 17-8
................................................................................................................................................ 17-9 17-9
17-10 Actions>Packet>Construction>Create Link over Cable ........................................................................... 17-9 17-11 Create Link over Cable ....................................................................................................................................... 17-10 17-12 Actions>Assign Resources to Domain
......................................................................................................... 17-11
17-13 Assign Resources to Domain box ................................................................................................................... 17-12 .................................................................................................................................................................................................................................... 1350 OMS liii 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
17-14 Search>Packet>T-MPLS>T-MPLS Sections .............................................................................................. 17-13 17-15 T-MPLS Section list
............................................................................................................................................ 17-13 17-13
17-16 Actions>Packet>T-MPLS>Create T-MPLS tunnel 17-17 Create T-MPLS tunnel:Constraints
................................................................................................................ 17-15
17-18 Create T-MPLS tunnel: Quality of Service 17-19 Create T-MPLS tunnel: OAM
.................................................................................. 17-14
................................................................................................. 17-16
.......................................................................................................................... 17-17
17-20 Create T-MPLS tunnel: Protection
................................................................................................................. 17-18
17-21 Search>Packet>T-MPLS>T-MPLS Tunnels ............................................................................................... 17-19 17-22 Tunnel list
................................................................................................................................................................ 17-19 17-19
17-23 Actions>Implement T-MPLS Tunnel 17-24 The tunnel is implemented
............................................................................................................ 17-20
................................................................................................................................ 17-20
17-25 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire 17-26 Create T-MPLS Pseudo Wire: Constraints
..................................................................... 17-21
.................................................................................................. 17-22
17-27 Create T-MPLS Pseudo Wire: Quality of Service
.................................................................................... 17-23
17-28 Search>Packet>T-MPLS>T-MPLS Pseudo Wire
..................................................................................... 17-24
17-29 T-MPLS Pseudo Wires ........................................................................................................................................ 17-24 17-30 PW Implementation
............................................................................................................................................. 17-25 17-25
17-31 T-MPLS Pseudo wire implemented
............................................................................................................... 17-25
17-32 Search>Packet>Services>T-MPLS>T-MPLS Transport Links 17-33 T-MPLS Transport Links
........................................................... 17-26
................................................................................................................................... 17-26
17-34 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC
................................................................. 17-34
17-35 Create T-MPLS EVC: Specific ........................................................................................................................ 17-36 17-36 Create T-MPLS EVC: Detail 17-37 Create T-MPLS EVC: PM
............................................................................................................................ 17-37
................................................................................................................................. 17-38
17-38 Create T-MPLS EVC: Terminations Selection 17-39 Terminations Selection
.......................................................................................... 17-39
....................................................................................................................................... 17-40 17-40
17-40 Termination Settings ............................................................................................................................................ 17-42 17-42 17-41 Ingress flow create
............................................................................................................................................... 17-44 17-44
17-42 Ingress Flow: create monitoring ...................................................................................................................... 17-45 .................................................................................................................................................................................................................................... 1350 OMS liv 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
17-43 Egress Flow: Push
................................................................................................................................................ 17-47 17-47
17-44 Create Egress monitoring
.................................................................................................................................. 17-48
17-45 Create Ingress node A
......................................................................................................................................... 17-49
17-46 Create Egress node A
.......................................................................................................................................... 17-50
17-47 Transport Link selection
.................................................................................................................................... 17-51
17-48 Select the transport link
...................................................................................................................................... 17-52
17-49 Pseudo Wire selected ........................................................................................................................................... 17-53 17-53 17-50 T-MPLS EVC Allocate and Implement
........................................................................................................ 17-54
17-51 EVPL reference network .................................................................................................................................... 17-55 17-52 Actions>Packet>Services>Create Traffic Descriptor .............................................................................. 17-56 17-53 Create Traffic Descriptor
................................................................................................................................... 17-57
17-54 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC
................................................................. 17-58
17-55 Create T-MPLS EVC: Specific ........................................................................................................................ 17-59 17-56 Terminations Selection 17-57 Ingress Flow: create 17-58 Egress Flow: Push
....................................................................................................................................... 17-61 17-61
............................................................................................................................................. 17-63 17-63
................................................................................................................................................ 17-65 17-65
17-59 Transport Link selection
.................................................................................................................................... 17-67
17-60 Search>Packet>T-MPLS>T-MPLS Pseudo Wires
................................................................................... 17-68
17-61 PW list before EVC TD create ......................................................................................................................... 17-68 17-62 T-MPLS EVC Allocate and Implement 17-63 PW list after EVC TD create
........................................................................................................ 17-69
............................................................................................................................ 17-70
17-64 Search>Packet>T-MPLS>T-MPLS EVCs ................................................................................................... 17-70 17-65 EVC list: EVPL EVC allocate
......................................................................................................................... 17-71
17-66 EVC goes implemented ...................................................................................................................................... 17-71 17-67 EVPLAN reference network (3-nodes)
........................................................................................................ 17-72
17-68 EVPLAN network (4-nodes) ............................................................................................................................ 17-73 17-69 Create T-MPLS EVC: Specific ........................................................................................................................ 17-75 17-70 Terminations Selection
....................................................................................................................................... 17-77 17-77
17-71 EVPLAN: Ingress Flow: create ....................................................................................................................... 17-79 .................................................................................................................................................................................................................................... 1350 OMS lv 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
17-72 EVPLAN:Egress Flow
....................................................................................................................................... 17-81
17-73 Transport Link selection
.................................................................................................................................... 17-83
17-74 T-MPLS EVC Allocate and Implement 17-75 PW list after EVC TD create
........................................................................................................ 17-84
............................................................................................................................ 17-85
17-76 EVC goes implemented ...................................................................................................................................... 17-85 17-77 BTV reference network
..................................................................................................................................... 17-86
17-78 HSI reference network
....................................................................................................................................... 17-90
17-79 T-MPLS EVC list: Availability ........................................................................................................................ 17-94 17-80 EVC: Search>Fault Localization
.................................................................................................................... 17-95
17-81 Navigation to Transport Section ...................................................................................................................... 17-95 17-82 Navigate to Link over Cable ............................................................................................................................. 17-96 17-83 Search>Packet>Services>T-MPLS>T-MPLS EVCs 17-84 T-MPLS EVC:Actions>Deimplement 17-85 T-MPLS EVC:Actions>Deallocate
............................................................................... 17-98
.......................................................................................................... 17-99
................................................................................................................ 17-99
17-86 T-MPLS EVC: Search>T-MPLS Transport Links
................................................................................. 17-100
17-87 T-MPLS Transport Links ................................................................................................................................. 17-100 17-88 Search>Packet>T-MPLS>T-MPLS Pseudo Wires ................................................................................. 17-101 17-89 T-MPLS Pseudo Wire: Search>T-MPLS Tunnels
.................................................................................. 17-102
17-90 T-MPLS Tunnel: Search>T-MPLS Protection Involved Tunnel ....................................................... 17-103 17-91 T-MPLS Tunnel Routing Display
................................................................................................................ 17-103
17-92 Tunnel spare: Actions>Remove Protection keeping Main .................................................................. 17-104 17-93 Routing Display after Remove Protection 17-94 Tunnel: Search>T-MPLS Pseudo Wires
................................................................................................ 17-104
.................................................................................................... 17-105
17-95 T-MPLS EVC: Actions>Delete ..................................................................................................................... 17-105 17-96 EVC deletion evidence ..................................................................................................................................... 17-106 17-97 Pseudo Wires: Actions>Deimplement 17-98 Pseudo Wires: Actions>Delete 17-99 Delete Tunnel SPARE
........................................................................................................ 17-106
...................................................................................................................... 17-107
...................................................................................................................................... 17-107
17-100 Tunnel: Search>T-MPLS Section List ........................................................................................................ 17-108 .................................................................................................................................................................................................................................... 1350 OMS lvi 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
17-101 Tunnel related Section
...................................................................................................................................... 17-108
17-102 Delete T-MPLS tunnel ...................................................................................................................................... 17-109 17-103 Tunnel deletion evidence ................................................................................................................................. 17-109 17-104 Deassign LoC from Domain 17-105 Field Domain is deleted
.......................................................................................................................... 17-110
................................................................................................................................... 17-110
17-106 The associated Section is automatically deleted
..................................................................................... 17-111
17-107 Defined Node: Search>Ethernet Physical Ports
...................................................................................... 17-111
17-108 Deassign UNI port from the domain 17-109 Field domain is empty
........................................................................................................... 17-112
...................................................................................................................................... 17-112
17-110 Delete the NE ....................................................................................................................................................... 17-113 17-113 17-111 Search>Packet>Services>T-MPLS>T-MPLS EVCs ............................................................................. 17-114 17-112 T-MPLS EVCs
.................................................................................................................................................... 17-115 17-115
17-113 Allocate the EVC ................................................................................................................................................ 17-115 17-115 17-114 Implement the EVC
........................................................................................................................................... 17-116 17-116
18-1
Ethernet service containment tree ................................................................................................................... 18-19
18-2
EVPL/EPTL/EPL/Extended EVPL service creation wizard
18-3
Ethernet Service Properties window .............................................................................................................. 18-34
18-4
EVCs and Edge Ports relationships
18-5
EVC Modification window ............................................................................................................................... 18-48
18-6
EVC Properties window ..................................................................................................................................... 18-52
18-7
EVC Termination Properties window
18-8
Add EVC Termination window
18-9
Network schema for E2E connection
................................................................ 18-26
............................................................................................................... 18-38
........................................................................................................... 18-64
....................................................................................................................... 18-67 ............................................................................................................ 18-91
18-10 Search>Packet>Construction>Transport Links>Links over TDM(Sdh/Sonet) ............................. 18-93 18-11 Links over TDM(Sdh/Sonet)
............................................................................................................................ 18-94
18-12 Search>Packet>Construction>Network Elements>Defined NEs ....................................................... 18-94 18-13 Defined NE:Search>Ethernet Physical Ports 18-14 Port:Actions>Assign Resource to Domain 18-15 ETS Domain selection
............................................................................................. 18-95
................................................................................................. 18-95
........................................................................................................................................ 18-96
.................................................................................................................................................................................................................................... 1350 OMS lvii 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
18-16 Assign port to ETS domain ............................................................................................................................... 18-97 18-17 Link over TDM (path): Actions>Assign Resources to Domain
.......................................................... 18-98
18-18 Select ETS domain ............................................................................................................................................... 18-98 18-98 18-19 Confirm the assignment
..................................................................................................................................... 18-99
18-20 Search>Packet>Services>Connection Oriented>ETS Transport Link ........................................... 18-100 18-21 Path commissioning
.......................................................................................................................................... 18-100
18-22 Path included in the Links over TDM 18-23 Transport Links
........................................................................................................ 18-101
................................................................................................................................................... 18-101 18-101
18-24 Port: Assign resources to Domain
................................................................................................................ 18-103
18-25 Assign resources to Domain ........................................................................................................................... 18-104 18-26 Search>Packet>Services>T-MPLS>T-MPLS Edge Ports ................................................................... 18-105 18-27 UNI ports became edge ports
........................................................................................................................ 18-105
18-28 Actions>Packet>Services>Connection Oriented(ETS)>Create EVC 18-29 EVC over SDH: EVC definition 18-30 Far end edge port selection
............................................ 18-106
.................................................................................................................. 18-107
............................................................................................................................. 18-108
18-31 Ethernet Segments definition ......................................................................................................................... 18-109 18-32 Search>Packet>Services>Connection Oriented(ETS) 18-33 ETS EVCs
......................................................................... 18-110
............................................................................................................................................................. 18-110 18-110
18-34 ETS EVC: Search>Ethernet Segments ....................................................................................................... 18-111 18-35 Ethernet segment list
......................................................................................................................................... 18-111 18-111
18-36 Actions>Add Constraints to an Ethernet Service 18-37 Add Constraints to an Ethernet Service
................................................................................... 18-112
..................................................................................................... 18-113
18-38 Segment:Actions>Associate to Traffic Classifier ................................................................................... 18-114 18-39 Traffic Classifier list .......................................................................................................................................... 18-114 18-114 18-40 Associate Traffic Classifier ............................................................................................................................. 18-115 18-41 Allocate the segment
......................................................................................................................................... 18-116 18-116
18-42 Implement the segment
.................................................................................................................................... 18-116
18-43 Both segments are implemented 18-44 EVC-ETS implemented
................................................................................................................... 18-117
................................................................................................................................... 18-117
.................................................................................................................................................................................................................................... 1350 OMS lviii 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
18-45 T-MPLS EVC list: Availability
..................................................................................................................... 18-118
18-46 EVC: Search>Fault Localization .................................................................................................................. 18-119 18-47 Navigation to Transport Section 18-48 Navigate to Link over Cable 18-49 Create Domain 18-50 Define NE
................................................................................................................... 18-119
.......................................................................................................................... 18-120
.................................................................................................................................................... 18-123 18-123
............................................................................................................................................................. 18-124 18-124
18-51 Create EVC
.......................................................................................................................................................... 18-125 18-125
18-52 Align Up window ............................................................................................................................................... 18-127 18-53 Enable Takeover
................................................................................................................................................. 18-128 18-128
18-54 Color Profile Modification window 18-55 Color Profile Properties window
............................................................................................................ 18-137
.................................................................................................................. 18-141
18-56 Traffic Descriptor Modification window ................................................................................................... 18-150 18-57 Traffic Descriptor (Ethernet Management) Properties window 18-58 Traffic Classifier Modification window 18-59 Traffic Classifier Properties window
........................................................ 18-154
.................................................................................................... 18-163
.......................................................................................................... 18-166
18-60 Edge Port Modification window ................................................................................................................... 18-171 18-61 Edge Port Configuration window ................................................................................................................. 18-173 18-62 Edge Port Properties window 18-63 Show Equipment window
........................................................................................................................ 18-176
............................................................................................................................... 18-181
18-64 Transport Link Extremities window ............................................................................................................ 18-191 18-65 Transport Link Properties window
.............................................................................................................. 18-194
18-66 Ethernet Segment representation
.................................................................................................................. 18-197
18-67 Ethernet Segment representation
.................................................................................................................. 18-200
18-68 Ethernet Segment Modification window
................................................................................................... 18-206
18-69 Traffic Classifier Association (to an Ethernet Segment) window
.................................................... 18-210
18-70 Traffic Classifier disassociation (from an Ethernet Segment) window 18-71 Add Constraint to an Ethernet Segment window (Pop) 18-72 Ethernet Segment constraint properties window
.......................................... 18-212
....................................................................... 18-214
.................................................................................... 18-220
18-73 Constraint Modification window .................................................................................................................. 18-223 .................................................................................................................................................................................................................................... 1350 OMS lix 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
18-74 Ethernet Segment Configuration window 18-75 Ethernet Segment Extremities window
................................................................................................. 18-234
...................................................................................................... 18-236
18-76 Ethernet Segment Extremity Modification window (Origin)
............................................................ 18-237
18-77 Ethernet Segment Extremity Modification window (Destination) 18-78 Route Display - Ethernet Segment window
............................................................................................. 18-243
18-79 Connectivity view - Ethernet Segment window 18-80 VLAN Type Creation window
.................................................. 18-238
..................................................................................... 18-245
...................................................................................................................... 18-249
18-81 VLAN Type Modification window
............................................................................................................. 18-252
19-1
Connection Less Transport Link List
............................................................................................................ 19-28
19-2
Transport Link Configuration window
19-3
Transport Link Extremities window
19-4
Transport Link Properties window ................................................................................................................. 19-39
19-5
EVC Modification window (Details)
19-6
EVC Properties window ..................................................................................................................................... 19-59
19-7
EVC Fault Localization window
19-8
Show Equipment from EVC Fault Localization
19-9
AS window for EVC Alarms ............................................................................................................................ 19-71
......................................................................................................... 19-32
.............................................................................................................. 19-35
............................................................................................................ 19-54
.................................................................................................................... 19-66 ....................................................................................... 19-67
19-10 Add EVC termination window (General Panel) ........................................................................................ 19-75 19-11 Add EVC termination window (Egress Flow)
........................................................................................... 19-78
19-12 Add EVC termination window (L2 Control Protocol Panel)
............................................................... 19-80
19-13 EVC Termination Configuration window .................................................................................................... 19-84 19-14 EVC Termination Properties window
........................................................................................................... 19-86
19-15 Provider Domain Configuration window
.................................................................................................... 19-95
19-16 Domain Modification window ......................................................................................................................... 19-97 19-17 Network Element Configure window
........................................................................................................... 19-99
19-18 Client Type Selection ........................................................................................................................................ 19-101 19-101 19-19 Ethernet Physical Port
...................................................................................................................................... 19-102
19-20 Ethernet Physical Port Configuration window
........................................................................................ 19-103
19-21 Customer Creation window ............................................................................................................................ 19-105 .................................................................................................................................................................................................................................... 1350 OMS lx 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
19-22 Spanning Tree Instance Configuration window ...................................................................................... 19-122 20-1
PBB EVC provisioning ......................................................................................................................................... 20-8
20-2
Actions>Packet>Construction>Create Domain
20-3
Create PBB Domain
20-4
Search>Packet>Construction>Network Elements>Available NEs
20-5
Available NE: Actions>Define Network Element
20-6
Define Network Element dialog box
20-7
Defined NE list
20-8
Show Equipment view
20-9
Show Equipment: select the termination
20-10 Module setting
........................................................................................ 20-12
............................................................................................................................................ 20-13 20-13 .................................................... 20-14
.................................................................................... 20-15
............................................................................................................. 20-15
...................................................................................................................................................... 20-16 20-16 ....................................................................................................................................... 20-17 ..................................................................................................... 20-18
....................................................................................................................................................... 20-18 20-18
20-11 Show Equipment view of the terminating NE
........................................................................................... 20-19
20-12 Node: Actions>Physical>Synchronize>Synchronize NE 20-13 Actions>Physical>Create Physical Connection 20-14 Create Physical Connection
...................................................................... 20-19
....................................................................................... 20-21
.............................................................................................................................. 20-22
20-15 Create> Physical Connection step2
............................................................................................................... 20-23
20-16 Search>Packet>Construction>Transport Links>Links over Cable .................................................... 20-24 20-17 Links over Cable list ............................................................................................................................................ 20-25 20-25 20-18 Link over Cable: Actions>Assign Resources to Domain ....................................................................... 20-25 20-19 Assign Resources to Domain
........................................................................................................................... 20-26
20-20 Link over Cable list .............................................................................................................................................. 20-27 20-27 20-21 Link over Cable:Actions>Delete
.................................................................................................................... 20-28
20-22 Physical Connection:Actions>Remove
........................................................................................................ 20-28
20-23 Actions>Packet>ERP>Create ERP Ring 20-24 Create ERP Ring
..................................................................................................... 20-30
................................................................................................................................................... 20-31 20-31
20-25 Bridge Transport Links ....................................................................................................................................... 20-32 20-26 Create ERP Ring
................................................................................................................................................... 20-33 20-33
20-27 Search>Packet>ERP>Rings 20-28 List of ERP Rings
............................................................................................................................. 20-34
................................................................................................................................................. 20-34 20-34
.................................................................................................................................................................................................................................... 1350 OMS lxi 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
20-29 ERP ring: Actions>Implement ERP Ring 20-30 ERP Ring implemented
.................................................................................................... 20-35
...................................................................................................................................... 20-35
20-31 ERP Ring:Search>Nodes
................................................................................................................................... 20-36
20-32 Nodes belonging to the ring .............................................................................................................................. 20-36 20-33 ERP Ring:Search>Physical Links
.................................................................................................................. 20-36
20-34 Physcons belonging to the ring ........................................................................................................................ 20-37 20-35 ERP ring: Search>ERP Instances 20-36 Search of the ERP instances
................................................................................................................... 20-38
............................................................................................................................. 20-39
20-37 PBB domain:Search>ERP Instances
............................................................................................................. 20-39
20-38 Actions>Packet>ERP>Create ERP Instance 20-39 Create ERP Instance: General 20-40 Create ERP Instance: Timers
.............................................................................................. 20-40
.......................................................................................................................... 20-41
............................................................................................................................ 20-42
20-41 Create ERP Instance: Failures .......................................................................................................................... 20-43 20-42 Create ERP Instance
............................................................................................................................................ 20-44 20-44
20-43 ERP Instance: Actions>Implement ERP Instance
.................................................................................... 20-44
20-44 Actions>Packet>Services>ConnectionLess(Bridge)>Create B-VID ................................................ 20-46 20-45 Create B-VID wizard step1 ............................................................................................................................... 20-47 20-46 B-VID:Transport Links selection 20-47 Create B-VID 20-48 B-VID list
................................................................................................................... 20-48
......................................................................................................................................................... 20-49 20-49
................................................................................................................................................................ 20-50 20-50
20-49 B-VID: Actions>Implement
............................................................................................................................. 20-50
20-50 B-VID partially implemented (few secs)
..................................................................................................... 20-51
20-51 MIP creation policy .............................................................................................................................................. 20-53 20-53 20-52 Traffic Descriptor create step1 ......................................................................................................................... 20-54 20-53 Traffic Descriptor create step2 ......................................................................................................................... 20-55 20-54 EVC Termination list ........................................................................................................................................... 20-56 20-56 20-55 Actions> Add Connection Less EVC Termination
.................................................................................. 20-57
20-56 Add Connection Less EVC Termination dialog box 20-57 The new termination has been added
............................................................................... 20-58
............................................................................................................ 20-58
.................................................................................................................................................................................................................................... 1350 OMS lxii 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
20-58 ERP Graphical View example
....................................................................................................................... 20-128
20-59 Create PBB EVC: Termination Selection .................................................................................................. 20-146 20-60 Create PBB EVC: Termination Settings 20-61 Ingress flow create
.................................................................................................... 20-147
............................................................................................................................................. 20-148 20-148
20-62 Ingress Flow: create monitoring
................................................................................................................... 20-149
20-63 Egress Flow: Push .............................................................................................................................................. 20-150 20-64 EVC Allocate and Implement ........................................................................................................................ 20-151 20-65 Search>Packet>Connection Less(Bridge)>Bridge EVC
..................................................................... 20-152
20-66 Bridge EVC list ................................................................................................................................................... 20-152 20-152 20-67 TSS160C System ID Configuration
............................................................................................................ 20-157
20-68 TSS160C System ID Configuration form
................................................................................................. 20-158
20-69 TSS160C Q LAN Configuration (Gateway NE)
.................................................................................... 20-159
20-70 TSS160C Export of the Route ....................................................................................................................... 20-160 20-71 Tss160C OSI Routing Configuration .......................................................................................................... 20-161 20-72 TSS10 System ID Configuration .................................................................................................................. 20-162 20-73 TSS10 System IP Address ............................................................................................................................... 20-163 20-74 Tss10 LAN Interface Details .......................................................................................................................... 20-164 20-75 TSS160C Link Aggregation Group Management 20-76 Tss160C LAG Configuration (Client Type)
.................................................................................. 20-166
............................................................................................. 20-167
20-77 Tss160C LAG Configuration (Administration State) 20-78 Tss160C In Fiber In Band
.......................................................................... 20-168
............................................................................................................................... 20-169
20-79 Tss160C In Fiber In Band (OSPF) ............................................................................................................... 20-170 20-80 Tss160C In Fiber In Band Activate
............................................................................................................. 20-171
20-81 Tss160C port member of LAG ...................................................................................................................... 20-172 20-82 Tss160C port member of LAG configuration 20-83 Tss160C port member of LAG Actor
.......................................................................................... 20-173
......................................................................................................... 20-174
20-84 TSS10 Link Aggregation Group Management ........................................................................................ 20-176 20-85 Tss10 Enable the In Band Management ..................................................................................................... 20-177 20-86 TSS60 In Fiber In Band Configuration
...................................................................................................... 20-178
.................................................................................................................................................................................................................................... 1350 OMS lxiii 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
20-87 Tss10 portInLAG ................................................................................................................................................ 20-179 20-88 Tss10 port member of LAG configuration ................................................................................................ 20-180 20-89 Tss10_portInLAGconfigActor 20-90 Tss10_portInLAGadminState 20-91 NMS Start Supervision 20-92 NMS Synchronize NE
...................................................................................................................... 20-181
........................................................................................................................ 20-182
.................................................................................................................................... 20-183
...................................................................................................................................... 20-184
20-93 NMS add Node In Map .................................................................................................................................... 20-185 20-94 NMS Create Physical Connection ................................................................................................................ 20-186 20-95 NMS Create Physical Connection wizard ................................................................................................. 20-187 20-96 NMS Define NE
................................................................................................................................................. 20-188
20-97 NMS Ethernet Physical Port list
................................................................................................................... 20-189
20-98 Create LAG Link over Cable ......................................................................................................................... 20-190 20-99 Create Link Over Cable
................................................................................................................................... 20-191
20-100 NMS Link Over LAG list
............................................................................................................................... 20-192
21-1
BTV Element management chain
..................................................................................................................... 21-5
21-2
Broadcast TV Element List window
21-3
Broadcast TV Element Creation window ....................................................................................................... 21-9
21-4
External Network Element Modification window .................................................................................... 21-12
21-5
ETP Creation window
21-6
Path on 1350 OMS SDH .................................................................................................................................... 21-25
21-7
Broadcast TV Element Creation window
21-8
Link Over TDM Broadcast TV Creation window
21-9
1350 OMS SDH Path Id ..................................................................................................................................... 21-31
................................................................................................................ 21-7
......................................................................................................................................... 21-21
21-10 Create Ethernet Service
.................................................................................................... 21-27 .................................................................................... 21-30
...................................................................................................................................... 21-36 21-36
21-11 EVC Any to any Creation window ................................................................................................................. 21-38 22-1
Alarm status management
................................................................................................................................. 22-10
22-2
Alarm correlation
25-1
Mobile back-hauling scenario
25-2
Network layers in case of unterminated CE service ................................................................................... 25-5
.................................................................................................................................................. 22-11 22-11 ............................................................................................................................ 25-4
.................................................................................................................................................................................................................................... 1350 OMS lxiv 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
25-3
Transport Layer representation
.......................................................................................................................... 25-6
25-4
CES 9500 MPR Protection schemes
25-5
CES Relation between CAC tolerance and modulation mode
25-6
Horizontal and vertical alarm correlation in Packet Radio domain
25-7
Horizontal and vertical alarm correlation in T-MPLS domain ............................................................. 25-22
25-8
CES after join ......................................................................................................................................................... 25-28 25-28
25-9
CES after stich
............................................................................................................. 25-10 ............................................................. 25-11 ................................................... 25-17
....................................................................................................................................................... 25-28 25-28
25-10 CES routing display
............................................................................................................................................ 25-31
25-11 Tunnel routing display
........................................................................................................................................ 25-32
25-12 SNMP MIB relationships between E1 and PW tables
............................................................................ 25-36
26-1
Reference Network
................................................................................................................................................. 26-2 26-2
26-2
Actions>Packet>T-MPLS>Create T-MPLS tunnel
26-3
Create T-MPLS tunnel ........................................................................................................................................... 26-4 26-4
26-4
Point to point Packet Ring bidir protected T-MPLS tunnel
26-5
Selection of the port
26-6
Select the second extremity (node) ................................................................................................................... 26-7
26-7
P2P bid prot T-MPLS tunnel: selected extremities
26-8
P2P: constraint
26-9
P2P bid prot T-MPLS tunnel: selected extremities and constraint
..................................................................... 26-5
............................................................................................................................................... 26-6 26-6
..................................................................................... 26-8
......................................................................................................................................................... 26-9 26-9
26-10 Search>Packet>T-MPLS>T-MPLS Tunnels 26-11 Tunnel list
.................................................................................... 26-3
..................................................... 26-10
............................................................................................... 26-11
................................................................................................................................................................ 26-12 26-12
26-12 Actions>Implement T-MPLS Tunnel 26-13 The tunnel is implemented
............................................................................................................ 26-12
................................................................................................................................ 26-13
26-14 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire 26-15 Create T-MPLS Pseudo Wire
..................................................................... 26-14
........................................................................................................................... 26-15
26-16 Point to Point Bidirectional T-MPLS PW .................................................................................................... 26-17 26-17 Search>Packet>T-MPLS>T-MPLS Pseudo Wire
..................................................................................... 26-18
26-18 T-MPLS Pseudo Wires ........................................................................................................................................ 26-18 26-19 PW Implementation
............................................................................................................................................. 26-19 26-19
.................................................................................................................................................................................................................................... 1350 OMS lxv 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
26-20 T-MPLS Pseudo wire implemented 26-21 Reference Network
............................................................................................................... 26-19
.............................................................................................................................................. 26-21 26-21
26-22 Actions>Packet>T-MPLS>Create T-MPLS tunnel 26-23 Create T-MPLS tunnel
.................................................................................. 26-22
........................................................................................................................................ 26-23
26-24 Point to point Packet Ring bidir protected T-MPLS tunnel open sink
.............................................. 26-24
26-25 Selection of the port ............................................................................................................................................. 26-25 26-25 26-26 Select the second extremity (node)
................................................................................................................ 26-26
26-27 P2P bid prot T-MPLS tunnel open sink: selected extremities
.............................................................. 26-27
26-28 P2P open sink: constraint ................................................................................................................................... 26-28 26-29 P2P bid prot T-MPLS tunnel open sink: selected extremities and constraint
................................. 26-29
26-30 Search>Packet>T-MPLS>T-MPLS Tunnels ............................................................................................... 26-30 26-31 Tunnel list
................................................................................................................................................................ 26-31 26-31
26-32 Actions>Implement T-MPLS Tunnel 26-33 The tunnel is implemented
............................................................................................................ 26-31
................................................................................................................................ 26-32
26-34 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire 26-35 Create T-MPLS Pseudo Wire
..................................................................... 26-33
........................................................................................................................... 26-34
26-36 Dual Point to Point Bidirectional T-MPLS PW ......................................................................................... 26-36 26-37 Search>Packet>T-MPLS>T-MPLS Pseudo Wire
..................................................................................... 26-37
26-38 T-MPLS Pseudo Wires ........................................................................................................................................ 26-37 26-39 PW Implementation
............................................................................................................................................. 26-38 26-38
26-40 T-MPLS Pseudo wire implemented
............................................................................................................... 26-38
26-41 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC
................................................................. 26-40
26-42 Create T-MPLS EVC: Specific ........................................................................................................................ 26-42 26-43 Create T-MPLS EVC: Terminations Selection 26-44 Terminations Selection
.......................................................................................... 26-43
....................................................................................................................................... 26-44 26-44
26-45 Termination Settings ............................................................................................................................................ 26-46 26-46 26-46 Ingress flow create
............................................................................................................................................... 26-48 26-48
26-47 Ingress Flow: create monitoring ...................................................................................................................... 26-49 26-48 Egress Flow: Push
................................................................................................................................................ 26-51 26-51
.................................................................................................................................................................................................................................... 1350 OMS lxvi 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
26-49 Create Egress monitoring
.................................................................................................................................. 26-52
26-50 Spoke Transport Link selection
....................................................................................................................... 26-53
26-51 Create Ingress node A
......................................................................................................................................... 26-54
26-52 Create Egress node A
.......................................................................................................................................... 26-55
26-53 Select the transport link
...................................................................................................................................... 26-56
26-54 T-MPLS EVC Allocate and Implement
........................................................................................................ 26-57
26-55 Search>Packet>Services>T-MPLS>T-MPLS EVCs
............................................................................... 26-58
26-56 T-MPLS EVCs ....................................................................................................................................................... 26-59 26-59 26-57 Allocate the EVC
.................................................................................................................................................. 26-59 26-59
26-58 EVC implemented
................................................................................................................................................ 26-59 26-59
27-1
EVC definition: PM folder
.................................................................................................................................. 27-3
27-2
EVC definition: PM policy .................................................................................................................................. 27-4
27-3
Create Measure
27-4
Measure: Actions menu options ......................................................................................................................... 27-7
27-5
Search>PM>PM domains
27-6
Ethernet domain: Search menu
27-7
Ethernet domain: Actions menu ......................................................................................................................... 27-9
27-8
PM transport: Actions menu
27-9
PM TP list
........................................................................................................................................................ 27-5 27-5
.................................................................................................................................... 27-8 .......................................................................................................................... 27-8
............................................................................................................................... 27-9
................................................................................................................................................................ 27-10 27-10
27-10 Start TP dialog box ............................................................................................................................................... 27-10 27-11 Stop TP dialog box
............................................................................................................................................... 27-11
27-12 Measure consistency ............................................................................................................................................ 27-13 27-13 27-13 NE: Actions>Generate Audit ............................................................................................................................ 27-13 27-14 Generate Audit
....................................................................................................................................................... 27-14 27-14
27-15 Create Report Profile ........................................................................................................................................... 27-16 27-16 27-16 Correlation Measure with Report Profile ..................................................................................................... 27-17 27-17 Uncorrelation Measure with Report Profile ................................................................................................ 27-18 27-18 PM TP Actions menu
.......................................................................................................................................... 27-19
27-19 Export TPs to CSV file
....................................................................................................................................... 27-20
.................................................................................................................................................................................................................................... 1350 OMS lxvii 8DG42227DAAA 9.6 Issue 3 December 2012
List of figures ....................................................................................................................................................................................................................................
27-20 Generate Measure PM Report to CSV file
.................................................................................................. 27-21
27-21 Generate PM tabular report ............................................................................................................................... 27-22 28-1
TSS-5 interworking with TSS160/320
............................................................................................................ 28-8
28-2
Create Domain
28-3
Define NE ................................................................................................................................................................ 28-14 28-14
....................................................................................................................................................... 28-13 28-13
.................................................................................................................................................................................................................................... 1350 OMS lxviii 8DG42227DAAA 9.6 Issue 3 December 2012
About this document About this document
Purpose
This preface provides information about how to use this document, which is the 1350 OMS PKT Guide. The purpose of the 1350 OMS PKT Guide is to explain the administration and provisioning features of the 1350 OMS PKT application for the 1350 OMS 9.6 release. This document describes how to use, administer, and maintain the 1350 OMS PKT application for configuring and for monitoring Ethernet or MPLS networks. Reason for reissue
This document has been reissued to support the 1350 OMS 9.6. The revision history of this document is shown in the following table: Location
Revision
Issue
1350 OMS PKT Guide
Document reflects the changes made to the 1350 OMS release 9.6.
Issue 2, May 2012
1350 OMS PKT Guide
Document changes reflect the new 9.6 release of the 1350 OMS.
Issue 1, March 2012
Safety information
This document does not contain any safety information (cautions or warnings) because the 1350 OMS is a software product. Important! When working with any hardware that is associated with any piece of software, always refer to the safety information that the hardware manufacturer provides for that particular piece of hardware. For example, when working with an HP ® server, refer to safety information that is provided in the HP ® documentation for that server. When working with any Alcatel-Lucent network element, refer to safety information that is provided in the Alcatel-Lucent documentation for that particular NE.
................................................................................................................................................................................................................................... 1350 OMS lxix 8DG42227DAAA 9.6 Issue 3 December 2012
About this document ....................................................................................................................................................................................................................................
Intended audience
The 1350 OMS PKT Guide is written primarily for the advanced users of the 1350 OMS, who typically are systems engineers, programmers, and system administrators who must configure and monitor Ethernet or MPLS networks. This document can be used by anyone who needs specific administration or provisioning information about the features, applications, and operations of the 1350 OMS PKT component of the 1350 OMS. These people are you, its users. The 1350 OMS PKT Guide assumes that the user is familiar with the function of telecommunication networks and has had some exposure to the X.org Foundation X-Window ® and Microsoft Windows ® environments. How to use this information product Conceptual and task content
In the broadest sense, this document contains the following types of content: •
•
Conceptual content, which is background information, is given so users can better understand the tasks that must be performed. The presentation of conceptual information varies according to the topic being explained—sections, subsections, tables, figures, and screen captures can be commonly found. Task content, which includes step-by-step instructions, is provided so users can administer, provision, and maintain the system. The task information is typically presented as series of tasks that follows the conceptual information.
The conceptual information complements and enhances the step-by-step instructions that are found in each task. To optimize the use of the conceptual and task content, users should consider the following: •
•
•
The conceptual information should be used to broaden your general knowledge of the network management system. It is best if you read all conceptual information and have a good understanding of the concepts being presented before undertaking the step-by-step instructions given in any task. The conceptual and task portions of the document have extensive hyperlinks. Use these links to toggle between the two types of information presented so you can access all pertinent information related to particular concepts and tasks. The task information is based on a user needs analysis that has been performed for each management system user job; therefore, use the task information to get the job at hand done quickly and with minimal system impact.
Format of task content
Each task consists of sections that are called When to use, Related information, Before you begin, and Task. The intent of these sections is self-explanatory—they explain when you should use the task, any related information that you would need to know while doing the task, and what you need to consider or do before you start the task. When a task does not have any related information that must be considered before it is started, the Related information section for that task states the following: This task does not have any related information. .................................................................................................................................................................................................................................... 1350 OMS lxx 8DG42227DAAA 9.6 Issue 3 December 2012
About this document ....................................................................................................................................................................................................................................
When a task does not have any conditions that must be considered before it is started, the Before you begin section for that task states the following: This task does not have any preconditions. Each Task section consists of steps. The completion of all steps, which are sequentially numbered, is required for the entire task to be completed successfully. In some instances, a step might be prefaced with the wording Optional, which indicates that the step can be skipped and the task can still be completed successfully. A task is considered to be completed when all of its steps are completed and when the wording End of Steps appears. Many times, the management system affords users with multiple ways to accomplish the same task. In these instances, this type of task gives the user several Methods of how to accomplish the same set of steps successfully. Typographical conventions used for content
This document uses the following typographical conventions: •
User input or path navigation on the administration and application GUIs is identified with this type.
•
User input in the UNIX® environment is identified with this type.
•
System output in the UNIX® environment is identified with this type..
• •
GUI fields/parameters and their options are identified with this type. Document titles or words that are being defined or emphasized are identified with this type.
Marking conventions used for content
The following convention is used to indicate a path, which is a flow of buttons and/or menu items that you must navigated through to arrive at a destination on the GUI: Search > EML > Network Elements
This same convention is also used to show a path through a series of menu items, for example: Click the filtering tool and select Node > Node Type. All mouse selections are presumed to be left clicks. Right click mouse selections are indicated as the following: Right click the highlighted item and follow the path: Search > Clients. Or, if brevity is needed, the same path could be documented as: RClick item > Search > Clients.
Occasionally, a set of 1350 OMS features is not supported for all NEs or for all operating components and/or environments. This set of features is clearly marked to show these exceptions.
.................................................................................................................................................................................................................................... 1350 OMS lxxi 8DG42227DAAA 9.6 Issue 3 December 2012
About this document ....................................................................................................................................................................................................................................
Technical content
In general, the technical content in this document is augmented by technical content that is provided in other documents in this documentation set and/or in the document set of the particular network element (NE ) or piece of hardware in the network configuration. It is the user's responsibility to read all pertinent material in all documentation sets in order to understand a particular concept or procedure and/or to implement the procedure in his or her working environment. This document contains information on the complete line of NEs that the 1350 OMS supports. Each release of the 1350 OMS and its applications supports certain NEs within the Alcatel-Lucent family of optical NEs. Mention of NEs or specific NE features in the text of this document, or any document in the 1350 OMS documentation set, that are not supported in this particular product release can apply to prior or future product releases. Such material may not be currently visible or operable on the GUI and/or the server and has been added only as a convenience for our customers. This material is subject to change. For a list of NEs that are supported in the 1350 OMS 9.6, contact your Alcatel-Lucent local customer service support team. This document, or any document in the 1350 OMS documentation set, may contain information that is related to features, service packs (SPs), maintenance releases, or other updates that our product and its applications supported in prior releases or is to support in the near future. This material may not be visible or operable on the supported servers and/or GUI, and has been added only as a convenience for our customers. This material is subject to change. For a list of all supported features for a particular release, contact your Alcatel-Lucent local customer service support team. Treatment of terms
A term that is presented in the text of this document, along with any used abbreviation for the term, is typically defined where the term is initially introduced. Many of the more generic terms that are defined in this document, along with the terms that are defined in other documents in this documentation set, are also defined in the Glossary, which is part of the 1350 OMS Getting Started Guide. We encourage our users to rely on the Glossary for a comprehensive set of terms and any abbreviations of the terms. Document formats
This document is available for use in HTML format and PDF. The on-line HTML version of the document has a search capability, a table of contents in the front matter of the document, a partial table of contents in each chapter, and an index. The PDF version can be viewed on-line; or it, or portions of it, can be printed locally at the user's discretion. On-line help
The 1350 OMS help systems are designed to consider the task that the user is performing and to help the user complete the task.
.................................................................................................................................................................................................................................... 1350 OMS lxxii 8DG42227DAAA 9.6 Issue 3 December 2012
About this document ....................................................................................................................................................................................................................................
Contact sensitive help, which defines many GUI fields, is available; and other types of help can be accessed from the GUI menu. Related documentation
The following documents are related to the 1350 OMS PKT Guide: 1. The 1350 OMS Getting Started Guide (8DG42227AAAA) explains the look-and-feel of the user and administration GUIs to new users. This document contains a complete explanation of the 1350 OMS information product set and a glossary of terms that is applicable to the entire documentation set. 2. The 1350 OMS Administration Guide explains how to use the tools and the administration GUIs to administer and maintain the element management layer, network management layer, and service management layer of the 1350 OMS. This document consists of the following volumes: • The 1350 OMS Administration Guide, Vol 1: Common Tools and Processes (8DG42227LAAA-Vol1) explains how to administer and maintain the common tools and processes that are associated with the 1350 OMS. •
The 1350 OMS Administration Guide, Vol 2: Common GUI Functions (8DG42227LAAA-Vol2) explains how to administer and maintain the common administration GUIs that are associated with the 1350 OMS. 3. The 1350 OMS EML Guide (8DG42227BAAA) explains how to administer and provision the 1350 OMS EML application of the 1350 OMS, which is the element management layer of the 1350 OMS. 4. The1350 OMS SDH Guide (8DG42227CAAA) explains how to administer and provision the Synchronous Digital Hierarchy (SDH) network management layer of the 1350 OMS. 5. The 1350 OMS WDM Guide (8DG42227QAAA) explains how to administer and provision the 1350 OMS WDM, which provides the Wavelength Division Multiplexing (WDM) and Dense Wavelength Division Multiplexing (DWDM) network management layer for the 1350 OMS. 6. The 1350 OMS Service Assurance Guide (8DG42227FAAA) explains how to maintain the 1350 OMS in terms of activities such as alarm clearing and performance monitoring. 7. The 1350 OMS CLI Reference (8DG42227KAAA) provides detailed reference material on the Command Line Interface for the advanced user of the 1350 OMS. The 1350 OMS 9.6 also supports modules for system resiliency and northbound communication. These modules are explained in the following documents: • •
1350 OMS HA Guide (8DG42227GAAA) explains how to install, administer, and use the High Availability feature. 1350 OMS OI Guide (8DG42227HAAA) explains how to install, administer, and use the Open Interfaces that are supported for the 1350 OMS.
Ordering information
The ordering number for this particular document is 8DG42227DAAA. Contact your local Alcatel-Lucent local customer service support team for details. .................................................................................................................................................................................................................................... 1350 OMS lxxiii 8DG42227DAAA 9.6 Issue 3 December 2012
About this document ....................................................................................................................................................................................................................................
In addition, to order the 1350 OMS and/or any of its applications, add-on features or upgrades, contact your local Alcatel-Lucent local customer service support team. How to comment
To comment on this document, go to the Online Comment Form (http://infodoc.alcatellucent.com/comments/) or e-mail your comments to the Comments Hotline (
[email protected]).
.................................................................................................................................................................................................................................... 1350 OMS lxxiv 8DG42227DAAA 9.6 Issue 3 December 2012
Part I: Introduction
Overview Purpose
This part contains a general description about the 1350 OMS product and introduce the user to the activity of administration and maintenance of the 1350 OMS PKT application. Contents Chapter 1, Product Overview
1-1
Chapter 2, Introduction to Administration
2-1
................................................................................................................................................................................................................................... 1350 OMS I-1 8DG42227DAAA 9.6 Issue 3 December 2012
Introduction
Overview
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS I-2 8DG42227DAAA 9.6 Issue 3 December 2012
1
Product Overview 1
Overview Purpose
This chapter provides an overview of the 1350 OMS PKT and the user functions that are required to provision the application. Contents 1350 OMS Overview
1-2
1350 OMS Modules for System Resiliency and Northbound Communication
1-5
................................................................................................................................................................................................................................... 1350 OMS 1-1 8DG42227DAAA 9.6 Issue 3 December 2012
Product Overview
1350 OMS Overview
....................................................................................................................................................................................................................................
1350 OMS Overview 1350 OMS and its supported management layers
The 1350 OMS is a network management system that supports three layers of management to accommodate and grow with the optical network of the Customers. The Element Management Layer, or EML, provides the functionality that is needed to access any Alcatel-Lucent supported network elements (NEs) that are deployed in a customer network. The EML provides a single access point for communication with an NE. The Network Management Layer, or NML, provides the functionality that is needed to commission, provision, and supervise the network that is deployed in a customer premise. The Service Management Layer, or SML, provides the functionality that is needed to commission, provision, and supervise a Virtual Private Network (VPN) that an Alcatel-Lucent customer deploys to its end users or to its customers. 1350 OMS and its applications
The 1350 OMS is the Alcatel-Lucent converged and unified network management system. It manages the complete portfolio of Alcatel-Lucent active network elements (NEs) and it maintains the complete portfolio of Alcatel-Lucent legacy NEs. The 1350 OMS consists of the following set of integrated, licensed applications: •
“1350 OMS EML” (p. 1-2).
•
“1350 OMS PKT” (p. 1-3).
•
“1350 OMS SDH” (p. 1-3).
•
“1350 OMS WDM” (p. 1-3).
Refer to the 1350 OMS Getting Started Guide for a more detailed system description. 1350 OMS EML
The 1350 OMS EML application provides element level management (EML) capabilities for both Alcatel-Lucent ANSI and ETSI NEs. Its set of protocol adapters supports basic NE functions such as NE MIB backup/restore and software downloads. Because the 1350 OMS provides all of the element layer functions that are required to manage the deployed network, it requires to deploy also the 1350 OMS EML application. Refer to the following documents and contact your Alcatel-Lucent local customer service support team for additional details: • •
1350 OMS EML Guide. 1350 OMS Service Assurance Guide.
.................................................................................................................................................................................................................................... 1350 OMS 1-2 8DG42227DAAA 9.6 Issue 3 December 2012
Product Overview
1350 OMS Overview
....................................................................................................................................................................................................................................
1350 OMS PKT
The 1350 OMS PKT application provides Ethernet network management layer support along with provisioning, alarm correlation, and historical PM data services. Ethernet services include Multi-Protocol Label Switching (MPLS), Transport-Multi-Protocol Label Switching (T-MPLS), bridging, Connection Oriented traffic, and packet rings. Refer to the following documents and contact your Alcatel-Lucent local customer service support team for additional details: • •
1350 OMS PKT Guide. 1350 OMS Service Assurance Guide.
1350 OMS SDH
The 1350 OMS SDH application provides the Synchronous Digital Hierarchy (SDH) network management layer along with provisioning, alarm correlation, and PM correlation capabilities. The 1350 OMS SDH functions as a client for the 1350 OMS WDM application and as a server for the 1350 OMS PKT application. Refer to the following documents and contact your Alcatel-Lucent local customer service support team for additional details: •
1350 OMS CLI Reference.
•
1350 OMS Service Assurance Guide.
1350 OMS WDM
The 1350 OMS WDM application provides Wavelength Division Multiplexing (WDM) and Dense Wavelength Division Multiplexing (DWDM) support along with provisioning, alarm correlation, and historical PM correlation capabilities. Refer to the following documents and contact your Alcatel-Lucent local customer service support team for additional details: •
1350 OMS WDM Guide.
•
1350 OMS Service Assurance Guide.
1350 OMS software and the Web
1350 OMS is run through an Internet browser-based Graphical User Interface (GUI). It supports the standard web features that a browser offers, such as bookmarks, back, forward, reload, and print. The Web Desktop is the available mechanism that both system administrators and users can use to access the 1350 OMS GUI. It provides a central access point from which both system administrators and users are authenticated and from which they can navigate to the Web Portal to access the 1350 OMS applications.
.................................................................................................................................................................................................................................... 1350 OMS 1-3 8DG42227DAAA 9.6 Issue 3 December 2012
Product Overview
1350 OMS Overview
....................................................................................................................................................................................................................................
The Web Portal is a Java application that is started when the administrator or user logs in from the Web Desktop. The Web Portal provides the administrator with a view of all 1350 OMS applications and manages GUI navigation between the subsystem components. The Web Portal also provides various methods of navigation—such as menus, icons, and a left tree navigation area—between applications and tools. From the 1350 OMS Web Portal, administrators can set up each application and its users, and users can access the network and element level applications that enable the family of Alcatel-Lucent NEs to be provisioned. Refer to the 1350 OMS Getting Started Guide for a more detailed description of the look and feel of the software and for a glossary of terms and acronym list. 1350 OMS supported NEs
The 1350 OMS supports the Alcatel-Lucent family of optical network elements (NEs). To accommodate the world of optical transmission standards, these NEs operate using different transport structures and they support different native command languages. Contact your local customer support team for a list of NEs that are supported by the 1350 OMS and its particular applications.
.................................................................................................................................................................................................................................... 1350 OMS 1-4 8DG42227DAAA 9.6 Issue 3 December 2012
Product Overview
1350 OMS Modules for System Resiliency and Northbound Communication
....................................................................................................................................................................................................................................
1350 OMS Modules for System Resiliency and Northbound Communication 1350 OMS HA
The 1350 OMS supports High Availability (HA) as an added value module, which is referred to as the 1350 OMS HA. The 1350 OMS HA software package is installed on top of an already installed and configured NML and EML platform and independently of any other application such as the 1350 OMS SDH, 1350 OMS PKT, or 1350 OMS WDM, or any element manager such as the 1350 OMS EML or 1350 OMS eOMS. As its name suggests, the 1350 OMS HA provides high availability to these applications whose main task is to manage transport networks. It protects the 1350 OMS applications and its HP® server platform against hardware and software failures that could be caused by system failures (such as the failure of the system power supply or a system component), a site failure (such as a natural disaster or fire), a backplane failure, a processor failure, or any unplanned outage. The 1350 OMS HA is explained in detail in the 1350 OMS HA Guide (8DG42227GAAA). This document includes installation, administration, and user information for the 1350 OMS High Availability (HA) feature. Contact your Alcatel-Lucent local customer service support team for additional details. 1350 OMS OI
The 1350 OMS OI software package is installed on top of an already installed and configured MW-INT platform and independently of any other application such as the 1350 OMS SDH, 1350 OMS PKT, 1350 OMS WDM, or any element manager such as the 1350 OMS EML or 1350 OMS eOMS. The 1350 OMS OI enables the 1350 OMS applications to export or import data to multiple external operation systems (OSs). The 1350 OMS OI is a flexible, powerful, and effective set of generic OS-to-OS interfaces (GENOS) that allow an external OS to synchronize alarms, performance monitoring, network inventory, and remote inventory data with any of the 1350 OMS applications. The 1350 OMS OI is explained in detail in the 1350 OMS OI Guide (8DG42227HAAA). This document includes installation, administration, and user information for the Open Interfaces (OIs) that are supported for the 1350 OMS. Contact your Alcatel-Lucent local customer service support team for additional details.
.................................................................................................................................................................................................................................... 1350 OMS 1-5 8DG42227DAAA 9.6 Issue 3 December 2012
Product Overview
1350 OMS Modules for System Resiliency and Northbound Communication
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 1-6 8DG42227DAAA 9.6 Issue 3 December 2012
2
I2ntroduction to Administration
Application Administration MW-INT as the building block
The MW-INT, which is the middleware interface, is the building block of the 1350 OMS architecture; and as such, it is the platform for all 1350 OMS components and its features. The MW-INT enables the administrator to install a single product or several different products, as well as different instances of the same product on one hardware platform. The 1350OMS applications are installed and configured on top of the MW-INT platform. The MW-INT provides the following functionality: •
Process management
• • •
Subsystem configuration Installation/integration and customization System management
Application instances
The 1350 OMS supports the 1350 OMS PKT application, and each occurrence of this application in the management system is referred to as an instance. Each application instance is managed by the MW-INT. Refer to the 1350 OMS Administration Guide, Vol 1: Common Tools and Processes for details. Process Monitoring
Process Monitoring is the graphical representation of the system processes and their actual status. The Process Monitoring Control application is the graphic interface of the MW-INT application that allows the user to have an overall control of the IM subsystem of the selected System Instance. The PMC graphic interface is composed of a common window dedicated to display information and to execute commands for the management of all the processes (agents) of the selected System Instance. The processes are collected in groups (for example Database processes, Alarms processes,...) and each group is represented in the PMC window through an icon which color informs the user of the group functional state. Exactly the group icon gives the summarized information about the functional state of all the processes and their children included in the group itself. ................................................................................................................................................................................................................................... 1350 OMS 2-1 8DG42227DAAA 9.6 Issue 3 December 2012
Introduction to Administration
Application Administration
....................................................................................................................................................................................................................................
Refer to the 1350 OMS Administration Guide, Vol 2: Common GUI Functions for details. The Web Desktop
Much of the administration of the 1350 OMS PKT application occurs through the Web Desktop of the 1350 OMS. The Web Desktop provides a central access point from which both system administrators and users are authenticated and from which they can navigate to the Web Portal to access the 1350OMS applications. Refer to the 1350 OMS Administration Guide, Vol 2: Common GUI Functions for details. SEC User Administration and SEC User Authentication
The 1350 OMS uses its two SEC (Security) GUIs to administer and maintain security: • •
The 1350 OMS enables administrators to create and maintain user accounts through its SEC User Administration GUI. Functional area domains (FADs), object access domains (OADs), and combinations of these domains along with user profiles and the declaration and discarding of user accounts are administered through its SEC Authentication GUI.
Both the SEC User Administration GUI and the SEC User Authentication GUI are explained in the 1350 OMS Administration Guide, Vol 2: Common GUI Functions. Full system backups
The 1350 OMS enables administrators to perform a full system backup and recovery. For details, refer to the 1350 OMS Administration Guide, Vol 1: Common Tools and Processes, which details full system backups and recoveries, single volume backups, and mirror configurations. Troubleshooting information is also included. Application backup and restore
The 1350 OMS enables administrators to backup and restore a particular 1350 OMS application and to schedule a backup of a particular 1350 OMS application. For details, refer to the 1350 OMS Administration Guide, Vol 2: Common GUI Functions, which details how use the SMF Scheduler to schedule a full backup or a backup of just the network data, the alarm data, the performance monitoring data, the log data, user data, or the system configuration. PM Administration
Through its Data Management facilities, the 1350 OMS enables administrators to view the performance monitoring statistics of a particular PM database. For details, refer to the 1350 OMS Administration Guide, Vol 2: Common GUI Functions.
.................................................................................................................................................................................................................................... 1350 OMS 2-2 8DG42227DAAA 9.6 Issue 3 December 2012
Introduction to Administration
Application Administration
....................................................................................................................................................................................................................................
Logs, Command Log, and Command Log Administration
Log files are files that consist of records that are created by the various tools (scripts) and processes. Administrators use log files to track any and/or all meaningful operations that occur within the application or when a tool is executed. The 1350 OMS supports security logs, command logs, and system logs. These logs are explained in detail in the 1350 OMS Administration Guide, Vol 2: Common GUI Functions. The Command Log enables administrators to parse a command log or a set of command logs from a list of command logs. Once that list of command logs has been parsed, the Command Log enables administrators to extract log records from target command log files by using filters and to output that extracted list to a browser or to a table, called the Command Result List, which is a tabular display that can be printed. For details, refer to the 1350 OMS Administration Guide, Vol 2: Common GUI Functions. Command Log Administration enables the administrator to edit the command output template. In addition, the Command Log Administration function then allows the administrator to view, parse, and filter the Command Log. For details, refer to the 1350 OMS Administration Guide, Vol 2: Common GUI Functions.
.................................................................................................................................................................................................................................... 1350 OMS 2-3 8DG42227DAAA 9.6 Issue 3 December 2012
Introduction to Administration
View Application Release Information
....................................................................................................................................................................................................................................
View Application Release Information When to use
Use this task to view release information about an application. Related information
See the following topic in this document: •
“Application Administration” (p. 2-1)
Before you begin
Open a Terminal session on the server machine. Task
Complete the following steps to view release information about an application. ...................................................................................................................................................................................................
Type the following command after the command prompt :
1
/alu/Kernel/bin/Info.pl -sys PKT -inst -9.1.0 Result: The System Information window is displayed. ...................................................................................................................................................................................................
The release information for the application is similar to the following
2
General Information on System: System Version Instance Role
: : : : Master Ws : LOCAL OSK -ENGINE: Master Kernal Type: Master OSK-ENGINE Interface Version: Info ...
: *
Last Configuration Update: Local Time: Local Customization Update: Local Time: .................................................................................................................................................................................................................................... 1350 OMS 2-4 8DG42227DAAA 9.6 Issue 3 December 2012
Introduction to Administration
View Application Release Information
....................................................................................................................................................................................................................................
Composition ...................................................................................................................................................................................................
3
Press the Dismiss button to close the window. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 2-5 8DG42227DAAA 9.6 Issue 3 December 2012
Introduction to Administration
View Application Release Information
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 2-6 8DG42227DAAA 9.6 Issue 3 December 2012
Part II: Administration
Overview Purpose
This document part provides to system and network administrators information and procedures to administer and to maintain the 1350 OMS PKT. Contents Chapter 3, 1350 OMS PKT Configuration
3-1
Chapter 4, 1350 OMS PKT Process Monitoring
4-1
Chapter 5, 1350 OMS PKT User Management
5-1
Chapter 6, 1350 OMS PKT System Log Management
6-1
Chapter 7, 1350 OMS PKT Parameters
7-1
Chapter 8, 1350 OMS PKT Ethernet Multi-Manager Management Configurations
8-1
Chapter 9, 1350 OMS PKT MIB Realignment and the ISA Board
9-1
Chapter 10, 1350 OMS PKT AlignDBSDHPathID Tool
10-1
................................................................................................................................................................................................................................... 1350 OMS II-1 8DG42227DAAA 9.6 Issue 3 December 2012
Administration
Overview
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS II-2 8DG42227DAAA 9.6 Issue 3 December 2012
3
3350 OMS PKT 1 Configuration
Overview Purpose
This chapter provides the administrator with the conceptual information and the associated tasks that pertain to the configuration of the overall 1350 OMS PKT application. Contents 1350 OMS PKT Configuration
3-2
Access the System Configuration Window and Configure 1350 OMS PKT
3-3
Integrate the 1350 OMS PKT with Other NMSs
3-8
Integrate 1350 OMS PKT Client Workstations with the Master Workstation
3-9
................................................................................................................................................................................................................................... 1350 OMS 3-1 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Configuration
1350 OMS PKT Configuration
....................................................................................................................................................................................................................................
1350 OMS PKT Configuration Administrator log in
The administrator must log into the 1350 OMS PKT configuration from the log in mask as alcatel. Important! We strongly recommend that you do not log in as bmml to start the 1350 OMS PKT session. The default administrator log in is alcatel, which is available since the first customization. If needed, you can create additional administrator log using SMF. Any security warnings that appear should be ignored. Application Configuration through SystemConfig
Open a Unix Terminal window starting from the Unix Server machine to activate the System Configuration Window: The System Configuration window is divided into the following two panes: •
The Instantiable Subsystems pane is on the left. This pane contains a list of system processes, which are listed as proxies, that can have multiple instances. The administrator can use the arrow to move one or more system processes, which in this scenario are proxies, from the Instantiable Subsystems list to the Subsystems List, which moves the particular process or processes over to the static list and adds an instance number to the process.
•
The Subsystems List pane is on the right. This pane contains a static list of processes that cannot have multiple instances. In addition, this pane can contain one or more system processes from the Instantiable Subsystems pane on the left. The list of processes in the Subsystems List will be system instance processes.
System Configuration is used to configure processes in a system instance. The processes are configured into groups. A group of processes is called entity, which is used to configure, in a single step, processes that have the same configuration properties. The group definition is a System (NMS) configuration property. Each NMA has a specific configuration file that is used to configure its processes; this configuration file contains specific data and parameters. Process configuration enables processes to be configured in the following ways: •
A static list of processes can be defined that can belong to the System Instance.
•
A variable list of processes can be defined that can have multiple instances within the System Instance.
A configuration file can define the ID category of the multiple instances off-line.
.................................................................................................................................................................................................................................... 1350 OMS 3-2 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Configuration
Access the System Configuration Window and Configure 1350 OMS PKT
....................................................................................................................................................................................................................................
Access the System Configuration Window and Configure 1350 OMS PKT When to use
Use this task to access the system configuration window and to configure the 1350 OMS PKT. Related information
See the following topic in this document: •
“Access the System Configuration Window and Configure 1350 OMS PKT” (p. 3-3)
Before you begin
You cannot add a proxy to the system configuration while the system is running. When configuring proxies, the system must be down. Task
Complete the following steps to configure a 1350 OMS application, such as the 1350 OMS PKT. ...................................................................................................................................................................................................
1
The system must be brought down. ...................................................................................................................................................................................................
2
On the CDE front panel, press the terminal icon to start a Unix terminal application. Result: The terminal window is displayed. ...................................................................................................................................................................................................
3
Login as root user. ...................................................................................................................................................................................................
4
Open a telnet session on the server machine. ...................................................................................................................................................................................................
5
Set the export the of the display: export DISPLAY=: ...................................................................................................................................................................................................
6
Insert following command after the prompt : /alu/Install_Wizard/Install.sh –config
and select PKT as the system to configure.
.................................................................................................................................................................................................................................... 1350 OMS 3-3 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Configuration
Access the System Configuration Window and Configure 1350 OMS PKT
....................................................................................................................................................................................................................................
Result: The System Configuration window is displayed. The left pane of the window displays Instantiable Subsystems. The right pane of the window displays a Subsystems List. ...................................................................................................................................................................................................
7
To configure the EMLIM_PROXY, do the following: In the Instantiable Subsystems list, click on EMLIM_PROXY. If you want to add one EMLIM_PROXY, enter a 1 in the next ID field. Click the right arrow to move the EMLIM_PROXY from the Instantiable Subsystems list to the Subsystems List. Result:
EMLIM_PROXY_1 now appears on the Subsystems List.
In the Subsystem List, click on EMLIM_PROXY_1 to configure it. Result: The tool displays the Parameters Definition pop-up window.
In the Parameters Definition window, select the following to configure each of the parameters: For USE_CDN, select False, which is the default, if the proxy is to be an SNMP-type. If the proxy is not to be an SNMP-type, select True. For EML_NAME, enter a name given to the EML proxy. The name can be 1 to 10 characters in length. It cannot contain spaces (blanks). In addition, do not use any characters that will conflict with the UNIX ps command. For NM_INSTANCE_NAME_TO_USE, enter the complete EML system instance name. For example: 1353NM_1-7.4 where the EML is configured. If USE_CDN is true, this value must be the value of the SDH. ...................................................................................................................................................................................................
8
To configure the proxy for the NML, do the following: In the Instantiable Subsystems list, click on NMLIM_PROXY. If you want to add one NMLIM_PROXY, enter a 1 in the next ID field. Remember! Only one 1350 OMS PKT can manage one NML proxy.
Click the right arrow to move the NMLIM_PROXY from the Instantiable Subsystems list to the Subsystems List. Result:
NMLIM_PROXY_1 now appears on the Subsystems List.
In the Subsystem List, click on NMLIM_PROXY_1 to configure it. Result: The tool displays the Parameters Definition pop-up window.
In the Parameters Definition window, select the following to configure each of the parameters: For NML_NAME, enter a name given to the NML proxy. The name can be 1 to 10 characters in length. It cannot contain spaces (blanks). In addition, do not use any characters that conflict with the UNIX® ps command. .................................................................................................................................................................................................................................... 1350 OMS 3-4 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Configuration
Access the System Configuration Window and Configure 1350 OMS PKT
....................................................................................................................................................................................................................................
For RM_INSTANCE_NAME_TO_USE, enter the complete 1350OMS-RM system instance name. For example: 1350OMSRM_1-7.4.5. Follow this path to exit: Actions > Apply & Exit ...................................................................................................................................................................................................
9
To configure the SNA_EMLIM_PROXY, do the following: In the Instantiable Subsystems list, click on SNA_EMLIM_PROXY. The value to enter in the ID field is the ID value assigned to the adapter TL1 configured on EML application. Click the right arrow to move the SNA_EMLIM_PROXY from the Instantiable Subsystems list to the Subsystems List. Result:
SNA_EMLIM_PROXY_x now appears on the Subsystems List.
In the Subsystem List, click on SNA_EMLIM_PROXY_x to configure it. Result: The tool displays the Parameters Definition pop-up window.
In the Parameters Definition window, select the following to configure each of the parameters: For EML_NAME, enter a name given to the EML proxy. The name can be 1 to 10 characters in length. It cannot contain spaces (blanks). In addition, do not use any characters that will conflict with the UNIX ps command. For NM_INSTANCE_NAME_TO_USE, enter the complete EML system instance name. For example: EML_2-9.1.0 where the adapter TL1 is configured. ...................................................................................................................................................................................................
10
To configure the NMA for the CORE_IM, do the following: In the Subsystem List, look for and click on _CORE_IM. Under TMP_REMOTENAMINGFILE in the Actions pane of the Parameters Definition window, specify the name of the 1350OMS-EML naming file. Example: /tmp/naming.ref Under TMP_NE_UNDER_1354RM Management, indicate by specify 1 for yes or 0 for no if all NEs that are managed by the 1350 OMS PKT are also under 1350 OMS SDH management. For migrations, if NEs are already defined in the 1350 OMS PKT database and if these NEs were under 1350OMS-RM mangement, you cannot specify a 0 for no. If you do, the 1350 OMS SDH cannot be started. For the remaining fields, select all default values. Follow this path to exit: Actions > Apply & Exit ...................................................................................................................................................................................................
11
To configure the NMA for the CORE_UM, do the following:
.................................................................................................................................................................................................................................... 1350 OMS 3-5 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Configuration
Access the System Configuration Window and Configure 1350 OMS PKT
....................................................................................................................................................................................................................................
In the Subsystem List, look for and click on _CORE_USM. Under UI_LANGUAGE in the Actions pane of the Parameters Definition window, specify the user interface language to be English. Under PRINTER, specify the name of the default system printer even if the system printer is not yet installed. This field is mandatory.. Follow this path to exit: Actions > Apply & Exit ...................................................................................................................................................................................................
12
To configure NMC system tuning, do the following: In the Subsystem List, look for and click on System_Tuning. Result: The Parameters Definition window is displayed.
Leave the default values, which are 100 for SYSTEM_TUNING_VAL and 30 for SYS_START_WAIT_VAL. Follow this path to exit: Actions > Apply & Exit ...................................................................................................................................................................................................
13
To configure the NMC Oracle database, do the following: In the Subsystem List, look for and click on ORACLE-DB. Result: The Parameters Definition window is displayed.
Under MIB in the Actions pane of the Parameters Definition window, specify NEW to create a new database. Under DB_SIZE in the Actions pane of the Parameters Definition window, specify the size of the new database to be one of the following. (The DB_SIZE is linked to the kind of instance that you selected at OS_CONF predisposition time.) •
small
If you selected IM_Small instance, you must select small as the DB_SIZE. •
medium (the default)
If you selected IM_Medium instance, you must select small or medium as the DB_SIZE. •
large
If you selected IM_Large instance, you can select small, medium, or large as the DB_SIZE. Follow this path to exit: Actions > Apply & Exit ...................................................................................................................................................................................................
14
To configure NMC TAO_Interface Repository, do the following: In the Subsystem List, look for and click on TAO_InterfaceRepository. Result: The Parameters Definition window is displayed.
.................................................................................................................................................................................................................................... 1350 OMS 3-6 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Configuration
Access the System Configuration Window and Configure 1350 OMS PKT
....................................................................................................................................................................................................................................
Under IFRREP in the Actions pane of the Parameters Definition window, specify NEW, the default, to create a new persistent file. Follow this path to exit: Actions > Apply & Exit ...................................................................................................................................................................................................
15
To execute the configuration, do the following: In the System Configuration window, follow this path: Main > UpdateConfig Result: The Parameters Definition window is displayed. If the parameter New was
selected to create a new database, the database creation takes about 20 minutes. When the configuration is finished, the System Configuration Log is output. Ignore the warning messages. Click the Dismiss button to close the window. Follow this path to exit from the System Configuration window: Main > Quit. Result: The system asks you if you really want to quit.
Select Yes to quit. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 3-7 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Configuration
Integrate the 1350 OMS PKT with Other NMSs
....................................................................................................................................................................................................................................
Integrate the 1350 OMS PKT with Other NMSs When to use
Use this task to integrate an instance of the 1350 OMS PKT with other network management systems (NMSs), such as the 1350 OMS SONET, 1350 OMS SDH, or 1350 OMS WDM. Related information
See the following topic in this document: •
“Access the System Configuration Window and Configure 1350 OMS PKT” (p. 3-3)
Before you begin
This task is to be used if an instance (master or client) of the 1350 OMS PKT is co-located with other NMSs, such as the 1350 OMS SONET, 1350 OMS SDH, or 1350 OMS WDM. This task validates inter-system navigation; that is, navigation from one NMS to another NMS. It also enables CORBA communication between NMSs. Task
Complete the following steps to integrate an instance of the 1350 OMS PKT with other network management systems (NMSs), such as the the 1350 OMS SONET, 1350 OMS SDH, or 1350 OMS WDM. ...................................................................................................................................................................................................
1
Log in as root. ...................................................................................................................................................................................................
2
Enter the following command to start the global integration tool: ...,sys,root # /alcatel/Kernel/script/UpdateNeworkConnection.pl [Enter] Result: This tool validates the inter-system navigation and enables CORBA
communications between NMS. ...................................................................................................................................................................................................
3
Choose yes when integrating PKT with EML/SDH/NPR for both PLT and NAV integration and yes when integrating eOMS only for PLT part. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 3-8 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Configuration
Integrate 1350 OMS PKT Client Workstations with the Master Workstation
....................................................................................................................................................................................................................................
Integrate 1350 OMS PKT Client Workstations with the Master Workstation When to use
Use this task to integrate each the 1350 OMS PKT client workstation with its 1350 OMS PKT master workstation. Related information
See the following topic in this document: •
“Access the System Configuration Window and Configure 1350 OMS PKT” (p. 3-3)
Before you begin
Execute this task for each 1350 OMS PKT client workstation that must be integrated with its 1350 OMS PKT master workstation. Task
Complete the following steps to integrate each the 1350 OMS PKT client workstation with its 1350 OMS PKT master workstation. ...................................................................................................................................................................................................
1
Log in as root. ...................................................................................................................................................................................................
2
Enter the following command to start the global integration tool: ...,sys,root # /alcatel/Kernel/script/UpdateNeworkConnection.pl [Enter] E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 3-9 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Configuration
Integrate 1350 OMS PKT Client Workstations with the Master Workstation
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 3-10 8DG42227DAAA 9.6 Issue 3 December 2012
4
4350 OMS PKT Process 1 Monitoring
Overview Purpose
This chapter provides the administrator with the conceptual information and the associated tasks that pertain to the process monitoring of the overall 1350 OMS PKT application. Contents Process Monitoring Overview
4-2
Run Levels
4-5
................................................................................................................................................................................................................................... 1350 OMS 4-1 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Process Monitoring
Process Monitoring Overview
....................................................................................................................................................................................................................................
Process Monitoring Overview Groups
Processes are collected in groups, such as the database group, alarms group, or adapters group. Figure 4-1 Process Monitoring Window
.................................................................................................................................................................................................................................... 1350 OMS 4-2 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Process Monitoring
Process Monitoring Overview
....................................................................................................................................................................................................................................
The follow table lists the groups of the processes. Process Groups Group name
Process Name
Function
Database
oracle_monitor_process
Manages the ORACLE processes.
Alarms
AS_Current_IM
Manages the AS current alarms.
AS_Historic_IM
Manages the AS historical alarms.
AlmAdapter
Manages the communication with EML/SDH for the alarms.
EmlAdapter
Manages the communication with EML (through Proxy processes).
NmlAdapter
Manages the communication with SDH (through Proxy processes).
c_FaultManagement
Manages the alarms for the CORE entities.
c_DataManagement
Manages the access to the database for the CORE entities.
c_TopologyManagement
Manages the topology of the network.
c_EquipmentTopology
Manages the equipment defined in EMLs/IM.
c_AuditAlignRecovery
Manages Audit/Alignment/Recovery utilities
c_Scheduler
Manages scheduled reports generation
m_FaultManagement
Manages the alarms for the MPLS entities.
m_NetworkManagement
Manages the network entities.
m_ TrafficProfileManagement
Manages the traffic profiles.
m_DataManagement
Manages the access to the database for the MPLS entities.
m_AuditAlignRecovery
Manages Audit/Alignment/Recovery utilities (MPLS entities)
Adapters
Core
Mpls
.................................................................................................................................................................................................................................... 1350 OMS 4-3 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Process Monitoring
Process Monitoring Overview
....................................................................................................................................................................................................................................
Process Groups Group name Eot
Process Name
Function
e_DataManagement
Manages the access to the database for the MPLS entities.
e_FaultManagement
Manages the alarms for the MPLS entities.
e_ProfileManagement
Manages the profiles.
e_ServiceManagement
Manages the services.
e_TrafficManagement
Manages the traffic profiles.
e_AuditAlignRecovery
Manages Audit/Alignment/Recovery utilities (EOT entities)
e_Facility
Add on for VPWS Ethernet Service Creation.
e_Bridge
Manages the Bridge.
e_PM
Manages Performance Monitoring on Ethernet services
Session
SessionManagement
Manages the interface of all IM processes of the 1350 OMS PKT and the GUI(s) or CLI(s).
Nbi
NbiManagement
Manages the Northbound Interface.
EML_Proxies
Proxy_E_EML_NAME
Manages each configured Eml Proxy with EML_NAME
Proxy_E_SNA_NAME
Manages each configured SNA Eml Proxy with SNA_EML_NAME
NML_Proxies
Proxy_N_NML_NAME
Manages configured Nml Proxy (one and only one can be configured) with NML_NAME
E2E
e2e_manager
Manages the e2e Ethernet services
e2e_data
Manages the access to database for e2e entities
e2e_indirect
Manages indirect eOMS services
tmpls_adaconfig
Manages the Adapter configuration
tmpls_dom
Manages the domains
tmpls_inventory
Inventory management
tmpls_lsp
Lsp Management
EthOperatorLog
Managing the log on operator
Tmpls
OperatorLogger
.................................................................................................................................................................................................................................... 1350 OMS 4-4 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Process Monitoring
Run Levels
....................................................................................................................................................................................................................................
Run Levels Run levels 0 through 4
The 1350 OMS PKT has the following run levels: Run Level
Name
Information
0
FullFunctionality
Run the entire application.
1
BackupMode
Subsystem runs to allow a backup job to run without conflicting problems. Only processes configured for this run level should be run.
2
RestoreMode
Subsystem runs to allow a restore job to run without conflicting problems. Only processes configured for this run level should be run.
3
ADAPTERS
Run the ADAPTERS part.
4
DB_Only
Needed for OS resilience. Run ORACLE Database processes.
.................................................................................................................................................................................................................................... 1350 OMS 4-5 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Process Monitoring
Run Levels
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 4-6 8DG42227DAAA 9.6 Issue 3 December 2012
5
5350 OMS PKT User 1 Management
Overview Purpose
This chapter provides the administrator with the conceptual information and the associated tasks that pertain to the user management of the overall 1350 OMS PKT application. Contents User Profiles
5-2
Construction Macro Functions and Default User Profiles
5-3
MPLS Macro Functions and Default User Profiles
5-7
Ethernet Macro Functions and Default User Profiles
5-9
................................................................................................................................................................................................................................... 1350 OMS 5-1 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
User Profiles
....................................................................................................................................................................................................................................
User Profiles Default operator profiles
The 1350OMS default operator profiles are the following: •
An administrator can perform every function on the particular 1350OMS application.
•
A constructor can manage the topology of the network, which includes subnetworks, NEs, ENEs, LOS, LOC, and LOM. The constructor can perform every function on maps and NEs; however, the constructor cannot perform certain administration functions. For example: a constructor cannot add or remove operators or perform a backup and restore of the system. An operator can create local maps, import saved maps, and manage services such as Ethernet; however, the operator cannot manage NEs (start/stop supervision) or manage the global inventory. In addition, an operator cannot perform certain administration functions. For example: an operator cannot add or remove operators or perform a backup and restore of the system. A viewer can view lists of data and can view the maps. In general, a viewer can only look at data; a viewer has limited access and privileges.
•
•
When a new operator is created through the Create User function, that operator must be assigned to one of the default profiles. The default profiles names cannot be changed and the profiles themselves cannot be reconfigured.
.................................................................................................................................................................................................................................... 1350 OMS 5-2 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
Construction Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
Construction Macro Functions and Default User Profiles TMPLS management TMPLS Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
T-Mpls Domain, Nodes, Sections, Tunnels, Pseudo Wires list
✓
✓
✓
✓
Services
✓
✓
T-Mpls deletion
✓
✓
T-Mpls modification
✓
✓
T-Mpls properties
✓
✓
✓
✓
Administrator
Constructor
Operator
Viewer
Domain list / search
✓
✓
✓
✓
Domain creation
✓
✓
Domain deletion
✓
✓
Domain modification
✓
✓
Domain properties
✓
✓
✓
✓
Domain inventory
✓
✓
✓
✓
T-Mpls EVC creation
Domain management Domain Management ✓ is Allowed Macro Function
Service node management Service Node Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Service node list / search
✓
✓
✓
✓
Service node properties
✓
✓
✓
✓
Service node inventory
✓
✓
✓
✓
.................................................................................................................................................................................................................................... 1350 OMS 5-3 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
Construction Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
NE management NE Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
NE list / search
✓
✓
✓
✓
NE available list/ search
✓
✓
NE definition
✓
✓
NE deletion
✓
✓
NE modification
✓
✓
NE properties
✓
✓
✓
✓
NE acknowledge
✓
✓
✓
✓
NE configuration
✓
✓
NE assign to domain
✓
✓
NE de-assign from domain
✓
✓
ENE management ENE Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
ENE list / search
✓
✓
✓
✓
ENE creation
✓
✓
ENE deletion
✓
✓
ENE modification
✓
✓
ENE properties
✓
✓
✓
✓
SDH termination management SDH Termination Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
SDH termination synchronization
✓
✓
SDH termination audit
✓
✓
SDH termination upload
✓
✓
SDH termination properties
✓
✓
✓
✓
SDH termination list / search
✓
✓
✓
✓
.................................................................................................................................................................................................................................... 1350 OMS 5-4 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
Construction Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
Ethernet physical port management Ethernet Physical Port Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Ethernet physical port upload
✓
✓
Ethernet physical port modification
✓
✓
Ethernet physical port configuration
✓
✓
Ethernet physical port properties
✓
✓
✓
✓
Ethernet physical port list / search
✓
✓
✓
✓
Operator
Viewer
External termination management External Termination Management ✓ is Allowed Macro Function
Administrator
Constructor
ETP creation
✓
✓
ETP deletion
✓
✓
ETP properties
✓
✓
✓
✓
ETP list/ search
✓
✓
✓
✓
Operator
Viewer
Link over SDH management Link over SDH Management ✓ is Allowed Macro Function
Administrator
Constructor
Link over SDH creation
✓
✓
Link over SDH creation (nav on RM)
✓
✓
Link over SDH deletion
✓
✓
Link over SDH deletion (nav on RM)
✓
✓
Link over SDH modification
✓
✓
Link over SDH properties
✓
✓
✓
✓
Link over SDH extremities
✓
✓
✓
✓
Link over SDH list / search
✓
✓
✓
✓
.................................................................................................................................................................................................................................... 1350 OMS 5-5 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
Construction Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
Link over SDH Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
✓
Link over SDH configuration
Viewer
✓
Link over MPLS management Link over MPLS Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Link over MPLS properties
✓
✓
✓
✓
Link over MPLS extremities
✓
✓
✓
✓
Link over MPLS list / search
✓
✓
✓
✓
Operator
Viewer
Link over cable management Link over Cable Management ✓ is Allowed Macro Function
Administrator
Constructor
Link over cable creation
✓
✓
Link over cable deletion
✓
✓
Link over cable modification
✓
✓
Link over cable properties
✓
✓
✓
✓
Link over cable extremities
✓
✓
✓
✓
Link over cable list / search
✓
✓
✓
✓
Utilities management Utilities Management ✓ is Allowed Utilities Management
Administrator
Start/End Procedure
✓
Audit NE
✓
Display NE Audit
✓
Align NE
✓
Reserve
✓
Constructor
Operator
Viewer
.................................................................................................................................................................................................................................... 1350 OMS 5-6 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
MPLS Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
MPLS Macro Functions and Default User Profiles Transport Link management Transport Link Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Characteristics definition
✓
✓
Transport Link bandwidth load indication
✓
✓
✓
✓
Transport Link extremities
✓
✓
✓
✓
Transport Link list / search
✓
✓
✓
✓
Transport link properties
✓
✓
✓
✓
Transport link inventory
✓
✓
✓
✓
Operator
Viewer
Traffic descriptor management Transport Descriptor Management ✓ is Allowed Macro Function
Administrator
Constructor
Traffic descriptor creation
✓
✓
Traffic descriptor deletion
✓
✓
Traffic descriptor properties
✓
✓
✓
✓
Traffic descriptor list / search
✓
✓
✓
✓
Traffic descriptor modification
✓
✓
Traffic descriptor inventory
✓
✓
✓
✓
LSP Tunnel management LSP Tunnel Management ✓ is Allowed Macro Function
Administrator
Constructor
LSP Tunnel creation
✓
✓
LSP Tunnel deletion
✓
✓
LSP Tunnel allocation
✓
✓
LSP Tunnel de-allocation
✓
✓
LSP Tunnel implementation
✓
✓
LSP Tunnel de-implementation
✓
✓
Operator
Viewer
.................................................................................................................................................................................................................................... 1350 OMS 5-7 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
MPLS Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
LSP Tunnel Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
LSP Tunnel constraint adding
✓
✓
LSP Tunnel constraint removing
✓
✓
LSP Tunnel bandwidth load indication
✓
✓
✓
✓
LSP Tunnel list / search
✓
✓
✓
✓
LSP Tunnel inventory
✓
✓
✓
✓
LSP Tunnel extremities
✓
✓
✓
✓
LSP Tunnel constraint list
✓
✓
✓
✓
LSP tunnel modification
✓
✓
LSP Tunnel route
✓
✓
✓
✓
LSP Tunnel Properties
✓
✓
✓
✓
Clipboard
✓
✓
VC LSP management VC LSPManagement ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
VC LSP creation
✓
✓
VC LSP deletion
✓
✓
VC LSP implementation
✓
✓
VC LSP de-implementation
✓
✓
VC LSP commission
✓
✓
VC LSP de-commission
✓
✓
VC LSP list /search
✓
✓
✓
✓
VC LSP extremities
✓
✓
✓
✓
VC LSP modification
✓
✓
VC LSP properties
✓
✓
✓
✓
.................................................................................................................................................................................................................................... 1350 OMS 5-8 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
Ethernet Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
Ethernet Macro Functions and Default User Profiles Customer management Customer Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Customer list / search
✓
✓
✓
✓
Customer create
✓
✓
Customer modify
✓
✓
Customer properties
✓
Customer delete
✓
Inventory of services
✓
✓
✓
✓
✓ ✓
✓
✓
Service management Service Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Service list
✓
✓
✓
✓
Service create
✓
✓
Service modify
✓
✓
Service properties
✓
Service delete
✓
✓
✓
✓
✓
EVC management EVC Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
EVC list
✓
✓
✓
✓
EVC create
✓
✓
EVC modify
✓
✓
EVC properties
✓
EVC delete
✓
✓
EVC Termination add
✓
✓
EVC Termination delete
✓
✓
✓
✓
✓
.................................................................................................................................................................................................................................... 1350 OMS 5-9 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
Ethernet Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
Ethernet Traffic Descriptor management Ethernet Traffic Descriptor Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Ethernet Traffic Descriptor list
✓
✓
✓
✓
Ethernet Traffic Descriptor create
✓
✓
Ethernet Traffic Descriptor modify
✓
✓
Ethernet Traffic Descriptor properties
✓
Ethernet Traffic Descriptor delete
✓
✓
✓
✓
✓
Ethernet Traffic Classifier management Ethernet Traffic Classifier Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Ethernet Traffic Classifier list
✓
✓
✓
✓
Ethernet Traffic Classifier create
✓
✓
Ethernet Traffic Classifier modify
✓
✓
Ethernet Traffic Classifier properties
✓
Ethernet Traffic Classifier delete
✓
✓
✓
✓
✓
Ethernet Edge Physical Port management Ethernet Edge Physical Port Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Ethernet Edge Physical Port properties
✓
✓
✓
✓
Ethernet Edge Physical Port add to EVC
✓
✓
Ethernet Edge Physical Port modification VLANs
✓
✓
.................................................................................................................................................................................................................................... 1350 OMS 5-10 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
Ethernet Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
Ethernet Edge Physical Port Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Ethernet Edge Physical Ports list
✓
✓
✓
✓
Ethernet Transport Segment management Ethernet Transport Segment Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Inventory of Ethernet Segments
✓
✓
✓
✓
Ethernet Transport segment bandwidth load
✓
✓
✓
✓
Ethernet Transport Segment list
✓
✓
✓
✓
Ethernet Transport Segment properties
✓
✓
✓
✓
Ethernet Segment management Ethernet Segment Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Ethernet Segment list
✓
✓
✓
✓
Ethernet Segment create
✓
✓
Ethernet Segment modify
✓
✓
Ethernet Segment properties
✓
Ethernet Segment delete
✓
✓
Ethernet Segment configure
✓
✓
Ethernet Constraint add
✓
✓
Ethernet Constraint list
✓
Ethernet Constraint delete
✓
✓
Ethernet VLAN Constraint add
✓
✓
Ethernet VLAN Constraint remove
✓
✓
✓
✓
✓
✓
✓
✓
.................................................................................................................................................................................................................................... 1350 OMS 5-11 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
Ethernet Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
Ethernet Segment Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Ethernet VLAN Constraint list
✓
✓
Ethernet Segment allocate
✓
✓
Ethernet Segment de-allocate
✓
✓
Ethernet Segment implement
✓
✓
Ethernet Segment de-implement
✓
✓
Ethernet Segment show EVC
✓
✓
✓
✓
Ethernet Segment extremities
✓
✓
✓
✓
Ethernet Segment alarm history
✓
✓
✓
✓
Ethernet Segment failure localization
✓
✓
Color Profile Management Color Profile Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Color Profile list
✓
✓
✓
✓
Color Profile create
✓
✓
Color Profile modify
✓
✓
Color Profile properties
✓
Color Profile delete
✓
✓
✓
✓
✓
Transport Link Management Transport Link Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Transport Link list
✓
✓
✓
✓
Transport Link properties
✓
✓
✓
✓
Transport Link extremities
✓
✓
✓
✓
Transport Link bandwidth load
✓
✓
✓
✓
.................................................................................................................................................................................................................................... 1350 OMS 5-12 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
Ethernet Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
Transport Link Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer ✓
Transport Link list supported Ethernet segments
✓
✓
Transport Link configure
✓
✓
VLAN Type Management VLAN Type Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
VLAN type list
✓
✓
✓
✓
VLAN type creation
✓
✓
VLAN type deletion
✓
✓
VLAN type modification
✓
✓
VLAN type properties
✓
✓
✓
✓
Provider Network Management Provider Network Management ✓ is Allowed Macro Function
Administrator
Constructor
Operator
Viewer
Ethernet Traffic Classifier list
✓
✓
✓
✓
Ethernet Traffic Classifier modify
✓
✓
.................................................................................................................................................................................................................................... 1350 OMS 5-13 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT User Management
Ethernet Macro Functions and Default User Profiles
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 5-14 8DG42227DAAA 9.6 Issue 3 December 2012
6
6350 OMS PKT System Log 1 Management
Overview Purpose
This chapter provides the administrator with the conceptual information and the associated tasks that pertain to the system log management of the overall 1350 OMS PKT application. Contents SMF/Commands/Event Log File Overview
6-2
Failure Management Log File Overview
6-5
Trace Management Overview
6-6
................................................................................................................................................................................................................................... 1350 OMS 6-1 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT System Log Management
SMF/Commands/Event Log File Overview
....................................................................................................................................................................................................................................
SMF/Commands/Event Log File Overview SMF/Commands/Event log file locations
The log files for SMF, commands, and/or events are stored in the following locations: •
/usr/Systems/_/maintenance/log
•
/usr/Systems/_/SMF/tools/log/data
•
/usr/Systems/_/ORACLE/databases/dbnml/admin/create
•
/usr/Systems/_/ORACLE/databases/dbnml/admin/logbook
•
/usr/Systems/_/ORACLE/databases/dbnml/admin/bdump
•
/usr/Systems/_/ORACLE/databases/network
•
/usr/Systems/_/TAO/maintenance/trace
•
/usr/Systems/_/databases/dbbmml/data
Log file suffixes
The system log files have the following suffixes: •
.log
•
.data
•
.dataflow
maintenance/log files
The following table lists all files that are in the /usr/Systems/_/maintenance/log directory. Log files in /usr/Systems/_/maintenance/log Filename
Contents
smf.log
Main source of SMF information.
pmc2.log
Main source of PMC information.
JacORB.log
Main source of JABORB information.
PMCStart.log
Information about the startup of the processes managed in PMC.
1354BM.log
Main information source for all IMs processes of the 1350OMS PKT.
EMLStart.log
Information source for the startup of the EML adapter and its proxies.
NMLStart.log
Information source for the startup of the NML adapter and its proxies.
*_dbi.log
Log files for the 1350 OMS PKT for the processes that used the DBI.
.................................................................................................................................................................................................................................... 1350 OMS 6-2 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT System Log Management
SMF/Commands/Event Log File Overview
....................................................................................................................................................................................................................................
Log files in /usr/Systems/_/maintenance/log Filename
Contents
*Gui.log
Main information source for all USMs processes of the 1350 OMS PKT.
ascurusm.log
Information source for the AS USM.
BmAdaptationModifyTrace.log
File logging adaptation information for the dynamic trace level changing tool.
BmCoreModifyTrace.log
File logging bmcore information for the dynamic trace level changing tool.
BmMplsModifyTrace.log
File logging mpls information for the dynamic trace level changing tool.
EotModifyTrace.log
File logging eot information for dynamic trace level changing tool.
allTracesModify.log
File logging information for the dynamic trace level changing tool invoked from the Set BM Parameter GUI.
SMF/tools/log/data file
The /usr/Systems/_/SMF/tools/log/data directory contains the traceDebug.log, which is the log file for debugging. ORACLE/databases/dbnml/admin/create file
The /usr/Systems/_/ORACLE/databases/dbnml/admin/create directory contains the crdb_phase.log, which is the log file that is created during the creation of the database. ORACLE/databases/dbnml/admin/logbook file
The /usr/Systems/_/ORACLE/databases/dbnml/admin/logbook directory contains the start_db.log and stop_db.log files, which is the log files that log
the start and the stopping of the database. ORACLE/admin/dbump file
The /usr/Systems/_/ORACLE/databases/dbnml/admin/bdump directory contains the alert_dbbmml1.log file, which is the log file that contains
information on the ORACLE errors.
.................................................................................................................................................................................................................................... 1350 OMS 6-3 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT System Log Management
SMF/Commands/Event Log File Overview
....................................................................................................................................................................................................................................
ORACLE/databases/network file
The /usr/Systems/_/ORACLE/databases/network directory contains the dbbmml1listener.log file, which is the log file that contains information on the listener process of ORACLE. TAO/maintenance/trace file
The /usr/Systems/_/TAO/maintenance/trace directory contains the ORBStart.log file, which is the log file that contains information on the ORB TAP startup. databases/dbbmml/data
The /usr/Systems/_/databases/dbbmml/data directory contains the redo.log file, which is the log file that contains information on the ORACLE redo log files.
.................................................................................................................................................................................................................................... 1350 OMS 6-4 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT System Log Management
Failure Management Log File Overview
....................................................................................................................................................................................................................................
Failure Management Log File Overview Failure management log file location
The failure management log files are in the /usr/Systems/_/maintenance/trace directory. Failure management log file suffixes
The failure management log files have the following suffixes: •
.err
•
.outerr
.................................................................................................................................................................................................................................... 1350 OMS 6-5 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT System Log Management
Trace Management Overview
....................................................................................................................................................................................................................................
Trace Management Overview Trace management log file location
The failure management log files are in the following directories: •
/usr/Systems/_/maintenance/trace
•
/usr/Systems/_/PMC2/trace
Trace management log file suffixes
The failure management log files have the following suffixes: •
.data
•
.data.lck
•
.dataflow
•
.dataflow.lck
•
.trc
•
trc.old
•
.trace
•
.out
.................................................................................................................................................................................................................................... 1350 OMS 6-6 8DG42227DAAA 9.6 Issue 3 December 2012
7
1350 OMS PKT Parameters 7
Overview Purpose
This chapter provides the administrator with the conceptual information that pertains to the parameters for the 1350 OMS PKT application. Contents Parameter Overview
7-2
1350 OMS PKT Parameters for Core NMA
7-3
1350 OMS PKT Parameters for GUI NMA
7-4
1350 OMS PKT Parameters for MW-INT
7-5
1350 OMS PKT Parameters for Oracle Management
7-6
Set PKT Parameters
7-7
1350 OMS PKT Parameter List
7-9
................................................................................................................................................................................................................................... 1350 OMS 7-1 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Parameters
Parameter Overview
....................................................................................................................................................................................................................................
Parameter Overview Parameter functional definition
The parameters can be defined for the 1350 OMS PKT application during the initial installation of the application or after the installation of the application through the SMF interface.
.................................................................................................................................................................................................................................... 1350 OMS 7-2 8DG42227DAAA 9.6 Issue 3 December 2012
1350 OMS PKT Parameters
1350 OMS PKT Parameters for Core NMA
....................................................................................................................................................................................................................................
1350 OMS PKT Parameters for Core NMA TMP_NE_UNDER_ Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Service. Result: The list window is displayed.
See the following topic in this document: “Description of the list of Services” (p. 18-21) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-20 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Description of the list of Services
....................................................................................................................................................................................................................................
Description of the list of Services Attributes of a Service
The attributes displayed for each service are: •
User Label.
•
Customer User Label.
•
Type (EPL, EVPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI, Broadcast, BTV).
•
Working State (Normal, Configuring, Removing).
•
Service State (Not in service, In service, Upgrading).
•
Availability Status (Normal, Degraded, In Failure, Not Meaningful).
.................................................................................................................................................................................................................................... 1350 OMS 18-21 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Create a Service
....................................................................................................................................................................................................................................
Create a Service When to use
This function allows creating an Ethernet Service. Related Information
If this creation window is required from the Customer List, the Customer field of the creation window is automatically filled with the selected value. For more information about Services, refer to “Ethernet Service description” (p. 18-17). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
At least, one customer must previously be defined. The User Label must be different from the existing ones.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Create Ethernet Service. ...................................................................................................................................................................................................
2
On the Create Service Window. To create a service define following data: •
Enter a Service User label.
•
•
Choose the Customer from the list (this field is automatically filled if this window is required from the Customer List). Select a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI, BTV, or Broadcast). Enter the Reference SLA(string optional).
•
Enter a Comment (optional).
•
...................................................................................................................................................................................................
3
Click Ok.
.................................................................................................................................................................................................................................... 1350 OMS 18-22 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Create a Service
....................................................................................................................................................................................................................................
Result: The service is created.
A correlation with the selected customer is created. Then, the tree area and the Ethernet Service List are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-23 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Service Setup
....................................................................................................................................................................................................................................
Service Setup When to use
The wizard creates and configure at once: Service, EVC, and Ethernet Segment. Related Information
For more information about Services, refer to “Ethernet Service description” (p. 18-17). wizard results
For EVPL, EPTL, EPL, and Extended EVPL connectivity only an Automatic Setup function can be chosen. The wizard creates at once: • • • •
a new service. a Point-to-Point Bi-directional EVC (named " _EVC_ "),. two Ethernet Segments (named " _ESG_A_Z_ " and " _ESG_Z_A_ "). associate a Traffic Descriptor and a Traffic Classifier to Ethernet Segments.
Service states
The Ethernet service is created into the 1350 OMS PKT with the following state: • •
Working State: Normal. Service State: Not In Service.
•
Availability Status: depending on the availability status of created EVC.
A correlation with the selected customer is created. Then, the tree area and the Ethernet Service List are updated. EVC states
One EVC is created into the 1350 OMS PKT with the following attributes: •
User Label: _EVC_.
•
Type: Point to Point.
•
Traffic type: Unicast.
•
Directionality: Bidir.
•
Service Level: Gold.
•
Provisioning State: Defined.
•
Working State: Normal.
A correlation with the Service is created. Then, the EVC is allocated and then, implemented (Provisioning State set to Implemented). At the end, the tree area and the EVC List are updated.
.................................................................................................................................................................................................................................... 1350 OMS 18-24 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Service Setup
....................................................................................................................................................................................................................................
Ethernet Segment states
Two Ethernet Segments are created into the 1350 OMS PKT with the following attributes: • • •
User Label: _ESG_A_Z_ and
_ESG__Z_A_. Subnetwork: NE Subnetwork. Provisioning State: Defined.
•
Working State: Normal.
•
Traffic type: Unicast.
•
Policy Mode: Color Blind.
•
Color Profile: "No associated Color Profile".
Final settings
If the Transport Link is chosen by the user (case NE are not E/FE/GE), that Transport Link is used as a constraint. If the Transport Link is not chosen by the user, the Transport Link must be derived by one of the two ports. Then, the retrieved Transport Link is used as constraint. A correlation with the EVC is created. Then, the two Ethernet Segments are allocated and then, implemented Provisioning State set to Implemented). At the end, the tree area and the Ethernet Segment List are updated. A correlation with the default Traffic Descriptor is created. Correlation is based on bandwidth parameter. At the end, the Service State of the Ethernet service is set to 'In Service'. Recovery consideration in case of error
In case of error, no global rollback is provided. The execution is immediately stopped at the last useful step (and a message is returned to the user to describe the occurred problem. The function can be split in term of other sub functions (create Service, create EVC, ….) and consider each sub function as atomic. so when a sub function fails, the operation fails but for all previous sub functions and no rollback is possible. In case of any negative result, the user has two possibilities: • •
Continue manually supplying all missing operations proceeding step by step. Invoke a manual deletion of the partially built tree starting from the Ethernet Service.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. .................................................................................................................................................................................................................................... 1350 OMS 18-25 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Service Setup
....................................................................................................................................................................................................................................
Conditions
To get a positive result: •
No more service is related to the customer to be deleted.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Create Ethernet Service. Result: The wizard EVPL/EPTL/EPL/Extended EVPL Automatic Setup is shown. Figure 18-2 EVPL/EPTL/EPL/Extended EVPL service creation wizard
...................................................................................................................................................................................................
2
In the panel insert: •
Enter a Service User label.
•
Choose the Customer by using the sensitive help (this field is automatically filled if this window is required from the Customer List). Select the Service Type (EPTL, EVPL, EPL, or Extended EVPL). If you insert EVPL or Extended EVPL Service Type. Refer to: “Task for EVPL or Extended EVPL” (p. 18-28).
•
.................................................................................................................................................................................................................................... 1350 OMS 18-26 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Service Setup
....................................................................................................................................................................................................................................
• • • •
Select a NAD Value from the list. Enter the Reference SLA (a string) (optional). The Class of Service is Guaranteed. Enter a Comment (optional).
•
Click Next. Result: The wizard goes to the next step.
...................................................................................................................................................................................................
3
Fill the following fields: •
Select Resources section (by using the sensitive help and menu).
•
Select a NE or ENE for the "A" end by using sensitive help.
•
Select an Edge Port A by using sensitive help.
.................................................................................................................................................................................................................................... 1350 OMS 18-27 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Service Setup
....................................................................................................................................................................................................................................
• • • • • •
Select a NE or ENE for the "Z" end by using sensitive help. Select an Edge Port Z by using sensitive help. Select if free Transport Link (by checking the box). Select the Transport Link (by using the sensitive help; in the case of E/FE/GE NE, the Transport Link is automatically determined by the 1350 OMS PKT). Click Next. On the next panel click the Finish button. Result: The wizard creates and configure at once: Service, EVC, and Ethernet
Segment. E................................................................................................................................................................................................... N D O F S T E P S
Task for EVPL or Extended EVPL ...................................................................................................................................................................................................
1
If you insert EVPL or Extended EVPL Service Type, the following panel is displayed: •
Enter a Service User label.
• • •
Choose the Customer by using the sensitive help (this field is automatically filled if this window is required from the Customer List). Select the Service Type (EVPL, Extended EVPL). Enter the Reference SLA (a string) (optional).
•
Enter a Comment (optional).
•
In the Traffic Descriptor tab: The Traffic Descriptor can be selected from the already created list, or checking the box Create, insert the Traffic Descriptor characteristics: – Class of Service: Guaranteed, Regulated, Best Effort. –
•
•
CIR, PIR, CES, PBS values.
In the Traffic Classifier tab: The Traffic Classifier can be selected from the already created list, or checking the box Create, insert the Traffic Classifier characteristics: –
Vlan Id.
–
Priority Id.
–
Priority Max.
–
Vlan Max.
Click Next. Result: The wizard goes to the next step.
...................................................................................................................................................................................................
2
Fill Resources section (by using the sensitive help and menu): this panel has the same layout as the EPLINE Service panel. On the panel click the Finish button.
.................................................................................................................................................................................................................................... 1350 OMS 18-28 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Service Setup
....................................................................................................................................................................................................................................
Result: The wizard creates and configure at once: Service, EVC, and Ethernet Segment. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-29 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Modify a Service
....................................................................................................................................................................................................................................
Modify a Service When to use
The function modifies Service characteristics. Related Information
For more information about Services, refer to “Ethernet Service description” (p. 18-17). The service modification gives the possibility to modify one or all the following parameters: •
Service User Label.
• •
Service Type (only if no EVCs are currently associated to the Ethernet service).
•
Comment.
Reference SLA.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
No operation is pending on the Ethernet service. If modified, the new User Label must be different from the existing ones.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Services. ...................................................................................................................................................................................................
2
On the Service List Window, select the Service to modify. Click the right mouse button and select Modify on the popup menu. ...................................................................................................................................................................................................
3
The Modify Service window is displayed. To modify an Ethernet service: •
Enter a new User Label (optional).
•
Modify the Service Type (optional).
.................................................................................................................................................................................................................................... 1350 OMS 18-30 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Modify a Service
....................................................................................................................................................................................................................................
• •
Modify the Reference SLA (optional). Modify the Comment (optional).
...................................................................................................................................................................................................
4
Click Ok. Result: The service is modified.
If the Service User Label is modified, after confirmation of the modification: the tree area (in customer section) and the Service List are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-31 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Delete a Service
....................................................................................................................................................................................................................................
Delete a Service When to use
This function consists in deleting an Ethernet service from the 1350 OMS PKT supervision. Related Information
For more information about Services, refer to “Ethernet Service description” (p. 18-17). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
No more EVC related to the Service to be deleted.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Services. ...................................................................................................................................................................................................
2
On the Service List Window, select the service to delete. Select Action > Service > Delete from the Action menu. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The service is deleted.
After confirmation, the services are removed. The Service List is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-32 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Get details of the Service
....................................................................................................................................................................................................................................
Get details of the Service When to use
This function gets information about an Ethernet service. Related Information
For more information about Services, refer to “Ethernet Service description” (p. 18-17). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Services. ...................................................................................................................................................................................................
2
On the Service List Window, select a Service. Select Properties from the popup menu activated using the mouse right button.
.................................................................................................................................................................................................................................... 1350 OMS 18-33 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Get details of the Service
....................................................................................................................................................................................................................................
Result: The Properties window is displayed.
See the following topic in this document: “Details of a Service” (p. 18-35) Figure 18-3 Ethernet Service Properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-34 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Details of a Service
....................................................................................................................................................................................................................................
Details of a Service Attributes of a Service
The attributes displayed for each service are: •
Id
• •
User Label.
•
Customer User Label.
•
Service Type (EPL, EVPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI, Broadcast, BTV).
•
Reference SLA
•
Comment
•
Action Type
•
Action Date
• •
Working State (Normal, Configuring, Removing).
•
Availability Status (Normal, Degraded, In Failure, Not Meaningful).
•
ETS ID label
•
ETS LABEL label
Customer Id label User Label.
Service State (Not in service, In service, Upgrading).
.................................................................................................................................................................................................................................... 1350 OMS 18-35 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Services
Display the Services of a Customer
....................................................................................................................................................................................................................................
Display the Services of a Customer When to use
The function lists all the Ethernet services belonging to a Customer. Related Information
The list can be required in different manners: • • •
If the list is required from Main Menu, all the Ethernet Services are displayed. If the list is required from the Customer List, only the Ethernet services associated to the selected customer are displayed. If the list is required from Ethernet Transport Link List, only the Ethernet services associated to the selected Ethernet Transport Links are displayed.
For more information about Services, refer to “Ethernet Service description” (p. 18-17). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Service. Result: The list window is displayed.
See the following topic in this document: “Description of the list of Services” (p. 18-21) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-36 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Overview about ETS Ethernet Virtual Connections
....................................................................................................................................................................................................................................
Managing ETS Ethernet Virtual Connections (EVC) Overview about ETS Ethernet Virtual Connections EVC description
The Ethernet Virtual Connection (EVC) specifies the connectivity among two or more Ethernet Edge Terminations (UNIs). If they belong to the same Metro Ethernet Network, the association of Ethernet Edge Termination is implicitly specified, too. The following main rules govern the EVC: The EVC is common to Connection Oriented and Connection Less management • • •
a frame sent in the EVC can be delivered to one or more egress EVC Termination (Ethernet Edge Termination). a frame sent in the EVC cannot be delivered back to the ingress EVC Termination. a frame sent in the EVC cannot be delivered to another EVC.
Every EVC is terminated by Edge Ports. The same Edge Port can be used by different EVCs. EVC topologies
The EVC can be used in different topologies and can have different properties. In particular, the EVC can be: • •
•
Point-to-point (PtoP): It connects exactly two points (that is, two Ethernet Edge Ports). It can be unidirectional or bidirectional. It supports only Unicast traffic. Rooted-multipoint (RMP): A multipoint EVC in which each UNI is designated as either a Root or a Leaf. Ingress Service Frames at a Root UNI can be delivered to one or more of any of the other UNIs in the EVC. Ingress Service Frames at a Leaf UNI can only be delivered to one or more Root UNIs in the EVC. Multipoint-to-multipoint (MPtoMP): It connects two or more points. It can be unidirectional or bidirectional. It supports only traffic Unicast.
The Role of Edge Port
Depending on the EVC topology, every Edge Port used by a given EVC assumes a specific Role. • • •
In PtoP topology, the two ports assume the "both" role (that is, root + leaf). In PtoMP topology, one port assumes the "root" role while all the others assume the "leaf" role. In MPtoMP topology, all ports assume the "both" role (that is, root + leaf).
.................................................................................................................................................................................................................................... 1350 OMS 18-37 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Overview about ETS Ethernet Virtual Connections
....................................................................................................................................................................................................................................
The following figure summarizes the role assumed by Edge Port for different EVCs. Figure 18-4 EVCs and Edge Ports relationships
.................................................................................................................................................................................................................................... 1350 OMS 18-38 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Resource Reservation for Private Services
....................................................................................................................................................................................................................................
Resource Reservation for Private Services Overview
When the user defines a new Service Type, an important aspect is to define the expected usage of physical resources. In particular, the management of Resource Sharing attribute introduced at EVC level. This parameter defines the global policy, in terms of privacy/sharing of UNI (Edge Ports) and Transport Links. To manage the issue related to Shared or Dedicated Transport Link usage, the Resource Sharing attribute at EVC Level can assume following values. •
Full: the EVC Service under definition can use every resource without any restriction.
•
Private UNI: the EVC Service under definition must use Private UNI, that is UNI
• •
uniquely used by that EVC Service. Private Link: The EVC Service under definition must use Private Links, that is Transport Links uniquely used by that EVC Service. Private UNI and LINK: The EVC Service under definition must use Private UNI and Private Links, that is chosen Transport Links and UNIs are uniquely used by that EVC Service.
Resource Sharing
The following table reports the possible choices of Resource Sharing respect to Service Type and respect to crossed technological domain. Service Type.
Resource Sharing. Full.
Private UNI.
Private Link.
Private UNI and Link.
UNKNOWN. EVPL.
ETS. Provider Bridge.
EPTL.
ETS.
EPL.
ETS. Provider Bridge.
EVPLAN.
Extended EVPL.
Extended EVPLAN.
ETS.
ETS.
Provider Bridge.
Provider Bridge.
ETS.
ETS.
ETS.
ETS.
Provider Bridge.
Provider Bridge.
Provider Bridge.
Provider Bridge.
ETS.
ETS.
ETS.
ETS.
Provider Bridge.
Provider Bridge.
Provider Bridge.
Provider Bridge.
.................................................................................................................................................................................................................................... 1350 OMS 18-39 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Resource Reservation for Private Services
....................................................................................................................................................................................................................................
Service Type. HSI.
Resource Sharing. ETS. Provider Bridge.
BTV.
ETS. Provider Bridge.
BROADCAST.
ETS.
ETS.
Connection Oriented Service Type relations Table 18-1
Connection Oriented Service Type relations
Service Type.
Type.
Traffic Type.
Resource Sharing.
EVPL.
Point-to-Point.
Unicast.
Full.
EPTL.
Point-to-Point.
Unicast.
Private UNI and Link.
EPL.
Point-to-Point.
Unicast.
Private UNI.
EVPLAN.
Any-to-Any.
Unicast.
Full. Private UNI. Private UNI and Link. 1
Extended EVPL.
Point-to-Point.
Unicast.
.
Full. Private UNI. Private UNI and Link. 1
Extended EVPLAN.
Any-to-Any.
Unicast.
Full.
Rooted Multipoint.
Multicast.
Private UNI.
1
HSI.
Private UNI and Link.
.
Rooted Multipoint.
1
Unicast.
Rooted Multipoint.
Rooted Multipoint.
Full.
.
Unicast.
Full.
Multicast. 1
Broadcast.
.
Multicast. 1
BTV.
.
.
Unicast.
Full. Private UNI. Private UNI and Link. 1
.
.................................................................................................................................................................................................................................... 1350 OMS 18-40 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Resource Reservation for Private Services
....................................................................................................................................................................................................................................
Notes:
1.
This case allows a selection of the parameters.
Frame delivery
Frame delivery types are the following: •
•
•
Unicast Service Frame Delivery: MAC ACL configuration on Edge Ports can
influence the behavior. It verifies if the MAC ACL can be used to filter all unicast address. For Connection Oriented EVCs transporting Unicast frames, the default value is assumed always equal to Deliver Unconditionally. For Connection Less EVCs, the default value is Deliver Conditionally (depending on filtering set on UNI). The default value is modifiable and it does not affect real traffic due to the fact that MAC ACL is not known to 1350 OMS PKT. The MAC ACL is managed through Navigation, The full compliancy is in the user hands. Multicast Service Frame Delivery: MAC ACL configuration on Edge Ports can influence the behavior. It must be verified if the MAC ACL can be used to filter all multicast address. For Connection Oriented EVCs transporting Multicast Frames, the default value is assumed always equal to Deliver Unconditionally. For Connection Less EVCs or when IGMP is used, the default value is Deliver Conditionally (depending on filtering set on UNI). The MAC ACL is managed through Navigation. The full compliancy is in the user hands. Broadcast Service Frame Delivery: MAC ACL configuration on Edge Ports can influence the behavior. It must be verified if the MAC ACL can be used to filter all broadcast address. For Connection Oriented EVCs, the default value is assumed always equal to Deliver Unconditionally. For Connection Less EVCs, the default value is Conditional (depending on filtering set on UNI). The MAC ACL is managed through Navigation. The full compliancy is in the user hands.
C-VLAN and CoS Preservation
C-VLAN and CoS Preservation: •
C-VLAN Preservation ensures that each packet exiting the EVC has the same VLAN
Id information that it had when it entered the EVC. The following relation is respected: VLAN Id Egress UNI = VLAN IdIngress UNI. C-VLAN Preservation attribute must be defined at EVC definition and is modifiable
before EVC allocation. •
C-VLAN CoS Preservation ensures that each packet exiting the EVC has the same Priority Bits information that it had when it entered the EVC.
The following relation is respected: Priority Bit at ingress = Priority Bit at egress .
.................................................................................................................................................................................................................................... 1350 OMS 18-41 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Display the list of Connection Oriented EVC
....................................................................................................................................................................................................................................
Display the list of Connection Oriented EVC When to use
The Ethernet Virtual Connection List window presents all the EVCs and their attributes. Related Information
This list can be required also from the Ethernet Service List, from the Ethernet Segment List, or from the Ethernet Transport Link List. In These cases, only the EVCs associated to the selected object are displayed. For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select ConnectionOriented > ETS EVCs. Result: The list window is displayed.
See the following topic in this document: “Description of the list of EVCs” (p. 18-43) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-42 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Description of the list of EVCs
....................................................................................................................................................................................................................................
Description of the list of EVCs Attributes of a EVC
The attributes displayed for each EVC are: •
User Label.
•
Ethernet Service User Label.
•
Type (Point to point, Routed multi-point, Any to any).
•
Traffic Type (Unicast, Multicast).
•
Working State (Normal, Configuring, Allocating, De-allocating, Implementing,
•
De-implementing, Commissioning, De-commissioning, Termination adding, Termination removing, Constraint adding, Constraint removing, removing). Provisioning State (Defined, Partially allocated, Allocated, Partially implemented, Implemented, Commissioned). Service State (Not in Service, In Service).
• •
Availability Status (Normal, Degraded, In Failure, Not Meaningful).
.................................................................................................................................................................................................................................... 1350 OMS 18-43 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Create a Connection Oriented EVC
....................................................................................................................................................................................................................................
Create a Connection Oriented EVC When to use
This function allows creating a Connection Oriented Ethernet Virtual Connection. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). If the EVC Creation window is required from the Service List, the Ethernet Service field is filled with the selected value. When no Ethernet Service reference is supplied a dummy service is created. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The User Label must be not in use. Only one Root termination is authorized.
•
The EVC Type must be compatible with the service type of the associated Ethernet Service. The EVC Type must be compatible with the selected Traffic Type. The role of each EVC termination must be compatible with the EVC Type.
• • Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > ConnectionOriented > Create EVC. Result: The EVC Creation window is displayed. ...................................................................................................................................................................................................
2
On the General Panel insert following data: •
Enter an EVC User Label.
•
Insert the Ethernet Service.
.................................................................................................................................................................................................................................... 1350 OMS 18-44 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Create a Connection Oriented EVC
....................................................................................................................................................................................................................................
•
Two different choices are possible: – Choose an already created Ethernet Service selecting it from the available list. The list is displayed clicking in the field. If this window is required from the Service List, this field is automatically filled. – Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI, BTV, Broadcast). The parameters: Type, Traffic Type, and Resource Sharing are assigned according to the chosen Service Type as indicated in: Table 18-1, “Connection Oriented Service Type relations ” (p. 18-40). Execute the following steps: – Select a Service Level (Premium, Gold, Silver, Bronze). –
Resource Sharing: (Full, Private UNI, Private Link, Private UNI and LINK).
See: “Overview” (p. 18-39). •
C-VLAN Preservation: check it to keep the VLAN Id through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)). •
C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)). •
Enter a NAD value for the EVC.
•
Enter a Comment (optional).
•
Enter an External Mark (optional). It can be used to identify external systems having relations with the EVC (for example an ownership).
...................................................................................................................................................................................................
3
On the Detail Panel. Set the Frame Delivery: •
•
Select the Frame Delivery parameters (see “Frame delivery” (p. 18-41)) –
Unicast Service Frame Delivery.
–
Multicast Service Frame Delivery.
– Broadcast Service Frame Delivery. Select the standard Vlan Type (8100).
...................................................................................................................................................................................................
4
On PM Panel. Select the following parameters • • •
Under PM: select True if the Performance Monitoring is applied on the EVC, if true is selected the following parameters are activated. Granularity: select the required type of granularity (15 min, 1 h, 24 h, Not Meaningful). Report Output Type: select the desired output type (No Report, CSV Delta, CSV Raw, Performance Counter Tabular, Performance Counter Graphical, Delta Counter Tabular, Delta Counter Graphical, Not Meaningful).
.................................................................................................................................................................................................................................... 1350 OMS 18-45 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Create a Connection Oriented EVC
....................................................................................................................................................................................................................................
•
Report Output Frequency: select the desired frequency for the output report (15 min, 1 h, 24 h, 1 Week, 1 Month, 1 Year, Not Meaningful).
•
Report Output Name: type a significant name for the output report.
•
Policy: select the policy for the output report management (Keep, Purge on Stop, Purge on Delete, Not Meaningful).
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-46 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Modify an ETS EVC
....................................................................................................................................................................................................................................
Modify an ETS EVC When to use
The function modifies EVC characteristics. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). The EVC modification function allow the user to modify: • • • •
EVC User Label. C-VLAN Preservation (Yes/No). C-VLAN CoS Preservation (Yes/No). NAD Value.
• •
Comment. External Mark.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
If the User Label is modified, the new User Label must be different from other already used by another EVC.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. ...................................................................................................................................................................................................
2
Select the EVC to modify in the list. ...................................................................................................................................................................................................
3
Click the right mouse button and select from the popup menu Modify.
.................................................................................................................................................................................................................................... 1350 OMS 18-47 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Modify an ETS EVC
....................................................................................................................................................................................................................................
Result: The EVC modification window is displayed. Figure 18-5 EVC Modification window
...................................................................................................................................................................................................
4
On the modification window to modify an EVC. Following parameters can be modified: •
Enter a new User Label (optional).
•
C-VLAN Preservation: check it to keep the VLAN Id through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)). •
C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)). •
Modify the NAD Value.
•
Modify the Comment (optional).
•
Modify the External Mark (optional).
Then, the EVC list, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-48 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Delete an ETS EVC
....................................................................................................................................................................................................................................
Delete an ETS EVC When to use
This function allows deleting an ETS EVC from the 1350 OMS PKT supervision. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • • •
The provisioning state of the EVC must be defined. No operation is pending on the EVC. No Ethernet Segment is referring the EVC.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. ...................................................................................................................................................................................................
2
Select the element to delete in the list. ...................................................................................................................................................................................................
3
Click the right mouse button and select from the popup menu Action from ETS EVC > Delete. Result: A confirmation box is displayed. ...................................................................................................................................................................................................
4
Confirm the deletion operation. After confirmation: • • •
the 1350 OMS PKT checks that no Ethernet Segment is referring the EVCs. the EVCs are dissociated from the related service (if no more EVC are associated to the service, the service is also removed). the EVCs are removed.
.................................................................................................................................................................................................................................... 1350 OMS 18-49 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Delete an ETS EVC
....................................................................................................................................................................................................................................
The EVC list, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-50 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Get the EVC properties
....................................................................................................................................................................................................................................
Get the EVC properties When to use
This function gets information about an Ethernet Virtual Connection. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. ...................................................................................................................................................................................................
2
Select an element in the list. ...................................................................................................................................................................................................
3
Click the right mouse button and select from the popup menu Properties.
.................................................................................................................................................................................................................................... 1350 OMS 18-51 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Get the EVC properties
....................................................................................................................................................................................................................................
Result: The EVC properties window is displayed.
See the following topic in this document: “Details of a EVC” (p. 18-53) Figure 18-6 EVC Properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-52 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Details of a EVC
....................................................................................................................................................................................................................................
Details of a EVC Attributes of an EVC
The attributes displayed for each EVC are: •
Id.
•
User Label.
•
Service Id Label.
•
Ethernet Service User Label.
•
Type (Point to point, Routed multi-point, Any to any).
•
Traffic Type (Unicast, Multicast).
•
Directionality.
•
Service Level.
• •
Comment.
•
Action Type.
•
Action Date.
•
Working State (Normal, Configuring, Allocating, De-allocating, Implementing, De-implementing, Commissioning, De-commissioning, Termination adding, Termination removing, Constraint adding, Constraint removing, removing).
•
Provisioning State (Defined, Partially allocated, Allocated, Partially implemented, Implemented, Commissioned).
•
Service State (Not in Service, In Service).
•
Availability Status (Normal, Degraded, In Failure, Not Meaningful).
•
ETS Id Label.
•
ETS LABEL label.
•
Vlan Type.
•
Resource sharing.
• •
Domain Id.
•
VLAN distribution.
•
S-VLAN Id.
External Mark.
Domain.
.................................................................................................................................................................................................................................... 1350 OMS 18-53 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Allocate ETS EVC
....................................................................................................................................................................................................................................
Allocate ETS EVC When to use
This function allocates a Connection Oriented EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. Result: The ETS EVC list is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > ETS EVC > Allocate. Result: The confirmation box is displayed. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The EVC is allocated.
The EVC list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-54 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Deallocate ETS EVC
....................................................................................................................................................................................................................................
Deallocate ETS EVC When to use
This function deallocates a Connection Oriented EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. Result: The ETS EVC list is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > ETS EVC > Deallocate. Result: The confirmation window is displayed. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The EVC is deallocated.
The EVC list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-55 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Implement ETS EVC
....................................................................................................................................................................................................................................
Implement ETS EVC When to use
This function implements a Connection Oriented EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. Result: The ETS EVC list is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > ETS EVC > Implement. Result: The confirmation box is displayed. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The EVC is Implemented.
The EVC list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-56 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Deimplement ETS EVC
....................................................................................................................................................................................................................................
Deimplement ETS EVC When to use
This function deimplements a Connection Oriented EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. Result: The ETS EVC list is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > ETS EVC > Deimplement. Result: The confirmation window is displayed. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The EVC is deallocated.
The EVC list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-57 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Commission ETS EVC
....................................................................................................................................................................................................................................
Commission ETS EVC When to use
This function commissions a Connection Oriented EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. Result: The ETS EVC list is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > ETS EVC > Commission. Result: The confirmation box is displayed. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The EVC is commissioned.
The EVC list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-58 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Decommission ETS EVC
....................................................................................................................................................................................................................................
Decommission ETS EVC When to use
This function decommissions a Connection Oriented EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. Result: The ETS EVC list is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > ETS EVC > Decommission. Result: The confirmation window is displayed. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The EVC is decommissioned.
The EVC list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-59 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
List the EVC terminations
....................................................................................................................................................................................................................................
List the EVC terminations When to use
The EVC Termination List window presents all the terminations of the selected EVC and their attributes. Related Information
If this list is required from the Ethernet Service List or from the EVC List, only the EVC terminations associated to the selected item are displayed. For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. ...................................................................................................................................................................................................
2
Select the EVC to modify in the list. ...................................................................................................................................................................................................
3
Select Search > Inventory from ETS EVC > List EVC Terminations. Result: The list of the EVC terminations is displayed.
See the following topic in this document: “Description of the list of terminations” (p. 18-61) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-60 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Description of the list of terminations
....................................................................................................................................................................................................................................
Description of the list of terminations Attributes of a termination
The attributes displayed for each EVC termination are: •
EVC Termination User Label.
•
Rate.
•
Network Element.
•
EVC User Label.
•
Role (Root, Leaf, Both).
•
Usage State.
•
Ethernet Service.
•
VLAN Type.
.................................................................................................................................................................................................................................... 1350 OMS 18-61 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Delete an EVC Termination
....................................................................................................................................................................................................................................
Delete an EVC Termination When to use
This function allows deleting an ETS EVC termination from the 1350 OMS PKT supervision. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The specified EVC termination is not used as Ethernet Segment extremity. No operation is pending on the selected EVC termination.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. ...................................................................................................................................................................................................
2
Select the element to delete in the list. ...................................................................................................................................................................................................
3
Click the right mouse button and select from the popup menu Action from ETS EVC Termination > Delete. Result: A confirmation box is displayed. ...................................................................................................................................................................................................
4
Confirm the deletion operation. After confirmation: • •
the EVC terminations are dissociated from the related EVC. the EVC terminations are removed.
The EVC Termination list is updated. E................................................................................................................................................................................................... N D O F S T E P S .................................................................................................................................................................................................................................... 1350 OMS 18-62 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Get the EVC termination properties
....................................................................................................................................................................................................................................
Get the EVC termination properties When to use
This function shows all the termination attributes. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. ...................................................................................................................................................................................................
2
Select the EVC in the list. ...................................................................................................................................................................................................
3
Follow the menu path Search > Inventory from ETS EVC > List EVC Terminations. ...................................................................................................................................................................................................
4
Select the termination in the list. ...................................................................................................................................................................................................
5
Click the right mouse button and select from the popup menu Properties.
.................................................................................................................................................................................................................................... 1350 OMS 18-63 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Get the EVC termination properties
....................................................................................................................................................................................................................................
Result: The properties window is displayed.
See the following topic in this document: “Details of a Termination” (p. 18-65) Figure 18-7 EVC Termination Properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-64 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Details of a Termination
....................................................................................................................................................................................................................................
Details of a Termination Attributes of a Termination
The attributes displayed for each EVC termination are: •
EVC Termination User Label.
•
Rate.
•
Network Element.
•
EVC User Label.
•
Role (Root, Leaf, Both).
•
Usage State.
•
Ethernet Service.
•
VLAN Type.
.................................................................................................................................................................................................................................... 1350 OMS 18-65 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Add an EVC termination
....................................................................................................................................................................................................................................
Add an EVC termination When to use
This function add a termination to an EVC. Related Information
In case of Connection Oriented EVCs, the bandwidth profiles defined for each EVC termination have to be intended in the following way: • •
It represents the bandwidth profile for the traffic at "ingress" of that UNI (Profile is immediately checked). It must be reflected to the corresponding Ethernet Segments (that is to the Ethernet Segment starting from that UNI).
The affects along the Ethernet Segment route is evaluated at Ethernet Segment allocation. This function consists in adding a new termination to an existing EVC. For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • • • •
No operation is pending on the selected EVC. The EVC provisioning state must be set to Defined. EVC Termination Role must be congruent with the EVC topology. Only one termination can have "Root" role.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. ...................................................................................................................................................................................................
2
Select the EVC in the list. ...................................................................................................................................................................................................
3
Follow the menu path Action > ETS EVC > Add Connection Oriented EVC Termination.
.................................................................................................................................................................................................................................... 1350 OMS 18-66 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Add an EVC termination
....................................................................................................................................................................................................................................
Result: The add termination window is displayed. Figure 18-8 Add EVC Termination window
...................................................................................................................................................................................................
4
To add a termination: •
Select a NE or ENE by using sensitive help.
•
Select an Edge Port by using sensitive help.
•
Select the termination Role (Root, Leaf, Both).
...................................................................................................................................................................................................
5
Click Ok button. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-67 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
EVC Fault Localization
....................................................................................................................................................................................................................................
EVC Fault Localization When to use
This function displays the localization of the fault present for the selected EVC. Related Information
This function is active when EVC or Ethernet Segment associated are implemented. For more information about EVC, refer to “EVC description” (p. 18-37). For details about Fault Localization, see: “Fault Localization” (p. 11-69). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs. ...................................................................................................................................................................................................
2
Select the EVC and issue Search > Fault Localization. Result: The list window is displayed.
See the following topic in this document: “Description of the list of Fault Localization” (p. 18-69) The list is not refreshed automatically, click Actualize button to refresh it. ...................................................................................................................................................................................................
3
Selecting an item in the Fault Localization list, using the popup menu the user visualize the alarm list of the selected item. Select one EVC in the list and click Search > External Navigation to > AS . Result: The Fault Management window is displayed with selected EVC alarm list.
See the following topic in this document: “Description of the list of Alarms” (p. 18-70) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-68 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Description of the list of Fault Localization
....................................................................................................................................................................................................................................
Description of the list of Fault Localization Attributes of a Fault Localization
The Fault Localization window displays: •
The User Label of the alarmed entity.
•
The Entity Type of the alarmed entity.
•
The Network Element (if any) of the alarmed entity.
•
The Alarm Status.
•
The Event Date.
•
The Operator Label (if any). Note: The list is not refreshed automatically, click Actualize button to refresh it.
.................................................................................................................................................................................................................................... 1350 OMS 18-69 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Description of the list of Alarms
....................................................................................................................................................................................................................................
Description of the list of Alarms Attributes of an Alarm
The alarm list window displays: •
The Perceived Severity.
•
The Event Date & Time.
•
The Friendly Name.
•
The Alarm Type.
•
The Probable Cause.
.................................................................................................................................................................................................................................... 1350 OMS 18-70 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Start PM on an EVC
....................................................................................................................................................................................................................................
Start PM on an EVC When to use
This function starts Performance Monitoring (PM) on a Connection Oriented EVC or Connection Less EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). For more information about PM, refer to “Quality of service: PM management ” (p. 11-69). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Service menu is shown. ...................................................................................................................................................................................................
2
Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge EVCs. Result: The EVC list is displayed. ...................................................................................................................................................................................................
3
Select the EVC in the list and follow the path Action > EVC > Start PM. Result: The PM is started on the EVC. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-71 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Stop PM on an EVC
....................................................................................................................................................................................................................................
Stop PM on an EVC When to use
This function Stops Performance Monitoring (PM) on a Connection Oriented EVC or Connection Less EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). For more information about PM, refer to “Quality of service: PM management ” (p. 11-69). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Service menu is shown. ...................................................................................................................................................................................................
2
Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge EVCs. Result: The EVC list is displayed. ...................................................................................................................................................................................................
3
Select the EVC in the list and follow the path Action > EVC > Stop PM. Result: The PM is Stopped on the EVC. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-72 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Synchronize PM on an EVC
....................................................................................................................................................................................................................................
Synchronize PM on an EVC When to use
This function Synchronizes Performance Monitoring (PM) on a Connection Oriented EVC or Connection Less EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). For more information about PM, refer to “Quality of service: PM management ” (p. 11-69). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Service menu is shown. ...................................................................................................................................................................................................
2
Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge EVCs. Result: The EVC list is displayed. ...................................................................................................................................................................................................
3
Select the EVC in the list and follow the path Action > EVC > Synchronize PM. Result: The PM is Synchronized on the EVC. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-73 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
Show PM on an EVC
....................................................................................................................................................................................................................................
Show PM on an EVC When to use
This function Shows Performance Monitoring (PM) on a Connection Oriented EVC or Connection Less EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). For more information about PM, refer to “Quality of service: PM management ” (p. 11-69). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Service menu is shown. ...................................................................................................................................................................................................
2
Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge EVCs. Result: The EVC list is displayed. ...................................................................................................................................................................................................
3
Select the EVC in the list and follow the path Search > EVC > Show > PM. Result: The PM related to the EVC is shown. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-74 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing ETS Ethernet Virtual Connections (EVC)
View the Routing Display on an EVC
....................................................................................................................................................................................................................................
View the Routing Display on an EVC When to use
This function starts Routing Display on a Connection Oriented EVC or Connection Less EVC. Related Information
For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Service menu is shown. ...................................................................................................................................................................................................
2
Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge EVCs. Result: The EVC list is displayed. ...................................................................................................................................................................................................
3
Select the EVC in the list and follow the path Search > EVC > Routing Display. Result: The Routing Display is started on the EVC. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-75 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about E2E Ethernet Virtual Connections Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Managing End-to-End Ethernet Virtual Connections (E2E EVC) Overview about E2E Ethernet Virtual Connections Introduction to End to End EVC connection
The following two modalities can be used in creating an End to End EVC connection: • •
bottom-up. This modality requires the separate creation of the EVCs within their domains, then the user will join the different EVCs. top-down. This modality is completely automatic. The user creates the full EVC over different domains and all relevant commands are forwarded to the subordinate network.
Managing Extended Ethernet Virtual Connection
Ethernet Virtual Connections (EVC) span over only one domain, ETB or ETS, at a time. It is possible to create an End-To-End EVC (E2E EVC), crossing one ETB domain and one ETS domain, which are connected by Inter-Domain-Links. E2E EVC Categories
The categories of E2E EVCs are: •
“Full E2E EVC ” (p. 18-76)
•
“Raw E2E EVC ” (p. 18-76)
Full E2E EVC
Full E2E EVC is a E2E EVC that is created in the top-down way, it is defined by end points and other EVC parameters, and the fragment EVCs are created then accordingly. Full E2E EVC must be consistent, its fragment EVCs must match each other and the E2E EVC itself. If, for any reason, the consistency is not kept, it becomes a raw E2E EVC. Raw E2E EVC
Raw E2E EVC is an E2E EVC that is created in the bottom-up way, there are fragment EVCs, which are joined to create the raw E2E EVC. It is used mainly in the Takeover, having in the network already existing groups of EVCs, which can be joined into E2E EVCs. Raw E2E EVC does not have to be consistent with its fragment EVCs. Raw E2E EVC can be created also from a full E2E EVC, which is not consistent any more. If a raw E2E EVC reaches a level of full consistency, it can become a full E2E EVC.
.................................................................................................................................................................................................................................... 1350 OMS 18-76 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about E2E Ethernet Virtual Connections Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
EVC Prevented Actions
When an EVC is a part of a Full E2E EVC, any direct modification of its attributes may affect the E2E EVC it belongs to, and also other fragment EVCs that belong to the same E2E EVC. Therefore only the EVC attributes User Label, Comment and External Mark can be modified. The EVC cannot be deleted. In order to do any of these actions, directly to the EVC, the parent E2E EVC must be changed to be a Raw E2E EVC, and then all the actions are allowed.
.................................................................................................................................................................................................................................... 1350 OMS 18-77 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Display the list of E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Display the list of E2E EVC When to use
The Ethernet Virtual Connection List window presents all the EVCs and their attributes. Related Information
This list can be required also from the Ethernet Service List, from the Ethernet Segment List, or from the Ethernet Transport Link List. In These cases, only the EVCs associated to the selected object are displayed. For more information about EVC, refer to “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select E2E EVCs. Result: The list window is displayed.
See the following topic in this document: “Description of the list of EVCs” (p. 18-79) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-78 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of EVCs Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Description of the list of EVCs Attributes of an EVC
The attributes displayed for each EVC are: •
User Label.
•
Ethernet Service User Label.
•
Type (Point to point, Routed multi-point, Any to any).
•
Traffic Type (Unicast, Multicast).
•
Working State (Normal, Configuring, Allocating, De-allocating, Implementing, De-implementing, Commissioning, De-commissioning, Termination adding, Termination removing, Constraint adding, Constraint removing, Removing).
•
Provisioning State (Defined, Partially allocated, Allocated, Partially implemented, Implemented, Commissioned).
•
Service State (Not in Service, In Service).
•
Availability Status (Normal, Degraded, In Failure, Not Meaningful).
.................................................................................................................................................................................................................................... 1350 OMS 18-79 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Create an E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Create an E2E EVC When to use
This function create an Ethernet Virtual Connection in an end to end way. Related Information
Related information can be found in “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Create E2E EVC. Result: The Create E2E EVC window is displayed. ...................................................................................................................................................................................................
2
Select the General panel. Fill the following data: •
Enter an EVC User Label.
•
Set the Service associated to the EVC: To set the service the user can do one of the following steps: – Choose an existing Ethernet Service by using the sensitive help. If this window is required from the Service List, this field is automatically filled. – Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI, BTV, Broadcast). According to the choice, Type, Traffic Type, and Resource Sharing are assigned as indicated in Table 18-1, “Connection Oriented Service Type relations ” (p. 18-40).
• • •
Select a Type (Point to Point, Routed Multipoint, Any to Any (also called Multipoint to multipoint)). if allowed. Select a Traffic Type (Unicast, Multicast), the selection of the parameter depends on the selected type. Select a Resource Sharing (Full, Private UNI, Private Link, Private UNI and LINK). See “Overview” (p. 18-39).
•
Select a Domain Label by using the sensitive help.
.................................................................................................................................................................................................................................... 1350 OMS 18-80 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Create an E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) .................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
Select the Detail panel. Fill the following data: •
Enter Vlan Distribution (Full mesh, Not full mesh).
•
Enter a Vlan Bundle in the range of the local Vlan.
•
Enter s-Vlan Id the range of the VLAN over SDH path, an equal value can go on the same domain. Select the Standard Vlan Type (8100). Select the Frame Delivery parameters (see “Frame delivery” (p. 18-41))
• •
–
Unicast Service Frame Delivery.
– –
Multicast Service Frame Delivery. Broadcast Service Frame Delivery.
•
Select the standard Vlan Type (8100).
•
Define IGMP Snooping State (Not Meaningful, Enabled, Disabled). This option is enabled only for EVPLAN, Extended EVPLAN and BTV EVC types and can optionally be defined. The possible values are: –
Enabled: to remind that the IGMP snooping protocol is not used on top of the created EVC: enable the IGMP snooping immediately after having implemented the EVC. disable the IGMP snooping immediately before de-implemented the EVC.
–
Disabled: to remind that the IGMP snooping protocol is not used on the created EVC.
...................................................................................................................................................................................................
4
Select the Layer-2 Control Protocol panel. Fill the following data: •
To set all the fields in the form with the same value at once: Select Put entire set to and choose one of the following values: –
Default: all the set is put to Tunnel.
–
Not Meaningful: all the set is put to Not Meaningful.
–
Free: every value can be different.
•
Set the Data Frames.
•
Set the Customer BPDU.
•
Set the Provider BPDU.
•
Set the Slow Protocols.
•
Set the 802.1X PAE.
•
Set the Provider GVRP.
•
Set the Bridge Management.
.................................................................................................................................................................................................................................... 1350 OMS 18-81 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Create an E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
• •
Set the Customer GMRP. Set the Customer GVRP. User chooses which control Protocol must be tunneled or discarded. The configuration is propagated to all EVC terminations to ensure that all EVC terminations use the same Tunneling criteria. A check is needed also toward Layer-2 Control Protocol Processing defined at UNI level. This check allows a congruent management of Control protocols crossing the EVC. The single L2 protocol can have different values. User can select a value for each protocol between Tunnel, Not Meaningful and Discard.
...................................................................................................................................................................................................
5
Select the PM panel. Fill the following data: •
Select Under PM (True, False).
•
Choose the Granularity.
•
Choose the Report Output Type.
•
Choose the Report Output Frequency.
•
Set the Report Output Name.
•
Choose the Policy.
...................................................................................................................................................................................................
6
Select the Miscellaneous panel. Fill the following data: •
Select a Service Level (Premium, Gold, Silver, Bronze).
•
C-VLAN Preservation: check it to keep the VLAN Id through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)). •
C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)). •
NAD: select a NAD value from the list.
•
Enter an External Mark (optional). It can be used to identify external systems having relations with the EVC (for example an ownership). Enter Comment (optional).
•
...................................................................................................................................................................................................
7
Click Next to set the EVC terminations. ...................................................................................................................................................................................................
8
Click Next to define the EVC. ...................................................................................................................................................................................................
9
Click Ok.
.................................................................................................................................................................................................................................... 1350 OMS 18-82 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Create an E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Result: A check is performed. If the check succeeded, the EVC is created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-83 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Create a full E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Create a full E2E EVC When to use
This function consists in creating a full end to end Ethernet Virtual Connection. Related Information
Related information can be found in “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Create Full E2E EVC. Result: The E2E EVC Full Creation window is displayed. ...................................................................................................................................................................................................
2
Select the General panel. Fill the following data: •
Enter an EVC User Label.
•
Set the Service Type associated to the EVC: To set the service the user can do one of the following steps: – Choose an existing Ethernet Service by using the sensitive help. If this window is required from the Service List, this field is automatically filled. – Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI, BTV, Broadcast). According to the choice, Type, Traffic Type, and Resource Sharing are assigned as indicated in Table 18-1, “Connection Oriented Service Type relations ” (p. 18-40).
• • • •
Select a Type (Point to Point, Routed Multipoint, Any to Any (also called Multipoint to multipoint)). if allowed. Select a Traffic Type (Unicast, Multicast), the selection of the parameter depends on the selected type. Select a Service Level (Premium, Gold, Silver, Bronze). Select a Resource Sharing (Full, Private UNI, Private Link, Private UNI and LINK). See “Overview” (p. 18-39).
.................................................................................................................................................................................................................................... 1350 OMS 18-84 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Create a full E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
•
Select a C-VLAN Preservation to keep the VLAN Id through the EVC. (see: “C-VLAN and CoS Preservation” (p. 18-41)).
•
Select a C-VLAN CoS Preservation to keep the Priority Bits through the EVC. (see: “C-VLAN and CoS Preservation” (p. 18-41)).
•
Select a NAD value from the list.
•
Enter an External Mark (optional). It can be used to identify external systems having relations with the EVC (for example an ownership). Enter Comment (optional).
•
...................................................................................................................................................................................................
3
Select the Detail panel. Fill the following data: •
Enter the Directionality (Unidirectional, Bidirectional).
•
Define the IGMP Snooping State (Not Meaningful, Enabled, Disabled).
•
Select the Standard Vlan Type (8100).
•
Enter a value for the VLAN Bundle or a range for the parameter.
...................................................................................................................................................................................................
4
Select the Termination panel. Fill the following data: •
Select the Domain Label by using the sensitive help.
• • •
Select the NE or the ENE user label by using the sensitive help. (The NEs belonging to the selected domain are listed). Select an Edge Port user label by using the sensitive help. Select the Role of the termination (Root, Leaf, Both).
•
Enter a list of EVC terminations by using Add EVC Termination button.
...................................................................................................................................................................................................
5
Click Ok. Result: A check is performed. If the check succeeded, the EVC is created. The tree area and the EVC List are updated.
The EVC is created with the following states: Provisioning State set to Defined, Working State set to Normal. A correlation with the Service is created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-85 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Create a raw E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Create a raw E2E EVC When to use
This function consists in creating a raw end to end Ethernet Virtual Connection. Related Information
Related information can be found in “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Create Raw E2E EVC. Result: The E2E EVC Raw Creation window is displayed. ...................................................................................................................................................................................................
2
Fill the following data: •
Enter the EVC User Label.
•
Enter Comment (optional).
•
Enter an External Mark (optional). It can be used to identify external systems having relations with the EVC (for example an ownership). Enter a list of EVC terminations by using Add EVC Termination button. The EVC can be Connection Oriented or Connection Less. To remove an EVC from the list, use the Remove EVC button.
•
...................................................................................................................................................................................................
3
Click Ok. Result: A check is performed. If the check succeeded, the EVC is created. The tree
area and the EVC List are updated. The EVC is created with the following states: Provisioning State set to Defined, Working State set to Normal. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-86 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a full E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Modify a full E2E EVC When to use
The function allows the user to modify EVC characteristics. Related Information
Related information can be found in “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
If the User Label is modified, the new User Label must be different from other already used by another EVC.
Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > E2E EVCs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select the EVC to modify in the list. ...................................................................................................................................................................................................
3
Click the right mouse button and select from the popup menu Modify. Result: The EVC modification window is displayed. ...................................................................................................................................................................................................
4
To modify an EVC, modify one or more of the following items: •
Modify the EVC User Label.
• • •
Modify the C-VLAN Preservation. Modify the C-VLAN CoS Preservation. Modify the NAD Value.
• •
Modify the Comment. Modify the External Mark.
.................................................................................................................................................................................................................................... 1350 OMS 18-87 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a full E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) .................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Click Ok. Result: The EVC list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-88 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Join E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Join E2E EVC When to use
This function joins two or more Ethernet Virtual Connections. Related Information
Related Information can be found in “EVC description” (p. 18-37). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the Multi Service GUI Main view, follow the path Action > Packet > Services > Join E2E EVC. Result: The Join E2E EVC window is displayed. ...................................................................................................................................................................................................
2
To join two or more EVCs: •
Enter a User Label.
•
Enter the Comment (optional).
•
Enter the External Mark (optional).
•
Select the EVCs to be joined. Select an EVC domain (Connection Oriented, Connection Less, T-MPLS, eOMS) –
Click the EVC List icon to list all the EVCs defined into the domain.
– –
Select the one or more EVCs in the list. Click the confirmation icon.
Note: The EVCs can be added to or removed from the list by the icons under EVC List menu. Note: Repeat this step for all the needed EVC. Result: Selected EVCs are listed in the Join E2E EVC window. ...................................................................................................................................................................................................
3
Click Ok.
.................................................................................................................................................................................................................................... 1350 OMS 18-89 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Join E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Result: A check is performed. If the check succeeded, the join is accomplished. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-90 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing an E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) ....................................................................................................................................................................................................................................
Managing an E2E EVC When to use
The scope of this procedure is to create an End to End EVC connection. With reference to the below schema. Figure 18-9 Network schema for E2E connection
Related Information
This task does not have any related information. Before you begin
This task does not have any preconditions. Task ...................................................................................................................................................................................................
1
Create LoC between NE-B and NE-C ...................................................................................................................................................................................................
2
Assign port B1 to Domain ETS ...................................................................................................................................................................................................
3
Assign port C1 to Domain T-MPLS ...................................................................................................................................................................................................
4
After the assignment of port B1 to Domain ETS and port C1 to Domain T-MPLS, • the Loc between NE-B and NE-C becomes IWI (it was generic) • ports B1 and port C1 become UNI (Edge port in their domains)
.................................................................................................................................................................................................................................... 1350 OMS 18-91 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing an E2E EVC Managing End-to-End Ethernet Virtual Connections (E2E EVC) .................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Assign port B2 to Domain ETS ...................................................................................................................................................................................................
6
Create EVC ETS (from B1 to B2) ...................................................................................................................................................................................................
7
Create EVC T-MPLS (from C1 to C2) ...................................................................................................................................................................................................
8
From the main bar select Actions>Packet>Service>Join E2E EVC ...................................................................................................................................................................................................
9
Select domain C.O. Select EVC Select domain T-MPLS Select EVC Click on OK to confirm. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-92 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Structure for EVC over SDH
....................................................................................................................................................................................................................................
EVC over SDH Structure for EVC over SDH When to use
The scope of this procedure is Related Information
This task does not have any related information. Before you begin
All needed conditions are detailed along the procedure. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > Construction > Transport Links > Links over TDM(Sdh/Sonet) Figure 18-10 Search>Packet>Construction>Transport Links>Links over TDM(Sdh/Sonet)
...................................................................................................................................................................................................
2
The list of Links over TDM(Sdh/Sonet) is displayed.
.................................................................................................................................................................................................................................... 1350 OMS 18-93 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Structure for EVC over SDH
....................................................................................................................................................................................................................................
This list contains an Ethernet path, created on SDH, which will be used Figure 18-11 Links over TDM(Sdh/Sonet)
...................................................................................................................................................................................................
3
From the bar select Search>Packet>Construction>Network Elements>Defined NEs Figure 18-12 Search>Packet>Construction>Network Elements>Defined NEs
...................................................................................................................................................................................................
4
The list of the Defined NEs is displayed.
.................................................................................................................................................................................................................................... 1350 OMS 18-94 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Structure for EVC over SDH
....................................................................................................................................................................................................................................
Select the relevant NE and issue Search > Ethernet Physical Ports Figure 18-13 Defined NE:Search>Ethernet Physical Ports
...................................................................................................................................................................................................
5
Select the Ethernet port and issue Actions > Assign Resource to Domain Figure 18-14 Port:Actions>Assign Resource to Domain
.................................................................................................................................................................................................................................... 1350 OMS 18-95 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Structure for EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
6
Click on button Domains. From the domain list select the ETS Domain and click on V. Figure 18-15 ETS Domain selection
.................................................................................................................................................................................................................................... 1350 OMS 18-96 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Structure for EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
7
Click on OK to assign the port to ETS domain. Figure 18-16 Assign port to ETS domain
...................................................................................................................................................................................................
8
Execute the assignment for the far end port on TSS-B. (Port:Actions>Assign Resource to Domain) ...................................................................................................................................................................................................
9
From the main menu bar select Search>Packet>Construction>Transport Links>Links over TDM(Sdh/Sonet)
.................................................................................................................................................................................................................................... 1350 OMS 18-97 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Structure for EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
10
Select the relevant Link over TDM (path) and issue Actions>Assign Resources to Domain Figure 18-17 Link over TDM (path): Actions>Assign Resources to Domain
...................................................................................................................................................................................................
11
Select ETS domain. Figure 18-18 Select ETS domain
.................................................................................................................................................................................................................................... 1350 OMS 18-98 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Structure for EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
12
Click on OK to confirm the assignment. Figure 18-19 Confirm the assignment
...................................................................................................................................................................................................
13
From the bar select Search>Packet>Services>Connection Oriented>ETS Transport Link
.................................................................................................................................................................................................................................... 1350 OMS 18-99 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Structure for EVC over SDH
....................................................................................................................................................................................................................................
The path, when assigned, is now an ETS Transport Link Figure 18-20 Search>Packet>Services>Connection Oriented>ETS Transport Link
...................................................................................................................................................................................................
14
Since we do not find the path in the list of ETS Transport Links, this is due to the fact that we forgive to commission the path. Figure 18-21 Path commissioning
.................................................................................................................................................................................................................................... 1350 OMS 18-100 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Structure for EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
15
After path commissioning the path is included in the Links over TDM list. Figure 18-22 Path included in the Links over TDM
...................................................................................................................................................................................................
16
And in the Transport Links, accordingly. Figure 18-23 Transport Links
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-101 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Assign ports to domain
....................................................................................................................................................................................................................................
Assign ports to domain When to use
The scope of this procedure is to assign ports to domain Related Information
This task does not have any related information. Before you begin
This task does not have any preconditions. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > Construction > Network Elements > Defined NEs ...................................................................................................................................................................................................
2
Select a Defined Network Element from the list and using the right mouse button, select from the popup menu, Search > Ethernet Physical Ports
.................................................................................................................................................................................................................................... 1350 OMS 18-102 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Assign ports to domain
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
Port: Assign resources to Domain Figure 18-24 Port: Assign resources to Domain
.................................................................................................................................................................................................................................... 1350 OMS 18-103 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Assign ports to domain
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Assign resources to Domain. Click on Apply. Figure 18-25 Assign resources to Domain
.................................................................................................................................................................................................................................... 1350 OMS 18-104 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Assign ports to domain
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
From the main menu bar select Search > Packet > Services > T-MPLS > T-MPLS Edge Ports. Figure 18-26 Search>Packet>Services>T-MPLS>T-MPLS Edge Ports
...................................................................................................................................................................................................
6
The list of the edge ports is displayed. Figure 18-27 UNI ports became edge ports
...................................................................................................................................................................................................
7
Assign the other UNI port. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-105 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
EVC over SDH When to use
The scope of this procedure is to Create EVC over SDH. Related Information
This task does not have any related information. Before you begin
All needed coditions are detailed along the procedure. Task ...................................................................................................................................................................................................
1
From the main bar select Actions > Packet > Services > Connection Oriented(ETS) > Create EVC. Figure 18-28 Actions>Packet>Services>Connection Oriented(ETS)>Create EVC
...................................................................................................................................................................................................
2
Complete following data on the Create EVC window : • name • service type=EVPL • ethernet service:automatically selected • select the domain: ETS • type=point to point automatically selected
.................................................................................................................................................................................................................................... 1350 OMS 18-106 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
• traffic type=unicast • resource sharing=unicast Select the NE Select the Edge Port Figure 18-29 EVC over SDH: EVC definition
.................................................................................................................................................................................................................................... 1350 OMS 18-107 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
Select the far end edge port. Click on Next. Figure 18-30 Far end edge port selection
...................................................................................................................................................................................................
4
Select the traffic descriptor to associate.
.................................................................................................................................................................................................................................... 1350 OMS 18-108 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
Click on Apply Figure 18-31 Ethernet Segments definition
.................................................................................................................................................................................................................................... 1350 OMS 18-109 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
From the main menu bar select Search > Packet > Services > Connection Oriented(ETS) Figure 18-32 Search>Packet>Services>Connection Oriented(ETS)
...................................................................................................................................................................................................
6
The ETS EVC is created as defined. Figure 18-33 ETS EVCs
.................................................................................................................................................................................................................................... 1350 OMS 18-110 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
7
Select the ETS EVC and issue Search > Ethernet Segments. Figure 18-34 ETS EVC: Search>Ethernet Segments
...................................................................................................................................................................................................
8
The list of the Ethernet segments is shown below. Figure 18-35 Ethernet segment list
.................................................................................................................................................................................................................................... 1350 OMS 18-111 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
9
You may select an Ethernet Segment from the list and using the right mouse button, select from the popup menu Actions > Add Constraints to an Ethernet Service Figure 18-36 Actions>Add Constraints to an Ethernet Service
...................................................................................................................................................................................................
10
Select as constraint the transport link
.................................................................................................................................................................................................................................... 1350 OMS 18-112 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
Click on Apply. Figure 18-37 Add Constraints to an Ethernet Service
.................................................................................................................................................................................................................................... 1350 OMS 18-113 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
11
Select the Ethernet Segment in the list and using the right mouse button follow the path Actions > Associate Traffic Classifier Figure 18-38 Segment:Actions>Associate to Traffic Classifier
...................................................................................................................................................................................................
12
From the list select the Traffic Classifier. Figure 18-39 Traffic Classifier list
.................................................................................................................................................................................................................................... 1350 OMS 18-114 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
13
Click on Apply to launch the association. Figure 18-40 Associate Traffic Classifier
.................................................................................................................................................................................................................................... 1350 OMS 18-115 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
14
Allocate the segment. Figure 18-41 Allocate the segment
...................................................................................................................................................................................................
15
Implement the segment. Figure 18-42 Implement the segment
.................................................................................................................................................................................................................................... 1350 OMS 18-116 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
16
Allocate and implement the other segment. Figure 18-43 Both segments are implemented
Result: The EVC-ETS is implemented Figure 18-44 EVC-ETS implemented
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-117 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Alarms EVC T-MPLS
....................................................................................................................................................................................................................................
Alarms EVC T-MPLS When to use
The scope of this procedure is to detect a fault condition on a T-MPLS EVC. Related Information
This task does not have any related information. Before you begin
This task does not have any preconditions. Task ...................................................................................................................................................................................................
1
From the T-MPLS EVC list attribute Availability is marked In Failure. Figure 18-45 T-MPLS EVC list: Availability
.................................................................................................................................................................................................................................... 1350 OMS 18-118 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Alarms EVC T-MPLS
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
From the T-MPLS EVC issue Search>Fault Localization Figure 18-46 EVC: Search>Fault Localization
...................................................................................................................................................................................................
3
The Transport Section is In Failure. Figure 18-47 Navigation to Transport Section
.................................................................................................................................................................................................................................... 1350 OMS 18-119 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
Alarms EVC T-MPLS
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
You can navigate to Link over Cable Figure 18-48 Navigate to Link over Cable
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-120 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover
Overview about Full EVC Takeover procedure
....................................................................................................................................................................................................................................
Full EVC Takeover Overview about Full EVC Takeover procedure Overview about Takeover procedure
Takeover manages the profile configuration in the network. It manages profile creation on domain basis. The creation affects PKT database only.
.................................................................................................................................................................................................................................... 1350 OMS 18-121 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover
Full EVC Takeover Procedure
....................................................................................................................................................................................................................................
Full EVC Takeover Procedure When to use
When the PKT is deployed in a network where Network Elements and Ethernet Connectivity (network wide) are already in place, then the need to take in charge such Ethernet Connectivity is a must for PKT Network Manager. Related information
The Full EVC Takeover Online procedure is applicable to all kind of Connection Oriented, Connection Less and T-MPLS based EVCs and covers all managed topologies. 1. Connection Oriented EVC: The Takeover is applied at Ethernet Segment Level. The Takeover is applied on all Ethernet Segments types, unicast and multicast : the EVC which contains them are automatically updated; 2. Connection Less EVC: The Takeover is applied directly to the desired EVC. The Takeover is done on all EVC types 3. Connection T-MPLS EVC: The Takeover is applied directly to the desired EVC. The Takeover is done on all EVC types Note: The usage of the Offline Takeover procedure forces the shutdown and the subsequent restart of PKT processes in order to let the Takeover Procedure work. Using this procedure, there is no need to shutdown the services. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. Procedure
Following steps should be done to execute correctly the Takeover with online command: From MS-GUI main window: ...................................................................................................................................................................................................
1
Create one or more domains that corresponds to the scenario already acting in field : from the Construction application Select Action > Packet > Costruction > Create Domain.
.................................................................................................................................................................................................................................... 1350 OMS 18-122 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover
Full EVC Takeover Procedure
....................................................................................................................................................................................................................................
Insert the User Label, Domain Type, Bridge Type and STP Type compliant with the attributes already present. Figure 18-49 Create Domain
Result: The list Domain window is shown with new Domain. ...................................................................................................................................................................................................
2
Define the Network Elements to the PKT environment : from the Construction application. Select Action > Packet > Costruction > Define NE.
.................................................................................................................................................................................................................................... 1350 OMS 18-123 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover
Full EVC Takeover Procedure
....................................................................................................................................................................................................................................
Insert the User Label, Working Mode and STP Type compliant with the attributes already present. Figure 18-50 Define NE
Select the Network Elements to be added from the list, click the confirm button. The Defined Network Element List updated. When the NEs are added, assign the resources already present or create them. Select Action > Packet > Costruction > Assign Resources to Domain. Result: The list Network Element window is shown with new NE. ...................................................................................................................................................................................................
3
If the Customer is not yet created, create it now, repeat the same operation for Traffic Description and Traffic Classifier Select Action > Packet > Services> Create Customer.
.................................................................................................................................................................................................................................... 1350 OMS 18-124 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover
Full EVC Takeover Procedure
....................................................................................................................................................................................................................................
Select Action > Packet > Services> Create Traffic Descriptor. Select Action > Packet > Services> Create Traffic Classifier. Insert the information compliant with the attributes already present. Result: The Customer list is shown with new elements. ...................................................................................................................................................................................................
4
Create one or more EVC (with the Service in automatic mode) that corresponds to the scenario already acting in field : Select Action > Packet > Services > (ETS,ETB and T-MPLS)> Create EVC. Insert the parameters compliant with the attributes already present. Important! Define one or more allocated services that should Takeover, the service must have exactly the same characteristics as the service to Takeover. Figure 18-51 Create EVC
Important! End the operation in the state of allocated EVC. Note: If the EVCs are T-MPLS, to do the Discovery of the Tunnel and Pseudo-Wire.
.................................................................................................................................................................................................................................... 1350 OMS 18-125 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover
Full EVC Takeover Procedure
....................................................................................................................................................................................................................................
Result: The list EVC window is shown with new EVC. ...................................................................................................................................................................................................
5
Perform the Audit and Reservation on all interested Network Elements : select the interested NEs and from the main menu Select Action > Packet > Audit Align Reservation> Start AAR procedure. Insert the information compliant with the attributes already present. ...................................................................................................................................................................................................
6
Perform the Audit and Reservation on all interested Network Elements : from the NEs for Auditlist select the interested NEs and start NE Audit. Select all interested NEs:Search > Packet > Audit Align Reservation> NEs for Audit>Start NE Audit. Insert the information compliant with the attributes already present. Perform the same operation for Reservation. ...................................................................................................................................................................................................
7
Perform the Align Up procedure for the Takeover on the involved ports.
.................................................................................................................................................................................................................................... 1350 OMS 18-126 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover
Full EVC Takeover Procedure
....................................................................................................................................................................................................................................
Select Action > Packet > Audit Align Reservation> Service Align Up. Figure 18-52 Align Up window
Insert the information compliant with the attributes already present. Note: Execute the Align Up procedure maintaining the Audit window from the Construction application open. ...................................................................................................................................................................................................
8
Stop Audit, Align and Reservation procedure. Select Action > Packet > Audit Align Reservation> Stop AAR procedure. ...................................................................................................................................................................................................
9
The Ethernet Segments involved or the EVCs in case of connection less connection should be in Allocated state.
.................................................................................................................................................................................................................................... 1350 OMS 18-127 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover
Full EVC Takeover Procedure
....................................................................................................................................................................................................................................
Start the Takeover procedure: Select Action > Packet > Services> Takeover>Enable Takeover. Figure 18-53 Enable Takeover
Result: The full Takeover online procedure runs on the allocated services created in
the previous steps. ...................................................................................................................................................................................................
10
Implement the Ethernet Segments or EVCs to complete the Takeover procedure: From the Ethernet Management application. ...................................................................................................................................................................................................
11
Verify that the Takeover is successfully done, the service should be now in Implemented state. Note: Verify that the Takeover is successfully done, the service should be now in Implemented state. ...................................................................................................................................................................................................
12
Stop the Takeover procedure:
.................................................................................................................................................................................................................................... 1350 OMS 18-128 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover
Full EVC Takeover Procedure
....................................................................................................................................................................................................................................
Select Action > Packet > Services> Takeover>Disable Takeover. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-129 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management T-MPLS Takeover
T-MPLS Takeover description
....................................................................................................................................................................................................................................
T-MPLS Takeover T-MPLS Takeover description T-MPLS Takeover Key features:
T-MPLS Takeover procedure is aimed to discover existing T-MPLS infrastructure (i.e. tunnels and pseudo-wires) from the network, and import it into PKT database. physical connectivity must be described Circuit correctness checks – only tunnel/PWs defined coherently in all the NE’s involved are uploaded (e.g., two terminations must be found; traffic descriptor parameters must be equal along the circuit; T-MPLS in-labels must match the out-labels, etc). Takeover of 1+1 protected tunnels Takeover of 1+1 APS Protections Groups defined in the NE’s when tunnels are already in PKT database. Takeover of T-MPLS profiles (Traffic Descriptor, PHB, L2-encapsulation). Takeover of all tunnels/PWs OR only tunnels/PWs terminating in a node. Description of main steps
Define via NPR the physical/logical connectivity supporting T-MPLS, i.e., ethernet physical-connections or SDH paths. This will result in the definition of links-over-cable / links-over-SDH in PKT. Assign via PKT these links to T-MPLS domain. This will result in the definition of T-MPLS nodes and sections inside PKT database. Start Takeover operation from T-MPLS domain OR, if only a small part of the network is involved, from one of the T-MPLS nodes (in this latter case, choice is left to operator whether to discover all circuits or only those terminating in the node). This will result (if the circuit were defined correctly in the network) in the tunnels/PWs objects (in implemented state) inside PKT database. Check in the lists that tunnels/PWs have been uploaded
.................................................................................................................................................................................................................................... 1350 OMS 18-130 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management T-MPLS Takeover
Takeover procedure for T-MPLS
....................................................................................................................................................................................................................................
Takeover procedure for T-MPLS When to use
The procedure permit to take in charge Network Elements and Connectivity when the PKT is deployed in a network where (network wide) such connectivity is already in place. Related information
For more information refer to: “T-MPLS Takeover description” (p. 18-130) For general procedure description, refer to: “Description of main steps” (p. 18-130) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. Conditions
The topology of the network must be already defined. Task for T-MPLS
From MS-GUI main window: ...................................................................................................................................................................................................
1
Create a T-MPLS Domain. Select Action > Packet > Construction > Create Domain. For details refer to the procedure “Create a Domain” (p. 13-20). Result: The T-MPLS domain is created. ...................................................................................................................................................................................................
2
Select Search > Packet > Construction > Link Over Cable. Assign Links Over Cable to T-MPLS domain. For details refer to the procedure “Assign a Link Over Cable to a Domain” (p. 14-60). Result: The selected Links Over Cable are assigned to T-MPLS domain ...................................................................................................................................................................................................
3
Execute the T-MPLS PW Takeover: Select Search > Packet > T-MPLS > T-MPLS domain.. Select the T-MPLS domain. Select Action > T-MPLS > Takeover All Note: In a large network the Takeover from the domain requires a long time to execute. The user can start the Takeover only from involved nodes.
.................................................................................................................................................................................................................................... 1350 OMS 18-131 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management T-MPLS Takeover
Takeover procedure for T-MPLS
....................................................................................................................................................................................................................................
Result: T-MPLS Tunnels and PseudoWires are discovered and created in the PKT
DB. To check the object creation, refer to the procedure “View the list of T-MPLS tunnels” (p. 16-99). To check the object creation, refer to the procedure “View the list of Pseudo Wires” (p. 16-51). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-132 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Color Profiles
Overview about Color Profiles
....................................................................................................................................................................................................................................
Managing Color Profiles Overview about Color Profiles Color Profile description
The Color Profile allows the user to define a priority in accepting or rejecting incoming frames (Red/Yellow/Green). This rule applies when Traffic Descriptor is Regulated and Policy Control is not Color Blind.
.................................................................................................................................................................................................................................... 1350 OMS 18-133 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Color Profiles
Display the Color Profile list
....................................................................................................................................................................................................................................
Display the Color Profile list When to use
The Color Profile List window presents all the Color Profiles and their attributes. Related Information
If this list is required from the Ethernet Segment List, only the Color Profiles associated to the selected Ethernet Segment are displayed. For more information, refer to “Overview about Color Profiles” (p. 18-133). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Color Profile. Result: The list window is displayed.
The attributes displayed for each Color Profile are: • User Label. • Color Profile Mode (Priority, DSCP). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-134 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Color Profiles
Create a Color Profile
....................................................................................................................................................................................................................................
Create a Color Profile When to use
This function consists in defining a Color Profile used to describe the flow of Ethernet frames over an Ethernet Segment. Related Information
For more information, refer to “Overview about Color Profiles” (p. 18-133). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The maximum number of Color Profiles must not be reached.
•
The User Label must be different as one which exists.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Create Color Profile. ...................................................................................................................................................................................................
2
On the Create Color Profile Window, the following data must be entered. To create a customer: •
Enter a User Label.
•
Select the Color Profile Mode (Priority, DSCP).
•
If Priority Mode is selected, Priority Tab must be set up.
•
If DSCP Mode is selected, Code Point 1 to Code Point 4 Tabs must be set up, selecting a color (Green, Yellow, or Red).
...................................................................................................................................................................................................
3
Click Ok button. Result: The Color Profile is created.
The Color Profile list is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-135 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Color Profiles
Modify a Color Profile
....................................................................................................................................................................................................................................
Modify a Color Profile When to use
The function modifies Color Profile characteristics. Related Information
For more information, refer to “Overview about Color Profiles” (p. 18-133). The Color Profile modification gives the possibility to modify one or all the following parameters: • •
Color Profile User Label,. Color of each priority.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
If the User Label is modified, the new User Label must be different as one which is already used by another Color Profile.
•
The Color Profile must not be associated to any Ethernet Segment or could be associated to Ethernet Segments in Defined provisioning state.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Color Profiles. ...................................................................................................................................................................................................
2
On the Color Profile List, select the Color Profile to modify. Select with the right mouse button the path Action from Color Profile > Color Profile Modification.
.................................................................................................................................................................................................................................... 1350 OMS 18-136 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Color Profiles
Modify a Color Profile
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
The Modify Color Profile window is displayed. Figure 18-54 Color Profile Modification window
To modify a Color Profile: •
Enter a new User Label (optional).
•
If Priority Mode is selected, Priority Tab must be set up.
•
If DSCP Mode is selected, Code Point 1 to Code Point 4 Tabs must be set up, selecting a color (Green, Yellow, or Red).
...................................................................................................................................................................................................
4
Click Ok button.
.................................................................................................................................................................................................................................... 1350 OMS 18-137 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Color Profiles
Modify a Color Profile
....................................................................................................................................................................................................................................
Result: The Color Profile is modified.
The Color Profile list is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-138 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Color Profiles
Delete a Color Profile
....................................................................................................................................................................................................................................
Delete a Color Profile When to use
This function consists in deleting a Color Profile from the supervision. Related Information
For more information, refer to “Overview about Color Profiles” (p. 18-133). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Color Profile must not be associated to any Ethernet Segment or could be associated to Ethernet Segments in Defined provisioning state.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Color Profiles. ...................................................................................................................................................................................................
2
On the Color Profile List Window, select the Color Profile to delete. Select with the right mouse button from the popup menu Action from Color Profile > Delete. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The Color Profile is deleted.
After confirmation, the Color Profiles are removed and the Color Profile List is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-139 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Color Profiles
Get the Color Profile Properties
....................................................................................................................................................................................................................................
Get the Color Profile Properties When to use
This function gets information about a Color Profile. Related Information
For more information, refer to “Overview about Color Profiles” (p. 18-133). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Color Profiles. ...................................................................................................................................................................................................
2
On the Color Profile List Window, select a Color. Select with the right mouse button from the popup menu Properties. ...................................................................................................................................................................................................
3
The Properties window is displayed. The attributes displayed for each Color Profile are: •
Id
•
User Label.
.................................................................................................................................................................................................................................... 1350 OMS 18-140 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Color Profiles
Get the Color Profile Properties
....................................................................................................................................................................................................................................
• •
Priority 0… Priority 7. Color Profile Mode (Priority, DSCP).
Figure 18-55 Color Profile Properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-141 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management
Overview about Traffic Descriptor
....................................................................................................................................................................................................................................
Managing Traffic Descriptors Overview about Traffic Descriptor Traffic Descriptor description
The Traffic Descriptors describes the characteristics of an Ethernet Segment in term of Class of Service (CoS) and bandwidth. Another step toward the MEF alignment is provided by possibility to display bandwidth parameters following both IETF definitions (as already available) and MEF definitions. For reminder, the following definitions are applicable for IETF: CIR, PIR, PBS, CBS while the following one are applicable for MEF: CIR, EIR, CBS, EBS. The existing relationships are described as in the following: • •
EIR = PIR – CIR . EBS = PBS – CBS .
Three Traffic Descriptors are created by default during the 1350 OMS PKT installation. Class of services dependencies Table 18-2
Class of services and traffic parameters dependencies Class of Service.
Traffic Descriptor parameters.
CIR.
Best Effort.
Guaranteed.
Regulated.
0.
(CIR = PIR) & (CIR > 0).
(CIR = 0). if (CIR > 0), (CBS > 0). if (CIR = 0), (CBS=0).
PIR.
> 0.
(PIR = CIR) & (PIR > 0).
(PIR > = CIR) & (PIR > 0).
CBS.
0.
(CBS = PBS) & (CBS > 0).
(CBS > = 0) & (CBS 0), (CIR > 0). if (CBS = 0), (CIR=0).
PBS.
> 0.
(PBS = CBS) & (PBS > 0).
(PBS > 0) & (PBS > =CBS).
.................................................................................................................................................................................................................................... 1350 OMS 18-142 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Overview about Traffic Descriptor
....................................................................................................................................................................................................................................
Table 18-3
ISA boards and Ethernet traffic parameters dependencies ISA ES1 / ES4.
ISA PR EA / ISA ES16.
Minimum.
Maximum.
Minimum.
Maximum.
CIR.
0 or 8.
Up to PIR.
0 or 64.
Up to PIR.
PIR.
8.
Up to ELR.
64.
Up to ELR.
CBS.
0.
16384.
0.
Min (16384, 500/3*CIR).
PBS.
> 0.
16384.
> 0.
Min (65335, 500/3*PIR).
.................................................................................................................................................................................................................................... 1350 OMS 18-143 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Display the Traffic Descriptor list
....................................................................................................................................................................................................................................
Display the Traffic Descriptor list When to use
The Traffic Descriptor List window presents all the Traffic Descriptors and their attributes. Related Information
If this list is required from the Ethernet Segment List, only the Traffic Descriptors associated to the selected Ethernet Segment are displayed. For more information, refer to “Traffic Descriptor description” (p. 18-142). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Traffic Descriptors. Result: The list window is displayed.
See the following topic in this document: “Description of the list of Traffic Descriptors” (p. 18-145) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-144 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Description of the list of Traffic Descriptors
....................................................................................................................................................................................................................................
Description of the list of Traffic Descriptors Attributes of a Traffic Descriptor
The attributes displayed for each Traffic Descriptor are: •
User Label.
•
Class of Service (Guaranteed, Regulated, Best Effort, Guaranteed2, Regulated1, Regulated3, Regulated4, Background).
•
CIR (Committed Information Rate).
•
PIR (Peak Information Rate).
•
CBS (Committed Burst Size).
•
PBS (Peak Burst Size).
.................................................................................................................................................................................................................................... 1350 OMS 18-145 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Create a Traffic Descriptor
....................................................................................................................................................................................................................................
Create a Traffic Descriptor When to use
This function consists in defining a Traffic Descriptor. Related Information
Traffic Descriptor is used to describe the flow of the Ethernet frames over an Ethernet Segment. For more information, refer to “Traffic Descriptor description” (p. 18-142). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The maximum number of Traffic Descriptors must not be reached.
•
The traffic parameters of the Traffic Descriptor must be different from an existing ones Traffic Descriptor. The User Label must be different from the already used by other Traffic Descriptors.
• Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Traffic Descriptor Creation.
.................................................................................................................................................................................................................................... 1350 OMS 18-146 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Create a Traffic Descriptor
....................................................................................................................................................................................................................................
Result: The Creation window opens.
...................................................................................................................................................................................................
2
On the Create Traffic Descriptor Window, the following data must be entered. To create a Traffic Descriptor: •
Enter a User Label.
•
Select the Class of Service (Best Effort, Guaranteed, Regulated, Guaranteed2, Regulated1, Regulated3, Regulated4, Background). Enter a CIR value (set automatically to '0' if the selected Class of Service is 'Best Effort'). Enter a PIR value.
• • • •
Enter a CBS value (set automatically to '0' if the selected Class of Service is 'Best Effort'). Enter a PBS value (if the selected Class of Service is 'Guaranteed', PBS value is automatically set to CBS value - but could be modified).
.................................................................................................................................................................................................................................... 1350 OMS 18-147 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Create a Traffic Descriptor
....................................................................................................................................................................................................................................
See CIR/PIR/CBS/PBSdependencies in “Class of services dependencies” (p. 18-142). The relationship remains unchanged for the two Guaranteed as well as for the four Regulated. ...................................................................................................................................................................................................
3
Click Ok button. Result: After checking the coherence of the traffic parameters values, the Traffic Descriptor is created.
The Traffic Descriptor List is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-148 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Modify a Traffic Descriptor
....................................................................................................................................................................................................................................
Modify a Traffic Descriptor When to use
The function modifies Traffic Descriptor characteristics. Related Information
For more information, refer to “Traffic Descriptor description” (p. 18-142). The Traffic Descriptor modification gives the possibility to modify: • • •
Traffic Descriptor User Label. Class of Service. CIR, PIR, CBS and/or PBS.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
If the User Label is modified, the new User Label must be different from the one used by another Traffic Descriptor. The Traffic Descriptor must not be associated to any Ethernet Segment or could be associated to Ethernet Segments in Defined provisioning state.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Traffic Descriptors. ...................................................................................................................................................................................................
2
On the Traffic Descriptor List, select the Traffic Descriptor to modify. Select with the right mouse button the path Modify.
.................................................................................................................................................................................................................................... 1350 OMS 18-149 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Modify a Traffic Descriptor
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
The Modify Traffic Descriptor window is displayed. Figure 18-56 Traffic Descriptor Modification window
To modify a Traffic Descriptor: •
Enter a new User Label (optional).
• •
Modify the Class of Service (optional). Modify the ClR (optional).
•
Modify the PIR (optional).
•
Modify the CBS (optional).
•
Modify the PBS (optional).
...................................................................................................................................................................................................
4
Click Ok button.
.................................................................................................................................................................................................................................... 1350 OMS 18-150 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Modify a Traffic Descriptor
....................................................................................................................................................................................................................................
Result: After confirmation of the modification, 1350 OMS PKT checks the consistence of the traffic parameter values and then, the Traffic Descriptor list is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-151 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Delete a Traffic Descriptor
....................................................................................................................................................................................................................................
Delete a Traffic Descriptor When to use
This function consists in deleting a Traffic Descriptor. Related Information
For more information, refer to “Traffic Descriptor description” (p. 18-142). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Traffic Descriptor must not be associated to any Ethernet Segment or could be associated to Ethernet Segments in Defined provisioning state.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Traffic Descriptors. ...................................................................................................................................................................................................
2
On the traffic descriptor List Window, select the traffic descriptor to delete. Select with the right mouse button from the popup menu Action from Traffic Descriptor > Delete. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: After confirmation, the Traffic Descriptors are removed.
The Traffic Descriptor list is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-152 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Get the Traffic Descriptor Properties
....................................................................................................................................................................................................................................
Get the Traffic Descriptor Properties When to use
This function gets information about a Traffic Descriptor. Related Information
For more information, refer to “Traffic Descriptor description” (p. 18-142). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Traffic Descriptors. ...................................................................................................................................................................................................
2
On the Traffic Descriptor List Window, select a TD. Select with the right mouse button from the popup menu Properties. ...................................................................................................................................................................................................
3
The Properties window is displayed.
.................................................................................................................................................................................................................................... 1350 OMS 18-153 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Get the Traffic Descriptor Properties
....................................................................................................................................................................................................................................
See the following topic in this document: “Details of a Traffic Descriptor” (p. 18-155) Figure 18-57 Traffic Descriptor (Ethernet Management) Properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-154 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Descriptors
Details of a Traffic Descriptor
....................................................................................................................................................................................................................................
Details of a Traffic Descriptor Attributes of a Traffic Descriptor
The attributes displayed for each Traffic Descriptor are: •
Id
• •
User Label.
•
PIR (Peak Information Rate).
•
CBS (Committed Burst Size).
•
PBS (Peak Burst Size).
•
Class of Service (Guaranteed, Regulated, Best Effort, Guaranteed2, Regulated1, Regulated3, Regulated4, Background).
CIR (Committed Information Rate).
.................................................................................................................................................................................................................................... 1350 OMS 18-155 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Classifiers
Overview about Traffic Classifiers
....................................................................................................................................................................................................................................
Managing Traffic Classifiers Overview about Traffic Classifiers Traffic Classifier description
The 1350OMS-PKT realizes a flow classification. The 1350OMS-PKT is capable to distinguish different flows that are passing through the same port or transport link using a Traffic Classifier The Traffic Classifier describes the characteristics of an Ethernet frames on an Ethernet Segment. Ethernet frames can be either tagged or untagged. Three Traffic Classifiers are created by default during the 1350 OMS PKT installation. The classification can be done with one or more of the following criteria: • • •
Vlan Tag + Priority IP DSCP/TOS EtherType
When a VlanTag+Priority criteria is defined two flows are considered different if they have different (or different sets of) VLAN Ids and/or VLAN Priorities. A classification with IP DSCP/TOS criteria allows to identify distinct flows (at UNI/IWI) basing on IPv4 frame. The EthertType classification criteria is based on type/len field of Ethernet frame when it assumes the Type meaning. Each Ethernet Segment is characterized by a set of Traffic Classifiers that, in combination with classification mode (Priority/DSCP), univocally determine which frames belongs to it. Each Provider Bridge Ingress Flow is characterized by a set of Traffic Classifiers that, in combination with Classification Mode ("Priority"/"DSCP"), univocally determine which frames passes through it. See also “IP DSCP/TOS and EtherType” (p. 18-6) Classification criteria are not mutually excluded therefore some combinations of they are allowed Table 18-4 Vlan
Priority
Specific or Range
Specific or Range
Allowed combination of Traffic Classification criteria
DSCP
EtherType
Don'tCare Any value
Note Priority
Classification Type SPECIFIC VLAN CLASSIFIER SPECIFIC VLAN CLASSIFIER + ETHTYPE
.................................................................................................................................................................................................................................... 1350 OMS 18-156 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Classifiers
Overview about Traffic Classifiers
....................................................................................................................................................................................................................................
Table 18-4 Vlan Any value (except Don't care)
Priority
Allowed combination of Traffic Classification criteria
DSCP
Don'tCareSpecific or Range
EtherType IP (0x0800)
Note Dscp
(continued)
Classification Type UNTAGGED + SPECIFIC RANGE DSCP + IP SPECIFIC VLAN + SPECIFIC RANGE DSCP + ETHTYPE
Don'tCare Don'tCareSpecific or Range or NotIpPacket Untagged
Untagged
Any value (except Don't care)
Don'tCareNotIpPacket
Any value
Don'tCare Any value
Tagged
TAGGED + SPECIFIC RANGE DSCP TAGGED + NO IP TAGGED + NO IP + ETHTYPE
Untagged
UNTAGGED CLASSIFIER UNTAGGED CLASSIFIER + ETHTYPE
NotIpPacket
UNTAGGED + NO IP CLASSIFIER UNTAGGED + NO IP CLASSIFIER + ETHTYPE SPECIFIC VLAN + NO IP SPECIFIC VLAN + NO IP + ETHTYPE
Don'tCare Don'tCareDon'tCare Don'tCare Default (Don'tCare)
Default
VLAN admitted values
For the VLAN, the following values/ranges are admitted: •
Specific VLAN (0 Traffic Classifier > Delete. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: After confirmation, the Traffic Classifier are removed.
The Traffic Classifier list is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-164 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Classifiers
Get the Traffic Classifier Properties
....................................................................................................................................................................................................................................
Get the Traffic Classifier Properties When to use
This function gets information about a Traffic Classifier. Related Information
For more information, refer to “Traffic Classifier description” (p. 18-156). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Traffic Classifiers. ...................................................................................................................................................................................................
2
On the Traffic Classifier List Window, select a Traffic Classifier. Select with the right mouse button from the popup menu Properties. ...................................................................................................................................................................................................
3
The Properties window is displayed.
.................................................................................................................................................................................................................................... 1350 OMS 18-165 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Classifiers
Get the Traffic Classifier Properties
....................................................................................................................................................................................................................................
See the following topic in this document: “Details of a Traffic Classifier” (p. 18-167) Figure 18-59 Traffic Classifier Properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-166 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Traffic Classifiers
Details of a Traffic Classifier
....................................................................................................................................................................................................................................
Details of a Traffic Classifier Attributes of a Traffic Classifier
The attributes displayed for each Traffic Classifier are: •
Id.
•
User Label.
•
Ethernet Segment Id.
•
Ethernet Segment.
•
VLAN Id.
•
VLAN Max.
•
Priority Identifier.
•
Priority Max.
•
EVC Port Id Label
•
ESG Port Id Label
• •
DSCP (Differentiated Services Code Point).
•
EtherType.
DSCP Max.
.................................................................................................................................................................................................................................... 1350 OMS 18-167 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Overview about Ethernet edge physical ports
....................................................................................................................................................................................................................................
Managing Ethernet ETS Edge Physical Ports Overview about Ethernet edge physical ports Ethernet edge physical ports description
The Ethernet edge physical ports represent the border of the network managed by the 1350 OMS PKT. They are the extremities of Ethernet Services, EVCs, and Ethernet Segments and they represent UNIs and IWIs. An Ethernet edge physical port is in the Ethernet Domain, the image of an Ethernet Physical Port (PPT) or an External Termination Point (ETP) in the Construction Domain. Ethernet edge physical port attributes
The fundamental attributes of an Ethernet physical edge port are: • •
The Activation State that tells whether the port is active or not. If active, the port can carry traffic/is carrying traffic. The VLAN Type (that identifies the VLAN Tag protocol Type used to distinguish tagged and untagged frames and to form new VLAN Tags using push operations).
Ethernet edge physical port cannot be explicitly created or deleted by the user: Port is automatically created when a proper PPT or ETP is created. Port is automatically deleted when the related Construction object is deleted. Ethernet edge physical port and VLAN
Whenever a new Ethernet edge physical port is created, it comes with an Activation State and a VLAN Type that is aligned with what defined in the NE to which the Edge port belongs. If the edge port is ETP then the Activation State is Down and the VLAN Type is the default one (that is, 8100 hexadecimal). In the scope of MEF alignment, a set of attributes is added to Ethernet Edge Port (intended as UNI). The Edge ports support the VLAN Type according to the board they belong to. The boards like ISA PR EA supports any VLAN Type. The boards like ISA PR ES supports only the standard VLAN. The boards like ISA E/FE/GE and ISA ES1/4 do not support any VLAN.
.................................................................................................................................................................................................................................... 1350 OMS 18-168 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Display the ETS edge port list
....................................................................................................................................................................................................................................
Display the ETS edge port list When to use
The Edge Port List window presents all the edge ports and their attributes. Related Information
For more information, refer to “Ethernet edge physical ports description” (p. 18-168). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Connection Oriented (ETS) > ETS Edge Ports. Result: The list window is displayed.
The attributes displayed for each edge port are: • User Label. • Network Element. • Usage State (Busy, Reserved, Not Meaningful, Idle). •
Rate.
•
Activation State (Down, Up).
•
VLAN Type.
•
Interface Type.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-169 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Modify an edge port
....................................................................................................................................................................................................................................
Modify an edge port When to use
This function allows to modify the characteristics of a selected edge port. Related Information
For more information, refer to “Ethernet edge physical ports description” (p. 18-168). Details when modifying the edge port characteristics: •
Max Number of EVC: the number of EVC that must be allowed on that UNI. ( > = 1).
•
Service Multiplexing: new attribute for all Edge ports.
Default value: – Yes for ETS, ETS_P, ETB (Virt). –
No for ETB (MAC).
–
Modifiable in all cases except ETB (MAC).
This attribute is checked against the other attributes like: Max Number of EVC, Bundling and AllToOneBundling. The check is performed at attribute set and at UNI usage. •
Bundling: checked if the EVC can be mapped with one or more VLAN, not checked
•
if one EVC can be mapped only with one VLAN. All to one Bundling: checked if the EVC maps all VLAN existing on that UNI (that is, one EVC only on that UNI), not checked if the mapping is performed differently.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The edge port must be not active (for example: activation state equal to Down).
• •
The edge port must not be an ENE edge port. The edge port can be involved in defined Ethernet Segments only.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
.................................................................................................................................................................................................................................... 1350 OMS 18-170 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Modify an edge port
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
On the Edge Port List, select the Edge Port to modify. Select with the right mouse button the path Modify or Action > Modify from the main menu. ...................................................................................................................................................................................................
3
The Modify Edge Port window is displayed. Figure 18-60 Edge Port Modification window
To modify the edge port characteristics: •
Max Number of EVC.
•
Service Multiplexing.
•
Bundling.
•
All to one Bundling.
...................................................................................................................................................................................................
4
Click Ok button. Result: After confirmation of the modification: the new attribute values are
downloaded to the NE at the implementation time. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-171 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Configure an ETS Edge Port
....................................................................................................................................................................................................................................
Configure an ETS Edge Port When to use
This function consists in configuring the VLAN type of a selected edge port. Related Information
For more information, refer to “Ethernet edge physical ports description” (p. 18-168). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • • •
The edge port must not be active (for example: activation state equal to Down). The edge port can be involved in defined Ethernet Segments only. The edge port must not be an ENE edge port.
Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports. ...................................................................................................................................................................................................
2
On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path Action > ETS Edge Port > Edge Port Configuration.
.................................................................................................................................................................................................................................... 1350 OMS 18-172 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Configure an ETS Edge Port
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
The Edge Port configuration window is displayed. Figure 18-61 Edge Port Configuration window
To modify the edge port characteristics: •
Vlan Type: Insert the Vlan Type selecting it from the defined Vlan type list.
...................................................................................................................................................................................................
4
Click Ok button.
.................................................................................................................................................................................................................................... 1350 OMS 18-173 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Configure an ETS Edge Port
....................................................................................................................................................................................................................................
Result: After confirmation of the modification: the VLAN type is downloaded to the NE at the implementation time. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-174 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Get the ETS Edge Port Properties
....................................................................................................................................................................................................................................
Get the ETS Edge Port Properties When to use
This function gets information about an ETS edge port. Related Information
For more information, refer to “Ethernet edge physical ports description” (p. 18-168). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports. ...................................................................................................................................................................................................
2
On the ETS Edge Port List Window, select an Edge Port. Select with the right mouse button from the popup menu Properties. ...................................................................................................................................................................................................
3
The Properties window is displayed. The attributes displayed for each edge port are: •
User Label.
•
Network Element.
•
Usage State (Busy, Reserved, Not Meaningful, Idle).
•
Rate.
•
Activation State (Down, Up).
.................................................................................................................................................................................................................................... 1350 OMS 18-175 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Get the ETS Edge Port Properties
....................................................................................................................................................................................................................................
• •
VLAN Type. Interface Type.
Figure 18-62 Edge Port Properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-176 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Display the traffic parameter list
....................................................................................................................................................................................................................................
Display the traffic parameter list When to use
The Traffic Parameter List window presents all the information about the traffic parameters of the selected edge port. Related Information
This list is filled only when the Edge port is involved in an Ethernet Segment and contains Traffic Classifier and Traffic Descriptor. For more information, refer to “Ethernet edge physical ports description” (p. 18-168). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports. ...................................................................................................................................................................................................
2
On the ETS Edge Port List Window, select an Edge Port. Select with the right mouse button from the popup menu Action from Ets Edge Port > Traffic Parameter List. Result: The Traffic Parameter List window is displayed.
See the following topic in this document: “Description of the list of Traffic Parameters” (p. 18-178) ...................................................................................................................................................................................................
3
Selecting a Traffic Parameter in the list, the corresponding properties window can be displayed selecting with the right mouse button the item Properties from the popup menu. Result: The property window is displayed.
See the following topic in this document: “Details of Traffic Parameters” (p. 18-179) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-177 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Description of the list of Traffic Parameters
....................................................................................................................................................................................................................................
Description of the list of Traffic Parameters Attributes of a Traffic Parameter
The attributes displayed for each traffic parameter are: •
Ethernet Flow.
•
Edge port Role.
•
Class of Service (Best Effort, Guaranteed, Regulated).
•
Traffic Descriptor associated to the Ethernet Segment.
•
CIR.
•
PIR.
•
EIR.
•
Traffic Classifier associated to the Ethernet Segment.
• •
VLAN Identifier.
•
Priority Identifier.
•
Priority Range.
VLAN Range.
.................................................................................................................................................................................................................................... 1350 OMS 18-178 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Details of Traffic Parameters
....................................................................................................................................................................................................................................
Details of Traffic Parameters Attributes of a Traffic Parameter
The attributes displayed for each traffic parameter are: •
Ethernet Flow.
•
Edge port Role.
•
Class of Service (Best Effort, Guaranteed, Regulated).
•
Traffic Descriptor associated to the Ethernet Segment.
•
CIR.
•
PIR.
•
EIR.
•
Traffic Classifier associated to the Ethernet Segment.
• •
VLAN Identifier.
•
Priority Identifier.
•
Priority Range.
VLAN Range.
.................................................................................................................................................................................................................................... 1350 OMS 18-179 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Navigation to equipment
....................................................................................................................................................................................................................................
Navigation to equipment When to use
This procedure permits to navigate to the Equipment starting from Edge Port List, with port selection. Related Information
For more information about Edge Port, refer to “Ethernet edge physical ports description” (p. 18-168). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. Note: The navigation does not run if the address of the target server is not defined in the file hosts of the PC where the MS-GUI is running. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports. Result: The list window is shown. ...................................................................................................................................................................................................
2
Select one Edge Port in the list. ...................................................................................................................................................................................................
3
Select Search > Inventory from Edge Port > External Navigation to > GUI.
.................................................................................................................................................................................................................................... 1350 OMS 18-180 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Navigation to equipment
....................................................................................................................................................................................................................................
Result: The Show Equipment window is shown. Figure 18-63 Show Equipment window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-181 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Show PM on an Edge Port
....................................................................................................................................................................................................................................
Show PM on an Edge Port When to use
This function Shows Performance Monitoring (PM) on a Connection Oriented Edge Port or Connection Less Edge Port. Related Information
For more information about Edge Port, refer to “Ethernet Edge Port management” (p. 11-51). For more information about PM, refer to “Quality of service: PM management ” (p. 11-69). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Service menu is shown. ...................................................................................................................................................................................................
2
Select Connection Oriented (ETS) > ETS Edge Ports or Connection Less (Bridge) > Bridge Edge Ports. Result: The Edge Ports list is displayed. ...................................................................................................................................................................................................
3
Select the Edge Ports in the list and follow the path Search > Edge Port > Show > PM. Result: The PM related to the Edge Port is shown. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-182 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet ETS Edge Physical Ports
Show External Termination Point
....................................................................................................................................................................................................................................
Show External Termination Point When to use
This procedure show the Edge Port External Termination Points. Related Information
For more information about Edge Port, refer to “Ethernet edge physical ports description” (p. 18-168). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports. Result: The list window is shown. ...................................................................................................................................................................................................
2
Select one Edge Port in the list. ...................................................................................................................................................................................................
3
Select Search > Edge Port > Show > External Termination Point. Result: The External Termination Point list is shown. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-183 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Overview about Ethernet Transport Links
....................................................................................................................................................................................................................................
Managing Ethernet Transport Links Overview about Ethernet Transport Links Ethernet Transport Link description
The Ethernet Transport Link represents the elementary link that supports the connectivity provisioned by the Ethernet Traffic Management Domain, that is, Ethernet links (and by extensions EVCs and Services). An Ethernet Transport Link is the image, on the Ethernet Domain, of a Transport Link of the Construction Domain. The Ethernet Transport Link cannot be explicitly created or deleted by the user. The Ethernet Transport Link is automatically created when a Transport Link dedicated to Ethernet is created and is automatically deleted when the related Transport Link is deleted. Transport Link attributes
Important attributes for a Transport Link are the Configuration State and, considering its extremities, the Activation State and the VLAN Type. To be able to transport Ethernet traffic, the extremities of the Transport Link must be "activated", that is, a specific configuration must be performed on the NEs that host terminations to activate them. For this reason, at creation time, the Activation State of the Transport Link terminations is checked (uploading it from the corresponding NEs) and each non-active termination is activated. To manage VLAN tagged frames, a port (and in particular an end point of a Transport Link) must be configured with a proper VLAN Tag Protocol Type (used to distinguish tagged and untagged frames and to form new VLAN Tags using push operations). The VLAN Type attribute of the Transport Link extremities is managed in two ways: •
•
at creation time, the VLAN Tag Protocol Type for each Transport Link extremity is uploaded from the related NEs and the VLAN Type attribute is set. If in the 1350 OMS PKT there is no VLAN Type equivalent of the uploaded VLAN Tag Protocol Type, a new VLAN Type (with a proper user label) is created to model the latter. an operation is provided to configure the VLAN Tag Protocol Type of the extremities of a Transport Link after its creation.
.................................................................................................................................................................................................................................... 1350 OMS 18-184 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Overview about Ethernet Transport Links
....................................................................................................................................................................................................................................
Transport Link states
At any time, the configuration state of an Ethernet Transport Link could be recalculated and set to: •
Configured: If both extremities are active and are configured with the same VLAN
Tag protocol type. •
Partially Configured: If only one extremity is active or when both extremities are
•
active but are configured with two different VLAN Tag protocol types. Not Configured: If both extremities are not active.
.................................................................................................................................................................................................................................... 1350 OMS 18-185 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Display the Ethernet ETS Transport Link list
....................................................................................................................................................................................................................................
Display the Ethernet ETS Transport Link list When to use
The Ethernet Transport Link List window presents all the Ethernet Transport Links and their attributes. Related Information
If this list is required from the Ethernet Segment List, only the Transport Links associated to the selected Ethernet Segment is displayed. If this list is required from the VLAN type list, only Transport Links whose edge ports are associated to the selected VLAN type is displayed. For details see “Overview about Ethernet Transport Links” (p. 18-184). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The Transport Link must not be in use by an Ethernet Segment (Its usage state must be Idle). The Transport Link must have a SDH or Cable technology.
Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Connection Oriented (ETS) > ETS Transport Links. Result: The list window is displayed.
See the following topic in this document: “Description of the list of ETS Transport Links” (p. 18-187) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-186 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Description of the list of ETS Transport Links
....................................................................................................................................................................................................................................
Description of the list of ETS Transport Links Attributes of an ETS Transport Link
The attributes displayed for each Transport Link are: •
User Label.
•
Subnetwork.
•
Technology (MPLS, SDH, Cable).
•
Guaranteed Bandwidth.
•
Best Effort Bandwidth.
•
Usage State (Idle, Busy, Reserved, Not Meaningful).
•
Working State (Normal, Configuring, Removing).
•
Configuration State (Configured, Partially Configured, Not Configured).
.................................................................................................................................................................................................................................... 1350 OMS 18-187 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Configure an ETS Transport Link
....................................................................................................................................................................................................................................
Configure an ETS Transport Link When to use
This function permits to change the VLAN Protocol Type of Transport Link extremities. Related Information
The VLAN Type is not an attribute of the Transport Link. The VLAN Type is an attribute of its extremities (that is, Transport Link terminations). So, VLAN Type is displayed in the extremity window of the Transport Link. For these reasons, while the Edge port modification command acts on one Edge port (and its attributes), the Transport Link configuration command acts only on the Transport Link terminations (that is, a shortcut for the user, to avoid him to configure separately the two terminations. For details see “Overview about Ethernet Transport Links” (p. 18-184). Transport Link states
After confirmation, the Configuration state of the Transport Link is recalculated and set to: •
Configured: if both extremities are active and are configured with the same VLAN
Tag Protocol Type. •
Partially Configured: if only one extremity is active (while the other is not active) or
•
when both extremities are active but are configured with two different VLAN Tag Protocol Types. Not Configured: if both extremities are not active.
Transport Link VLAN
The ports at the extremities of the Transport Link are active and configured with the VLAN Type: • •
They recognize as tagged only the Ethernet frames that are tagged with the same VLAN type. Any push operation (that is, VLAN constraint of type "Push") defined on them uses the specified VLAN type to create (and push) new VLAN tags.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode.
.................................................................................................................................................................................................................................... 1350 OMS 18-188 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Configure an ETS Transport Link
....................................................................................................................................................................................................................................
Conditions
To get a positive result: • •
The Transport Link must not be in use by an Ethernet Segment (Its usage state must be Idle). The Transport Link must have a SDH or Cable technology.
Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport Links. ...................................................................................................................................................................................................
2
On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path Action > Transport Link > Transport Link Configuration. ...................................................................................................................................................................................................
3
The Transport Link configuration window is displayed. To configure a Transport Link: •
Select a Service Type (by using the sensitive help).
•
Select a VLAN Type (by using the sensitive help) or select True for the Set standard VLAN Type (8100).
...................................................................................................................................................................................................
4
Click Ok button. Result: The Transport Link configuration state is changed. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-189 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Get the Transport Link extremities
....................................................................................................................................................................................................................................
Get the Transport Link extremities When to use
This function gets information about the extremities of a Transport Link. Related Information
For details see “Overview about Ethernet Transport Links” (p. 18-184). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The Transport Link must not be in use by an Ethernet Segment (Its usage state must be Idle). The Transport Link must have a SDH or Cable technology.
Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport Links. ...................................................................................................................................................................................................
2
On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path Action > Transport Link > Extremities.
.................................................................................................................................................................................................................................... 1350 OMS 18-190 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Get the Transport Link extremities
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
The Transport Link Extremities window is displayed. Figure 18-64 Transport Link Extremities window
The window allows to modify: •
The Network Element.
•
The NE Type (by using the sensitive help).
• •
The Termination User Label (by using the sensitive help). The Activation State (by using the sensitive help).
...................................................................................................................................................................................................
4
Click Ok button.
.................................................................................................................................................................................................................................... 1350 OMS 18-191 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Get the Transport Link extremities
....................................................................................................................................................................................................................................
Result: After confirmation the extremities data are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-192 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Get the Transport Link properties
....................................................................................................................................................................................................................................
Get the Transport Link properties When to use
This function gets information about a Transport Link. Related Information
For details see “Overview about Ethernet Transport Links” (p. 18-184). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport Links. ...................................................................................................................................................................................................
2
On the Transport Link List, select the Transport Link to see the properties. Follow the path Action > Properties.
.................................................................................................................................................................................................................................... 1350 OMS 18-193 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Get the Transport Link properties
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
The Transport Link Properties window is displayed. Figure 18-65 Transport Link Properties window
...................................................................................................................................................................................................
4
Click the window Close button. Result: The properties window is closed. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-194 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Details of ETS Transport Links
....................................................................................................................................................................................................................................
Details of ETS Transport Links Attributes of an ETS Transport Link
The attributes displayed for each Transport Link are: •
Id.
•
User Label.
•
Subnetwork Id Label.
•
Subnetwork.
•
Technology (MPLS, SDH, Cable).
•
Directionality.
•
Ethernet Segment Id.
•
Ethernet Segment.
• •
Usage State (Idle, Busy, Reserved, Not Meaningful).
•
A END Id label.
•
Z END Id label.
•
A END Type label.
•
Z END Type label.
•
Forward cost.
•
Backward cost.
•
Guaranteed Bandwidth.
•
Best Effort Bandwidth.
•
Transport Link Label.
•
Consistency State.
•
Configuration State (Configured, Partially Configured, Not Configured).
•
VLAN Id.
•
VLAN Type.
•
NAD.
Working State (Normal, Configuring, Removing).
.................................................................................................................................................................................................................................... 1350 OMS 18-195 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Transport Links
Display the Transport Link bandwidth load
....................................................................................................................................................................................................................................
Display the Transport Link bandwidth load When to use
This function gets information about the bandwidth load of a Transport Link. Related Information
For details see “Overview about Ethernet Transport Links” (p. 18-184). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport Links. ...................................................................................................................................................................................................
2
On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path Action Transport Link > Bandwidth Load. ...................................................................................................................................................................................................
3
The Transport Link Bandwidth Load window is displayed. ...................................................................................................................................................................................................
4
Click the window Close button. Result: The properties window is closed. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-196 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Overview about Ethernet Segments
....................................................................................................................................................................................................................................
Managing Ethernet Segments Overview about Ethernet Segments Ethernet Segment description
An Ethernet Segment is a unidirectional end-to-end connection between two Ethernet physical ports (that is, between two PEs). Every Ethernet Segment is terminated by means of two Ethernet Edge ports which represent the terminations in the Provider Edges (where the Ethernet traffic "enter in"/"exit from" the managed network). An Ethernet Edge Physical port can support different Ethernet traffics. Each Ethernet Segment is built by means of a series of Ethernet Links. Ethernet Links (Transport Links) are unidirectional connections terminated by means of two Ethernet Link Terminations. The conjunction between two Ethernet Links is made by a cross connection named Ethernet Switch. Ethernet Segment representation Figure 18-66 Ethernet Segment representation
.................................................................................................................................................................................................................................... 1350 OMS 18-197 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Overview about Ethernet Segments
....................................................................................................................................................................................................................................
Bandwidth check for Transport Links
The following bandwidth checks are executed for SDH and Cable Transport Link: •
• •
The sum of all CIR of Ethernet Segments allocated using the Transport Link must be less or equal the total bandwidth of the Transport Link; this check is executed separately for forward and backward direction. The PIR of Ethernet Segment must be less than or equal to of the total bandwidth. The number of best effort Ethernet Segments must be less than or equal to the configuration limit.
Bandwidth check for MPLS connections
For MPLS Transport Link: •
The PIR, CIR, CBS and PBS of Ethernet Segment must be less than or equal to the same values associated to Transport Link.
Bandwidth check for multicast connections
The bandwidth check for multicast connections is executed taking this connection type in account. If more Ethernet Segments use the same Transport Link, the bandwidth reservation is considered only for one Ethernet Segment. For the extremities of the Ethernet Segment, the following bandwidth checks are executed: •
For Aend and Zend: The sum of CIR of the Ethernet Segment that uses the port as Aend/Zend + the CIR of the Ethernet Segment that is allocating Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Connection Oriented (ETS) > Ethernet Segments. Result: The list window is displayed.
See the following topic in this document: “Description of the list of Ethernet Segments” (p. 18-200) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-199 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Description of the list of Ethernet Segments
....................................................................................................................................................................................................................................
Description of the list of Ethernet Segments Ethernet Segment description
An Ethernet Segment is a unidirectional end-to-end connection between two Ethernet physical ports (that is, between two PEs). Every Ethernet Segment is terminated by means of two Ethernet Edge ports which represent the terminations in the Provider Edges (where the Ethernet traffic "enter in"/"exit from" the managed network). An Ethernet Edge Physical port can support different Ethernet traffics. Each Ethernet Segment is built by means of a series of Ethernet Links. Ethernet Links (Transport Links) are unidirectional connections terminated by means of two Ethernet Link Terminations. The conjunction between two Ethernet Links is made by a cross connection named Ethernet Switch. Ethernet Segment representation Figure 18-67 Ethernet Segment representation
Attributes of a Ethernet Segment
The attributes displayed for each Ethernet Segment are: •
User Label.
•
Subnetwork.
•
EVC.
.................................................................................................................................................................................................................................... 1350 OMS 18-200 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Description of the list of Ethernet Segments
....................................................................................................................................................................................................................................
• •
Policy Mode (Color Blind, Color Aware, Disabled).
•
Provisioning State (Defined, Partially Allocated, Allocated, Partially Implemented, Implemented).
•
Availability Status (Normal, Degraded, In Failure, Not Meaningful).
Working State (Normal, Configuring, Allocating, De-allocating, Implementing, De-implementing, Commissioning, De-commissioning, Constraint adding, Constraint removing).
.................................................................................................................................................................................................................................... 1350 OMS 18-201 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Create an Ethernet Segment
....................................................................................................................................................................................................................................
Create an Ethernet Segment When to use
This function consists in creating an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Policy Mode Policy Mode values and meaning:
•
Disabled: no policy applies.
•
Color Blind: Policy is enabled and based only on Traffic Descriptor parameters.
•
Color Aware: Policy is enabled and based both on Traffic Descriptor parameters and on Color Profile.
Color Profile
Color Profile depends on the selected Policy Mode: •
Policy Mode = Disabled: Color Profile can be defined.
•
Policy Mode = Color Aware: Color Profile must be defined.
•
Policy Mode = Color Blind: Color Profile cannot be defined.
Traffic Descriptor
Traffic Descriptor depends on the selected Policy Mode: •
Policy Mode = Disabled: No Traffic Descriptor.
•
Policy Mode = Color Aware: the Traffic Descriptor must be Regulated.
•
Policy Mode = Color Blind: the Traffic Descriptor must be Best Effort or Guaranteed.
Priority Mode Priority Mode depends on the Policy Mode:
• •
If Policy Mode is Color Blind, choose the Priority Id value between 0 and 7, Untagged, Do not care. The Priority Id is priority of all the packets after the push. If Policy Mode is Color Aware, choose Green Priority and Yellow Priority for all green and yellow outgoing packets.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode.
.................................................................................................................................................................................................................................... 1350 OMS 18-202 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Create an Ethernet Segment
....................................................................................................................................................................................................................................
Conditions
To get a positive result: • • •
At least, one EVC, one Color Profile, one Traffic Descriptor, and two Edge Physical Ports must exist. The User Label must be not in use. The Edge Physical Port can be in use by another Ethernet Segment provided that it belongs to the same Ethernet service.
Task
From the MS-GUIMain view: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Connection Oriented (ETS) > Create Ethernet Segment. ...................................................................................................................................................................................................
2
To create an Ethernet Segment: On the Ethernet Segment Creation window General Panel •
Enter an Ethernet Segment User label.
•
Enter the EVC the Ethernet Segment belongs to.
•
•
Choose the EVC Termination or ENE on side "A" and on side "Z" by using the sensitive help (each termination is composed of 'Network Element'+'User Label'+'Role'). Choose a Traffic Descriptor by using the sensitive help. See “Traffic Descriptor” (p. 18-202). Select a Policy Mode (Disabled, Color Blind, Color Aware). See “Policy Mode” (p. 18-202). Define a Color Profile by using the sensitive help (Regulated, Best Effort, Guaranteed). See “Color Profile” (p. 18-202). Select the Classification Mode (Priority, DSCP).
•
Enter a Comment (optional).
• • •
...................................................................................................................................................................................................
3
On the Pop Panel enter following data: Execute the following steps: •
Specify a list of Traffic Classifiers references by using the icon that lists the Traffic Classifier.
•
Select one or more Traffic Classifier.
...................................................................................................................................................................................................
4
On the Push Panel enter following data:
.................................................................................................................................................................................................................................... 1350 OMS 18-203 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Create an Ethernet Segment
....................................................................................................................................................................................................................................
Execute the following steps: •
Enter the VLAN Id to be pushed.
•
Select a Policy Mode (Disabled, Color Blind, Color Aware). See “Policy Mode” (p. 18-202). Select the Priority Id (0, …,7, Untagged, Do not care,Green Priority,Yellow Priority).
•
...................................................................................................................................................................................................
5
Click Ok. Result: The Ethernet Segment is created into the 1350 OMS PKT with the following
state: •
Provisioning State: Defined.
•
Availability Status: Normal.
•
Working State: Normal.
If the usage state of each EVC termination is idle, the usage state is marked busy. The tree area, the Ethernet Segment list, and the EVC list are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-204 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Modify an Ethernet Segment
....................................................................................................................................................................................................................................
Modify an Ethernet Segment When to use
The function modifies Ethernet Segment characteristics. Related Information
See “Ethernet Segment description” (p. 18-197). See “Color Profile” (p. 18-202). See “Traffic Descriptor” (p. 18-202). The Ethernet modification gives the possibility to modify one or all the following parameters: • • •
Ethernet Segment User Label. Color Profile. Traffic Descriptor.
•
Comment.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • • •
If the User Label is modified, the new User Label must not be in use by another Ethernet Segment. Traffic Descriptor is modifiable only when Ethernet Segment provisioning state is Defined. Color Profile is modifiable only when Ethernet Segment provisioning state is Defined or Allocated.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
On the Ethernet Segment List Window, select the Segment to modify. Click the right mouse button and select Modify on the popup menu.
.................................................................................................................................................................................................................................... 1350 OMS 18-205 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Modify an Ethernet Segment
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
The Modify Segment window is displayed. Figure 18-68 Ethernet Segment Modification window
To modify an Ethernet Segment: •
Enter a new User Label.
• • •
Choose a new Traffic Descriptor by using the sensitive help, according to the Policy Mode. Modify the Color Profile, by using the sensitive help, according to the Policy Mode. Modify the Classification Mode (Priority, DSCP).
•
Modify the Comment (optional).
.................................................................................................................................................................................................................................... 1350 OMS 18-206 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Modify an Ethernet Segment
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Click Ok. Result: The segment is modified.
If the Ethernet User Label is modified, the tree area, the Ethernet Segment list, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-207 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Delete an Ethernet Segment
....................................................................................................................................................................................................................................
Delete an Ethernet Segment When to use
This function consists in deleting an Ethernet Segment from the 1350 OMS PKT supervision. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Ethernet Segment Provisioning state must be Defined.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
On the Traffic Classifier List Window, select the traffic descriptor to delete. Select with the right mouse button from the popup menu Action > Ethernet Segment > Delete. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: After confirmation, the Ethernet Segments are deleted.
If the Ethernet Edge Physical Port terminating the deleted Ethernet Segments is no more used by any other Ethernet Segment, the Ethernet Edge Physical Port is marked as "not busy" (Usage State set to idle). The provisioning state of parent EVC is recalculated. The Ethernet Segment list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-208 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Associate a Traffic Classifier to an Ethernet Segment
....................................................................................................................................................................................................................................
Associate a Traffic Classifier to an Ethernet Segment When to use
This function consists in associating a Traffic Classifier to an Ethernet Segment. Related Information
One or more Traffic Classifier can be associated to an Ethernet Segment. If two Ethernet Segments share the same Edge port, the Traffic Classifiers associated to them must refer different VLAN Bit and Priority Bit. See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Ethernet Segment Provisioning state must be Defined.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
From the Multi Service GUI Main view, follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
Select the Ethernet Segment in the list. ...................................................................................................................................................................................................
3
Follow the path Action > ETS Ethernet Segment > Associate Traffic Classifier.
.................................................................................................................................................................................................................................... 1350 OMS 18-209 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Associate a Traffic Classifier to an Ethernet Segment
....................................................................................................................................................................................................................................
Result: The corresponding windows opens. Figure 18-69 Traffic Classifier Association (to an Ethernet Segment) window
...................................................................................................................................................................................................
4
To associate a Traffic Classifier to an Ethernet Segment: •
Choose a Traffic Classifier by using the sensitive help.
•
Click Ok button. Result: After confirmation, the Traffic Classifier is associated to the Ethernet
Segment. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-210 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Disassociate a Traffic Classifier to an Ethernet Segment
....................................................................................................................................................................................................................................
Disassociate a Traffic Classifier to an Ethernet Segment When to use
This function consists in disassociating a Traffic Classifier from an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Ethernet Segment Provisioning state must be Defined.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
Select the Ethernet Segment in the list. ...................................................................................................................................................................................................
3
Follow the path Action > ETS Ethernet Segment > Disassociate Traffic Classifier.
.................................................................................................................................................................................................................................... 1350 OMS 18-211 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Disassociate a Traffic Classifier to an Ethernet Segment
....................................................................................................................................................................................................................................
Result: The corresponding windows opens. Figure 18-70 Traffic Classifier disassociation (from an Ethernet Segment) window
...................................................................................................................................................................................................
4
To disassociate a Traffic Classifier from an Ethernet Segment: • •
Choose a Traffic Classifier by using the sensitive help (only the associated Traffic Classifiers to the concerned Ethernet Segment are displayed). Click Ok button. Result: After confirmation, the Traffic Classifier is disassociated from the Ethernet
Segment. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-212 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Add a constraint to an Ethernet Segment
....................................................................................................................................................................................................................................
Add a constraint to an Ethernet Segment When to use
This function consists in adding an allocation constraint to an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Ethernet Segment Provisioning state must be Defined.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
Select the Ethernet Segment in the list. ...................................................................................................................................................................................................
3
Follow the path Action > ETS Ethernet Segment > Add Constraint to an Ethernet Segment.
.................................................................................................................................................................................................................................... 1350 OMS 18-213 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Add a constraint to an Ethernet Segment
....................................................................................................................................................................................................................................
Result: The corresponding windows opens. Figure 18-71 Add Constraint to an Ethernet Segment window (Pop)
.................................................................................................................................................................................................................................... 1350 OMS 18-214 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Add a constraint to an Ethernet Segment
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
To add a constraint to an Ethernet Segment: •
Choose a Transport Link by using the sensitive help.
•
On the Push Panel, execute the following steps: – Enter the VLAN Id to be pushed. –
•
Select a Policy Mode (Disabled, Color Blind, Color Aware). See “Policy Mode” (p. 18-202). – Select the Priority Id (0, …,7, Untagged, Do not care,Green Priority,Yellow Priority). Click Ok button. Result: If the Constraint List is opened, this window is updated with the new added
constraint. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-215 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
List the constraints related to an Ethernet Segment
....................................................................................................................................................................................................................................
List the constraints related to an Ethernet Segment When to use
This function consists in getting the list of constraints related to an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Ethernet Segment Provisioning state must be Defined.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
Select the Ethernet Segment in the list. ...................................................................................................................................................................................................
3
Select Search > Inventory from Ethernet Segment > List Constraints. Result: The list window is displayed.
See the following topic in this document: “Description of the list of Constraints” (p. 18-217) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-216 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Description of the list of Constraints
....................................................................................................................................................................................................................................
Description of the list of Constraints Attributes of a Constraint
The attributes displayed for each constraint are: •
Constraint Entity User Label (= user label of the Transport Link).
•
Constraint Type (Use, Not Use, Use For Multicast).
.................................................................................................................................................................................................................................... 1350 OMS 18-217 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Delete an Ethernet Segment Constraint
....................................................................................................................................................................................................................................
Delete an Ethernet Segment Constraint When to use
This function consists in deleting a constraint associated to an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The Ethernet Segment Provisioning state must be Defined. No operation is pending on the selected Ethernet Segment.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
On the traffic Ethernet Segment list Window, select the Ethernet Segment to which the constraint belongs. Follow the path Search > Inventory from Ethernet Segment > List Constraints. ...................................................................................................................................................................................................
3
Select the constraint to delete. ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: After confirmation, the Ethernet Segment constraints are dissociated from the
related Ethernet Segment and removed. The Ethernet Segment Constraint list is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-218 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Get the Ethernet Segment Constraint Properties
....................................................................................................................................................................................................................................
Get the Ethernet Segment Constraint Properties When to use
This function consists in getting information about a constraint associated to an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Ethernet Segment Provisioning state must be Defined.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
On the Traffic Classifier List Window, select the Ethernet Segment. ...................................................................................................................................................................................................
3
Follow the path Search > Inventory from Ethernet Segment > List Constraints, select the constraint in the list. ...................................................................................................................................................................................................
4
Select with the right mouse button from the popup menu Properties. ...................................................................................................................................................................................................
5
The Properties window is displayed.
.................................................................................................................................................................................................................................... 1350 OMS 18-219 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Get the Ethernet Segment Constraint Properties
....................................................................................................................................................................................................................................
See the following topic in this document: “Details of an Ethernet Segment Constraint” (p. 18-221) Figure 18-72 Ethernet Segment constraint properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-220 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Details of an Ethernet Segment Constraint
....................................................................................................................................................................................................................................
Details of an Ethernet Segment Constraint Attributes of an Ethernet Segment Constraint
The attributes displayed for each constraint are: •
Id.
•
Constrained Class.
•
Constrained Class Id Label.
•
Constrained Entity User Label.
•
Constraint Class.
•
Constraint Class Id Label.
•
Constraint Entity User Label (= user label of the Transport Link).
•
Constraint Type (Use, Not Use, Use For Multicast).
• •
Replication Factor.
•
Yellow Priority.
•
Green Priority.
•
Priority Mode.
•
Number of Traffic Classifiers.
VLAN Id.
.................................................................................................................................................................................................................................... 1350 OMS 18-221 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Modify a Constraint
....................................................................................................................................................................................................................................
Modify a Constraint When to use
The function modifies Ethernet Segment Constraint characteristics. Related Information
See “Ethernet Segment description” (p. 18-197). The Constraint modification gives the possibility to modify one or all the constraint parameters: • • •
VLAN Identifier. Policy Mode. Priority Id.
• •
Green Priority. Yellow Priority.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The Ethernet Segment Provisioning state must be Defined. No operation is pending on the selected Ethernet Segment.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
On the Ethernet Segment List Window, select the Ethernet Segment. ...................................................................................................................................................................................................
3
Follow the path Search > Inventory from Ethernet Segment > List Constraints, select the constraint in the list. ...................................................................................................................................................................................................
4
Select with the right mouse button from the popup menu Modify.
.................................................................................................................................................................................................................................... 1350 OMS 18-222 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Modify a Constraint
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
The Properties window is displayed. Figure 18-73 Constraint Modification window
...................................................................................................................................................................................................
6
To modify a constraint, modify one or all the following parameters: •
On Pop Panel. Execute the following step: –
•
Choose a Traffic Classifier by using the sensitive help and Add button to insert it.
On Push Panel.
.................................................................................................................................................................................................................................... 1350 OMS 18-223 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Modify a Constraint
....................................................................................................................................................................................................................................
Execute the following steps: – Enter a new VLAN Id. – Modify Policy Mode (Color Blind or Color Aware). – Modify Priority Id, Green Priority and/or Yellow Priority. ...................................................................................................................................................................................................
7
Confirm the modifications with Ok button. Result: If the VLAN Id is modified, after modification, the VLAN Constraint list is
updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-224 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
VLAN Push/Pop at ETS NNI Interface
....................................................................................................................................................................................................................................
VLAN Push/Pop at ETS NNI Interface Overview
The Vlan Push/Pop mechanism is extended to ETS domain, to allow the encapsulation of untagged or C-Vlan Tagged Ethernet frames, with a Provider VLAN Tag. This behavior is used to route the traffic in segregated way either only internally to the managed network or for inter-working purpose. The difference for this operation is that the definition of VLAN constraint is performed before the segment allocation. Early definition allows the VLAN stacking on NNI. See “Ethernet Segment description” (p. 18-197). Sequence of operations
The new sequence of operations is: • • • • • •
Create an Ethernet Segment. Associate a Traffic Classifier. Definition of route Constraints (allowing to define the full routes of Ethernet traffic). Definition of VLAN Constraints, defining the points where the Push/Pop on NNI must be performed. Allocation of the Ethernet Segment. Implementation.
.................................................................................................................................................................................................................................... 1350 OMS 18-225 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Allocate an Ethernet Segment
....................................................................................................................................................................................................................................
Allocate an Ethernet Segment When to use
This function consists in finding a route between the end physical ports of the Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • • • •
The Ethernet Segment Provisioning state must be Defined. A list of constraints containing all Transport Links used is associated to the Ethernet Segment. Traffic profile, Traffic Descriptor, and Traffic Classifier must be associated to the Ethernet Segment. No operation is pending on the Ethernet Segment.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
Select the Ethernet Segment in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Ethernet Segment > Allocate. Result: A confirmation box is displayed.
The 1350 OMS PKT checks the 'validation' of the Transport Links to be used in term of traffic type, bandwidth, and continuity of the chosen Transport Links. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-226 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Deallocate an Ethernet Segment
....................................................................................................................................................................................................................................
Deallocate an Ethernet Segment When to use
This function consists in finding a route between the end physical ports of the Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). After confirmation: • • • • •
deletion of the VLAN constraints related to each Ethernet Segment is done (no more VLAN constraint is associated to them). Then the Ethernet Segment List is updated with provisioning state set to Defined. The provisioning state of related EVC is updated in Defined or Partially Allocated. The bandwidth parameters of all involved Transport Links are updated taken into account the bandwidth freed by the de-allocation. If the de-allocated segment is the last using the Transport Link, the Transport Link usage state is set to Idle.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Ethernet Segment Provisioning state must be Defined.
•
No operation is pending on the Ethernet Segment.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
Select the Ethernet Segment in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Ethernet Segment > Deallocate.
.................................................................................................................................................................................................................................... 1350 OMS 18-227 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Deallocate an Ethernet Segment
....................................................................................................................................................................................................................................
Result: A confirmation box is displayed.
The 1350 OMS PKT checks the 'validation' of the Transport Links to be used in term of traffic type, bandwidth, and continuity of the chosen Transport Links. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-228 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Implement an Ethernet Segment
....................................................................................................................................................................................................................................
Implement an Ethernet Segment When to use
This function establishes an Ethernet flow over an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). In case of correct execution, all the Ethernet Segment connections inside the NE are implemented. The Ethernet Segment is updated into the 1350 OMS PKT with the following states: •
Provisioning State: Implemented.
•
Consistency State: Consistent.
•
Availability Status: Available.
In case of errors, the Ethernet Segment is set to: •
Provisioning State: Partially Implemented.
•
Consistency State: Not Consistent.
•
Availability Status: Not Available.
The provisioning state of the related EVC is also updated to Implemented or Partially Implemented. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • • •
The Ethernet Segment provisioning state must be set to Implemented or Partially Implemented. The NE extremities must not be locked (that is, audit/alignment/reserve not in progress). No operation is pending on the Ethernet Segment.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments.
.................................................................................................................................................................................................................................... 1350 OMS 18-229 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Implement an Ethernet Segment
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
Select the Ethernet Segment in the list. ...................................................................................................................................................................................................
3
Select Action > Ethernet Segment > Implement. Result: A confirmation box is displayed. ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: After confirmation, the 1350 OMS PKT implements the Ethernet Segments.
The Ethernet Segment List is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-230 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Deimplement an Ethernet Segment
....................................................................................................................................................................................................................................
Deimplement an Ethernet Segment When to use
This function removes an Ethernet flow over an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). In case of correct execution, all the Ethernet Segment connections inside the NE are de-implemented. The Ethernet Segment is updated into the 1350 OMS PKT with the following states: •
Provisioning State: Allocated.
•
Consistency State: Not Meaningful.
•
Availability Status: Not Meaningful.
In case of errors, the Ethernet Segment is set to: •
Provisioning State: Partially Implemented.
•
Consistency State: Not Consistent.
•
Availability Status: Not Available.
The provisioning state of the related EVC is also updated in Allocated or Partially Implemented. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Ethernet Segment provisioning state must be set to Allocated.
•
The NE extremities must not be locked (that is, audit/alignment/reserve not in progress). No operation is pending on the Ethernet Segment.
• Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments.
.................................................................................................................................................................................................................................... 1350 OMS 18-231 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Deimplement an Ethernet Segment
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
Select the Ethernet Segment in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Ethernet Segment > Deimplement. Result: A confirmation box is displayed. ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: After confirmation, the 1350 OMS PKT de-implements the Ethernet Segments.
The Ethernet Segment List is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-232 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Configure an Ethernet Segment
....................................................................................................................................................................................................................................
Configure an Ethernet Segment When to use
This function consists in configuring an Ethernet Segment, that is, assigning a traffic descriptor to the Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Ethernet Segment provisioning state must be set to Implemented or Partially Implemented.
Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
On the Ethernet Segment List Window, select the Ethernet Segment. ...................................................................................................................................................................................................
3
Follow the path Action > Ethernet Segment > Configure.
.................................................................................................................................................................................................................................... 1350 OMS 18-233 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Configure an Ethernet Segment
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
The Configuration window is displayed. Figure 18-74 Ethernet Segment Configuration window
...................................................................................................................................................................................................
5
To configure the selected Ethernet Segment: •
Choose a Traffic Descriptor by using the sensitive help.
•
Click Ok button. Result: After confirmation, the traffic descriptor is associated to the Ethernet
Segment. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-234 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Get the Ethernet Segment extremities
....................................................................................................................................................................................................................................
Get the Ethernet Segment extremities When to use
This function gets information about the extremities of an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
No operation is pending on the selected Ethernet Segment.
Task
From the Multi Service GUI Main view ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
On the Ethernet Segment List Window, select the Ethernet Segment. ...................................................................................................................................................................................................
3
Follow the path Search > Inventory from Ethernet Segment > Extremities. ...................................................................................................................................................................................................
4
The Extremities window is displayed.
.................................................................................................................................................................................................................................... 1350 OMS 18-235 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Get the Ethernet Segment extremities
....................................................................................................................................................................................................................................
See the following topic in this document: “Description of the list of Ethernet Segment Extremities” (p. 18-239) Figure 18-75 Ethernet Segment Extremities window
...................................................................................................................................................................................................
5
To modify a segment extremity Click Modify Button, for the Origin A following window is displayed.
.................................................................................................................................................................................................................................... 1350 OMS 18-236 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Get the Ethernet Segment extremities
....................................................................................................................................................................................................................................
Result: The Extremities modification window is displayed. Figure 18-76 Ethernet Segment Extremity Modification window (Origin)
...................................................................................................................................................................................................
6
Choose a Traffic Classifier by using the sensitive help and Add button to insert it. ...................................................................................................................................................................................................
7
Click Modify button for the Destination Z.
.................................................................................................................................................................................................................................... 1350 OMS 18-237 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Get the Ethernet Segment extremities
....................................................................................................................................................................................................................................
Result: Following window is displayed. Figure 18-77 Ethernet Segment Extremity Modification window (Destination)
...................................................................................................................................................................................................
8
Execute the following steps: •
Enter a new VLAN Id.
•
Modify Priority Mode (Color Blind or Color Aware).
•
Modify Priority Id, Green Priority and/or Yellow Priority.
...................................................................................................................................................................................................
9
Confirm with Ok button. Result: Ethernet Segment Extremities characteristics change. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-238 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Description of the list of Ethernet Segment Extremities
....................................................................................................................................................................................................................................
Description of the list of Ethernet Segment Extremities Attributes of an Ethernet Segment Extremity
The attributes displayed for each object are: •
User Label.
•
User Label (A).
•
Committed Rate (A).
•
Rate (A).
•
Network Element (A).
•
Usage State (A).
•
Vlan Type (A).
•
User Label (Z).
• •
Committed Rate (Z).
•
Network Element (Z).
•
Usage State (Z).
•
Vlan Type (Z).
•
VLAN Id.
•
Priority Mode.
•
Green Priority.
Rate (Z).
The attributes displayed for each Ethernet Segment extremity are: Origin (A), Destination (Z): • • • •
User Label. Committed Rate. Rate. Network Element.
• •
Usage State (Idle, Busy). Vlan Type.
.................................................................................................................................................................................................................................... 1350 OMS 18-239 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Get the Ethernet Segment properties
....................................................................................................................................................................................................................................
Get the Ethernet Segment properties When to use
This function gets information about an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
No operation is pending on the selected Ethernet Segment.
Task
From the Multi Service GUI Main view ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
On the Ethernet Segment List Window, select the Ethernet Segment. ...................................................................................................................................................................................................
3
Follow the path Action > Properties. Result: The Properties window is displayed.
See the following topic in this document: “Details of an Ethernet Segment” (p. 18-241) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-240 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Details of an Ethernet Segment
....................................................................................................................................................................................................................................
Details of an Ethernet Segment Attributes of a Ethernet Segment
The attributes displayed for each Ethernet Segment are: •
User Label.
•
Subnetwork.
•
EVC.
•
Policy Mode (Color Blind, Color Aware, Disabled).
•
Working State (Normal, Configuring, Allocating, De-allocating, Implementing, De-implementing, Commissioning, De-commissioning, Constraint adding, Constraint removing).
•
Provisioning State (Defined, Partially Allocated, Allocated, Partially Implemented, Implemented).
•
Availability Status (Normal, Degraded, In Failure, Not Meaningful).
.................................................................................................................................................................................................................................... 1350 OMS 18-241 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Display the route of an Ethernet Segment
....................................................................................................................................................................................................................................
Display the route of an Ethernet Segment When to use
This function gets graphical information about the Transport Links used (crossed) by an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). The following commands are available from the graphical view, depending on the selected object and its position on the route: • •
With no selection: Begin of Route and End of Route commands allow to highlight the NE used for the beginning or the end of the route. With a selected entity (NE, Transport Link, ENE, Off page connector): Begin of Route and End of Route commands are completed by other commands depending on the selected entity.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
On the Ethernet Segment List Window, select the Ethernet Segment. ...................................................................................................................................................................................................
3
Follow the path Display Route.
.................................................................................................................................................................................................................................... 1350 OMS 18-242 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Display the route of an Ethernet Segment
....................................................................................................................................................................................................................................
Result: The Route Display window is displayed.
The Transport Links used by the Ethernet Segment appears in blue. Figure 18-78 Route Display - Ethernet Segment window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-243 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Display the connectivity view of an Ethernet Segment
....................................................................................................................................................................................................................................
Display the connectivity view of an Ethernet Segment When to use
This function gets graphical information about the connectivity view of an Ethernet Segment. Related Information
See “Ethernet Segment description” (p. 18-197). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments. ...................................................................................................................................................................................................
2
On the Ethernet Segment List Window, select the Ethernet Segment. ...................................................................................................................................................................................................
3
Follow the path Connectivity view.
.................................................................................................................................................................................................................................... 1350 OMS 18-244 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing Ethernet Segments
Display the connectivity view of an Ethernet Segment
....................................................................................................................................................................................................................................
Result: The Connectivity view window is displayed. Figure 18-79 Connectivity view - Ethernet Segment window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-245 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing VLAN types
Overview
....................................................................................................................................................................................................................................
Managing VLAN types Overview about VLAN types VLAN types description
The VLAN type entity models the VLAN Tag Protocol Type allowing the user to give a name (user label) to a specific VLAN Tag Protocol Type (either standard or not) to ease its subsequent usage in the scope of VLAN management. The VLAN can be associated to an Ethernet edge port or a Provider Network before the creation of the Ethernet Segment (mapping model). If VLAN is associated to an Ethernet Segment (tunneling model), association induces the propagation to the edge ports. A VLAN Protocol type value could be duplicated according to its usage. Note: The creation and modification of a VLAN Tag Protocol Type over an active Ethernet interface has an influence on the active traffic. Only if the Ethernet Interface is not affected by Active traffic, this operation is allowed. The provisioning state of all EVCs and all Ethernet Segments using the interface is checked.
.................................................................................................................................................................................................................................... 1350 OMS 18-246 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing VLAN types
Display the VLAN type list
....................................................................................................................................................................................................................................
Display the VLAN type list When to use
This function gets graphical information about the connectivity view of an Ethernet Segment. Related Information
See “Overview about VLAN types” (p. 18-246). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select VLAN. Result: The list window is displayed.
The attributes displayed for each VLAN Type are: • User Label. • Protocol Type (VLAN Id in hexadecimal value). • Role (Customer, Provider). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-247 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing VLAN types
Create a VLAN type
....................................................................................................................................................................................................................................
Create a VLAN type When to use
This function consists in defining a VLAN Type and a user label to identify it (for example in the operations of association to Edge Ports). Related Information
To give maximum flexibility to the user, creation of two or more VLAN types with the same VLAN Tag Protocol Type is possible. See “Overview about VLAN types” (p. 18-246). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The User Label must be different from the existing ones. The maximum number of VLAN types must not be reached.
Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > VLANs. ...................................................................................................................................................................................................
2
Follow the path Action > Add VLAN.
.................................................................................................................................................................................................................................... 1350 OMS 18-248 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing VLAN types
Create a VLAN type
....................................................................................................................................................................................................................................
Result: The creation window is displayed. Figure 18-80 VLAN Type Creation window
...................................................................................................................................................................................................
3
To create a VLAN type: •
Enter a VLAN type User label.
•
Enter a VLAN Tag Protocol Type (hexadecimal value between 05dd a ffff ).
.................................................................................................................................................................................................................................... 1350 OMS 18-249 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing VLAN types
Create a VLAN type
....................................................................................................................................................................................................................................
If Protocol Type is equal to 8100 (hex), Role attribute is set to Customer otherwise Role is set to Provider. ...................................................................................................................................................................................................
4
Confirm the modifications with Ok button. Result: The VLAN Type is created and the VLAN Type List is updated.
. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-250 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing VLAN types
Modify a VLAN type
....................................................................................................................................................................................................................................
Modify a VLAN type When to use
The function modifies VLAN type characteristics. Related Information
See “Overview about VLAN types” (p. 18-246). The VLAN type modification gives the possibility to modify one or all the following parameters: • •
VLAN type User Label. VLAN Tag Protocol Type (hexadecimal value).
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
If the User Label is modified, the new User Label must be not in use by another VLAN Type.
•
The VLAN type must not be not in use by any Provider Network, Edge Port, Transport link, or Transport link end point.
Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > VLANs. ...................................................................................................................................................................................................
2
On the VLAN List Window, select the VLAN Type to modify. ...................................................................................................................................................................................................
3
Follow the path Action > Modify.
.................................................................................................................................................................................................................................... 1350 OMS 18-251 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing VLAN types
Modify a VLAN type
....................................................................................................................................................................................................................................
Result: The modification window is displayed. Figure 18-81 VLAN Type Modification window
...................................................................................................................................................................................................
4
To modify a VLAN type: •
Enter a new User Label (optional).
•
Modify the VLAN Tag Protocol Type value (optional).
If new VLAN Tag Protocol Type is equal to 8100 (hex), Role attribute is set to Customer otherwise Role is set to Provider. ...................................................................................................................................................................................................
5
Confirm the modifications with Ok button. Result: After confirmation of the modification: the VLAN Type List is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-252 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management Managing VLAN types
Delete a VLAN type
....................................................................................................................................................................................................................................
Delete a VLAN type When to use
This function consists in deleting a VLAN type from the 1350 OMS PKT supervision. Related Information
See “Overview about VLAN types” (p. 18-246). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The VLAN type must not be used. It must not be associated to any provider network, edge port, or Transport Link end point.
Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > VLANs. ...................................................................................................................................................................................................
2
On the traffic VLAN list Window, select the VLAN Type to delete. ...................................................................................................................................................................................................
3
Follow the path Action > Delete. ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: After confirmation, the VLAN types are removed and the VLAN Type List is
updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 18-253 8DG42227DAAA 9.6 Issue 3 December 2012
End to End Ethernet Provisioning Management
Delete a VLAN type
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 18-254 8DG42227DAAA 9.6 Issue 3 December 2012
19
19 Bridge Network Management
Overview Purpose
This chapter describes how to set up a Connection Less network (Provider Bridge). Contents Connection Less Networks
19-4
Bridge Network Management
19-4
Bridge Traffic Management
19-6
Spanning Tree Instance Management
19-8
VLAN management
19-10
EVC Data Plane
19-11
The EVC life cycle
19-13
Layer-2 Control Protocol Processing
19-16
Bandwidth Profile per UNI
19-18
View the list of bridge NEs
19-22
Description of the list of Bridge NEs
19-23
View the list of bridge ENEs
19-24
Description of the list of Bridge ENEs
19-25
View the Provider Bridge Flows of an EVC
19-26
Connection Less Transport Link Management
19-27
Display the Ethernet Bridge Transport Link list
19-27
Description of the list of Bridge Transport Links
19-29
Configure a transport Link
19-30
Get the Transport Link extremities
19-34
Description of the list of Transport Link extremities
19-37
Get the Transport Link properties
19-38
................................................................................................................................................................................................................................... 1350 OMS 19-1 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management
Overview
....................................................................................................................................................................................................................................
Details of an ETB Transport Link
19-40
Activate a Bridge Transport Link
19-41
Deactivate a Bridge Transport Link
19-42
View the list of Bridge Edge Ports
19-43
Description of the list of Bridge Edge Ports
19-44
Activate a Bridge Edge Port
19-45
Deactivate a Bridge Edge Port
19-46
Connection Less EVC Management
19-47
View the Connection Less EVC list
19-47
Description of the list of Bridge EVCs
19-48
Create a Bridge EVC
19-49
Modify a Bridge EVC
19-53
Delete a Bridge EVC
19-56
Get the EVC properties
19-58
Details of a Bridge EVC
19-60
Configure a Bridge or an ETS EVC
19-61
Add bridge Transport Link to EVC
19-62
Remove bridge Transport Link to EVC
19-63
Inventory of bridge Transport Links of an EVC
19-64
EVC Fault Localization
19-65
Description of the list of Fault Localization
19-68
Description of the list of Alarms
19-69
Navigation to AS
19-70
Bridge EVC Termination Management
19-72
View the list of EVC terminations
19-72
Description of the list of EVC Terminations
19-73
Add Connection Less EVC Termination
19-74
Delete a Bridge EVC Termination
19-81
Configure a Bridge EVC Termination
19-83
Get the EVC termination properties
19-85
Details of an EVC Termination
19-87
Workflow for Bridge Management
19-88
Overview about Workflow
19-88
Create a Domain
19-90
Add NE to a Domain
19-91
.................................................................................................................................................................................................................................... 1350 OMS 19-2 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management
Overview
....................................................................................................................................................................................................................................
Domain Configuration
19-94
Domain Modification
19-96
Configure a Network Element
19-98
Link Over TDM configuration
19-100
NE Ethernet Physical Port Configuration
19-102
Create a Customer
19-104
Create an Ethernet Service
19-107
Traffic Descriptor Definition
19-109
EVC Allocation and Implementation
19-111
EVC Bandwidth Management
19-112
Dynamic change capability
19-112
Function Description
19-113
Service Delimiting
19-117
Vlan Push/Pop On Provider Bridge UNI/IWI Management Spanning Tree
19-117 19-119
Show the Spanning Tree Instance of EVC
19-119
Show the Spanning Tree Instance
19-120
Spanning Tree Instance configuration
19-121
Spanning Tree Instance Implementation
19-123
Spanning Tree Instance Deimplementation
19-124
.................................................................................................................................................................................................................................... 1350 OMS 19-3 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Bridge Network Management
....................................................................................................................................................................................................................................
Connection Less Networks Bridge Network Management Bridge network description
The aim of bridge network management is to provide support for emerging Ethernet-based Connection Less services like the virtual private LAN service (EVPLAN) connecting in a transparent way various customer sites across a metropolitan network (Metro-Ethernet). An Ethernet switch learns the MAC addresses of end-hosts and associates them with appropriate ports on which the end-host frames arrive. In case of mesh networks, loop-free connectivity is assured by a distributed computation carried through control frames and resulting in a spanning tree. In the context of Metro-Ethernet, a customer network is a collection of multiple networks (LANs) that are physically connected by means of a service provider network and operate as if all those multiple networks are connected (virtually) as a single LAN. Ethernet infrastructure participating to switching can be partitioned into virtual LANs possibly overlapping and each one identified by a VLAN-Id. The Q-tag inserted in the Ethernet frames can be used to limit packet broadcasting to the switches participating to the VLAN. Packets tagged with a VLAN are never sent to interfaces that are not part in the VLAN and therefore traffic segregation is achieved. This way, VLAN-Ids allow additional pruning of the loop-free logical connectivity provided by the spanning tree. Provider bridge added value
A provider bridge network brings the following main added values with respect to a virtual bridge one: •
If different customers use the same C-VLAN, for each customer a different P-VLAN is stacked over that C-VLAN. Stacking segregates the traffic sourced by one customer from the one sourced by the other, inside the provider network.
•
It is possible to perform in the NE traffic classification and traffic description of the ingress frames at the edge of the provider domain: – –
Traffic classification allows sharing an IWI interface among different customers. Traffic description allows enhanced quality of service management.
The introduction of the ISA ES family allows offering Ethernet bridging functionality over SDH network and cables. Bridge network functional areas
Bridge network management is based on the following functional areas: • •
Network construction. Bridge infrastructure management including: Transport link activation/deactivation.
.................................................................................................................................................................................................................................... 1350 OMS 19-4 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Bridge Network Management
....................................................................................................................................................................................................................................
•
Bridge traffic management including: – EVC association to bridge infrastructure.
•
– Manual or automatic VLAN distribution inside 1350 OMS PKT resources. – STP parameters set-up inside 1350 OMS PKT resources. – VLAN and STP provisioning to the NE. – QoS management. Maintenance management.
•
Utilities.
.................................................................................................................................................................................................................................... 1350 OMS 19-5 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Bridge Traffic Management
....................................................................................................................................................................................................................................
Bridge Traffic Management Overview
The traffic management is related to the elementary EVC management based on Connection Less networks (MAC Bridge, Virtual Bridge, or Provider Bridge). Bridge Traffic management handles the set-up of data traffic toward the customer edge, STP tuning and VLAN distribution inside and at the edge of the domain. Following main functions are in the scope of the bridge traffic management. • • • •
EVC association to bridge infrastructure. Manual or automatic VLAN distribution inside 1350 OMS PKT resources. STP parameters set-up inside 1350 OMS PKT resources. VLAN and STP provisioning to the NE.
Bridge EVC
One EVC is an elementary EVC that spans the scope of a single bridge domain. In case of MAC domain, no VLAN are managed and there exists at most only one EVC for the domain. In case of Virtual or Provider domain, more EVC can insist on the same domain. The EVC is associated to a set of edge ports of a bridge domain. EVC association to domain is automatic for MAC or when the edge ports are specified at EVC creation-time: the terminations of one EVC must correspond to edge ports belonging to the same bridge domain. All or a subset of the domain edge ports can be selected as EVC terminations (all by default in a MAC domain). In case of Virtual or Provider domain, one EVC is optionally characterized by one VLAN bundle, that is, a group of VLAN. Moreover, in case of Provider domain, we have to distinguish the outer VLAN, that is, the C-VLAN, from the inner VLAN carried inside the domain, namely the P-VLAN. This distinction is expressed by means of a C-VLAN/P-VLAN mapping. The C-VLAN/P-VLAN mapping is defined at EVC level since it must be uniform for all EVC terminations. Any given inner VLAN can be associated to only one EVC supported by the same domain. EVC Terminations
The EVC Termination is a: • • •
MAC Bridge Termination if it uses a MAC Bridge Port. Virtual Bridge Termination if it uses a Virtual Bridge Port. Provider Bridge Termination if it uses a Provider Bridge Customer Port.
.................................................................................................................................................................................................................................... 1350 OMS 19-6 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Bridge Traffic Management
....................................................................................................................................................................................................................................
The EVC Termination is conceptually associated to: • •
•
One Ethernet interface (either local or remote) in case of MAC Bridge Termination. One set of ETB virtual ports insisting on the same Ethernet interface in case of Virtual Bridge Termination. This set the set of ETB virtual ports corresponding to the C-VLAN of the EVC ( One ETB virtual port correspond to one C-VLAN). One ETS flow or set of ETS flows in case of Provider Bridge Termination. The flow or set of flows referenced by the Traffic Classifiers is associated with the C-VLAN of the EVC.
.................................................................................................................................................................................................................................... 1350 OMS 19-7 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Spanning Tree Instance Management
....................................................................................................................................................................................................................................
Spanning Tree Instance Management Network robustness
In Connection Less networks based on Bridge solution, the risk of network loop and packet flooding can lead to network congestion. The usage of Spanning Tree Protocols adds robustness to the network, as the active topology is automatically recalculated by the ISA boards after the detection of one of the following conditions: • • •
Alarms on Transport Links or edge ports. Add/remove of NE or Transport Links in the Domain. Tuning of STP parameters (for example: bridge priority) by management system.
STI tree topology
Network congestion can be avoided supplying a tree topology to the internal used resources. The tree topology can be obtained in two different ways: • •
Manually by the user: the user statically shapes a tree in the network manually configuring Transport Links to be used. Automatically by ISA Boards: the user configures and enables the usage of Spanning Tree Protocols inside a given Domain (STP/RSTP/PVSTP/MSTP) to let ISA Boards to autonomously determine an active tree shape (also called active topology) inside the network.
STI resources
The spanning tree instance (STI) is the set of NE, ENE and Ports carrying control frames (BPDU) that participate to the same distributed computation. The spanning tree NE (ST-NE) represents the image of one NE or ENE in the scope of the STI. Each ST-Termination is characterized by a port state and a port forced state. The port state tells whether the port is forwarding or discarding data frames in the scope of the STI. The port forced state tells whether the control on the port state is delegated to the network (dynamic forced state) or manually constrained by user (blocked or forwarding forced state). The ST-termination port forced state can be configured acting on the ST-link, that means, configuring both end-points with one single operation. Port configuration
On a per-STI basis, configuring the port forced state to forced blocking. One or more ST-links can be manually excluded from the data forwarding process. On the other hand, configuring the port forced state to forced forwarding implies that the ST-link is constrained to participate to packet forwarding. In both cases, either configuring the port forced state to forced blocking or forwarding, the ST-links are manually excluded from the network computation: these links belong or not to a static tree topology due to the constraints of the user. A failure on forced forwarding links is not recovered by the spanning tree protocol.
.................................................................................................................................................................................................................................... 1350 OMS 19-8 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Spanning Tree Instance Management
....................................................................................................................................................................................................................................
The active STI is constituted by NE, ENE and Ports carrying both BPDU and customer data frames. The Ports belonging to the spanning tree instance (STI) are NNI interfaces carrying control frames (BPDU): the active NNI interfaces carry both customer data frames and control frames. A distributed computation (control frame forwarding) determines dynamically which interfaces must actually forward data frames. The active spanning tree is a dynamic snapshot of the network status. Static tree topology
A static tree topology is a subset of the active STI, built by user forcing manually the control plane port forced state to forwarding for all ST-Terminations in the tree. The user can statically determine part or all of the STI active topology. A static tree topology can introduce loops in the network. The number of spanning tree instances for a domain depends on the associated STP type: • • •
None - no spanning tree instance. STP/RSTP - only one spanning tree instance for all VLAN. PVSTP - one spanning tree instance per-VLAN.
•
MSTP - one spanning tree instance per set of VLAN.
Each STI represents a control plane, namely a virtual infrastructure dedicated to the transport of control frames (that is, the BPDU carrying the spanning tree computation). A dedicated set of BPDU is exchanged for each STI. By design choice, the EVC is always associated to a single spanning tree instance (STI), whatever STP type is running. to have a service exploiting different spanning tree instances, we must define different EVC for that service. The associated STI can be shared with other EVC. As a consequence, in case of PVSTP, the EVC must be characterized by a single VLAN.
.................................................................................................................................................................................................................................... 1350 OMS 19-9 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
VLAN management
....................................................................................................................................................................................................................................
VLAN management Overview
Virtual LANs are introduced for segmenting the network into different broadcast (or multicast) domains. The VLAN-Id is used to forward Ethernet traffic only toward those Ethernet ports (UNI) that are members of a given VLAN, ensuring that the tagged frames are only accessible by the proper end-user and therefore realizing traffic segregation. 4096 different VLAN can be used in one Ethernet network. VLAN management helps solving security and privacy, bandwidth management, and increasing the performance. The use of VLAN
VLAN can be used anyway to switch traffic in different contexts: • •
•
• •
•
Defining Ethernet VPNs (EVPLAN service in Connection Less networks). Switching broadband access traffic to the selected ISP. For instance, the use of customer-based VLAN for routing purposes in the network couples the operational aspects of the customer and network user domain. Allowing inter-working the provider network characterized by its own VLAN tag with the network of another provider using not standard VLAN tag. This inter-working is achieved by means of VLAN push and pop operations. Provider network inter-working at the Layer-2 control protocol level can follow a transit model (tunneling) or a peer-to-peer model (mapping mode). In the scope of Virtual Bridge management, the VLAN assume the meaning of Customer VLAN (C-VLAN). In the scope of Provider Bridge management, the VLAN assume the meaning of Provider VLAN (P-VLAN). A scalable solution design can be designed mapping the received Customer VLAN on one internally defined P-VLAN. Both in case of Virtual and Provider Bridge management, Ethernet frames can flow in the network only after having properly provisioned the required VLAN inside the network (C-VLAN for Virtual and P-VLAN for Provider).
.................................................................................................................................................................................................................................... 1350 OMS 19-10 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
EVC Data Plane
....................................................................................................................................................................................................................................
EVC Data Plane Overview
Each EVC spanning the scope of a bridge domain has an associated data plane and active topology. The EVC data plane is the set of NE, ENE and Ports enabled to carry user data frames belonging to that EVC. It contains the set of NE and Ports where the set of VLAN characterizing the EVC has to be distributed. The EVC active topology is the set of NE, ENE and Ports belonging to the same Domain and actually carrying user data frames. For example, the active topology differs from the data plane when a link is blocked by the spanning tree computation to avoid loops. In fact, the EVC active topology is actually the projection of the EVC data plane onto the active topology of the STI supporting the EVC: the data path for the EVC is therefore obtained keeping into account both the VLAN distribution and the dynamic computation of the associated STI. The EVC data plane and active topology are also virtual entities since they are specific for the VLAN bundle characterizing the EVC and, therefore, are specific for that EVC. Data frames characterized by different VLAN Id can generally follow different data paths across the bridge network, but data frames belonging to same EVC are constrained, by design choice, to follow the same data path to allow QoS management on a per-EVC basis. When edge ports (that is, UNI or IWI interfaces) are associated to the EVC, they belong to the EVC data plane but not to the active STI topology, since control frames coming from CE or from another domain must be filtered or tunneled. UNI and IWI interfaces are not allowed to enter the active STI topology. On the other hand, NNI Transport Links can belong to both EVC data plane and active STI topology: they can carry both data frames and control frames. Active topology
The Ports belonging to the EVC active topology are therefore characterized by: • •
The VLAN characterizing the EVC are in the Port member set. Forced port state equal to forced forwarding (namely they are part of the STI static active Topology) or.
•
Forced port state equal to dynamic and port state equal to forwarding (namely, they are part of the STI dynamic active topology).
Following table summarizes the port forced-state relation with EVC active topology. Forced-state/ Plane.
Control frame forwarding.
Data frame forwarding.
EVC Active Topology.
Forced-blocking.
No.
No.
No.
Forced-forwarding.
No.
Yes.
Yes.
.................................................................................................................................................................................................................................... 1350 OMS 19-11 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
EVC Data Plane
....................................................................................................................................................................................................................................
Forced-state/ Plane.
Control frame forwarding.
Dynamic.
Yes.
Data frame forwarding. Decided by network computation.
EVC Active Topology. Decided by network computation.
.................................................................................................................................................................................................................................... 1350 OMS 19-12 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
The EVC life cycle
....................................................................................................................................................................................................................................
The EVC life cycle Overview
The EVC life cycle is tightly related to the life cycle of the associated EVC data plane and that of the supporting STI. At Domain activation time, the default STP protocol type is enabled on all NE and also the NNI Ports are activated. This activations implies that control frames are allowed to flow in the network. In case of STP/RSTP/MSTP, the default STI is therefore implemented in the network. The default STI is referred as the CIST (Common Instance Spanning Tree) in case of MSTP. We extend this terminology also to the case of STP/RSTP, where it represents the only instance available. In case of MAC Domain, only one EVC is created automatically by the system at Domain activation time. In case of Virtual or Provider Domain, the EVC must be explicitly created by user and more than one EVC can insist on the same Domain. EVC creation or modification
At creation/modification time, the EVC is associated to a set of edge ports and, in case of Virtual or Provider Domain, to a set of VLAN. Association to edge ports implies the automatic association with the underlying Domain. The EVC is characterized by a full-mesh/ not full-mesh attribute used to drive the VLAN distribution inside 1350 OMS PKT resources (at EVC data plane allocation time). In case of Provider Bridge, user must specify a C-VLAN/P-VLAN mapping. At EVC Termination creation/modification time, user can optionally specify a default user priority on a per-Port basis (in case of MAC Bridge or Virtual Bridge edge port). In case of Virtual Bridge only, the user can also specify an 801.2p priority bit regeneration table. The EVC data plane is one-to-one with the EVC and is automatically defined at EVC creation time. Similarly, the EVC data plane is automatically deleted at EVC deletion time. to allow EVC allocation, the EVC data plane must be allocated first. EVC data plane allocation means defining the physical infrastructure for the data plane. The system must include the VLAN in the EVC bundle in the VLAN member set of the ports that are part of the virtual data plane specific for that EVC. All VLANs in the EVC share the same virtual data plane. EVC data plane allocation implies VLAN distribution to Edge Ports, corresponding to the VLAN distributed on EVC Terminations. The UNI/IWI association to EVC data plane is therefore automatically established by the system. The VLAN of each EVC Termination is allocated on the respective UNI/IWI. The VLAN in the EVC bundle have to be uniformly allocated to the NNI. The NNI association is performed either manually (not full-mesh case) or automatically (full-mesh case).
.................................................................................................................................................................................................................................... 1350 OMS 19-13 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
The EVC life cycle
....................................................................................................................................................................................................................................
In case of full-mesh, the association is performed at EVC data plane allocation-time: the system automatically distributes the VLAN in 1350 OMS PKT MIB to all Transport Links (that is, NNI Ports) in the Domain. In case of not full-mesh, the user must use a specific function to add/remove a set of Transport Links to the allocated EVC data plane. EVC allocation
To summarize, when a full-mesh EVC Data Plane is allocated, all VLAN in the bundle are distributed to all edge ports and Transport Links in the domain. In case of not full-mesh, the allocation operates only on edge ports, while the user has to add the selected set of Transport Links; then the system automatically and uniformly distributes all VLAN in the bundle to the selected Transport Links. to perform a non-uniform VLAN allocation over the Transport Links used by a service, the user is therefore required to use different EVC. EVC allocation means to select a supporting STI and to associate the selected STI to the set of VLAN characterizing the EVC. The way to select a STI for the EVC depends on the domain STP type: • • • •
None: spanning tree instance is not supported and the infrastructure must be a tree topology. The user must ensure that the topology is loop-free. STP/RSTP: the default spanning tree instance (the CIST) is implicitly selected by the system. The CIST is automatically implemented at domain activation time. PVSTP: for the single VLAN characterizing the EVC, a new STI is automatically allocated by the system at EVC allocation time. MSTP. In this case, the user has two possibilities: – –
Allocate the EVC over an existing STI (the CIST by default). Require to allocate the EVC over a new STI to be automatically created and allocated by the system.
Provisioning details
EVC de-allocation implies losing the relation with the supporting STI. If the STI is not the CIST, at de-allocation time of the last EVC, the supporting STI is automatically deleted. The CIST is automatically de-implemented at bridge domain deactivation time. The EVC Data Plane de-allocation can be performed individually or cascaded automatically after EVC de-allocation. The EVC Data Plane de-allocation is a pre-condition for EVC deletion. The EVC Data Plane de-allocation consists in removing of the VLAN characterizing the EVC from the Edge Ports (that is, UNI/IWI Ports) and from all associated Transport Links (that is, NNI Ports). Therefore, the EVC data plane de-allocation behaves in the same way both in case of full-mesh and not full-mesh EVC. In case of not full-mesh EVC, the user can remove one or more Transport Links from the allocated EVC data plane, before implementing it. To allow EVC implementation, the supporting STI and the EVC data plane must be implemented first. .................................................................................................................................................................................................................................... 1350 OMS 19-14 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
The EVC life cycle
....................................................................................................................................................................................................................................
STI implementation means that any new STI is instantiated on the ISA NE (only in case of MSTI) and that the STP parameters are provisioned on the ISA NE (only NNI Ports). The CIST is automatically implemented at bridge domain activation time.
.................................................................................................................................................................................................................................... 1350 OMS 19-15 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Layer-2 Control Protocol Processing
....................................................................................................................................................................................................................................
Layer-2 Control Protocol Processing Overview
The user optionally defines, on EVC basis, which control Protocol must be tunneled or discarded. Such configuration must be propagated to all EVC terminations to ensure that all EVC terminations use the same Tunneling criteria. A check is needed also toward Layer-2 Control Protocol Processing defined at UNI level. This check allows a congruent management of Control protocols crossing the EVC. In case of Connection Oriented EVC, the value defined for the EVC is predefined to Tunnel for all L2 Control Protocols and this value is propagated to contained Ethernet Segments. In case of Provider Bridge based EVC, the value can be freely defined by the user for the EVC. The value is propagated to all EVC Terminations. In case of MAC Bridge or Virtual Bridge based EVC, the EVC is always tunneling (the UNI setting is fully operative). If the Layer-2 Protocol Processing is not defined at EVC level, then this definition is delegated to each single EVC Termination (for Provider Bridge Based EVCs) while for Ethernet Segment (Connection Oriented EVCs) is fixed to Tunnel for all L2 Protocols. This way to operate is maintained as backward compatible with previous 1350 OMS PKT releases but is not considered as MEF compliant because do not ensure that at EVC level a common policy on Control Protocols is applied. During EVC Definition, for each used UNI, a check is performed respect to the Max Number of EVC defined on each UNI. L2 Control Protocols
For the List of L2 Control Protocols, refer to the following table: Table 19-1
L2 Control Protocols
Control Protocol.
Discard.
Tunnel (default for all protocols).
Data Frames.
Yes.
Yes.
Customer BPDU (STP, RSTP, MSTP).
Yes.
Yes.
Provider BPDU (STP, RSTP, MSTP).
Yes.
Yes.
Slow Protocols.
Yes.
Yes.
802.1X PAE.
Yes.
Yes.
Notes.
At EVC level, it is allowed to Tunnel or Discard also Data Frames.
.................................................................................................................................................................................................................................... 1350 OMS 19-16 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Layer-2 Control Protocol Processing
....................................................................................................................................................................................................................................
Table 19-1
L2 Control Protocols
Control Protocol.
(continued)
Discard.
Tunnel (default for all protocols).
Provider GVRP.
Yes.
Yes.
Bridge Management.
Yes.
Yes.
Customer GMRP.
Yes.
Yes.
Customer GVRP.
Yes.
Yes.
Notes.
Bandwidth profiles
The bandwidth profiles defined for each EVC termination have to be intended in the following way: •
In case of Connection Less EVCs based on Provider Bridge, the bandwidth profiles defined for each EVC termination represents the bandwidth profile for the traffic at the ingress of that UNI (and it is immediately checked).
•
In case of Connection Less EVCs based on Virtual Bridge, the bandwidth profiles defined for each EVC are automatically defined as Best Effort Class Of Service having the PIR fully equal to the UNI rate. In case of Connection Less EVCs based on MAC Bridge, the bandwidth profiles defined for each EVC are automatically inherited from UNI characteristics (in fact all UNI of a MAC Bridge supports only the Bandwidth Profile per UNI) and the traffic parameters.
•
.................................................................................................................................................................................................................................... 1350 OMS 19-17 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Bandwidth Profile per UNI
....................................................................................................................................................................................................................................
Bandwidth Profile per UNI Overview
Each Bandwidth Profile configured on a given UNI represent the way the traffic entering in ingress to that UNI is shaped and managed in term of Bandwidth. The following possible values for Bandwidth Profile are manageable at UNI level: • •
•
“Bandwidth Profile per UNI” (p. 19-18). Bandwidth description is shared for all connection starting from this ingress UNI. “Bandwidth Profile per EVC” (p. 19-18). Bandwidth description is shared for all connection starting from this UNI in the scope of this EVC. Each EVC has one or a group of VLAN. “Bandwidth Profile per CoS” (p. 19-18). The bandwidth applies to traffic defined by one or a group of VLAN and one Priority bit.
Bandwidth Profile per UNI
The Bandwidth Profile is configured with a bandwidth description on the edge port before having created any service on this port. In this case, all the services that start on this UNI share this bandwidth (in the limits described in the profile). The provisioning is accomplished by means of the management of the FlowGroup concept. For each EVC Connection Oriented based starting from this UNI, the UNI Bandwidth profile is propagated along the used route (the pseudo CAC implemented at 1350 OMS PKT level takes into account either current per flow Traffic Descriptors and FlowGroup Traffic Descriptor). In case of UNI belonging to MAC bridges, traffic parameters are automatically defined as Best Effort CoS with the PIR value equal to the UNI rate. Bandwidth Profile per EVC
The bandwidth profile is supplied during each termination addition describing the bandwidth usable and shared for all the connection of the considered EVC. This setting applies on the added termination only; that is, one port used by the EVC can work in per EVC mode and another port used by the same EVC can work in per Cos mode. The provisioning is accomplished by means of the management of the FlowGroup concept. For each EVC Connection Oriented based starting from this UNI, the UNI Bandwidth profile is propagated along the used route (the pseudo CAC implemented at 1350 OMS PKT level takes into account either current per flow Traffic Descriptors and FlowGroup Traffic Descriptor). Bandwidth Profile per CoS
The bandwidth profile is described by one VLAN or group and one Priority bit or set of bits. This profile is applicable for one EVC termination: so the EVC termination is used per Cos or is used per EVC. The description of the bandwidth profile is done by the way of one Traffic Descriptor composed of Bandwidth profile attributes (CIR, PIR, CBS, PBS) and also one QoS attribute, standing for the description of the PHB (Per Hop
.................................................................................................................................................................................................................................... 1350 OMS 19-18 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Bandwidth Profile per UNI
....................................................................................................................................................................................................................................
Behavior), that is, the internal NE mode for managing the traffic. The PHB (Per Hop Behavior), represents, on equipment base, the QoS expected by a Customer at EVC level (that is, on Per Network Behavior). The QoS definition
The QoS attribute can be automatically determined by the 1350 OMS PKT from the bandwidth parameter values supplied in the profile. This behavior is the default behavior but, to remain as flexible as the equipment (introducing 8 QoS following the same formula for the profile values), the user can force this value to a specific one according to the equipment formula. In addition to the Traffic Descriptor, two other concepts complete the QoS definition: • •
the Policy mode: such management is today aligned with IETF and whose extension in the scope of MEF compliancy is in the scope of 1350 OMS PKT. The Color Profile: such management is aligned with IETF concepts for Color Aware traffic management. This management is not considered MEF. The Color Profile management, is maintained unchanged in respect to previous 1350 OMS PKT releases. The user must plan the usage or not.
Bandwidth Profile Per UNI attributes
The Bandwidth Profile per UNI is one of the possible management definable on UNI basis relatively to MEF compliancy. The Bandwidth Profile Per UNI is described by the following attributes: • • • •
Committed Information Rate (CIR). Excess Information Rate (EIR). Committed Burst Size (CBS). Excess Burst Size (EBS).
• •
Color Mode (CM). Coupling Flag (CF).
Manual and default operations
This management is mutually exclusive with the two other possible management (Bandwidth Profile per EVC and Bandwidth Profile per EVC per Cos). The Bandwidth Profile per UNI must be defined on a given UNI in two ways: • •
By the user through a manual operation before the port is used. Automatically as the default value for a given UNI depending on restrictions existing on specific NE configurations.
.................................................................................................................................................................................................................................... 1350 OMS 19-19 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Bandwidth Profile per UNI
....................................................................................................................................................................................................................................
The following table reports the known operations at NE configuration or at Port upload. Table specify the manual operation needed or the predefined default operation. UNI Configuration.
Bandwidth (BWD) Profile allowed.
Default Value.
Modification Allowed.
ETS.
Per UNI, Per EVC, Per CoS.
/.
Yes, Bwd Per UNI only before UNI usage.
ETS (Provider Bridge).
Per UNI, Per EVC, Per CoS.
/.
Yes, Bwd Per UNI only before UNI usage.
ETB (MAC Bridge).
Per UNI.
CIR=PIR=Port Rate.
NO.
ETB (Virtual Bridge).
Per UNI.
CIR=PIR=Port Rate.
NO.
After having configured a UNI supporting a Bandwidth Profile per UNI, each EVC using that port inherits, from that UNI the same Bandwidth profile for traffic entering from that UNI. All the EVCs instantiated as entering from that UNI use the same Bandwidth profile). From the traffic point of view, all traffic entering in a UNI (from a CE) is in competition with other traffics for the probability to be transmitted in the transport network. An EVC using a UNI being configured with a Bandwidth Profile per UNI can use other UNIs having different Bandwidth Profiles configured (either per UNI, Per EVC, Per CoS). EVC provisioning
It is important to differentiate the expected management behavior (particularly for allocation and provisioning steps) in the various cases of Connection Oriented (ETS) or Connection Less (ETB) management. ETS Case:
When an EVC lying on an ETS domain uses a UNI defined to support a Bandwidth Profile per UNI, the Ethernet Segment starting from that UNI inherits (as Traffic Descriptor Definition) the information defined in that Bandwidth profile. When the EVC is allocated, this implying the allocation of contained Ethernet Segments, that TD (reflecting the BwdProfilePerUNI) is propagated along the route of the Ethernet Segment. When the EVC is Implemented, this implying the implementation of contained Ethernet Segments, that TD (reflecting the BwdProfilePerUNI) is provisioned on all affected NEs along the route of the Ethernet Segment. In terms of Provisioning, the SNMP objects to be provisioned is a FlowGroup (reflecting that EVC on the UNI) with associated a Traffic Descriptor.
.................................................................................................................................................................................................................................... 1350 OMS 19-20 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Bandwidth Profile per UNI
....................................................................................................................................................................................................................................
ETB Provider Bridge Case:
When an EVC lying on an ETB Provider Bridge domain uses a UNI defined to support a Bandwidth Profile per UNI, the EVC Termination (reflecting the traffic entering from that UNI) inherits (as Traffic Descriptor Definition) the information defined in that Bandwidth profile. This “inheritance” can happen both at EVC Definition and during EVC Termination Adding. The Traffic Descriptor reflecting the BwdProfilePerUNI is defined and associated to the EVC Termination. When the EVC is Implemented, this implying the implementation of EVC Termination, the TD that reflects the BwdProfilePerUNI, is provisioned on the affected NEs. ETB Virtual and MAC Bridge Case:
When an EVC lying on an ETB Virtual or MAC Bridge domain uses a UNI defined to support a Bandwidth Profile per UNI, the EVC Termination (reflecting the traffic entering from that UNI) inherits (as Traffic Descriptor Definition) the information defined in that Bandwidth profile. This “inheritance” can happen both at EVC Definition and during EVC Termination Adding. The TD reflecting the BwdProfilePerUNI is defined and associated to that EVC Termination. When the EVC is Implemented, nothing happens on NEs, because in the scope of Virtual and MAC bridge no provisioning is possible in terms of Traffic Descriptors.
.................................................................................................................................................................................................................................... 1350 OMS 19-21 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
View the list of bridge NEs
....................................................................................................................................................................................................................................
View the list of bridge NEs When to use
This function lists the Network Elements of connection less type. Related Information
For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge). Result: The Connection Less menu is shown. ...................................................................................................................................................................................................
2
Bridge NEs Result: The list window is displayed.
See the following topic in this document: “Description of the list of Bridge NEs” (p. 19-23) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-22 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Description of the list of Bridge NEs
....................................................................................................................................................................................................................................
Description of the list of Bridge NEs Attributes of a Bridge NE
The attributes displayed for each Bridge (Connection less) NE are: •
User Label.
•
Working State (Normal, Configuring, Removing).
•
STP Type(MSTP, RSTP).
•
Domain.
•
MAC Address.
•
Network Element.
•
Spanning Tree Instance.
•
Provider Bridge Operation Mode(Not Meaningful, 5P3D).
•
PTM Name.
.................................................................................................................................................................................................................................... 1350 OMS 19-23 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
View the list of bridge ENEs
....................................................................................................................................................................................................................................
View the list of bridge ENEs When to use
This function lists the External Network Elements of connection less type. Related Information
For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge). Result: The Connection Less menu is shown. ...................................................................................................................................................................................................
2
Bridge External NEs Result: The list window is displayed.
See the following topic in this document: “Description of the list of Bridge ENEs” (p. 19-25) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-24 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
Description of the list of Bridge ENEs
....................................................................................................................................................................................................................................
Description of the list of Bridge ENEs Attributes of an ENE
The attributes displayed for each Bridge (Connection less) ENE are: •
User Label.
•
Working State (Normal, Configuring, Removing).
•
STP Type(MSTP, RSTP).
•
Domain.
•
MAC Address.
•
Network Element.
•
Spanning Tree Instance.
•
Provider Bridge Operation Mode(Not Meaningful, 5P3D).
•
PTM Name.
.................................................................................................................................................................................................................................... 1350 OMS 19-25 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Networks
View the Provider Bridge Flows of an EVC
....................................................................................................................................................................................................................................
View the Provider Bridge Flows of an EVC When to use
This function shows the provider bridge Flows of an EVC. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The EVC list is shown. ...................................................................................................................................................................................................
2
Select the Bridge EVC and select the path Search > Bridge EVC > Provider bridge Flows. Result: The list shows the flows belonging to the selected EVC. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-26 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Display the Ethernet Bridge Transport Link list
....................................................................................................................................................................................................................................
Connection Less Transport Link Management Display the Ethernet Bridge Transport Link list When to use
The Ethernet Transport Link List window presents all the Ethernet Transport Links and their attributes. Related Information
If this list is required from the VLAN type list, only Transport Links whose edge ports are associated to the selected VLAN type, are displayed. For general information about Transport Links, see: “Transport link management” (p. 11-50). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Transport Link must not be in use by an Ethernet Segment (Its usage state must be Idle).
•
The Transport Link must have an SDH or Cable technology.
Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Connection Less > Transport Link.
.................................................................................................................................................................................................................................... 1350 OMS 19-27 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Display the Ethernet Bridge Transport Link list
....................................................................................................................................................................................................................................
Result: The list window is displayed.
See the following topic in this document: “Description of the list of Bridge Transport Links” (p. 19-29) Figure 19-1 Connection Less Transport Link List
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-28 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Description of the list of Bridge Transport Links
....................................................................................................................................................................................................................................
Description of the list of Bridge Transport Links Attributes of a Bridge Transport Link
The attributes displayed for each Bridge (Connection less) Transport Link are: •
User Label.
•
Subnetwork.
•
Technology (MPLS, SDH, Cable).
•
Total Bandwidth.
•
Usage State (Idle, Busy, Reserved, Not Meaningful).
•
Working State (Normal, Configuring, Removing).
•
Configuration State (Configured, Partially Configured, Not Configured).
•
Domain.
•
Domain Type.
.................................................................................................................................................................................................................................... 1350 OMS 19-29 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Configure a transport Link
....................................................................................................................................................................................................................................
Configure a transport Link When to use
This function permits to change the VLAN Protocol Type of Transport Link extremities. Related Information
For information about Transport Link management, see: “Overview about Transport links ” (p. 14-4). The VLAN Type is not an attribute of the Transport Link. The VLAN Type is an attribute of its extremities (that is, Transport Link terminations). So, VLAN Type is displayed in the extremity window of the Transport Link. For these reasons, while the Edge port modification command acts on one Edge port (and its attributes), the Transport Link configuration command acts only on the Transport Link terminations. The command is a shortcut for the user, not to configure separately the two terminations. The ports at the extremities of the Transport Link are active and configured with the VLAN Type and, hence: •
They recognize as tagged only the Ethernet frames that are tagged with this VLAN type.
•
Any push operation (that is, VLAN constraint of type "Push") defined on them uses the specified VLAN type to create (and push) new VLAN tags.
PCP Table Profile compliant with NE
PCP Table Profile possible values are As Container, 5P3D, 6P2D, 7P1D, 8P0D; to be assigned in compliance with the NE, as listed: • • • •
On node basis, ES1/4 admits the values: 5P3D (default on node basis), 8P0D. On node basis, ES16 admits the values: 5P3D (default on node basis), 8P0D. On port basis, ES1/4 does not admit any PCP Port table profile. On port basis, ES16 admits the values: as Container (This value is the default on Port Basis [default=0] mirroring the value defined on Node basis), 5P3D, 6P2D, 7P1D, 8P0D.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode.
.................................................................................................................................................................................................................................... 1350 OMS 19-30 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Configure a transport Link
....................................................................................................................................................................................................................................
Conditions
To get a positive result: • •
The Transport Link must not be in use by an Ethernet Segment (Its usage state must be Idle). The Transport Link must have an SDH or Cable technology.
Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
follow the path Search > Packet > Services > Connection Less > Transport Link. ...................................................................................................................................................................................................
2
Select the Transport Link in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Configure..
.................................................................................................................................................................................................................................... 1350 OMS 19-31 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Configure a transport Link
....................................................................................................................................................................................................................................
Result: The configuration window is displayed. Figure 19-2 Transport Link Configuration window
...................................................................................................................................................................................................
4
To configure a Transport Link: •
Acceptable Frame Type (All, ONLY VLAN tagged):
•
PVID.
•
Enable Ingress Filtering.
•
Priority bit mapping.
•
Default User Priority.
.................................................................................................................................................................................................................................... 1350 OMS 19-32 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Configure a transport Link
....................................................................................................................................................................................................................................
• •
PCP Table Profile. See “PCP Table Profile compliant with NE” (p. 19-30).
Select a VLAN Type (by using the sensitive help) or set the Set standard VLAN Type (8100) value to true.
...................................................................................................................................................................................................
5
Click Ok button. Result: After confirmation, the Configuration state of the Transport Link is
recalculated and set to: • •
•
Configured: if both extremities are active and are configured with the same
VLAN Tag Protocol Type. Partially Configured: if only one extremity is active (while the other is not active) or when both extremities are active but are configured with two different VLAN Tag Protocol Types. Not Configured: if both extremities are not active.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-33 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Get the Transport Link extremities
....................................................................................................................................................................................................................................
Get the Transport Link extremities When to use
This function gets information about the extremities of a Transport Link. This function permits optionally to modify extremity characteristics. Related Information
For information about Transport Link management, see: “Overview about Transport links ” (p. 14-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path: Search > Packet > Services > Connection Less > Transport Link. ...................................................................................................................................................................................................
2
Select the Transport Link in the list. ...................................................................................................................................................................................................
3
Follow the path Search > Inventory from Transport Link > Extremities.
.................................................................................................................................................................................................................................... 1350 OMS 19-34 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Get the Transport Link extremities
....................................................................................................................................................................................................................................
Result: The extremities window is displayed.
See the following topic in this document: “Description of the list of Transport Link extremities” (p. 19-37) Figure 19-3 Transport Link Extremities window
...................................................................................................................................................................................................
4
Change parameters.
.................................................................................................................................................................................................................................... 1350 OMS 19-35 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Get the Transport Link extremities
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Click Ok button. Result: The Transport Link extremities attributes are changed consequently. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-36 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Description of the list of Transport Link extremities
....................................................................................................................................................................................................................................
Description of the list of Transport Link extremities Attributes of a Transport Link extremity
The attributes shown are: •
Network Element.
•
Network Element type.
•
Termination user label.
•
Activation State.
•
VLAN Type.
•
Acceptable Frame Type.
•
PVID.
•
Enable Ingress Filtering.
• •
Default User Priority.
•
PCP Table Profile.
Priority bit mapping.
.................................................................................................................................................................................................................................... 1350 OMS 19-37 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Get the Transport Link properties
....................................................................................................................................................................................................................................
Get the Transport Link properties When to use
This function gets information about the properties of a Transport Link. Related Information
For information about Transport Link management, see: “Overview about Transport links ” (p. 14-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less > Transport Link. ...................................................................................................................................................................................................
2
Select the Transport Link in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Properties.
.................................................................................................................................................................................................................................... 1350 OMS 19-38 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Get the Transport Link properties
....................................................................................................................................................................................................................................
Result: The properties window is displayed.
See the following topic in this document: “Details of an ETB Transport Link” (p. 19-40) Figure 19-4 Transport Link Properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-39 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Details of an ETB Transport Link
....................................................................................................................................................................................................................................
Details of an ETB Transport Link Attributes of an ETB Transport Link
The attributes displayed for each Transport Link are: •
Id.
•
User Label.
•
Subnetwork Id Label.
•
Subnetwork.
•
Technology (MPLS, SDH, Cable).
•
Usage State (Idle, Busy, Reserved, Not Meaningful).
•
Working State (Normal, Configuring, Removing).
•
A END Id label.
• •
Z END Id label.
•
Z END Type label.
•
Transport Link Label.
•
Configuration State (Configured, Partially Configured, Not Configured).
•
VLAN Id.
•
VLAN Type.
•
Domain Id.
•
Domain.
•
Domain Type.
•
STI Id label.
•
STI User Label.
•
EVC Id.
•
EVC User Label.
•
Total Bandwidth.
•
NAD.
A END Type label.
.................................................................................................................................................................................................................................... 1350 OMS 19-40 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Activate a Bridge Transport Link
....................................................................................................................................................................................................................................
Activate a Bridge Transport Link When to use
This function activates a Bridge Transport Link. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge Transport Links. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select the Transport Links in the list. ...................................................................................................................................................................................................
3
Select Action > Bridge Transport Link > Activate. Result: The Transport Link is activated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-41 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Deactivate a Bridge Transport Link
....................................................................................................................................................................................................................................
Deactivate a Bridge Transport Link When to use
This function deactivates a Bridge Transport Link. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge Transport Links. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select the Transport Links in the list. ...................................................................................................................................................................................................
3
Select Action > Bridge Transport Link > Deactivate. Result: The Transport Link is deactivated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-42 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
View the list of Bridge Edge Ports
....................................................................................................................................................................................................................................
View the list of Bridge Edge Ports When to use
This function lists Bridge Edge Ports. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge). Result: The Bridge menu is displayed. ...................................................................................................................................................................................................
2
Select Bridge Edge Port. Result: The list window is displayed.
See the following topic in this document: “Description of the list of Bridge Edge Ports” (p. 19-44) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-43 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Description of the list of Bridge Edge Ports
....................................................................................................................................................................................................................................
Description of the list of Bridge Edge Ports Attributes of a Bridge Edge Port
The attributes displayed for each Bridge Edge Port are: •
User Label.
•
Rate.
•
Network Element.
•
EVC User Label.
•
Role (Root, Leaf, Both).
•
Usage State.
•
VLAN Type.
.................................................................................................................................................................................................................................... 1350 OMS 19-44 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Activate a Bridge Edge Port
....................................................................................................................................................................................................................................
Activate a Bridge Edge Port When to use
This function activates a Bridge Edge Port. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge Edge Ports. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select the Edge Port in the list. ...................................................................................................................................................................................................
3
Select Action > Bridge Edge Port > Activate. Result: The Port is activated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-45 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less Transport Link Management
Deactivate a Bridge Edge Port
....................................................................................................................................................................................................................................
Deactivate a Bridge Edge Port When to use
This function deactivates a Bridge Edge Port. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge Edge Ports. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select the Edge Port in the list. ...................................................................................................................................................................................................
3
Select Action > Bridge Edge Port > Deactivate. Result: The Port is deactivated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-46 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
View the Connection Less EVC list
....................................................................................................................................................................................................................................
Connection Less EVC Management View the Connection Less EVC list When to use
The Ethernet Virtual Connection List window presents all the EVCs and their attributes. Related Information
If this list is required from the Ethernet Service List (or from the Ethernet Segment List or from the Ethernet Transport Link List), only the EVCs associated to the selected service (or Ethernet Segment or Ethernet Transport Link) are displayed. For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Connection Less > Bridge EVCs. Result: The list window is displayed.
See the following topic in this document: “Description of the list of Bridge EVCs” (p. 19-48) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-47 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Description of the list of Bridge EVCs
....................................................................................................................................................................................................................................
Description of the list of Bridge EVCs Attributes of a Bridge EVC
The attributes displayed for each EVC are: •
User Label.
•
Ethernet Service User Label.
•
Type (Point to point, Routed multi-point, Any to any).
•
Service Type.
•
Traffic Type (Unicast, Multicast).
•
Domain.
•
Bridge Type.
•
Working State (Normal, Configuring, Allocating, De-allocating, Implementing, De-implementing, Commissioning, De-commissioning, Termination adding, Termination removing, Constraint adding, Constraint removing, removing).
•
Provisioning State (Defined, Partially allocated, Allocated, Partially implemented, Implemented, Commissioned).
•
Service State.
•
Availability Status (Normal, Degraded, In Failure, Not Meaningful).
•
Domain.
For more attributes, refer to “EVC attributes to support ELP” (p. 28-36).
.................................................................................................................................................................................................................................... 1350 OMS 19-48 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Create a Bridge EVC
....................................................................................................................................................................................................................................
Create a Bridge EVC When to use
This function consists in creating a Connection Less Ethernet Virtual Connection. Related Information
If this action is required from the Service List, the Ethernet Service field of the EVC Creation window, is filled with the service selected in the Service List. For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Service Type, Type, Resource Sharing relations Table 19-2
Service Type, Type, Resource Sharing relations
Service Type.
Type.
Traffic Type.
Resource Sharing.
EVPL.
Point-to-Point.
Unicast.
Full.
EPTL.
Point-to-Point.
Unicast.
Private UNI and Link.
EPL.
Point-to-Point.
Unicast.
Private UNI.
EVPLAN.
Any-to-Any.
Unicast.
Full. Private UNI. Private Link. Private UNI and Link. 1
Extended EVPL.
Point-to-Point.
Unicast.
.
Full. Private UNI. Private Link. Private UNI and Link. 1
Extended EVPLAN.
Any-to-Any.
Unicast.
Full.
Rooted Multipoint.
Multicast.
Private UNI.
1
Private Link.
.
Private UNI and Link. 1
HSI.
Rooted Multipoint.
Unicast.
Rooted Multipoint.
.
Full.
Multicast. 1
BTV.
.
.
Unicast.
Full.
Multicast. 1
.
.................................................................................................................................................................................................................................... 1350 OMS 19-49 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Create a Bridge EVC
....................................................................................................................................................................................................................................
Table 19-2
Service Type, Type, Resource Sharing relations
Service Type. Broadcast.
Type. Rooted Multipoint.
Traffic Type. Unicast.
(continued)
Resource Sharing. Full. Private UNI. Private Link. Private UNI and Link. 1
.
Notes:
1.
This case allows a selection of the parameters.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • • •
The User Label must be different from any in use by another EVC. Only one Root termination is authorized. The EVC Type must be compatible with the service type of the associated Ethernet Service.
• •
The EVC Type must be compatible with the selected Traffic Type. The role of each EVC termination must be compatible with the EVC Type.
Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Action > Packet > Services > Connection Less (Bridge) > Create Bridge EVC. Result: The creation window is displayed. ...................................................................................................................................................................................................
2
General Panel.
Following data can be filled in the General Panel: •
Enter an EVC User Label.
•
Service:
.................................................................................................................................................................................................................................... 1350 OMS 19-50 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Create a Bridge EVC
....................................................................................................................................................................................................................................
• •
Two different choices are possible: – Choose an already created Ethernet Service by using the sensitive help (this field is automatically filled if this window is required from the Service List). – Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI, BTV, Broadcast). The parameters: Type and Resource Sharing are assigned according to the chosen Service Type as indicated in: Table 19-2, “Service Type, Type, Resource Sharing relations” (p. 19-49). Select a Type (Point to Point, Routed Multipoint, Any to Any (=Multipoint to multipoint)). if allowed. Select a Traffic Type (Unicast, Multicast), the selection of the parameter depends on the selected type. Select a Service Level (Premium, Gold, Silver, Bronze). Resource Sharing: to manage the issue related to Shared or Dedicated Transport Link usage, the Resource Sharing attribute at EVC Level can assume following values. – Full: the EVC Service under definition can use every resource without any restriction. – Private UNI: the EVC Service under definition must use Private UNI, that is, the UNI is uniquely used by the EVC Service. – Private Link: The EVC Service under definition must use Private Links, that is, Transport Links uniquely used by the EVC Service. – Private UNI and LINK: The EVC Service under definition must use Private UNI and Private Links, that is, chosen Transport Links and UNIs are uniquely used by that EVC Service. Select a Domain Label. Select a Service Level (Premium, Gold, Silver, Bronze).
•
C-VLAN Preservation: check it to keep the VLAN Id through the EVC.
•
• • •
(see: “C-VLAN and CoS Preservation” (p. 18-41)). •
C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)). •
NAD: select a NAD value from the list.
•
Enter a Comment (optional).
•
Enter an External Mark (optional). It can be used to identify external systems having relations with the EVC (for example an ownership).
...................................................................................................................................................................................................
3
Detail Panel.
Following data can be filled in the Detail Panel: •
Enter Vlan Distribution (Full mesh, Not full mesh).
•
Enter s-Vlan Id the range of the VLAN over SDH path, an equal value can go on the same domain. Define IGMP Snooping State (Not Meaningful, Enabled, Disabled).
•
.................................................................................................................................................................................................................................... 1350 OMS 19-51 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Create a Bridge EVC
....................................................................................................................................................................................................................................
•
This option is available only for EVPLAN, Extended EVPLAN and BTV EVC types and can optionally be defined as: – Enabled: to remind that the IGMP snooping protocol is used on top of the created EVC. The IGMP is enabled immediately after the implementation of the EVC and the IGMP is disabled immediately before the de-implementation the EVC. – Disabled: to remind that the IGMP snooping protocol is not used on the created EVC. Select the Frame Delivery parameters (see “Frame delivery” (p. 18-41)) – Unicast Service Frame Delivery. –
Multicast Service Frame Delivery.
•
– Broadcast Service Frame Delivery. Select the standard Vlan Type (8100).
•
Enter a Vlan Bundle in the range of the local Vlan.
...................................................................................................................................................................................................
4
Layer-2 Control Protocol Panel.
If the entire set has the same value, then select the first parameter Put entire set to • • •
Default, all the set is put to Tunnel. Not Meaningful, all the set is put to Not Meaningful. Free, every value can be different.
Select which control Protocol must be tunneled or discarded. Such configuration is propagated to all EVC terminations (this configuration ensures that all EVC terminations use the same Tunneling criteria). A check is needed also toward Layer-2 Control Protocol Processing defined at UNI level. This check allows a congruent management of Control protocols crossing the EVC. The default value is Tunnel. Checking the Set to Default box all values are set to Tunnel. Checking the Set to Not Meaningful box all values are set to Not Meaningful. The single L2 protocol can have different values, select a value for each protocol selecting between Tunnel, Not Meaningful, and Discard. ...................................................................................................................................................................................................
5
Confirm the EVC creation with OK button. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-52 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Modify a Bridge EVC
....................................................................................................................................................................................................................................
Modify a Bridge EVC When to use
The EVC modification gives the possibility to modify parameters and relative values. Related Information
If the User Label is modified, the new User Label must be different from the one which is already used by another EVC. For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The Connection Less EVC list window is displayed. ...................................................................................................................................................................................................
2
Select the element to modify in the list. ...................................................................................................................................................................................................
3
Click the right mouse button and select Modify from the popup menu. ...................................................................................................................................................................................................
4
To modify an EVC (Ingress Flow): •
Enter a new User Label (optional).
•
C-VLAN Preservation: check it to keep the VLAN Id through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)). •
C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
.................................................................................................................................................................................................................................... 1350 OMS 19-53 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Modify a Bridge EVC
....................................................................................................................................................................................................................................
• •
Modify the Comment (optional). Modify the External Mark (optional).
Figure 19-5 EVC Modification window (Details)
To modify an EVC (Details Panel): •
Modify VLAN distribution (optional).
•
Modify S-Vlan Id value (optional).
•
Modify Unicast Service Frame Delivery (optional).
•
Modify Multicast Service Frame Delivery (optional).
• •
Modify Broadcast Service Frame Delivery (optional). Modify VLAN Type (optional).
•
Modify VLAN Bundle (optional).
.................................................................................................................................................................................................................................... 1350 OMS 19-54 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Modify a Bridge EVC
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Click Ok button to confirm the changes. Result: Then, the EVC list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-55 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Delete a Bridge EVC
....................................................................................................................................................................................................................................
Delete a Bridge EVC When to use
This function consists in deleting an EVC from the 1350 OMS PKT supervision. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). After confirmation, the following checks are performed: • • •
the 1350 OMS PKT checks that no Ethernet Segment is referring the EVCs. the EVCs are dissociated from the related service (if no more EVC are associated to the service, the service is also removed). the EVCs are removed.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • • •
The provisioning state of the EVC must be defined. No Ethernet Segment is referring the EVC. No operation is pending on the EVC.
Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
On the Bridge EVCsr List Window, select the EVC to delete. Select Action > Bridge EVC > Delete from the Action menu. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40).
.................................................................................................................................................................................................................................... 1350 OMS 19-56 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Delete a Bridge EVC
....................................................................................................................................................................................................................................
Result: The EVC is deleted.
The EVC list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-57 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Get the EVC properties
....................................................................................................................................................................................................................................
Get the EVC properties When to use
This function gets information about an Ethernet Virtual Connection. Related Information
For general information about Transport Links, see: “Transport link management” (p. 11-50). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The Bridge EVC list is displayed. ...................................................................................................................................................................................................
2
Select a Bridge EVC element from the list. ...................................................................................................................................................................................................
3
From the Main Menu follow the path Action > Properties.
.................................................................................................................................................................................................................................... 1350 OMS 19-58 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Get the EVC properties
....................................................................................................................................................................................................................................
Result: The Bridge EVC Properties window is displayed.
See the following topic in this document: “Details of a Bridge EVC” (p. 19-60) Figure 19-6 EVC Properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-59 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Details of a Bridge EVC
....................................................................................................................................................................................................................................
Details of a Bridge EVC Attributes of a Bridge EVC
The attributes displayed for each EVC are: •
Id.
•
User Label.
•
Service Id Label.
•
Ethernet Service User Label.
•
Type (Point to point, Routed multi-point, Any to any).
•
Traffic Type (Unicast, Multicast).
•
Directionality.
•
Service Level.
• •
Comment.
•
Action Type.
•
Action Date.
•
Working State (Normal, Configuring, Allocating, De-allocating, Implementing, De-implementing, Commissioning, De-commissioning, Termination adding, Termination removing, Constraint adding, Constraint removing, removing).
•
Provisioning State (Defined, Partially allocated, Allocated, Partially implemented, Implemented, Commissioned).
•
Service State (Not in Service, In Service).
•
Availability Status (Normal, Degraded, In Failure, Not Meaningful).
•
ETS Id Label.
•
ETS LABEL label.
•
Vlan Type.
•
Resource sharing.
• •
Domain Id.
•
VLAN distribution.
•
S-VLAN Id.
External Mark.
Domain.
.................................................................................................................................................................................................................................... 1350 OMS 19-60 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Configure a Bridge or an ETS EVC
....................................................................................................................................................................................................................................
Configure a Bridge or an ETS EVC When to use
The configuration of an EVC consists in associating a Traffic Descriptor to the EVC. This function is available for Connection Oriented and Connection Less EVCs. Related Information
See “EVC Management” (p. 11-53). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Select one the following commands: •
Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs
•
Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs Result: The EVC list window is displayed.
...................................................................................................................................................................................................
2
Select the EVC in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Bridge EVC > EVC Configuration. Result: The EVC Configuration window is displayed. ...................................................................................................................................................................................................
4
Select a Traffic Descriptor using the sensitive help. ...................................................................................................................................................................................................
5
Click Ok. Result: The Traffic Descriptor is assigned to the EVC.
A correlation with the EVC is created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-61 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Add bridge Transport Link to EVC
....................................................................................................................................................................................................................................
Add bridge Transport Link to EVC When to use
This function adds a Transport Link to a Connection Less EVC. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The EVC provisioning state must be set to Defined. No operation is pending on the selected EVC.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select the Bridge EVC. ...................................................................................................................................................................................................
3
Select the path Action > Bridge EVC > Add Transport Link to EVC. ...................................................................................................................................................................................................
4
Click Ok button to save the operation. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-62 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Remove bridge Transport Link to EVC
....................................................................................................................................................................................................................................
Remove bridge Transport Link to EVC When to use
This function disassociates a Transport Link from a Connection Less EVC. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The EVC provisioning state must be set to Defined. No operation is pending on the selected EVC.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The EVC list is shown. ...................................................................................................................................................................................................
2
Select the Bridge EVC and select the path Search > Bridge EVC > Transport Link. Result: The list shows the Transport Links belonging to the selected EVC. ...................................................................................................................................................................................................
3
Select a Transport Link. ...................................................................................................................................................................................................
4
Select the path Action > Transport Link > Remove Transport Link from EVC. ...................................................................................................................................................................................................
5
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: If the command is confirmed, The Transport Link is disassociated from EVC. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-63 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Inventory of bridge Transport Links of an EVC
....................................................................................................................................................................................................................................
Inventory of bridge Transport Links of an EVC When to use
This function shows a Transport Links from a Connection Less EVC. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The EVC provisioning state must be set to Defined. No operation is pending on the selected EVC.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The EVC list is shown. ...................................................................................................................................................................................................
2
Select the Bridge EVC and select the path Search > Bridge EVC > Transport Link. Result: The list shows the Transport Links belonging to the selected EVC. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-64 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
EVC Fault Localization
....................................................................................................................................................................................................................................
EVC Fault Localization When to use
This function allows the user to display the localization of alarms on an EVC. Related Information
The function is available for implemented EVCs. For more information about EVC, refer to “EVC description” (p. 18-37). For details about Fault Localization, see: “Fault Localization” (p. 11-69). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select the EVC in the list. ...................................................................................................................................................................................................
3
Follow the path Search > Fault Localization.
.................................................................................................................................................................................................................................... 1350 OMS 19-65 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
EVC Fault Localization
....................................................................................................................................................................................................................................
Result: The Bridge EVC Fault Localization window is displayed.
See the following topic in this document: “Description of the list of Fault Localization” (p. 19-68) Figure 19-7 EVC Fault Localization window
...................................................................................................................................................................................................
4
Select an alarmed port on the list, navigate to the Equipment View of the NE by issuing Search > External Navigation to > USM.
.................................................................................................................................................................................................................................... 1350 OMS 19-66 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
EVC Fault Localization
....................................................................................................................................................................................................................................
Result: The NE User Interface window is displayed. Figure 19-8 Show Equipment from EVC Fault Localization
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-67 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Description of the list of Fault Localization
....................................................................................................................................................................................................................................
Description of the list of Fault Localization Attributes of a Fault Localization
The Fault Localization window displays: •
The User Label of the alarmed entity.
•
The Entity Type of the alarmed entity.
•
The Alarm /Availability State.
•
The Specific Fault Date.
•
The Probable Cause.
•
The Operator Label.
•
The NE User Label
•
The Global Alarm Date. Note: The list is not refreshed automatically, click Actualize button to refresh it.
.................................................................................................................................................................................................................................... 1350 OMS 19-68 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Description of the list of Alarms
....................................................................................................................................................................................................................................
Description of the list of Alarms Attributes of an Alarm
The alarm list window displays: •
The Perceived Severity.
•
The Event Date & Time.
•
The Friendly Name.
•
The Alarm Type.
•
The Probable Cause.
.................................................................................................................................................................................................................................... 1350 OMS 19-69 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Navigation to AS
....................................................................................................................................................................................................................................
Navigation to AS When to use
Starting from an implemented EVC, the corresponding alarm list can be displayed in AS window. Related Information
The function is available for implemented EVCs. For general information about Fault Localization, see: “Fault Localization” (p. 11-69). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select the EVC in the list. ...................................................................................................................................................................................................
3
Follow the path from the popup menu Search > External Navigation to > AS.
.................................................................................................................................................................................................................................... 1350 OMS 19-70 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Connection Less EVC Management
Navigation to AS
....................................................................................................................................................................................................................................
Result: The Fault Management window is displayed with the alarms concerning the selected EVC. Figure 19-9 AS window for EVC Alarms
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-71 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
View the list of EVC terminations
....................................................................................................................................................................................................................................
Bridge EVC Termination Management View the list of EVC terminations When to use
The EVC Termination List window presents all the terminations of the selected EVC and their attributes. Related Information
From list, the user displays the extremity of an EVC or deletes EVC. If the list is required from the Ethernet Service List (or from the EVC List), only the EVC terminations associated to the selected service (or EVC) are displayed. For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select the bridge EVC in the list. ...................................................................................................................................................................................................
3
Select the path Search > Inventory from Bridge EVC > List EVC Terminations. Result: The list window is displayed.
See the following topic in this document: “Description of the list of EVC Terminations” (p. 19-73) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-72 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Description of the list of EVC Terminations
....................................................................................................................................................................................................................................
Description of the list of EVC Terminations Attributes of a EVC Termination
The attributes displayed for each EVC termination are: •
EVC Termination User Label.
•
Rate.
•
Network Element.
•
EVC User Label.
•
Role (Root, Leaf, Both).
•
Usage State.
•
VLAN Type.
.................................................................................................................................................................................................................................... 1350 OMS 19-73 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Add Connection Less EVC Termination
....................................................................................................................................................................................................................................
Add Connection Less EVC Termination When to use
This function consists in adding terminations to a Connection Less EVC. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • • • •
The EVC provisioning state must be set to Defined. Only one termination can have "Root" role. EVC Termination Role must be congruent with the EVC topology. No operation is pending on the selected EVC.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select the Bridge EVC in the list where the termination must be added. ...................................................................................................................................................................................................
3
Select the path Action > Bridge EVC > Add Connection Less EVC Termination.
.................................................................................................................................................................................................................................... 1350 OMS 19-74 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Add Connection Less EVC Termination
....................................................................................................................................................................................................................................
Result: The Add Termination window is displayed. Figure 19-10 Add EVC termination window (General Panel)
...................................................................................................................................................................................................
4
The Add Termination window has four different panels: General, Ingress Flow, Egress Flow, and Layer-2 Control Protocol.
.................................................................................................................................................................................................................................... 1350 OMS 19-75 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Add Connection Less EVC Termination
....................................................................................................................................................................................................................................
On the General Panel, insert following data: •
Select a NE or ENE using the popup list window with available NEs.
•
Select an Edge Port using the popup list window with available Edge Ports.
•
Select the termination Role (Root, Leaf, Both).
...................................................................................................................................................................................................
5
On the Ingress Flow panel insert following data: At least one Input Ethernet Flow OR at least one Output Ethernet Flow must be defined: this allowing to cover following cases: • • •
To define some Source EVC Termination point in Broadcasting Topologies only Input Ethernet Flows are defined. To define some Sink EVC Termination point in Broadcasting Topologies only Output Ethernet Flows are defined. To define some Bidirectional EVC Termination point in PTP, Rooted MultiPoint or Multi Point To Multi Point topologies, Input Ethernet Flows, and Output Ethernet Flows are defined; such point can be either balanced (that is, having equal I/O characteristics) or Unbalanced (that is, having Input characteristics different from output characteristics both in term of classification, bandwidth, Qos, and so forth).
Execute the following steps: • •
Select a Traffic Descriptor. Select Color Profile and Policy Mode (optional).
•
Check or clear the Vlan Pop Enabled.
.................................................................................................................................................................................................................................... 1350 OMS 19-76 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Add Connection Less EVC Termination
....................................................................................................................................................................................................................................
• •
Select the Classification Mode (Priority, DSCP). Select a Traffic Classifier clicking the button that displays the available Traffic Classifier list.
...................................................................................................................................................................................................
6
On the Egress Flow panel insert following data:
.................................................................................................................................................................................................................................... 1350 OMS 19-77 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Add Connection Less EVC Termination
....................................................................................................................................................................................................................................
Execute following steps: • •
Select the Class of Service (if Same as Ingress Flow not selected). Insert the VLAN and Priority for the Push operation.
Figure 19-11 Add EVC termination window (Egress Flow)
.................................................................................................................................................................................................................................... 1350 OMS 19-78 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Add Connection Less EVC Termination
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
7
On the Layer-2 Control Protocol Panel the control protocol is set for the termination. The selection which control Protocol must be tunneled or discarded can be made also at termination level. If the entire set has the same value, then select the first parameter Put entire set to • • •
Default, all the set is put to Tunnel. Not Meaningful, all the set is put to Not Meaningful. Free, every value can be different.
A check is needed also toward Layer-2 Control Protocol Processing defined at UNI level. This check allows a congruent management of Control protocols crossing the EVC.
.................................................................................................................................................................................................................................... 1350 OMS 19-79 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Add Connection Less EVC Termination
....................................................................................................................................................................................................................................
The single L2 protocol can have different values. Select a value for each protocol selecting between Tunnel, Not Meaningful, and Discard. Figure 19-12 Add EVC termination window (L2 Control Protocol Panel)
...................................................................................................................................................................................................
8
Click Ok button to save the operation. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-80 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Delete a Bridge EVC Termination
....................................................................................................................................................................................................................................
Delete a Bridge EVC Termination When to use
This function consists in deleting an EVC termination from the 1350 OMS PKT supervision. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The specified EVC termination is not used as Ethernet Segment extremity. No operation is pending on the selected EVC termination.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The bridge EVC list window is displayed. ...................................................................................................................................................................................................
2
Select the bridge EVC in the list where the termination is to delete. ...................................................................................................................................................................................................
3
Select the path Search > Inventory from Bridge EVC > List EVC Terminations. Result: The EVC termination list window is displayed. ...................................................................................................................................................................................................
4
On the Bridge EVCs termination List Window, select the EVC termination to delete. Select Action > EVC Port > Delete from the Action menu. ...................................................................................................................................................................................................
5
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40).
.................................................................................................................................................................................................................................... 1350 OMS 19-81 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Delete a Bridge EVC Termination
....................................................................................................................................................................................................................................
Result: The EVC termination is deleted.
After confirmation: • the EVC terminations are dissociated from the related EVC. • the EVC terminations are removed. The EVC Termination list is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-82 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Configure a Bridge EVC Termination
....................................................................................................................................................................................................................................
Configure a Bridge EVC Termination When to use
This function consists in configuring an Ethernet Virtual Connection termination. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The EVC list window is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list. ...................................................................................................................................................................................................
3
Select the path Search > Inventory from Bridge EVC > List EVC Terminations. Result: The EVC Termination list window is displayed. ...................................................................................................................................................................................................
4
Select the termination to configure in the list and follow the path Action > EVC Port > EVC Termination Configuration.
.................................................................................................................................................................................................................................... 1350 OMS 19-83 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Configure a Bridge EVC Termination
....................................................................................................................................................................................................................................
Result: The EVC Port Configuration window is displayed. Figure 19-13 EVC Termination Configuration window
...................................................................................................................................................................................................
5
On the Configuration Window. To configure the EVC termination: •
Select a Traffic Descriptor using the list of the available Traffic Descriptors displayed.
...................................................................................................................................................................................................
6
Click Ok. Result: The Traffic Descriptor is assigned to the EVC termination.
A correlation with the EVC is created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-84 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Get the EVC termination properties
....................................................................................................................................................................................................................................
Get the EVC termination properties When to use
This function gets information about an Ethernet Virtual Connection termination. Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management” (p. 19-6). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The Bridge EVC list is displayed. ...................................................................................................................................................................................................
2
Select a Bridge EVC element from the list. ...................................................................................................................................................................................................
3
To display the EVC terminations, select the path Search > Inventory from Bridge EVC > List EVC Terminations. Result: The EVC Termination list window is displayed. ...................................................................................................................................................................................................
4
From the Main Menu follow the path Action > Properties.
.................................................................................................................................................................................................................................... 1350 OMS 19-85 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Get the EVC termination properties
....................................................................................................................................................................................................................................
Result: The Bridge EVC termination Properties window is displayed.
See the following topic in this document: “Details of an EVC Termination” (p. 19-87) Figure 19-14 EVC Termination Properties window
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-86 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Bridge EVC Termination Management
Details of an EVC Termination
....................................................................................................................................................................................................................................
Details of an EVC Termination Attributes of an EVC Termination
The attributes displayed for each EVC termination are: •
Id.
•
EVC Termination User Label.
•
Rate.
•
NE Id Label
• •
Network Element.
• •
EVC User Label.
• •
Usage State.
•
Service Id Label
•
Ethernet Service
•
VLAN Id
• •
VLAN Type.
•
VLAN Bundle
•
Policy Mode
•
Traffic Descriptor
•
Color Profile
•
VLAN Pop
•
Class Of Service
•
VLAN Id
•
Green Priority
•
Yellow Priority
EVC Id Role (Root, Leaf, Both). Type
VLAN Protocol Type
.................................................................................................................................................................................................................................... 1350 OMS 19-87 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Overview about Workflow
....................................................................................................................................................................................................................................
Workflow for Bridge Management Overview about Workflow Description
The workflow to manage bridge is part of the more general workflow for the Ethernet Service management. For information about bridge network, see: “Bridge Network Management” (p. 19-4). Spanning Tree Protocol is a control protocol running inside a Bridge Network able to build tree based Active Topologies. The following Spanning Tree Protocols are available: STP, RSTP, PVSTP, MISTP. For information about Spanning Tree, see: “Spanning Tree Instance Management” (p. 19-8). Domain definition
A Domain is a distributed infrastructure made of NE, ENE, Transport Links and Edge Ports managed together to supply a Connection Less infrastructure. Its main properties are the bridge type (MAC, Virtual or Provider) and the STP type (STP, RSTP, PVSTP, MSTP or none). For Connection Oriented infrastructures, a default domain encompassing all such entities is considered existing by definition. There can be two ways of defining a domain: • •
Define a unique domain that includes all the NE and ENE that supplies the same service or. Define more domains that includes NE and ENE that supplies the same service, but are subdivided for example by customer.
The ETS domain is the default domain and is equal to the MAC domain. The Domain List window presents all the domains and their attributes. The domain ETS is created by defaults and cannot be deleted. Domain configuration
The Provider Bridge operation Mode allows to define the global QoS policy to be applied to all Ethernet Ports of a given Provider Bridge. Such value is mirrored on all Ports when each Port has configured the PCP Port Table Profile with its default value (that is, 0). The Provider Bridge Operation Mode can be configured on NE basis. The new attribute Provider Bridge Operation Mode (5P3D, 8P0D, 7P1D, 6P2D, CustomerDefined) is added to the Domain.
.................................................................................................................................................................................................................................... 1350 OMS 19-88 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Overview about Workflow
....................................................................................................................................................................................................................................
The value is derived from the corresponding value set at NE level, from all NEs contained in the Provider Bridge Domain. In particular, if all NEs have a homogeneous configuration of Provider Bridge Operation Mode, then the Domain reflects a real value, in all other cases, the value for the domain is set to "None". The Attribute can be configured at any time, this implying the automatic provisioning of the chosen value on all NEs contained in the Provider Bridge Domain. This operation forces all the ETB ports present in each Provider Bridge to be reset at the same Bridge NE PbOperationMode value and must be made paying attention. This attribute is meaningful only in case of Domain configured as Provider Bridge. The management performed at Domain level, ensures that all NEs contained inside the Provider Bridge domain really use the same QoS management. In fact, when all NEs are defined to use the same Priority Code Point All incoming Ethernet frames are interpreted in the same way: a defined meaning is assigned to each received sequence of Priority bits and such meaning/behavior is made common to a whole domain. NE configuration
The Provider Bridge operation Mode allows to define the global QoS policy to be applied to all Ethernet Ports of a given Provider Bridge. Such value is mirrored on all Ports when each Port has configured the PCP (priority code point) Port Table Profile with its default value (that is, 0). The Provider Bridge Operation Mode can be configured on NE basis. The configuration of the Provider Bridge Operation Mode on a Network Element is possible as described in the procedure“Configure a Network Element” (p. 19-98).
.................................................................................................................................................................................................................................... 1350 OMS 19-89 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Create a Domain
....................................................................................................................................................................................................................................
Create a Domain When to use
This function allows the operator to define a domain in the managed network. Related Information
For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The maximum number of domains must not be reached.
•
The User Label must be not in use by another domain.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Action > Packet > Construction > Create Domain. ...................................................................................................................................................................................................
2
On the Create Domain Window. To create a domain: •
Enter a User Label.
•
Enter a Bridge Type (None, MAC, Virtual, Provider, Not Meaningful, No Bridge).
•
Enter an STP Type (None, MSTP, PVSTP, RSTP, STP, Disabled).
•
Enter a Comment (optional).
...................................................................................................................................................................................................
3
Click Ok. Result: The domain is created.
The Domain list is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-90 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Add NE to a Domain
....................................................................................................................................................................................................................................
Add NE to a Domain When to use
The user adds a NE to a domain to manage the NE in that domain. Related Information
For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Construction > Network Elements > Defined NEs. ...................................................................................................................................................................................................
2
Select the NE in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Network Element > Assign Network Element to Domain.
.................................................................................................................................................................................................................................... 1350 OMS 19-91 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Add NE to a Domain
....................................................................................................................................................................................................................................
Result: The assign window is displayed.
...................................................................................................................................................................................................
4
Click the Bridge Domain field.
.................................................................................................................................................................................................................................... 1350 OMS 19-92 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Add NE to a Domain
....................................................................................................................................................................................................................................
Result: The list of available bridge domain is displayed.
...................................................................................................................................................................................................
5
Select the desired domain and Click the check sign to confirm it. ...................................................................................................................................................................................................
6
Click Ok. Result: The NE is assigned to the Domain previously created. This operation is
repeated for all the NEs that must be assigned to a domain. The domain must be the same or a different domain as explained in previous paragraph. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-93 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Domain Configuration
....................................................................................................................................................................................................................................
Domain Configuration When to use
This function allows the configuration of the Provider Bridge Operation mode of a provider domain. Related Information
For information, see: “Domain configuration” (p. 19-88). For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge Domains. ...................................................................................................................................................................................................
2
Select the Domain in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Domain > Configure Domain.
.................................................................................................................................................................................................................................... 1350 OMS 19-94 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Domain Configuration
....................................................................................................................................................................................................................................
Result: The configuration window is displayed. Figure 19-15 Provider Domain Configuration window
...................................................................................................................................................................................................
4
Select the Provider Bridge Operation Mode from the list. ...................................................................................................................................................................................................
5
If the Operation mode must be propagated to NEs belonging to the domain, select true; otherwise, select false. ...................................................................................................................................................................................................
6
Click Ok. Result: The Domain is configured consequently. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-95 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Domain Modification
....................................................................................................................................................................................................................................
Domain Modification When to use
This function modifies the VLAN Type for the domain. Related Information
For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge Domains. ...................................................................................................................................................................................................
2
Select the Domain in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Modify.
.................................................................................................................................................................................................................................... 1350 OMS 19-96 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Domain Modification
....................................................................................................................................................................................................................................
Result: The modification window is displayed. Figure 19-16 Domain Modification window
...................................................................................................................................................................................................
4
If the Set Standard VLAN Type (8100) is set to False, select the VLAN TYPE from the list of defined VLAN Types. ...................................................................................................................................................................................................
5
If the Set Standard VLAN Type (8100) is set to True, the VLAN TYPE is already set. ...................................................................................................................................................................................................
6
Click Ok. Result: The Domain is modified consequently. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-97 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Configure a Network Element
....................................................................................................................................................................................................................................
Configure a Network Element When to use
Configure the Provider Bridge Operation Mode on NE basis. Related Information
For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge NEs. ...................................................................................................................................................................................................
2
Select the Network Element in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Network Element > Configure.
.................................................................................................................................................................................................................................... 1350 OMS 19-98 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Configure a Network Element
....................................................................................................................................................................................................................................
Result: The configuration window is displayed. Figure 19-17 Network Element Configure window
...................................................................................................................................................................................................
4
To configure a Network Element: • •
Choose the Provider Bridge Operation Mode (As Container, 5P3D, 8P0D). If the operation mode must be propagated to the edge ports associated to NE, choose True for Propagate to Edge Ports parameter; in any other case, choose False.
...................................................................................................................................................................................................
5
Click Ok. Result: The Network Element is configured consequently. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-99 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Link Over TDM configuration
....................................................................................................................................................................................................................................
Link Over TDM configuration When to use
Configure the Link Over TDM. Related Information
For information, see: “Overview about Workflow ” (p. 19-88). For Link Over TDM, see: “Managing Links Over TDM” (p. 14-17). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Construction > Link Over TDM. ...................................................................................................................................................................................................
2
Select the Link Over TDM in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Link Over TDM > Configure.
.................................................................................................................................................................................................................................... 1350 OMS 19-100 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Link Over TDM configuration
....................................................................................................................................................................................................................................
Result: The configuration window is displayed. Figure 19-18 Client Type Selection
...................................................................................................................................................................................................
4
Select the Client Type ETB in the Configuration window. ...................................................................................................................................................................................................
5
Click Ok. Result: The Link Over TDM is configured consequently. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-101 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
NE Ethernet Physical Port Configuration
....................................................................................................................................................................................................................................
NE Ethernet Physical Port Configuration When to use
The NE Ethernet physical ports (local ports) are configured as ETS-P in a provider bridge configuration. Related Information
For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Construction > Network Elements > Defined NEs. ...................................................................................................................................................................................................
2
Select the Network Element in the list. ...................................................................................................................................................................................................
3
Follow the path Search > Inventory from Network Element > Ethernet Physical Port List. Result: The Ethernet Physical port list window is displayed. Figure 19-19 Ethernet Physical Port
.................................................................................................................................................................................................................................... 1350 OMS 19-102 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
NE Ethernet Physical Port Configuration
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
The Ethernet Physical Port list of the selected Network Element is displayed, select the port to configure and from the popup menu the item Configure. Result: The configuration window is displayed. Figure 19-20 Ethernet Physical Port Configuration window
...................................................................................................................................................................................................
5
Select the Client Type ETS-P and confirm with OK Button. Result: The Ethernet Physical Port is configured consequently. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-103 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Create a Customer
....................................................................................................................................................................................................................................
Create a Customer When to use
This function allows the user to define the characteristics of the owner (=customer) of one or more NE(s) to allow the usage of services defined across the boundaries of the managed network. Related Information
The first step to perform in EOT User Interface is the Customer creation to be able to create the desired Ethernet Service. For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The maximum number of customers must not be reached.
•
The User Label must be not in use by another customer.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Action > Packet > Services > Create Customer.
.................................................................................................................................................................................................................................... 1350 OMS 19-104 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Create a Customer
....................................................................................................................................................................................................................................
Result: The customer creation window opens. Figure 19-21 Customer Creation window
...................................................................................................................................................................................................
2
On the Create Customer Window insert the required data.
.................................................................................................................................................................................................................................... 1350 OMS 19-105 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Create a Customer
....................................................................................................................................................................................................................................
To create a customer: •
Enter a User Label.
•
Enter a Company (optional).
•
Enter an Address (optional).
•
Enter a Comment (optional).
...................................................................................................................................................................................................
3
Click Ok. Result: The customer is created.
The tree area and the Customer list are updated. The user can define services related to this customer. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-106 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Create an Ethernet Service
....................................................................................................................................................................................................................................
Create an Ethernet Service When to use
This function allows creating an Ethernet Service (related to a selected customer). Related Information
If this list is required from the Customer List, the Customer field of this creation window is automatically filled with the customer value selected in the Customer List. For general information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
Before the action, define one customer at least. The User Label must be not in use by another service.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Action > Packet > Services > Create Ethernet Service. ...................................................................................................................................................................................................
2
On the Create Service Window. Execute the following steps: •
Enter a Service User label.
•
Select the Customer from the available customer list, which opens when you enter the Customer field. Select the Service Type Extended EVPL. No other data are required. Click Ok.
• • •
...................................................................................................................................................................................................
3
Click Ok. Result: The service is created.
A correlation with the selected customer is created. .................................................................................................................................................................................................................................... 1350 OMS 19-107 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Create an Ethernet Service
....................................................................................................................................................................................................................................
Then, the tree area and the Ethernet Service List are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-108 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Traffic Descriptor Definition
....................................................................................................................................................................................................................................
Traffic Descriptor Definition When to use
Creation of the Traffic Descriptor. Related Information
For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Action > Packet > Services > Create Traffic Descriptor. Result: The creation window is displayed. ...................................................................................................................................................................................................
2
On the Create Traffic Descriptor Window. To create a Traffic Descriptor: •
Enter a User Label.
•
Select the Class of Service (Best Effort, Guaranteed, Regulated, Regulated1, Regulated3, Regulated4, Guaranteed2, Background). Enter a CIR value (set automatically to '0' if the selected Class of Service is 'Best Effort'). Enter a PIR value. Enter a CBS value (set automatically to '0' if the selected Class of Service is 'Best Effort'). Enter a PBS value (if the selected Class of Service is 'Guaranteed', PBS value is automatically set to CBS value - but could be modified).
• • • •
...................................................................................................................................................................................................
3
Click Ok. Result: The Traffic Descriptor is created.
A correlation with the selected customer is created.
.................................................................................................................................................................................................................................... 1350 OMS 19-109 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
Traffic Descriptor Definition
....................................................................................................................................................................................................................................
Then, the tree area and the Ethernet Service List are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-110 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Workflow for Bridge Management
EVC Allocation and Implementation
....................................................................................................................................................................................................................................
EVC Allocation and Implementation When to use
To complete the Provider Bridge Workflow: create a Connection Less EVC, allocate, and implement it. Related Information
For information, see: “Overview about Workflow ” (p. 19-88). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The Bridge EVC list window is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > Bridge EVC > Allocate. Result: The allocation window is displayed. ...................................................................................................................................................................................................
3
Click Ok. Result: The EVC is allocated.
The Provisioning State is changed to Allocated. ...................................................................................................................................................................................................
4
Select again the EVC in the list and follow the path Action > Bridge EVC > Implement. Result: The implementation window is displayed. ...................................................................................................................................................................................................
5
Click Ok. Result: The EVC is implemented.
The Provisioning State is changed to Implemented. E................................................................................................................................................................................................... N D O F S T E P S .................................................................................................................................................................................................................................... 1350 OMS 19-111 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management
Dynamic change capability
....................................................................................................................................................................................................................................
EVC Bandwidth Management Dynamic change capability Object applicability
The possibility to change dynamically the bandwidth assigned to an active (that is, implemented) Ethernet connectivity is one of the most important capabilities in the scope of Data Network Management. The dynamic change (increment/decrement) of bandwidth is possible for: •
Connection Oriented EVC: for Connection Oriented Networks, in the following cases: – The EVC is multicast, the traffic is broadcasted from one source UNI to leaves UNI. – All contained Ethernet Segment are balanced that is, have the same bandwidth parameters definitions. – All contained Ethernet Segment are not balanced that is, have different bandwidth parameters definitions; new parameters can cause the increment for one or more Ethernet Segment and the reduction for others.
•
Connection Less EVC: for Networks based on Provider Bridge, in the following cases: –
• •
All EVC Terminations are balanced that is, have the same bandwidth parameters definitions. – All EVC Terminations are not balanced that is, have different bandwidth parameters definitions; in this case it is possible that new parameters cause the bandwidth increment for some EVC termination and the reduction for some other. Ethernet Segments for Connection Oriented Networks, when the bandwidth of a single specific flow is changed.
•
EVC Terminations for Connection Less Networks, Provider Bridge based when the bandwidth of a specific EVC termination is changed. LSP Tunnel for MPLS networks, when the LSP Tunnel bandwidth is changed.
•
VC-LSP for MPLS networks, when the VC-LSP bandwidth is changed.
.................................................................................................................................................................................................................................... 1350 OMS 19-112 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management EVC Bandwidth Management
Function Description
....................................................................................................................................................................................................................................
Function Description Object status applicability
The applicability of the Bandwidth management is restricted to the following cases: • • • • • •
Implemented and allocated EVC (Connection Oriented Networks) which automatically affects all contained Ethernet Segments. Implemented and allocated EVC (Connection Less Networks) which automatically affects all contained EVC Terminations. Implemented and allocated Ethernet Segments (Connection Oriented Networks). EVC Terminations of Implemented and allocated EVCs (Connection Less Networks, Provider Bridge based). Implemented and Allocated LSP Tunnels. Implemented and Allocated VC-LSPs.
The Bandwidth management can also be requested on Allocated resources. Implemented Object applicability
Consider the following cases: •
“EVC Connection Oriented Based (Implemented)” (p. 19-113).
•
“EVC Connection Oriented Based (Allocated)” (p. 19-114).
•
“EVC Connection Less Based (Implemented or Allocated)” (p. 19-114).
•
“Ethernet Segments (Implemented)” (p. 19-115).
•
“Ethernet Segments (Allocated)” (p. 19-116).
EVC Connection Oriented Based (Implemented)
When all contained Ethernet Segments are implemented, acting at EVC level significantly simplifies the effort for the user that is requested to provide only once the new bandwidth parameters, either to enlarge or to reduce current values. Acting at EVC level, the bandwidth change is propagated to all contained Ethernet Segments; in particular: • • • •
The EVC must be implemented, all Ethernet Segments must be implemented. The bandwidth change is applied on each Ethernet Segment. When the bandwidth change is successfully propagated to all Ethernet Segments, the EVC continue to be Implemented. The new Class of Service must be compliant with the one in use by contained Ethernet Segments (in particular, if the EVC is realized by non homogeneous Class Of Services, then to avoid errors, the user must proceed on Ethernet Segment basis).
.................................................................................................................................................................................................................................... 1350 OMS 19-113 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management EVC Bandwidth Management
Function Description
....................................................................................................................................................................................................................................
•
In case of errors, the procedure is immediately stopped and one of the following situation are identified: – the EVC provisioning state is put in partially Implemented: this case occurs when at least one Ethernet Segment become partially Implemented because of unrecoverable errors during provisioning. – The EVC provisioning state remain as implemented: this case occurs when an Ethernet Segment has no room to allocate new bandwidth parameters. In this case the Ethernet Segment remain implemented with old bandwidth parameters.
EVC Connection Oriented Based (Allocated)
When all contained Ethernet Segments are Allocated, acting at EVC level significantly simplifies the effort for the user that is requested to provide only once the new bandwidth parameters, either to enlarge or to reduce current values. Acting at EVC level, the bandwidth change is propagated to all contained Ethernet Segments; in particular: • •
The EVC must be Allocated (this implying that all Ethernet Segments are allocated). The bandwidth change is applied on each Ethernet Segment.
EVC Connection Less Based (Implemented or Allocated)
Acting at EVC level significantly simplifies the effort for the user that is requested to provide only once the new bandwidth parameters, either to enlarge or to reduce current values. Acting at EVC level, the bandwidth change is propagated to all contained EVC Terminations; in particular: •
•
• •
Care must be taken about the new Class of Service that must be compliant with the one in use by contained EVC Terminations. If the EVC is realized by non homogeneous Class Of Services, then to avoid errors, the user must proceed on EVC Termination basis. The EVC can be implemented, if all EVC Terminations are activated, or allocated, if the bandwidth change for EVC Terminations is accomplished only inside 1350 OMS PKT database. The bandwidth change is applied on each contained EVC Termination. In case of errors, the procedure is immediately stopped. The EVC provisioning state remain with the previous provisioning state. The following situation is identified: – if provisioning state was implemented, it remains implemented. This case occurs when the provisioning for an EVC termination fails (that is the EVC termination remain active with old bandwidth parameters). In this case the EVC become made by “non homogeneous” (in terms of bandwidth) EVC Termination. –
if provisioning state was allocated, it remains allocated. The EVC become made with non homogeneous EVC terminations Bandwidth characteristics.
.................................................................................................................................................................................................................................... 1350 OMS 19-114 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management EVC Bandwidth Management
Function Description
....................................................................................................................................................................................................................................
Ethernet Segments (Implemented)
This case covers Implemented Ethernet Segments on Connection Oriented Networks; • •
• •
The bandwidth change is only admitted in the scope of the same QoS (for example: change from BE to Guaranteed is not allowed as well as other mixed possibilities). The bandwidth change is performed through the Ethernet Segment modification: the parameter modified is the Traffic Descriptor reference, so allowing the Ethernet Segment to point toward another TD. The bandwidth change is allowed, without restrictions, on all Transport Links types (that is Link Over TDM, Link Over Cable and Link Over MPLS). In case of increment, an internal check is performed along the Ethernet Segment following the current routing verifying that enough bandwidth is available. In particular: – In case of positive check,. - The Ethernet Segments starts pointing to another TD that reflects the new bandwidth parameters. - The values of used/available bandwidth values must be updated on used Transport Links and Edge Ports if an increment on Guaranteed parameter is required. - The behavior for bandwidth increment is performed on the Network, starting from last NE and proceeding in reverse way along the Ethernet Segment routing. - In case of error during provisioning operation, the global operation is stopped and the Provisioning state is set to partially implemented. –
In case of Negative check: The operation is stopped, a specific error message is displayed indicating the error reason. The Provisioning state remains set to implemented.
•
In case of reduction, no internal checks are needed and the operation is accepted; In particular: – – – –
The Ethernet Segments starts pointing to another Traffic Descriptor, that reflects the new bandwidth parameters. If a reduction on Guaranteed parameter is required, the values of used/available bandwidth values are updated on used Transport Links and Edge Ports. The behavior for bandwidth reduction is performed on the Network, starting from first NE and proceeding in forward way along the Ethernet Segment routing. In case of error during provisioning operation, the global operation is stopped and the Provisioning state is set to partially implemented.
.................................................................................................................................................................................................................................... 1350 OMS 19-115 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management EVC Bandwidth Management
Function Description
....................................................................................................................................................................................................................................
Ethernet Segments (Allocated)
The bandwidth change is: • •
• •
only admitted in the scope of the same QoS (for example: change from BE to Guaranteed is not allowed as well as other mixed possibilities). performed through the Ethernet Segment modification: the parameter modified is the Traffic Descriptor reference, so allowing the Ethernet Segment to point toward another Traffic Descriptor. allowed, without restrictions, on all Transport Links types (that is Link Over TDM, Link Over Cable and Link Over MPLS). In case of increment, an internal check is performed along the Ethernet Segment following the current routing, verifying that enough bandwidth is available. In particular: – In case of positive check,. - The Ethernet Segments starts pointing to a Traffic Descriptor that reflects the new bandwidth parameters. - The values of used/available bandwidth values must be updated on used Transport Links and Edge Ports if an increment on Guaranteed parameter is required.
•
In case of reduction, no internal checks are needed and the operation is accepted; In particular: – The Ethernet Segments starts pointing to a Traffic Descriptor that reflects the new bandwidth parameters. – The values of used/available bandwidth values must be updated on used Transport Links and Edge Ports if a reduction on Guaranteed parameter is required.
EVC Terminations
The terminations are Activated EVC Terminations belonging to Implemented or Allocated EVCs based on Connection Less Networks. The same behavior is performed both for bandwidth increments and for bandwidth reduction, no internal checks are needed and the operation is accepted; In particular: • • • • •
The EVC Termination starts pointing to another Traffic Descriptor that reflects the new bandwidth parameters. Only in case of Implemented EVCs, a specific behavior is started to propagate the modification toward NEs. The behavior for bandwidth change is performed on the Network, acting on the NE containing the EVC Termination. On NEs, a specific Traffic Descriptor creation is needed if a reusable one compliant with new bandwidth characteristics not exist. In case of error during provisioning operation, the global operation is stopped and the Provisioning state of the EVC does not change.
.................................................................................................................................................................................................................................... 1350 OMS 19-116 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Service Delimiting
Vlan Push/Pop On Provider Bridge UNI/IWI Management
....................................................................................................................................................................................................................................
Service Delimiting Vlan Push/Pop On Provider Bridge UNI/IWI Management Definition
The Service Delimiting allows the finalization of Vlan Push/Pop operations also at EVCs UNI/IWI based on Provider Bridge technology. This function enhances EVC Termination characteristics definition. For this reason, all the following consideration must be taken into account: •
•
•
For each EVC termination, the user can define, in addition to existing characteristics, an optional POP operation to be performed on Ethernet Traffic in the Provider Bridge Domain at ingress (that is, at UNI/IWI). For each EVC termination, the user can define, for traffic egress the Provider Bridge domain (that is, at UNI/IWI): Define in following way: – One or more Cos. – A PUSH operation for a given Cos. For each EVC termination, the user must define at least one Input Ethernet Flow or at least one Output Ethernet Flow. This operation allowing to cover all following cases: – Definition of "Source" EVC Termination point in Broadcasting Topologies in case that only Input Ethernet Flows are defined. – –
Definition of "Sink" EVC Termination point in Broadcasting Topologies, in case that only Output Ethernet Flows are defined. Definition of Bidirectional EVC Termination point in Point-to-point, Rooted-MultiPoint, or MultiPoint-To-MultiPoint topologies. In case that both Input Ethernet Flows and Output Ethernet Flows are defined, Termination point can be either balanced or unbalanced. Balanced means having equal I/O characteristics. Unbalanced means having Input characteristics different from output characteristics. Characteristics are classification, bandwidth, Qos, and so forth.
Operation and expected behavior
Operation and expected behavior in service delimiting are: •
EVC Definition (Provider Bridge). At EVC definition, EVC Terminations can optionally be supplied. For each EVC Termination, the user can define Input or Output Ethernet Flows characteristics. If the created EVC is empty, then all EVC Termination characteristics definition is delegated to the operation: “Add EVC Termination”.
•
Add EVC Termination (Provider Bridge).
.................................................................................................................................................................................................................................... 1350 OMS 19-117 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Service Delimiting
Vlan Push/Pop On Provider Bridge UNI/IWI Management
....................................................................................................................................................................................................................................
When the user wants to add a new EVC Termination to an existing EVC, for each EVC Termination the user must define Input or Output Ethernet Flows characteristics. •
Get EVC Extremities (Provider Bridge). For the selected EVC, this inventory must report the generic characteristics of all EVC Terminations, Input Ethernet Flows, and Output Ethernet Flows included.
•
Modify EVC Termination (Provider Bridge). After having defined the characteristics of an EVC termination, the user can change such characteristics for example adding or removing a POP or a PUSH.
•
Get Properties - EVC Termination (Provider Bridge). For the selected EVC Termination, this inventory must report the relevant characteristics, Input and Output Characteristics included.
.................................................................................................................................................................................................................................... 1350 OMS 19-118 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Spanning Tree
Overview
....................................................................................................................................................................................................................................
Spanning Tree Show the Spanning Tree Instance of EVC When to use
This function shows Spanning Tree Instance of a Connection Less EVC. Related Information
For information, see: “Spanning Tree Instance Management” (p. 19-8). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: • •
The EVC provisioning state must be set to Defined. No operation is pending on the selected EVC.
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The EVC list is shown. ...................................................................................................................................................................................................
2
Select the Bridge EVC and select the path Search > Bridge EVC > Show Spanning Tree Instance. Result: The Spanning Tree Instance belonging to the selected EVC is shown. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-119 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Spanning Tree
Show the Spanning Tree Instance
....................................................................................................................................................................................................................................
Show the Spanning Tree Instance When to use
This function shows Spanning Tree Instances. Related Information
For information about STI, see: “Spanning Tree Instance Management” (p. 19-8). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge). Result: The Connection Less menu is shown. ...................................................................................................................................................................................................
2
Select Show Spanning Tree Instance. Result: The Spanning Tree Instance belonging is shown. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-120 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Spanning Tree
Spanning Tree Instance configuration
....................................................................................................................................................................................................................................
Spanning Tree Instance configuration When to use
This function configures a Spanning Tree Instance. Related Information
For information, see: “Spanning Tree Instance Management” (p. 19-8). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Spanning Tree Instance. Result: The Spanning Tree Instance list window is displayed. ...................................................................................................................................................................................................
2
Select the Spanning Tree Instance in the list and follow the path Action > Spanning Tree Instance > Configure.
.................................................................................................................................................................................................................................... 1350 OMS 19-121 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Spanning Tree
Spanning Tree Instance configuration
....................................................................................................................................................................................................................................
Result: The Spanning Tree configuration window is displayed. Figure 19-22 Spanning Tree Instance Configuration window
...................................................................................................................................................................................................
3
Select one of the options then click OK. Result: The Spanning Tree Instance is configured. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-122 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Spanning Tree
Spanning Tree Instance Implementation
....................................................................................................................................................................................................................................
Spanning Tree Instance Implementation When to use
This function Implement a Spanning Tree Instance. Related Information
For information, see: “Spanning Tree Instance Management” (p. 19-8). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Spanning Tree Instance. Result: The Spanning Tree Instance list window is displayed. ...................................................................................................................................................................................................
2
Select the Spanning Tree Instance in the list and follow the path Action > Spanning Tree Instance > Implement. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: If the command is confirmed, the Spanning Tree Instance is Implemented. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-123 8DG42227DAAA 9.6 Issue 3 December 2012
Bridge Network Management Spanning Tree
Spanning Tree Instance Deimplementation
....................................................................................................................................................................................................................................
Spanning Tree Instance Deimplementation When to use
This function Deimplement a Spanning Tree Instance . Related Information
For information, see: “Spanning Tree Instance Management” (p. 19-8). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Spanning Tree Instance . Result: The Spanning Tree Instance list window is displayed. ...................................................................................................................................................................................................
2
Select the Spanning Tree Instance in the list and follow the path Action > Spanning Tree Instance > Deimplement. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: If the command is confirmed, the Spanning Tree Instance is Deimplemented. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 19-124 8DG42227DAAA 9.6 Issue 3 December 2012
20
20 Provider Backbone Bridge Network Management
Overview Purpose
This chapter describes how to set up a Provider Backbone Bridge (PBB) network. Contents Provider Backbone Bridge (PBB) Networks
20-5
Provider Backbone Bridge Management
20-5
PBB EVC provisioning
20-8
Ethernet Ring Protocol (ERP) Network Configuration
20-10 20-11
Network Configuration
20-11
PBB Domain Create
20-12
Define NE
20-14
Provisioning
20-17
Provisioning hardware reference
20-17
Transport link
20-20
Create Ethernet Physical Connection
20-21
Assign Link over Cable to PBB domain
20-24
ERP configuration
20-30
Create ERP Ring
20-30
Create an ERP Instance
20-38
Backbone VLAN ID
20-46
B-VID configuration
20-46
EVC-EVPLAN Service in PBB/ERP
20-52
Additional Info on PBB/ERP Service
20-52
PBB EVC Termination Management
20-56
................................................................................................................................................................................................................................... 1350 OMS 20-1 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management
Overview
....................................................................................................................................................................................................................................
Add PBB EVC Termination
20-56
Remove PBB EVC Termination
20-59
Provider Backbone Bridge EVC Management
20-60
View the PBB EVC list
20-61
Description of the list of PBB EVCs
20-62
Create PBB EVC
20-63
Allocate PBB EVC
20-65
Deallocate PBB EVC
20-67
Implement PBB EVC
20-68
Deimplement PBB EVC
20-70
Add Termination on implemented PBB EVC
20-71
Remove Termination on implemented EVC
20-72
Configure PBB EVC
20-73
Bridge Flows of PBB EVC
20-74
PBB EVC Broadcast Domain Containment
20-76
Enable Broadcast Domain Containment
20-77
Disable Broadcast Domain Containment
20-78
Automatic association UNI port - default VT
20-79
Manual association UNI port - user VT
20-80
Configuration of the DEI bit
20-81
B-VID Management
20-82
View the B-VID list
20-83
Create PBB B-VID
20-84
Delete PBB B-VID
20-86
Allocate PBB B-VID
20-87
Deallocate PBB B-VID
20-88
Implement PBB B-VID
20-89
Deimplement PBB B-VID
20-91
Domain Wide VID distribution
20-93
Ring Association to a B-VID
20-95
Ring Dissociation from B-VID
20-97
Change ERP of a B-VID
20-99
List ERP instances of a B-VID
20-101
Association of Transport Link to B-VID
20-102
Dissociation of Transport Link to B-VID
20-104
.................................................................................................................................................................................................................................... 1350 OMS 20-2 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management
Overview
....................................................................................................................................................................................................................................
Ethernet Ring Protection (ERP) Management
20-107
View the ERP ring list
20-108
Description of the list of ERP
20-109
Create/delete ERP Ring
20-110
Implement/deimplement the ERP
20-112
ERP Switch Command
20-113
ERP Switch Command From Port
20-114
Add/remove Transport Link in a Ring
20-115
Add/remove Node in a Ring
20-116
Create/delete ERP Ring bundle
20-117
Add/remove ERP Ring in a bundle
20-118
ERP Instance Management
20-120
View the ERP instance list
20-121
Description of the list of ERP instances
20-122
Create/delete ERP instance
20-123
Implement/deimplement the ERP instance
20-125
Associate OAM to the ERP instance
20-126
Get a graphical view of the ERP instance
20-127
Modify Defined ERP instance
20-129
Modify implemented ERP instance
20-131
PBB Fault Management PBB Fault Localization and navigation to AS Workflow for PBB Management
20-133 20-134 20-135
Overview about Workflow
20-135
Create a PBB Domain
20-137
Add NE to a Domain
20-138
Add Transport Link to a Domain
20-139
ERP provisioning
20-141
Configure B-VID
20-143
Create a PBB EVC
20-144
PBB EVC traffic classification
20-153
Traffic Descriptor Definition
20-154
EVC Allocation and Implementation
20-155
In Band Management Address Configuration of the Network Elements
20-156 20-157
.................................................................................................................................................................................................................................... 1350 OMS 20-3 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management
Overview
....................................................................................................................................................................................................................................
Lag Port Creation (Via Zic)
20-165
NMS Start Supervision (NE Not Defined On NMS)
20-183
.................................................................................................................................................................................................................................... 1350 OMS 20-4 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge (PBB) Networks
Provider Backbone Bridge Management
....................................................................................................................................................................................................................................
Provider Backbone Bridge (PBB) Networks Provider Backbone Bridge Management PBB description
Provider Backbone Bridges (PBB) is a networking standard approved by IEEE as 802.1ah standard. Provider Backbone Bridges is a set of architecture and protocols for routing of a customer network over a provider's network Provider Backbone Bridges allows interconnection of multiple Provider Bridge Networks without losing each customer's individually defined VLANs. Provider Backbone Bridges offers a complete separation of customer and provider domains. Objectives of Provider Backbone Bridging
PBB is designed to address limitations of Provider Bridge: •
VID-space scalability. A 24-bit field is added to each frame to contain an enlarged space for customer service identification. 16 M services.
•
FDB-size scalability. The MAC addresses of all customer equipment that passes through a core node must be learned and/or looked-up in the FDB. If FDB is “full”, addresses cannot be learned, so return traffic is flooded and not unicasted: Bandwidth inefficiency. A ‘backbone’ MAC destination and source address pair is added to each frame for forwarding between PBB Nodes. This header “hides” the Customer Destination Address and Customer Source Address fields.
PBB frames
The PBB header may take multiple different forms, but the main components of the header are: •
•
Backbone component: – Backbone destination address (B-DA) (six bytes). – Backbone source address (B-SA) (six bytes). – EtherType 0x88A8 (two bytes). – B-TAG/B-VID (two bytes), this is the backbone VLAN indicator. Service encapsulation: – EtherType 0x88E7 (two bytes). – Flags that contain priority, DEI and indication, if there are no customer addresses present (e.g. OAM frames). – I-SID, the service identifier (three bytes).
.................................................................................................................................................................................................................................... 1350 OMS 20-5 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge (PBB) Networks
Provider Backbone Bridge Management
....................................................................................................................................................................................................................................
•
Original customer frame: – Customer source address (six bytes). – – – – –
Customer destination address (six bytes). EtherType 0x8100 (two bytes). Customer VLAN identifier (two bytes). EtherType (e.g. 0x0800). Customer payload.
Bridges learn based on the B-SA and ingress port value and hence is completely unaware of the customer MAC addresses. I-SID allows to distinguish the services within a PBB domain. PBB Services Types
A service is identified by a Backbone Service Instance Identifier (I-SID). The Service Type is determined by the mapping of Customer Network Port traffic to a particular I-SID. Service Types (IEEE 802.1ah): •
Port based: All untagged and priority tagged frames ↔I-SID. This service type can be used to connect 802.1Q or 802.1D bridges to a CNP. All S-Tagged frames are dropped.
• •
S-tagged one-to-one: Frames with a single specific S-VID ↔I-SID. S-tagged bundled many-to-one: Frames with an S-VID in a specific set of N values ↔I-SID. S-tagged bundled all-to-one: Frames with any non-zero S-VID ↔I-SIDcomplement of “Port Based” service.
•
Note: 1350 OMS implementation of some service types is less rigid. For example “Port-based” does not necessarily discard all S-tagged frames. PBB Services Multiplexing
The frames are split in more than one “service”, each mapped to its own I-SID. Service Types that are incompatible with Service Multiplexing: • •
Port Based Service S-Tagged Service –All-to-One
Service Types that can be used with Service Multiplexing • •
S-Tagged Service –1:1. S-Tagged Service –N:1 Note: A given S-VID can map to only a single I-SID.
Mapping single S-VID to multiple I-SIDs is not allowed: • •
Can create an unintentional loop in the PBB network. Loop cannot be guarded by xSTP: PIP-CBP barrier for STPDUs
.................................................................................................................................................................................................................................... 1350 OMS 20-6 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge (PBB) Networks
Provider Backbone Bridge Management
....................................................................................................................................................................................................................................
PBB Ethernet Virtual Connection
MEF defines Ethernet Virtual Connection (EVC) services: •
EVC: Transparent connection service between a set of UNIs
•
In a PBB context the UNI is a CNP port
The EVCs have been classified in three Service Types: • •
E-Line: Point-to-point EVC. Connects 2 UNIs bi-directionally. E-LAN: Multipoint EVC. Connects more than 2 UNIs bi-directionally.
•
E-Tree: Rooted-multipoint EVC. Connects at least one “Root” UNI and at least two “Leaf” UNIs bi-directionally, but blocking direct traffic between “Leaf” UNIs
The following Service Types are supported: • •
E-Line: Any Port-based or S-tagged service can be supported over E-LINE. E-LAN: Any Port-based or S-tagged service can be supported over E-LAN.
•
E-Tree: Not supported within PBB: Requires non-standard additions to PBB toolset. E-TREE service requires that traffic between ‘Leaves’ is blocked. Service Multiplexing: E-LINE and E-LAN services can be multiplexed on same CNP port. Restriction: S-VID to I-SID mapping constraints.
•
.................................................................................................................................................................................................................................... 1350 OMS 20-7 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge (PBB) Networks
PBB EVC provisioning
....................................................................................................................................................................................................................................
PBB EVC provisioning PBB EVC provisioning description Figure 20-1 PBB EVC provisioning
.................................................................................................................................................................................................................................... 1350 OMS 20-8 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge (PBB) Networks
PBB EVC provisioning
....................................................................................................................................................................................................................................
The figure shows that the only provisioning needed to implement an EVC over PBB is the one done at its EVC Terminations (both the one directly related to the EVC Termination itself and the one related to the association of the I-SID to the B-VID that is perfomed on the NNIs of the B-VID in the same NE of the EVC Termination). “Ethernet Ring Protocol (ERP)” (p. 20-10) To implement an EVC over PBB, the system only perform provisioning on the NEs that host EVC Terminations for that EVC. This is true only if the EVC is not under OAM. If the EVC is under OAM, things are different. In general, OAM is possible for the I-SID (to monitor the single EVC) and for the B-VID (in order to monitor the virtual infrastructure common to more EVCs). I-SID monitoring, as for the standard, only takes into account the points where the EVC is provisioned. This means that internal points are not taken into consideration: link trace is not so meaningful in that case. The choice done for PKT is a bit different: we choose to monitor only the I-SID (so, no B-VID monitoring) but, willing to see also the intermediate points in the network, we provision the I-SID also wherever the B-VID is, so that a link trace, for example, will report all the NEs crossed by the traffic. The provisioning of an EVC under OAM requires the distribution of the I-SID to all the places wherever the B-VID is distributed (for example: to all the NNIs in the network that are in NEs that do not host any Termination of the monitored EVC). The distribution of the I-SID is done in addition to any other I-SID distribution.
.................................................................................................................................................................................................................................... 1350 OMS 20-9 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge (PBB) Networks
Ethernet Ring Protocol (ERP)
....................................................................................................................................................................................................................................
Ethernet Ring Protocol (ERP) ERP Objectives
Suitable to operate in the Ethernet transport plane, which implies Connectionless forwarding Automatic address learning Ageing and flushing mechanisms Ethernet Ring Protection (Switching) –ERP(S) – is standardized by ITU-T to establish a “Carrier Class” protection switching mechanism in the Ethernet transport plane. Main objectives: • • •
Protect single ring and more complicated topologies. Fast: 50 ms traffic restoration time (Compared with multiple seconds for xSTP). Suitable to operate in the Ethernet transport plane. Operate in the Ethernet transport plane implies: – Connection less forwarding. – Automatic address learning. – Ageing and flushing mechanisms.
ERP Protocol Tuning
ERP Protocol Tuning parameters explanation: •
Switch behavior [Revertive/Not Revertive]: revert or not to the main resource when failure clears.
•
Wait Time to Restore [0..12 Minutes in step of 1 minute]: meaningful only in case the swicthing behavior is revertive, is the time the main resource must be free of failures before reverting to. Hold-Off time [0..1000 millisec in step of 10 millisec]: time to wait, after failure detection, before starting protection in order to see if other protection recovers the failure Guard Time [10..2000 millisec in step of 10 millisec]: during guard time RPL owner discards the received R-APS OAM frames. It s started according to the ERP state machine specifications (see ERP specifications for more details)
•
•
.................................................................................................................................................................................................................................... 1350 OMS 20-10 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Network Configuration
Network Configuration
....................................................................................................................................................................................................................................
Network Configuration Network Configuration PBB Introduction
PBB is a type of Bridge domain: No specific PBB provisioning attributes is necessary. Control protocol is ERP. Inside PBB domain there are no Provider Bridge NEs. Control protocol is based on ERP only. In theory there could be a mix of xSTP (Spanning Tree Protocol) and ERP.
.................................................................................................................................................................................................................................... 1350 OMS 20-11 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Network Configuration
PBB Domain Create
....................................................................................................................................................................................................................................
PBB Domain Create When to use
The scope of this procedure is to create a PBB Domain. In Connection Less Networks, the Domain represents an homogeneous set of Network Elements dedicated to MAC, Virtual Provider or Provider Backbone Bridging. Related Information
A Domain is a distributed infrastructure made of NE, External-Network (aka virtual NE), Transport Links and Edge Ports managed together to supply a Connection Less infrastructure. Its main properties are the domain type (ETS, Bridge, T-MPLS), bridge type (MAC, Virtual, Provider or Provider Backbone Bridge) and the Control Plane Type (ERP, STP, RSTP, PVSTP, MSTP or none) The list of possible Control protocols depends on the selected Bridge Type. In case of PBB the only possible choice for Control Protocol is ERP. Before you begin
This task does not have any preconditions. Task ...................................................................................................................................................................................................
1
From the main menu bar select Actions > Packet > Construction > Create Domain. Figure 20-2 Actions>Packet>Construction>Create Domain
.................................................................................................................................................................................................................................... 1350 OMS 20-12 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Network Configuration
PBB Domain Create
....................................................................................................................................................................................................................................
Result: The Create PBB Domain window is displayed. ...................................................................................................................................................................................................
2
In the Create PBB Domain window enter following data: •
User Label : a friendly name identifying the Domain
•
Domain Type: select the value Bridge
•
Bridge Type: select the value PBB
•
Control Protocol Type: select the value ERP
•
Reserved B-VIDs for ERP: insert a range
Click Apply or OK button to confirm the operation. Figure 20-3 Create PBB Domain
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-13 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Network Configuration
Define NE
....................................................................................................................................................................................................................................
Define NE When to use
The scope of this procedure is to assign a Network Element to PBB domain. Related Information
This procedure applies to all NEs belonging to PBB domain. Before you begin
This task does not have any preconditions. Task ...................................................................................................................................................................................................
1
Issue a search of the NEs available following the path Search > Packet > Construction > Network Elements > Available NEs. Figure 20-4 Search>Packet>Construction>Network Elements>Available NEs
...................................................................................................................................................................................................
2
The list of the available NEs is displayed.
.................................................................................................................................................................................................................................... 1350 OMS 20-14 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Network Configuration
Define NE
....................................................................................................................................................................................................................................
Select the involved Network Element and follow the path Actions > Define Network Element from the popup menu. Figure 20-5 Available NE: Actions>Define Network Element
Result: The Define Network Element window is displayed. ...................................................................................................................................................................................................
3
Enter or select following data: •
User Label: a friendly name for the Network Element to be defined.
•
Working Mode: select PBB
•
STP type: select disabled
Click Apply or OK to confirm the operation. Figure 20-6 Define Network Element dialog box
...................................................................................................................................................................................................
4
From the main menu bar select Search> Packet > Construction > Network Elements > Defined NEs.
.................................................................................................................................................................................................................................... 1350 OMS 20-15 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Network Configuration
Define NE
....................................................................................................................................................................................................................................
The list of the defined NEs is displayed. Figure 20-7 Defined NE list
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-16 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Provisioning hardware reference
....................................................................................................................................................................................................................................
Provisioning Provisioning hardware reference When to use
The scope of this procedure is to give a reference for port create. For more detail refer to the equipment User Provisioning Guide Related Information
The involved NEs are defined in PBB domain. Before you begin
Insert the port terminations in the correct position. Task ...................................................................................................................................................................................................
1
Once 1850 TSS is supervised, navigation to the ZIC GUI management application is allowed selecting the TSS Network Element in the list and from the popup menu Search > Show Equipment
Access the Show Equipment view of the originating NE. Figure 20-8 Show Equipment view
.................................................................................................................................................................................................................................... 1350 OMS 20-17 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Provisioning hardware reference
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
In the Show Equipment, navigate the left-h-side tree and select the termination. The physical real image is shown in the right-h-side after bar down scrolling. Figure 20-9 Show Equipment: select the termination
...................................................................................................................................................................................................
3
Click twice on the termination. In the right-hand box click Save to confirm. Figure 20-10 Module setting
.................................................................................................................................................................................................................................... 1350 OMS 20-18 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Provisioning hardware reference
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Access the Show Equipment view of the terminating NE. The module setting is the same as above described for the originating NE. Figure 20-11 Show Equipment view of the terminating NE
...................................................................................................................................................................................................
5
From the Node list select the node involved in hardware recent change and follow the path Actions > Physical > Synchronize > Synchronize NE Figure 20-12 Node: Actions>Physical>Synchronize>Synchronize NE
E................................................................................................................................................................................................... N D O F S T E P S .................................................................................................................................................................................................................................... 1350 OMS 20-19 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Transport link
....................................................................................................................................................................................................................................
Transport link Transport link introduction
The transport infrastructure is named Transport Link. The Transport Link can be supported by: •
•
A TDM path. The link is called Link Over TDM. It carries directly Ethernet Segments, Tunnels or PWs. A Tunnel/PW. The link is called Link Over (T-)MPLS. A Link Over TDM or a Link Over Cable (Martini) carries it. An Ethernet cable. The link is called Link Over Cable.
•
A WDM link. The link is called Link Over WDM.
•
.................................................................................................................................................................................................................................... 1350 OMS 20-20 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Create Ethernet Physical Connection
....................................................................................................................................................................................................................................
Create Ethernet Physical Connection When to use
The scope of this procedure is to create an Ethernet Physical Connection Related Information
The involved ports have already been provisioned. Before you begin
This task does not have any preconditions. Task ...................................................................................................................................................................................................
1
From the map view, select the nodes to connect and follow the path Actions > Physical > Create Physical Connection Figure 20-13 Actions>Physical>Create Physical Connection
Result: The Create Physical connection window is displayed. ...................................................................................................................................................................................................
2
Set the following attributes: •
Enter a User Label to identify the transport link.
•
Select Connection type equal to Ethernet
•
Choose the Transport Alarm Enabling Rule (On Definition)
•
Only for TDM, select Implement rule
•
Only for TDM, select allocation cost
.................................................................................................................................................................................................................................... 1350 OMS 20-21 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Create Ethernet Physical Connection
....................................................................................................................................................................................................................................
Click Next button. Figure 20-14 Create Physical Connection
...................................................................................................................................................................................................
3
The second step is customized according to the “Connection Type” selected (here below Ethernet physical link creation window is shown): Only NEs with Ethernet Ports are proposed as possible choices to user.
.................................................................................................................................................................................................................................... 1350 OMS 20-22 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Create Ethernet Physical Connection
....................................................................................................................................................................................................................................
Only free ports of selected NE and with rate compatible with the link rate are proposed as possible choices to user. •
Select the Physical Connection Rate of Ethernet link
•
Select the end nodes, if not already selected, click on A-node and Z-node empty box, then select the node from the selection list.
•
Select the end ports, by means of the usual selection mechanism.
Figure 20-15 Create> Physical Connection step2
...................................................................................................................................................................................................
4
Click OK or Apply to confirm the creation. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-23 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Assign Link over Cable to PBB domain
....................................................................................................................................................................................................................................
Assign Link over Cable to PBB domain When to use
The scope of this procedure is to assign a Link over Cable to PBB domain. Related Information
The involved ports have already been provisioned. Before you begin
The Physical connection to assign has been created. Task ...................................................................................................................................................................................................
1
From the main menu bar follow the path Search > Packet > Construction > Transport Links > Links over Cable Figure 20-16 Search>Packet>Construction>Transport Links>Links over Cable
.................................................................................................................................................................................................................................... 1350 OMS 20-24 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Assign Link over Cable to PBB domain
....................................................................................................................................................................................................................................
Result: The Links over Cable list is displayed. Figure 20-17 Links over Cable list
...................................................................................................................................................................................................
2
Select the Link over Cable to assign and follow the path Actions > Assign Resources to Domain Figure 20-18 Link over Cable: Actions>Assign Resources to Domain
Result: The Assign Resources to Domain window is displayed. ...................................................................................................................................................................................................
3
Click the selection list icon (right side of the window). From the list select the relevant PBB domain.
.................................................................................................................................................................................................................................... 1350 OMS 20-25 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Assign Link over Cable to PBB domain
....................................................................................................................................................................................................................................
Click Apply or OK to confirm. Figure 20-19 Assign Resources to Domain
.................................................................................................................................................................................................................................... 1350 OMS 20-26 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Assign Link over Cable to PBB domain
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
In the Link over Cable list you can verify that the relevant Link over Cable has the domain attribute accordingly. Figure 20-20 Link over Cable list
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-27 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Assign Link over Cable to PBB domain
....................................................................................................................................................................................................................................
Delete Transport Link ...................................................................................................................................................................................................
1
Select the Link over Cable to delete in the list and follow the path from the popup menu Actions > Delete. Figure 20-21 Link over Cable:Actions>Delete
...................................................................................................................................................................................................
2
Select the related Physical Connection and follow the path from the popup menu Actions > Remove. Figure 20-22 Physical Connection:Actions>Remove
.................................................................................................................................................................................................................................... 1350 OMS 20-28 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning
Assign Link over Cable to PBB domain
....................................................................................................................................................................................................................................
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-29 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create ERP Ring
....................................................................................................................................................................................................................................
ERP configuration Create ERP Ring When to use
The scope of this procedure is to configure major ring and sub-rings by selecting the links in the map. Related Information
This task does not have any related information. Before you begin
From the physical topology view (physical map) the user configures major ring and sub-rings by selecting the links in the map. Task ...................................................................................................................................................................................................
1
From the main menu bar follow the path Actions > Packet > ERP > Create ERP Ring. Figure 20-23 Actions>Packet>ERP>Create ERP Ring
...................................................................................................................................................................................................
2
In the Create ERP window enter or select following data: • •
ERP User Label Ring type : select Major or Subring
•
Activation status [active/not active] : this value is used to enable or disable the ERP protocol.
.................................................................................................................................................................................................................................... 1350 OMS 20-30 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create ERP Ring
....................................................................................................................................................................................................................................
With the usual selection mechanism, select the PBB domain. Figure 20-24 Create ERP Ring
...................................................................................................................................................................................................
3
Select the Transport Links to associate to ERP ring. Click the selection icon, the following list is displayed. Select all Transport Links.
.................................................................................................................................................................................................................................... 1350 OMS 20-31 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create ERP Ring
....................................................................................................................................................................................................................................
Note: The multiple selection is allowed by means of the mouse small wheel. Figure 20-25 Bridge Transport Links
Click OK to confirm the selection. ...................................................................................................................................................................................................
4
The selected Transport Links are now displayed in the Create ERP Ring main window.
.................................................................................................................................................................................................................................... 1350 OMS 20-32 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create ERP Ring
....................................................................................................................................................................................................................................
Click OK to confirm the creation. Figure 20-26 Create ERP Ring
.................................................................................................................................................................................................................................... 1350 OMS 20-33 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create ERP Ring
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
To verify the successful creation follow the path Search > Packet > ERP > Rings Figure 20-27 Search>Packet>ERP>Rings
...................................................................................................................................................................................................
6
The list of the ERP Rings is shown below, containing the ERP ring which has been just created. Figure 20-28 List of ERP Rings
.................................................................................................................................................................................................................................... 1350 OMS 20-34 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create ERP Ring
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
7
Select the ring which has just been created and follow the path from the popup menu Actions > Implement ERP Ring Figure 20-29 ERP ring: Actions>Implement ERP Ring
...................................................................................................................................................................................................
8
The ERP Ring has been implemented. Figure 20-30 ERP Ring implemented
.................................................................................................................................................................................................................................... 1350 OMS 20-35 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create ERP Ring
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
9
From the ERP Ring you can search the nodes on the ring. Figure 20-31 ERP Ring:Search>Nodes
...................................................................................................................................................................................................
10
The list of the nodes belonging to the ring is displayed. Figure 20-32 Nodes belonging to the ring
...................................................................................................................................................................................................
11
From the ERP Ring you can search the physical links belonging to the ring. Figure 20-33 ERP Ring:Search>Physical Links
.................................................................................................................................................................................................................................... 1350 OMS 20-36 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create ERP Ring
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
12
The list of the physical connections belonging to the ring is displayed. Figure 20-34 Physcons belonging to the ring
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-37 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create an ERP Instance
....................................................................................................................................................................................................................................
Create an ERP Instance When to use
The scope of this procedure is to create an ERP instance. Related Information
The ERP ring has been configured and implemented. Before you begin
The ERP ring has been configured and implemented Task ...................................................................................................................................................................................................
1
Before creating a new instance, it is opportune to search the existing instances on the involved ring. On the same ERP ring many instances can be created, according to the customer traffic needs. Select the ERP ring in the list and follow the path on the popup menu Search > ERP Instances. Figure 20-35 ERP ring: Search>ERP Instances
...................................................................................................................................................................................................
2
A search of the ERP instances can be done also fro Show Equipment of an involved NE.
.................................................................................................................................................................................................................................... 1350 OMS 20-38 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create an ERP Instance
....................................................................................................................................................................................................................................
Select folder Ethernet Ring protection. Figure 20-36 Search of the ERP instances
ERP 1 has 2 instances, one per port and one per VLAN. ERP2 has no instance. ...................................................................................................................................................................................................
3
The user can display the ERP Instances for a PBB domain. Select the PBB domain in the domain list and follow the path on the popup menu Search > ERP Instances. Figure 20-37 PBB domain:Search>ERP Instances
.................................................................................................................................................................................................................................... 1350 OMS 20-39 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create an ERP Instance
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
From the main menu bar follow the path Actions > Packet > ERP > Create ERP Instance Figure 20-38 Actions>Packet>ERP>Create ERP Instance
...................................................................................................................................................................................................
5
The Create ERP Instance window is displayed. Folder General is already selected. Enter instance User Label and select the following attributes: • • • • • •
R-APS VLAN ID Insert a value between 1 and 4093, the value is unique per ring or
group of interconnected rings R-APS PCP [0..7] this is the priority bits value for R-APS. Maintenance Entity Level [0..7] this is an integer value indicating the OAM level
assigned to R-APS- ring autoprotection switch. Scope of ERP instance . You can select per port or per VLAN PBB domain. Select the target PBB domain. ERP Ring: the ring to which the instance will be applied.
.................................................................................................................................................................................................................................... 1350 OMS 20-40 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create an ERP Instance
....................................................................................................................................................................................................................................
• •
RPL (ring protection link) Owner It is the NE that has the master role on ERP instance RPL (East/west link that is Blocked by RPL owner in nominal conditions)
Figure 20-39 Create ERP Instance: General
...................................................................................................................................................................................................
6
Select folder Timers and proceed with Protocol Tuning: • •
Switch behavior [Revertive/Not Revertive] : revert or not to the main resource when failure clears Wait Time to Restore [0..12 Minutes,steps of 1] : meaningful only in case the swicthing behavior is revertiv. It is the time the main resource must be free of failures before reverting to.
.................................................................................................................................................................................................................................... 1350 OMS 20-41 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create an ERP Instance
....................................................................................................................................................................................................................................
• •
Hold-Off time [0..1000 millisec, steps of 10]: time to wait, after failure detection, before starting protection in order to see if other protection recovers the failure. Guard Time [10..2000 millisec, steps of 10] : during guard time RPL owner discards the received R-APS OAM frames. It is started according to the ERP status state.
Figure 20-40 Create ERP Instance: Timers
...................................................................................................................................................................................................
7
Select folder Failures Optional Alarms that can be included/excluded in the list of Switch Criteria: • • • •
Signal Degrade Partial Loss of Capacity (if ring ports are LAG) Loss Of Continuity (CCM) defect Link OAM Critical Events
.................................................................................................................................................................................................................................... 1350 OMS 20-42 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create an ERP Instance
....................................................................................................................................................................................................................................
Note: If Loss of Continuity defect or Link OAM Critical Events are used as Switch Criteria it is necessary to assign Down MEPs to Ring Ports (on all the NEs inside the ring) Figure 20-41 Create ERP Instance: Failures
.................................................................................................................................................................................................................................... 1350 OMS 20-43 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create an ERP Instance
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
8
In the Create ERP Instance wizard, click Apply or OK to confirm the creation. Figure 20-42 Create ERP Instance
...................................................................................................................................................................................................
9
Select the ERP Instance and follow the path on the popup menu Actions > Implement ERP Instance Figure 20-43 ERP Instance: Actions>Implement ERP Instance
.................................................................................................................................................................................................................................... 1350 OMS 20-44 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP configuration
Create an ERP Instance
....................................................................................................................................................................................................................................
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-45 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Backbone VLAN ID
B-VID configuration
....................................................................................................................................................................................................................................
Backbone VLAN ID B-VID configuration When to use
The scope of this procedure is to define a B-VID in a PBB domain and to associate it to the ERP instance: The B-VID is the VLAN. Related Information
The related descriptions are contained in the previous procedures. Before you begin
The configuration of NEs, Transport Links, ERP ring, ERP Instance has been previously completed with success. Task ...................................................................................................................................................................................................
1
From the main menu bar follow the path Actions > Packet > Services > ConnectionLess(Bridge) > Create B-VID Figure 20-44 Actions>Packet>Services>ConnectionLess(Bridge)>Create B-VID
...................................................................................................................................................................................................
2
In the B-VID creation wizard window enter or select following data: •
User Label. Enter the userlabel to identify the B-VID.
•
Domain. Select the domain.
.................................................................................................................................................................................................................................... 1350 OMS 20-46 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Backbone VLAN ID
B-VID configuration
....................................................................................................................................................................................................................................
• •
•
VLAN ID. Select a unique number.
VLAN distribution You can select: – Manual. In this case the user will specify all relevant Transports Links. – Domain Wide. In this case the VLAN is distributed over all Transport Links of all rings belonging to the Domain. Select Manual.
Click ERP. Select the ERP ring to which the B-VID is to be assigned. Select the ERP instance. The selected ERP instance is now contained in the bottom box. Figure 20-45 Create B-VID wizard step1
...................................................................................................................................................................................................
3
Click Transport Links.
.................................................................................................................................................................................................................................... 1350 OMS 20-47 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Backbone VLAN ID
B-VID configuration
....................................................................................................................................................................................................................................
Select the Transport/s to which the B-VID is assigned Figure 20-46 B-VID:Transport Links selection
.................................................................................................................................................................................................................................... 1350 OMS 20-48 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Backbone VLAN ID
B-VID configuration
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
After selecting all ERP and Transport Links, click Apply or OK to confirm the creation. Figure 20-47 Create B-VID
...................................................................................................................................................................................................
5
To verify the successful creation, from the main menu bar follow the path Search > Packet > Services > Connection Less(Bridge) > B-VIDs ...................................................................................................................................................................................................
6
The B-VID list is displayed, containing the B-VID which has been just created (status = defined).
.................................................................................................................................................................................................................................... 1350 OMS 20-49 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Backbone VLAN ID
B-VID configuration
....................................................................................................................................................................................................................................
Select the B-VID which has been just created and follow the path from the popup menu Actions > Allocate. Figure 20-48 B-VID list
...................................................................................................................................................................................................
7
The B-VID Provisioning State changes to allocated. Select the B-VID from the list and follow the path from the popup menu Actions > Implement.. Figure 20-49 B-VID: Actions>Implement
.................................................................................................................................................................................................................................... 1350 OMS 20-50 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Backbone VLAN ID
B-VID configuration
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
8
The B-VID Provisioning State changes to implemented passing thorough intermediate status partially implemented. Figure 20-50 B-VID partially implemented (few secs)
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-51 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management EVC-EVPLAN Service in PBB/ERP
Additional Info on PBB/ERP Service
....................................................................................................................................................................................................................................
EVC-EVPLAN Service in PBB/ERP Additional Info on PBB/ERP Service When to use
The scope of this procedure is to define Additional Info on PM, QoS and Managing Traffic Descriptor. Related Information
Refer to“PBB Ethernet Virtual Connection” (p. 20-7) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Additional Info on PM ...................................................................................................................................................................................................
1
MEG (maint-entity-grp) is characterized by: •
MEG Identifier: made by a Format and a Name. Format can be (to be confirmed by NE which will be implemented).
• • • • •
String Dns-Like Name MAC Address integer Associated Maintenance Domain
•
MIP creation policy [none, All points, Lower-level MEP exists]: which policy is used inside MEG for MIP Creation. Default is inherited from Maintenance Domain. See next step. CC Interval [1 sec(Default), 10 sec, 1 min, 10 min] (interval between CCM PDUs) CC Priority [0..7]( Class-of-Service to be used for CCM PDU). The Monitored Resource is automatically determined by NMS from domain type: in case of PBB.
• • • •
S-VLAN in case of Provider Bridge. C-VLAN in case of Virtual Bridge.
.................................................................................................................................................................................................................................... 1350 OMS 20-52 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management EVC-EVPLAN Service in PBB/ERP
Additional Info on PBB/ERP Service
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
MIP creation policy can be illustrated by an example: •
MEG#1, MEG#2, MEG#3 all refers to a given EVC.
• •
MEG#3 is created with “none”, so no MIPs are created. MEG#2 is created with “All points”, so MIPs are created in all the points (ports) where the EVC is passing through. MEG#1 is created with “Lower-level MEP exists”, so MIPs are present only where MEP of MEG#2 and MEG#3 are present.
•
Figure 20-51 MIP creation policy
...................................................................................................................................................................................................
3
For each EVC termination the user defines the traffic classification rules by associating a Traffic Classifier and QoS attributes. Traffic Classifier allows to specify classification rules based on: •
VLAN (single or range)
• • •
Priority bit (single or range) IP DSCP (single or range) Payload type
• • •
QoS attributes are: Policing mode [color blind, color aware, none] Colour profile (applicable if policing mode is color blind or color aware) CoS and bandwidth profile are specified associating a Traffic Descriptor
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-53 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management EVC-EVPLAN Service in PBB/ERP
Additional Info on PBB/ERP Service
....................................................................................................................................................................................................................................
QoS – Managing Traffic Descriptor
The Traffic Descriptor describes the characteristics of an Ethernet segment in term of Class of Service (CoS) and bandwidth. ...................................................................................................................................................................................................
1
Another step towards the MEF alignment is provided by possibility to display bandwidth parameters following both IETF definitions (as already available) and MEF definitions. For reminder, the following definitions are applicable for IETF: CIR, PIR, PBS, CBS while the following one are applicable for MEF: CIR, EIR, CBS, EBS. The existing relationships are described as in the following: • •
EIR = PIR – CIR. EBS = PBS – CBS.
Figure 20-52 Traffic Descriptor create step1
...................................................................................................................................................................................................
2
The range of the supported classes of service (CoS, also named forwarding classes) is extended from the basic set (best effort, regulated and guaranteed) to the enhanced set (best effort and background, four types of regulated, two types of guaranteed).
.................................................................................................................................................................................................................................... 1350 OMS 20-54 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management EVC-EVPLAN Service in PBB/ERP
Additional Info on PBB/ERP Service
....................................................................................................................................................................................................................................
The frame association to a CoS is performed at the ingress port. Differentiated quality of service (QoS) management is implemented mapping each CoS to a specific output queue at the egress port. Color management allows also frame prioritization within a given forwarding class. The frame per hop behavior (PHB) is therefore implemented by CoS and color management. Figure 20-53 Traffic Descriptor create step2
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-55 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management PBB EVC Termination Management
Add PBB EVC Termination
....................................................................................................................................................................................................................................
PBB EVC Termination Management Add PBB EVC Termination When to use
This function consists in adding terminations to a implemented PBB EVC. Related Information
For information about PBB EVC, Refer to “PBB Ethernet Virtual Connection” (p. 20-7) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the Bridge EVC list select the EVC to which a termination must be added and follow the path on the popup menu Search > EVC Termination.. The list of the terminations is displayed. Figure 20-54 EVC Termination list
.................................................................................................................................................................................................................................... 1350 OMS 20-56 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management PBB EVC Termination Management
Add PBB EVC Termination
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
From the Bridge EVC list select the EVC to which a termination must be added and follow the path on the popup menu Actions > Add Connection Less EVC Termination.. Figure 20-55 Actions> Add Connection Less EVC Termination
...................................................................................................................................................................................................
3
In the Add Connection Less EVC Termination window the EVC is already selected.
.................................................................................................................................................................................................................................... 1350 OMS 20-57 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management PBB EVC Termination Management
Add PBB EVC Termination
....................................................................................................................................................................................................................................
By means of the usual selection mechanism select the Network Element and the Edge Port to add. Figure 20-56 Add Connection Less EVC Termination dialog box
Click OK/Apply to confirm. ...................................................................................................................................................................................................
4
To verify that the new termination has been added successfully, refresh the EVC Terminations list. The new termination is displayed. Figure 20-57 The new termination has been added
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-58 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management PBB EVC Termination Management
Remove PBB EVC Termination
....................................................................................................................................................................................................................................
Remove PBB EVC Termination When to use
This function consists in removing terminations to a implemented PBB EVC. Related Information
For information about PBB EVC, Refer to“PBB Ethernet Virtual Connection” (p. 20-7) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the EVC Termination list select the termination to remove and issue the pop-up menu Actions> Delete. ...................................................................................................................................................................................................
2
A confirmation box is presented. Click OK to confirm the delete operation. Result: The termination is removed and no longer present. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-59 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Overview
....................................................................................................................................................................................................................................
Provider Backbone Bridge EVC Management Overview Purpose
This section describes how to manage Provider Backbone Bridge EVC. Contents View the PBB EVC list
20-61
Description of the list of PBB EVCs
20-62
Create PBB EVC
20-63
Allocate PBB EVC
20-65
Deallocate PBB EVC
20-67
Implement PBB EVC
20-68
Deimplement PBB EVC
20-70
Add Termination on implemented PBB EVC
20-71
Remove Termination on implemented EVC
20-72
Configure PBB EVC
20-73
Bridge Flows of PBB EVC
20-74
PBB EVC Broadcast Domain Containment
20-76
Enable Broadcast Domain Containment
20-77
Disable Broadcast Domain Containment
20-78
Automatic association UNI port - default VT
20-79
Manual association UNI port - user VT
20-80
Configuration of the DEI bit
20-81
.................................................................................................................................................................................................................................... 1350 OMS 20-60 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
View the PBB EVC list
....................................................................................................................................................................................................................................
View the PBB EVC list When to use
The PBB Ethernet Virtual Connection List window presents all the PBB EVCs and their attributes. Related Information
For information about PBB EVC, Refer to “PBB Ethernet Virtual Connection” (p. 20-7) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Connection Less (Bridge) > Bridge EVCs. Result: The list window is displayed.
See the following topic in this document: “Description of the list of PBB EVCs” (p. 20-62) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-61 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Description of the list of PBB EVCs
....................................................................................................................................................................................................................................
Description of the list of PBB EVCs Attributes of a PBB EVC
The attributes displayed for each EVC are: •
User Label.
•
Ethernet Service User Label.
•
Topology (Point to point, Routed multi-point, Any to any).
•
Service Type.(EVPL, EPL, EVPLAN, Broadcast).
•
Traffic Type (Unicast, Multicast).
•
Domain Type.(Backbone)
•
Working State (Normal, Configuring, Allocating, De-allocating, Implementing, De-implementing, Commissioning, De-commissioning, Termination adding, Termination removing, Constraint adding, Constraint removing, removing).
•
Provisioning State (Defined, Partially allocated, Allocated, Partially implemented, Implemented, Commissioned).
•
Service State.(In Service, Not In service)
•
Availability Status (Normal, Degraded, In Failure, Not Meaningful).
•
B-VID
•
Broadcast Domain Containment (Enabled, Disabled)
.................................................................................................................................................................................................................................... 1350 OMS 20-62 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Create PBB EVC
....................................................................................................................................................................................................................................
Create PBB EVC When to use
The function creates a PBB Ethernet Virtual Connection. Related Information
The user specifies the characteristics of the EVC (userlabel, type, terminations, flows, etc.) and, in addition: • • •
I-VID I-SID Broadcast Domain Containment. (Enabled, Disabled). Refer to “PBB EVC Broadcast Domain Containment” (p. 20-76)
The specified B-VID must: •
exist;
• •
be in the Domain specified for the EVC; have been created by the operator (B-VIDs created by ERP BB are not allowed).
The I-SID must not have been already used by another EVC in the same Domain. The allowed values for the Resource Sharing attribute are FULL or PRIVATE UNI. The allowed types for a PBB EVC are: •
EPL
•
EVPL
•
EPLAN
•
EVPLAN
•
BROADCAST
If the specified B-VID has a non empty I-SID Bundle, the I-SID specified for the EVC must be within that bundle. The creation of the EVC is similar to the creation of PB EVC, except for the fact that the association between the EVC, I-SID and B-VID is stored. For information about PBB EVC, Refer to“PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode.
.................................................................................................................................................................................................................................... 1350 OMS 20-63 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Create PBB EVC
....................................................................................................................................................................................................................................
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Action > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Connection Less (Bridge) > Create PBB EVC. See workflow “Create a PBB EVC” (p. 20-144) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-64 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Allocate PBB EVC
....................................................................................................................................................................................................................................
Allocate PBB EVC When to use
To allocate a PBB EVC Related Information
The allocation of a PBB EVC is possible only if the B-VID is at least allocated and is rejected in all other cases (i.e. when the B-VID is defined). In no case, a PBB EVC can have an EVC Termination on one NE that is not embraced by it's B-VID (either through a TL or through a ring). In other words: if no TL or ring associated to a B-VID reaches/crosses a NE, the latter can't host any EVC Termination served by that B-VID. Since no private use of Transport Links is allowed (Resource Sharing only admitted values are FULL and PRIVATE UNI), no check on Transport Links sharing is performed. The allocation, that for the most part (EVC Terminations and Flows) is identical to the one of a PB EVC, specifically concerns: •
the allocation of the association between each Port supporting an EVC Termination and the I-SID
•
the allocation of the association between the B-VID, the I-SID and all the NNIs, belonging to NEs where there are EVC Terminations, associated to the B-VID of the EVC; for each flow, the allocation of a cross connection that has, as a server at one side, the I-SID; if the EVC is under OAM, the I-SID has to be distributed also in all the places where the B-VID is.
• •
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
.................................................................................................................................................................................................................................... 1350 OMS 20-65 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Allocate PBB EVC
....................................................................................................................................................................................................................................
Result: The Bridge EVC list window is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > Bridge EVC > Allocate. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The EVC is allocated.
The Provisioning State is changed to Allocated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-66 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Deallocate PBB EVC
....................................................................................................................................................................................................................................
Deallocate PBB EVC When to use
To deallocate PBB EVC. Related Information
The deallocation, that for the most part (EVC Terminations and Flows) is identical to the one of a PB EVC, specifically concerns: • • •
the deallocation of the associations between the Ports of the EVC Terminations and the I-SID; the deallocation of the associations between the B-VID, the I-SID and the NNIs associated to the B-VID of the EVC; if the EVC is under OAM, its I-SID has to be un-distributed also in all the places where the B-VID has been.
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The Bridge EVC list window is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > Bridge EVC > Deallocate. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The EVC is deallocated.
The Provisioning State is changed to Defined. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-67 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Implement PBB EVC
....................................................................................................................................................................................................................................
Implement PBB EVC When to use
To implement PBB EVC. Related Information
The implementation of a PBB EVC is possible only if the B-VID is implemented and is rejected in all other cases (included partially implemented B-VID). The implementation, that for the most part (EVC Terminations and Flows) is identical to the one of a PB EVC, specifically concerns: • •
•
•
the implementation of the association between each Port supporting an EVC Termination and the I-SID (opticsIMPbbInstanceTable); the implementation of the association between the B-VID, the I-SID and all the NNIs, belonging to NEs where there are EVC Terminations, associated to the B-VID of the EVC (opticsIMPbbInstanceTable); for each flow, the implementation of a cross connection that has as a server at one side the I-SID (i.e. opticsIMETSInFlowServiceType = PBB and opticsIMETSInFlowServiceID = index of row of opticsIMPbbInstanceTable for the I-SID, for either opticsIMETSInFlowTable or opticsIMETSOutFlowTable); if the EVC is under OAM, the I-SID has to be distributed also in all the places where the B-VID is.
For information: Refer to“PBB Ethernet Virtual Connection” (p. 20-7). Refer to “PBB EVC provisioning” (p. 20-8). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The Bridge EVC list window is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > Bridge EVC > Implement.
.................................................................................................................................................................................................................................... 1350 OMS 20-68 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Implement PBB EVC
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The EVC is implemented.
The Provisioning State is changed to Implemented. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-69 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Deimplement PBB EVC
....................................................................................................................................................................................................................................
Deimplement PBB EVC When to use
To deimplement PBB EVC. Related Information
The deimplementation, that for the most part (EVC Terminations and Flows) is identical to the one of a PB EVC, specifically concerns: • •
•
the deimplementation of the association between each Port supporting an EVC Termination and the I-SID (opticsIMPbbInstanceTable); the deimplementation of the association between the B-VID, the I-SID and all the NNIs, belonging to NEs where there are EVC Terminations, associated to the B-VID of the EVC (opticsIMPbbInstanceTable); if the EVC is under OAM, its I-SID has to be un-distributed also in all the places where the B-VID has been.
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The Bridge EVC list window is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > Bridge EVC > deimplement. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The EVC is deimplemented.
The Provisioning State is changed to Allocated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-70 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Add Termination on implemented PBB EVC
....................................................................................................................................................................................................................................
Add Termination on implemented PBB EVC When to use
This function consists in adding terminations to a implemented PBB EVC. Related Information
Termination addition means I-SID distribution. In no case an EVC Termination can be added on a NE that is not used by the EVC's B-VID. In particular: • •
implementation of the association between the Termination's Port supporting and the I-SID (opticsIMPbbInstanceTable); (only if does not exist an implemented Termination of the same EVC in the same NE) implementation of the association between the B-VID, the I-SID and all the NNIs, belonging to the Termination's NE, associated to the B-VID of the EVC (opticsIMPbbInstanceTable).
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select the EVC in the list where the termination must be added. ...................................................................................................................................................................................................
3
Select the path Action > Bridge EVC > Add Connection Less EVC Termination. Result: The Add Termination window is displayed. ...................................................................................................................................................................................................
4
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-71 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Remove Termination on implemented EVC
....................................................................................................................................................................................................................................
Remove Termination on implemented EVC When to use
This function consists in removing terminations to an implemented PBB EVC. Related Information
Termination removal means undo of I-SID distribution. In no case an EVC Termination can be added on a NE that is not used by the EVC's B-VID. In particular: • •
deimplementation of the association between the Termination's Port supporting and the I-SID (opticsIMPbbInstanceTable); (only if this is the last implemented Termination of the same EVC in the same NE) deimplementation of the association between the B-VID, the I-SID and all the NNIs, belonging to the Termination's NE, associated to the B-VID of the EVC (opticsIMPbbInstanceTable).
For information about PBB EVC, Refer to“PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select the EVC in the list where the termination must be removed. ...................................................................................................................................................................................................
3
Select the path Action > Bridge EVC > Remove Connection Less EVC Termination. ...................................................................................................................................................................................................
4
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-72 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Configure PBB EVC
....................................................................................................................................................................................................................................
Configure PBB EVC When to use
This function changes attributes of PBB EVC. Related Information
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select the PBB EVC in the list . ...................................................................................................................................................................................................
3
Select the path Action > Bridge EVC > Configure PBB EVC. Result: The Configuration window is displayed. The user can change:
• •
EVC. Traffic descriptor.
...................................................................................................................................................................................................
4
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-73 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Bridge Flows of PBB EVC
....................................................................................................................................................................................................................................
Bridge Flows of PBB EVC When to use
This function shows bridge flows of a PBB EVC. Related Information
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select the PBB EVC in the list . ...................................................................................................................................................................................................
3
Select the path Action > Bridge EVC > Bridge Flows. Result: The List Bridge Flow is displayed.
• • – – –
EVC Bridge Ingress Flows Id Network Element Edge Port
– – –
Policy Mode Traffic Descriptor Color Profile
– – •
VLAN Pop Classification Bridge Egress Flows
– – –
Id Network Element Edge Port
.................................................................................................................................................................................................................................... 1350 OMS 20-74 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Bridge Flows of PBB EVC
....................................................................................................................................................................................................................................
– –
Class Of Service VLAN Id
– – –
Priority Mode Green Priority Yellow Priority
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-75 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
PBB EVC Broadcast Domain Containment
....................................................................................................................................................................................................................................
PBB EVC Broadcast Domain Containment Definition
Broadcast domain containment is implemented through the provisioning of I-SID instances also in intermediate nodes. Algorithm to determine the involved NEs and ports in a broadcast domain containment for an EVC: •
• •
get all the EVC Terminations and determine the paths between each pair of them (in other words: given a pair of EVC Terminations, determine a path between them (inside the involved B-VID, of course), in terms of the rings and/or single TLs that must be crossed to reach one from the other); enrich the set of rings and TLs, determined at the previous step, by adding all the main rings for any sub-ring that is already included in the set; take all the NEs of the rings and TLs of the set and provision the I-SID there (if not yet provisioned because of an EVC Termination) associating to it the NNI ports of the involved B-VID in that NE that are linked to another NE of the set.
Broadcast domain containment provisioning is alternative to I-SID for OAM provisioning: if broadcast domain containment is enabled no I-SID for OAM is provisioned.
.................................................................................................................................................................................................................................... 1350 OMS 20-76 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Enable Broadcast Domain Containment
....................................................................................................................................................................................................................................
Enable Broadcast Domain Containment When to use
This function activates the broadcast domain containment on an EVC , regardless of EVC Provisioning State. Related Information
The operator may enable the broadcast domain containment on an EVC by simply invoking the modify (in case of defined or allocated EVC) or the configure (in all other cases) of the EVC. Within the form of modify/configure the operator is able to change the Broadcast Domain Containment attribute from "Disabled" to "Enabled". If the EVC is in defined or allocated state, the impacts are only within the PKT (i.e. DB). If the EVC is in implemented state, the impacts are both on DB and on the involved NEs. Refer to“PBB EVC Broadcast Domain Containment” (p. 20-76). If the EVC is under OAM, the I-SID modifications/provisioning for broadcast domain containment replace the ones existing for OAM. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select The EVC in the list ...................................................................................................................................................................................................
3
Select the path Action > Bridge EVC> Modify. ...................................................................................................................................................................................................
4
Select the tab Details and set Enable Broadcast Domain Containment to Enabled. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-77 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Disable Broadcast Domain Containment
....................................................................................................................................................................................................................................
Disable Broadcast Domain Containment When to use
This function deactivates the broadcast domain containment on an EVC , regardless of EVC Provisioning State. Related Information
The operator may disable the broadcast domain containment on an EVC by simply invoking the modify (in case of defined or allocated EVC) or the configure (in all other cases) of the EVC. Within the form of modify/configure the operator is able to change the Broadcast Domain Containment attribute from "Enabled" to "Disabled". If the EVC is in defined or allocated state, the impacts are only within the PKT (i.e. DB). If the EVC is in implemented state, the impacts are both on DB and on the involved NEs. Refer to “PBB EVC Broadcast Domain Containment” (p. 20-76). If the EVC is under OAM, the I-SID situation on DB/NE is restored as if on the EVC was just put under OAM. This is needed since previous broadcast domain containment enabling could have removed some of the I-SID instances on some NE and modified other ones. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select The EVC in the list ...................................................................................................................................................................................................
3
Select the path Action > Bridge EVC> Modify. ...................................................................................................................................................................................................
4
Select the tab Details and set Enable Broadcast Domain Containment to Disabled. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-78 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Automatic association UNI port - default VT
....................................................................................................................................................................................................................................
Automatic association UNI port - default VT Automatic association of the default VT to an EVC Termination
At EVC definition time, by default, the EVC termination is associated to the default VT, only for those cards that support VT management. The operator can specify at EVC definition time or modify at EVC configuration time, the reserved bandwidth (ISID-CIR/ISID-PIR) associated to a given EVC termination. If the reserved bandwidth (ISID-CIR/ISID-PIR) has been not specified by operator at EVC definition time, then the system assumes: •
ISID-CIR = 0
•
ISID-PIR = VT-PR
At allocation time, each egress I-SID is automatically associated to the default VT of the ETS-P UNI interface. When a PBB EVC is allocated, the reserved VT-CR of the default VT is automatically increased by an amount equal to: ISID-CIR The reserved VT-PR of the default VT is automatically updated to take into account the contribution of: ISID-PIR For the default VT, VT-CR, VT-Reserved-CR, VT-PR and VT-Reserved-PR are automatically computed according to ANY aggregation criterion in Table 2 of PKT 9.1 QOS Management Technical Functional Specification.
.................................................................................................................................................................................................................................... 1350 OMS 20-79 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Manual association UNI port - user VT
....................................................................................................................................................................................................................................
Manual association UNI port - user VT Manual association of the user VT to an EVC Termination
The operator is allowed to manually define (during EVC definition) or modify (during EVC configuration) the association between the I-SID and the VT at the ETS-P UNI (i.e. the association between an EVC Termination and a VT). The operator has to specify at EVC definition time and can modify at EVC configuration time, the reserved bandwidth (ISID-CIR/ISID-PIR) associated to a given EVC termination. By default, the system assumes that: •
ISID-CIR = 0
•
ISID-PIR = VT-PR
The system checks that the required bandwidth is available on the user VT. When a PBB EVC is allocated, the reserved VT-CR of the user VT is automatically increased by an amount equal to: •
ISID-CIR
The reserved VT-PR of the user VT is automatically updated to take into account the contribution of: •
ISID-PIR
For the user VT, VT-Reserved-CR and VT-Reserved-PR are automatically computed according to the following parameters checks: •
VT-CR >= VT-Reserved-CR = ΣFixed-VT ISID-CIRi , over all ISID using the VT.
•
VT-PR>= VT-Reserved-PR = Max (ISID-PIRi) , over all ISID using the VT.
.................................................................................................................................................................................................................................... 1350 OMS 20-80 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge EVC Management
Configuration of the DEI bit
....................................................................................................................................................................................................................................
Configuration of the DEI bit Configuration of the DEI bit support on PBB NNI ports
The operator specifies a PBB NNI port (PNP client type) and tells whether he wants to activate or deactivate the DEI bit support. The system configures the port accordingly. Activating the DEI bit support means that from that port will be possible to manage 8 CoS each with two colors (green and yellow), thus giving a different meaning to the PCP attribute on the same port: 8P0D means, in fact, 8P8D. Activating the DEI bit is meaningful (and useful) only for PCP = 8P0D .
.................................................................................................................................................................................................................................... 1350 OMS 20-81 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Overview
....................................................................................................................................................................................................................................
B-VID Management Overview Purpose
This section describes how to manage B-VID. Contents View the B-VID list
20-83
Create PBB B-VID
20-84
Delete PBB B-VID
20-86
Allocate PBB B-VID
20-87
Deallocate PBB B-VID
20-88
Implement PBB B-VID
20-89
Deimplement PBB B-VID
20-91
Domain Wide VID distribution
20-93
Ring Association to a B-VID
20-95
Ring Dissociation from B-VID
20-97
Change ERP of a B-VID
20-99
List ERP instances of a B-VID
20-101
Association of Transport Link to B-VID
20-102
Dissociation of Transport Link to B-VID
20-104
.................................................................................................................................................................................................................................... 1350 OMS 20-82 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
View the B-VID list
....................................................................................................................................................................................................................................
View the B-VID list When to use
The PBB B-VID List window presents all the B-VIDand their attributes. Related Information
For information about PBB EVC, Refer to“PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Connection Less (Bridge) > B-VIDs. Result: The list window is displayed.
The attributes displayed for each B-VID are: • User Label. • Domain (must be a PBB Domain). • VLAN Id • •
Provisioning state.(Defined, Allocated, Partially implemented, Implemented, ) Availability State(Normal)
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-83 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Create PBB B-VID
....................................................................................................................................................................................................................................
Create PBB B-VID When to use
The function creates a PBB B-VID. B-VID is used as an infrastructure for EVCs. Related Information
About the parameters: •
Domain must be PBB Domain.
•
I-SID spcify the bundle of I-SIDs allowed to be supported by this B-VID. An empty
•
•
•
set means no restrictions apply. VLAN ID must not be already assigned to another B-VID in the Domain. Specified VID must be: – If the request is from ERP BB: specified VID must be in the R-APS B-VID VLAN Bundle of the Domain. – If the request is not from ERP BB: specified VID must not be in the R-APS B-VID VLAN Bundle of the Domain. VLAN Distribution is Manual means the Rings and the Transport Links to be associated to the B-VID must be explicitly chosen by the operator. Optionally the operator can choose the ERP instance of each chosen Ring to be associated to the B-VID. For each chosen Ring for which no ERP instance has been specified the per-Port ERP instance is automatically chosen. If no ERP instance is specified for a ring and that ring has no per-Port ERP instance, the creation of the B-VID fails and a detailed error is reported to the operator. If VLAN distribution is Manual, the user specify: – a subset of the Rings of the Domain and for each Ring, optionally, the ERP instance to be used; – a subset of the Transport Links of the Domain that do not already belong to a Ring VLAN Distribution is Domain Wide means that, once created, the B-VID will have all the Rings and the Transport Links of the Domain associated to it. In this case the per-Port ERP of each chosen ring is automatically associated to the B-VID. If no per-Port ERP exists for at least one ring of the Domain, the creation of the B-VID fails and a detailed error is reported to the operator.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode.
.................................................................................................................................................................................................................................... 1350 OMS 20-84 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Create PBB B-VID
....................................................................................................................................................................................................................................
Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Action > Packet > Services. Result: The menu of the Services is shown. ...................................................................................................................................................................................................
2
Select Connection Less (Bridge) > Create B-VID. ...................................................................................................................................................................................................
3
Enter the following parameters: •
Enter a Userlabel.
•
Select a Domain from list. Must be aPBB Domain.
•
Enter VLAN ID. (A value from 1 to 4094, a unique value in the Domain).
•
VLAN distribution. (Manual, Domain Wide)
•
Click ERP and select one or more rings from list.
•
For each ring, select one or more ERP instances from list.
•
Click Transport link and select one or more Transport links from list.
...................................................................................................................................................................................................
4
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-85 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Delete PBB B-VID
....................................................................................................................................................................................................................................
Delete PBB B-VID When to use
The function deletes a PBB B-VID. B-VID is used as an infrastructure for EVCs. Related Information
A B-VID can only be deleted when is in Defined state and does not support any EVC. A B-VID created by ERP BB can only be deleted by ERP BB. A B-VID created by the USM can only be deleted by the USM. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Delete. ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-86 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Allocate PBB B-VID
....................................................................................................................................................................................................................................
Allocate PBB B-VID When to use
The function allocates resources for a PBB B-VID. Related Information
This phase consists in the creation, on DB, of the VLAN Distribution information (for each NE on which terminates/passes a TL/Ring associated to the B-VID). A B-VID created by ERP BB can only be allocated by ERP BB. A B-VID created by the USM can only be allocated by the USM. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Allocate. ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-87 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Deallocate PBB B-VID
....................................................................................................................................................................................................................................
Deallocate PBB B-VID When to use
The function de-allocates resources for a PBB B-VID. Related Information
This phase consists in the removal of the DB objects created during the allocation . A B-VID can't be de-allocated if it supports one or more EVCs that are allocated: all the EVCs supported by a B-VID (if any) must be all in defined state in order for the B-VID to be deallocated. A B-VID created by ERP BB can only be de-allocated by ERP BB. A B-VID created by the USM can only be de-allocated by the USM. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Deallocate. ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-88 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Implement PBB B-VID
....................................................................................................................................................................................................................................
Implement PBB B-VID When to use
The function provisions the elementary objects involved with a PBB B-VID. Related Information
Provisioning on the involved NEs (i.e. the ones identified during the allocation phase) of the (in this order): 1. creation of the B-VID instance and of the associations B-VID - Port; 2. associations B-VID - ERP (for any non-per-Port ERP). Step 1 involves the creation of a row in the opticsIMPbbInstanceTable, in each involved NE, that contains among the other things the ports to be associated to the B-VID instance (i.e. the ports, in that NE, belonging to TLs or Rings associated to the B-VID). This provisioning is requested by EoT to Adaptation. Step 2 involves the request to ERP BB to perform the association for each involved ERP (only in case of per-VLAN ERP). Step 2 is not performed for B-VIDs created by ERP BB (the association, in fact, is provisioned by the ERP BB before invoking the B-VID implementation; This avoids deadlocks between ERP BB and EoT BB (both being single threaded processes). A complete failure on step 1 causes the B-VID to remain in Allocated state. A partial failure on step 1 or a failure during step 2 causes the B-VID to go in Partially Implemented state. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Implement.
.................................................................................................................................................................................................................................... 1350 OMS 20-89 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Implement PBB B-VID
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-90 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Deimplement PBB B-VID
....................................................................................................................................................................................................................................
Deimplement PBB B-VID When to use
The function releses the elementary objects involved with a PBB B-VID. Related Information
Un-provisioning on the involved NEs (i.e. the ones identified during the allocation phase) of the objects provisioned during the implementation with the same interactions of EoT with other BBs. This means: 1. removal of associations B-VID - ERP (for any non-per-Port ERP), requested to ERP BB by EoT BB; 2. removal of the B-VID instance (with automatic removal of B-VID - Port associations) performed by Adaption on behalf of EoT. Step 1 is not performed for B-VIDs created by ERP BB (the association, in fact, is un-provisioned by the ERP BB after invoking the B-VID de-implementation; This avoids deadlocks between ERP BB and EoT BB (both being single threaded processes). A complete failure on step 1 causes the B-VID to remain in Implemented state. A partial failure on step 1 or a failure during step 2 causes the B-VID to go in Partially Implemented state. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Deimplement.
.................................................................................................................................................................................................................................... 1350 OMS 20-91 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Deimplement PBB B-VID
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-92 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Domain Wide VID distribution
....................................................................................................................................................................................................................................
Domain Wide VID distribution When to use
The function associates all the Rings and Transport Links of a Domain to a B-VID. Related Information
This procedure applies to any provisioning state. Defined case
This procedure applies when the operator requires an existing B-VID in Defined state to be Domain-Wide distributed. This operation causes the B-VID to be associated to all the Rings and TLs of the Domain, as if it was been created with VLAN Distribution = "Domain Wide". Allocated case
This procedure applies when the operator requires an existing B-VID in Allocated or Partially Implemented state (in any case, no provisioning is performed) to be Domain-Wide distributed. This operation causes the B-VID to be associated to all the Rings and TLs of the Domain, as if it was created with VLAN Distribution = "Domain Wide" and then immediately allocated. This operation could also be seen as an equivalent of a series of ring association (allocated case) and transport link association (allocated case) in order to associate all TLs and Rings (only one Ring per Bundle) not associated to the B-VID. Implemented case
This procedure applies when the operator requires an existing B-VID in Implemented state to be Domain-Wide distributed. This operation causes the B-VID to be associated to all the Rings and TLs of the Domain, as if it was been created with VLAN Distribution = "Domain Wide" and then immediately allocated and implemented. This operation could also be seen as an equivalent of a series of ring association (implemented case) and transport link association (implemented case) in order to associate all TLs and Rings (only one Ring per Bundle) not associated to the B-VID. As a result of this operation the B-VID can be either in Implemented (if each TL/Ring association either failed completely or succeeded) or Partially Implemented (if at least one TL/Ring association failed half-way) and can be associated to all Rings and TLs of the Domains or not (in case at least one TL/Ring associated failed completely). In case of unsuccessful operation the operator is informed of which TLs/Rings where not associated properly or not associated at all.
.................................................................................................................................................................................................................................... 1350 OMS 20-93 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Domain Wide VID distribution
....................................................................................................................................................................................................................................
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Distribute VID domain-wide. Result: VLAN ID is distributed in the domain. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-94 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Ring Association to a B-VID
....................................................................................................................................................................................................................................
Ring Association to a B-VID When to use
The function associates a Ring and an ERP instance to a B-VID. Related Information
This function applies to any provisioning state. Defined case
To add a Ring to a B-VID, the operator must specify: • • •
the B-VID the Ring an ERP instance on that Ring
For a Ring to be associated to a B-VID, the following must be true: •
• •
no other Ring of the same Bundle is already associated to the B-VID (a Ring can't be associated to a B-VID if another Ring of the same Bundle is already associated to it: only one ring per bundle can be associate to a B-VID) B-VID and Ring must belong to the same Domain B-VID and Ring must not be already associated
If all checks are ok the B-VID is associated to the specified Ring and ERP instance. Allocated case
This is almost the same case of ring association defined case, in addition the allocation of the B-VID - Ring association is performed: • •
allocation on DB of the VLAN Distribution information (for each NE involved, the two involved Ports are associated to the B-VID) allocation on DB of the I-SID Distribution information, for each allocated EVC that is supported by the B-VID: – in case the EVC is not under OAM: the I-SID must be distributed in all the NEs, of the newly associated ring, that contain at least one EVC Termination – in case the EVC is under OAM: the I-SID must be distributed in all the NEs of the newly associated ring.
This case applies both to allocated and partially implemented B-VIDs (in any case, no provisioning is performed). Implemented case
This is almost the same case of ring association in allocated case, in addition part of the implementation of the B-VID and of all the implemented EVCs that the former supports is performed: • •
for each NE of the Ring in which the B-VID instance has not yet been provisioned: creation of the B-VID instance and of the associations B-VID - Port for each NE of the Ring in which the B-VID instance already exists: modification of the member set of the B-VID instance to include the two ports of the Ring for that NE
.................................................................................................................................................................................................................................... 1350 OMS 20-95 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Ring Association to a B-VID
....................................................................................................................................................................................................................................
• •
request to ERP BB to provision the association between the B-VID and the specified ERP (only in case of per-VLAN ERP); for each EVC supported by the B-VID: –
for each implemented EVC Termination residing on a NE crossed by the Ring: provisioning of the association Port - B-VID - I-SID, that can either mean creation of a row in opticsIMPbbInstanceTable (if the row did not existed) or modification of a row in opticsIMPbbInstanceTable (if the row did existed)
–
if the EVC is implemented and under OAM: the I-SID of the EVC has to be provisioned also in all the NEs of the newly added ring that do not contain an implemented EVC Termination.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Associate/Disassociate Ring. ...................................................................................................................................................................................................
4
In the Associate/Dissociate window: •
Select Select Operation (Associate).
•
Select B-VID from list.
•
Select Erp Ring from list.
•
Select Erp Instance from list.
...................................................................................................................................................................................................
5
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-96 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Ring Dissociation from B-VID
....................................................................................................................................................................................................................................
Ring Dissociation from B-VID When to use
The function dissociates a Ring from a B-VID. Related Information
This function applies to any provisioning state. Defined case
The operator specifies the B-VID and the Ring. B-VID and Ring must be associated. PKT dissociates the B-VID and the Ring (together with the associated ERP instance). Allocated case
This is almost the same case of ring dissociation (defined case); in addition, before the removal of the B-VID - Ring association, its de-allocation is performed: •
de-allocation of the I-SID Distribution information, for each allocated EVC supported by the B-VID in all the NEs that will no longer belong to the B-VID once the ring is removed
•
de-allocation of the VLAN Distribution information (for each NE involved, the two involved Ports are dissociated from the B-VID).
In no case a ring can be dissociated from a B-VID if this action leaves an EVC of the B-VID with an EVC Termination on a NE that is no more used by the B-VID. In other words: if an EVC Termination belonging to the involved B-VID, is on one of the NEs of the ring, and, on that NE, there are no other Transport Links or rings associated to the involved B-VID, the latter can't be dissociated from the ring. Implemented case
This is almost the same case of ring dissociation (allocated case), in addition, before the de-allocation of the B-VID - Ring association, its de-implementation and the de-implementation of the involved part of implemented and partially implemented EVCs supported by that B-VID is performed: •
•
for each EVC supported by the B-VID: – for each implemented or partially implemented EVC Termination residing on a NE crossed by the Ring: un-provisioning of the association Port - B-VID - I-SID, that means modification of a row in opticsIMPbbInstanceTable – if the EVC is implemented or partially implemented, removal of all the I-SID instances in all the NEs that will no longer belong to the B-VID once the ring is removed (that means deletion of a row in opticsIMPbbInstanceTable). This also covers the case of EVC under OAM un-provision the association between the B-VID and the associated ERP on that Ring (only in case of per-VLAN ERP)
.................................................................................................................................................................................................................................... 1350 OMS 20-97 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Ring Dissociation from B-VID
....................................................................................................................................................................................................................................
•
•
for each NE of the Ring in which there are no other NNIs not belonging to the Ring but associated to the B-VID instance: deletion of the B-VID instance and of the associations B-VID - Port for each NE of the Ring in which there's at least another NNI not belonging to the Ring but associated to the B-VID instance: modification of the member set of the B-VID instance to remove the two ports of the Ring for that NE
This case applies both implemented and partially implemented B-VIDs. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Associate/Disassociate Ring. ...................................................................................................................................................................................................
4
In the Associate/Dissociate window: •
Select Select Operation (Dissociate).
•
Select B-VID from list.
•
Select Erp Ring from list.
•
Select Erp Instance from list.
...................................................................................................................................................................................................
5
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-98 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Change ERP of a B-VID
....................................................................................................................................................................................................................................
Change ERP of a B-VID When to use
The function moves a defined B-VID from a ring of a bundle to another ring of the same bundle. Related Information
This function applies to any provisioning state. The operator specifies: • • •
the B-VID the associated Ring the Ring to be associated
The system checks that: •
the B-VID and the first Ring are associated
•
the two Rings belong to the same Ring Bundle
This procedure is functionally equivalent to a Ring dissociation followed by a Ring association. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Change ERP instance. ...................................................................................................................................................................................................
4
In the Change ERP window: •
Select B-VID from list.
•
Select Erp Ring from list.
•
Select Erp Instance from list.
.................................................................................................................................................................................................................................... 1350 OMS 20-99 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Change ERP of a B-VID
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-100 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
List ERP instances of a B-VID
....................................................................................................................................................................................................................................
List ERP instances of a B-VID When to use
The function lists all the ERP instances belonging to a B-VID. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > List ERP instances from B-VID. Result: The list window is displayed.
See the following topic in this document: “Description of the list of ERP” (p. 20-109). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-101 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Association of Transport Link to B-VID
....................................................................................................................................................................................................................................
Association of Transport Link to B-VID When to use
The function adds a Transport Link to a B-VID. Related Information
This function applies to any provisioning state. Defined case
The operator specifies: • •
the B-VID the Transport Link
For a Transport Link to be associated to a B-VID, the following must be true: • •
the TL must not belong to a Ring B-VID and TL must belong to the same Domain
•
B-VID and TL must not be already associated
If all checks are ok the B-VID is associated to the specified Transport Link. Allocated case
This is almost the same case of transport link association (defined case), in addition: •
the allocation of the B-VID - TL association is performed: allocation on DB of the VLAN Distribution information (the two involved Ports of the TL are associated to the B-VID)
•
the allocation on DB of the I-SID Distribution information is performed for each allocated EVC that is supported by the B-VID: – in case the EVC is not under OAM: the I-SID must be distributed at each extremity of the TL that contain at least one EVC Termination – in case the EVC is under OAM: the I-SID must be distributed at each extremity of the TL
This case applies both to allocated and partially implemented B-VIDs (in any case, no provisioning is performed). Implemented case
This is almost the same case of transport link association (allocated case), in addition part of the implementation of the B-VID and of all the implemented EVCs that the former supports is performed: • •
for each NE at the extremities of the TL in which the B-VID instance has not yet been provisioned: creation of the B-VID instance and of the associations B-VID - Port for each NE at the extremities of the TL in which the B-VID instance already exists: modification of the member set of the B-VID instance to include the extremity of the TL in that NE;
.................................................................................................................................................................................................................................... 1350 OMS 20-102 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Association of Transport Link to B-VID
....................................................................................................................................................................................................................................
•
for each EVC supported by the B-VID: – for each implemented EVC Termination residing on a NE at the extremities of the TL: provisioning of the association Port - B-VID - I-SID, that can either mean creation of a row in opticsIMPbbInstanceTable (if the row did not existed) or modification of a row in opticsIMPbbInstanceTable (if the row did existed) – if the EVC is implemented and under OAM: the I-SID of the EVC has to be provisioned also in all the NEs at the extremities of the TL that do not contain an implemented EVC Termination.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Associate/Disassociate Transport Link. ...................................................................................................................................................................................................
4
In the Associate/Dissociate window: •
Select Select Operation (Associate, Dissociate)
•
Select B-VID from list
•
Select Transport Link from list
...................................................................................................................................................................................................
5
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-103 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Dissociation of Transport Link to B-VID
....................................................................................................................................................................................................................................
Dissociation of Transport Link to B-VID When to use
The function removes a Transport Link from a B-VID. Related Information
This function applies to any provisioning state. Defined case
The operator specifies: • •
the B-VID the Transport Link
For a Transport Link to be dissociated from a B-VID, the following must be true: • •
the TL must not belong to a Ring B-VID and TL must be associated
If all checks are ok the B-VID is dissociated to the specified Transport Link. Allocated case
This is almost the same case of transport link dissociation (defined case), in addition, before the B-VID - TL association is removed, its de-allocation is performed: •
•
de-allocation on DB of the I-SID Distribution information, for each allocated EVC supported by the B-VID in all the NEs that will no longer belong to the B-VID once the TL is removed de-allocation on DB of the VLAN Distribution information (for each NE involved, the involved Port is dissociated from the B-VID).
In no case a TL can be dissociated from a B-VID if this action leaves an EVC of the B-VID with an EVC Termination on a NE that is no more used by the B-VID. In other words: if an EVC Termination ,of an EVC belonging to the involved B-VID, is on one of the NEs at the extremity of the TL, and, on that NE, there are no other Transport Links or rings associated to the involved B-VID, the latter can't be dissociated from the Transport Link.
.................................................................................................................................................................................................................................... 1350 OMS 20-104 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Dissociation of Transport Link to B-VID
....................................................................................................................................................................................................................................
Implemented case
This is almost the same case of transport link dissociation (allocated case), in addition, before the B-VID - TL association is de-allocated, part of the de-implementation of the B-VID and of all the implemented or partially implemented EVCs that the former supports is performed: •
•
•
for each EVC supported by the B-VID: – for each implemented or partially implemented EVC Termination residing on a NE at the extremities of the TL: un-provisioning of the association Port - B-VID I-SID, that means modification of a row in opticsIMPbbInstanceTable – if the EVC is implemented or partially implemented, removal of all the I-SID instances in all the NEs that will no longer belong to the B-VID once the TL is removed (that means deletion of a row in opticsIMPbbInstanceTable). This also covers the case of EVC under OAM. for each NE at the extremities of the TL in which there are no other NNIs associated to the B-VID instance: deletion of the B-VID instance and of the associations B-VID Port for each NE at the extremities of the TL in which there's at least another NNI associated to the B-VID instance: modification of the member set of the B-VID instance to remove the port of the TL for that NE.
This case applies both implemented and partially implemented B-VIDs. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Select the path Action > B-VIDs > Associate/Disassociate Transport Link.
.................................................................................................................................................................................................................................... 1350 OMS 20-105 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID Management
Dissociation of Transport Link to B-VID
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
In the Associate/Dissociate window: •
Select Select Operation (Associate, Dissociate)
•
Select B-VID from list
•
Select Transport Link from list
...................................................................................................................................................................................................
5
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-106 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
Overview
....................................................................................................................................................................................................................................
Ethernet Ring Protection (ERP) Management Overview Purpose
This document describes the functionality needed to manage ITU-T G.8032 Ethernet Ring Protection v2 (ERP) protocol inside 1350 OMS PKT product. Contents View the ERP ring list
20-108
Description of the list of ERP
20-109
Create/delete ERP Ring
20-110
Implement/deimplement the ERP
20-112
ERP Switch Command
20-113
ERP Switch Command From Port
20-114
Add/remove Transport Link in a Ring
20-115
Add/remove Node in a Ring
20-116
Create/delete ERP Ring bundle
20-117
Add/remove ERP Ring in a bundle
20-118
.................................................................................................................................................................................................................................... 1350 OMS 20-107 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
View the ERP ring list
....................................................................................................................................................................................................................................
View the ERP ring list When to use
The ERP List window presents all the rings and their attributes. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet. Result: The menu of the Packet is shown. ...................................................................................................................................................................................................
2
Select ERP > Rings. Result: The list window is displayed.
See the following topic in this document: “Description of the list of ERP” (p. 20-109). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-108 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
Description of the list of ERP
....................................................................................................................................................................................................................................
Description of the list of ERP Attributes of a Ring
The attributes displayed for each Ring are: •
User Label.
•
Ring Type (Major, Sub-ring).
•
Closure (Closed, Open).
•
Provisioning State (Defined, Allocated, Implemented).
•
Def.Time.
•
Working State (Normal).
•
Last Operation (None, Allocation, Deallocation, Implementation, Deimplementation).
•
Availability Status. (Normal).
.................................................................................................................................................................................................................................... 1350 OMS 20-109 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
Create/delete ERP Ring
....................................................................................................................................................................................................................................
Create/delete ERP Ring When to use
The function creates ERP Rings. Related Information
Ring Types: • •
A major ring is a ring that is self-containing, i.e. it has no need to use tunneling of R-APS through other rings. A sub-ring is a ring that is closed by a “tunnel connectivity” provided by other rings (either major rings or sub-ring).
A Ring can be created from: •
Links list
• •
Topological view Common Map
A ring can be done by transport link of one only domain. It is possible that the links assigned to a ring are not implementing a closed ring: in this case a warning should be raised to operator. For PKT 9.3 only PBB domains are foreseen. More then one major ring per domain is allowed. A physical ring can be created also if the transport link is already used by traffic. A physical ring can be deleted only when it is not-implemented. No check is done respect to the usage of the links for traffic. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Action > Packet > ERP > Create ERP Ring.
.................................................................................................................................................................................................................................... 1350 OMS 20-110 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
Create/delete ERP Ring
....................................................................................................................................................................................................................................
Result: The creation window is shown. ...................................................................................................................................................................................................
2
Enter: •
Enter the User Label
• •
Select the Ring Type. (Major, Sub) Select the Activation Status
• •
Select the PBB Domain from list Select the Transport Linksfrom list
...................................................................................................................................................................................................
3
Click OK Result: The ring is created E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-111 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
Implement/deimplement the ERP
....................................................................................................................................................................................................................................
Implement/deimplement the ERP When to use
The function implements major ring or sub-ring. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10). A physical ring can be deimplemented only if no ERP instances are active on it. No check is done respect to the usage of the links for traffic. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > ERP > Rings. Result: The list is shown. ...................................................................................................................................................................................................
2
Select the ring and select Implement or Deimplement. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-112 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
ERP Switch Command
....................................................................................................................................................................................................................................
ERP Switch Command When to use
The function set ERP Switch Command. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the menu item: •
Search > Packet > ERP > Rings
•
Search > Packet > ERP > ERP Instances Result: The list window is shown.
...................................................................................................................................................................................................
2
Select an item in the list and select Action > ERP Switch Command. ...................................................................................................................................................................................................
3
Select the following attributes: •
Select ERP Ring from list.
•
Select ERP Instance from list.
•
Select Target node of command from list.
•
Select Adjacent node from list.
•
Select Operator Command (Clear, Manual Switch, Force Switch).
•
Select or unselect Force without Check ring status.
...................................................................................................................................................................................................
4
Click OK E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-113 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
ERP Switch Command From Port
....................................................................................................................................................................................................................................
ERP Switch Command From Port When to use
The function set ERP Switch Command from ERP Port. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select the menu item: •
Search > Packet > ERP > ERP Instances Result: The list window is shown.
...................................................................................................................................................................................................
2
Select an item in the list and select Search > ERP Port Inst on NE. Result: The Port list window is shown. ...................................................................................................................................................................................................
3
Right Click the mouse and select the menu item: •
Action > Clear
•
Action > Manual Switch
•
Action > Force Switch
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-114 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
Add/remove Transport Link in a Ring
....................................................................................................................................................................................................................................
Add/remove Transport Link in a Ring When to use
The function add a Transport Link in major ring or sub-ring. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10) The function applies to both defined or implemented ring. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > ERP > Rings. Result: The list is shown. ...................................................................................................................................................................................................
2
Select the ring and select Add link. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-115 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
Add/remove Node in a Ring
....................................................................................................................................................................................................................................
Add/remove Node in a Ring When to use
The function add a Node in major ring or sub-ring. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10). The function applies to both defined or implemented ring. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > ERP > Rings. Result: The list is shown. ...................................................................................................................................................................................................
2
Select the ring and select Add Node. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-116 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
Create/delete ERP Ring bundle
....................................................................................................................................................................................................................................
Create/delete ERP Ring bundle When to use
The function creates ERP Rings bundle. Related Information
When more rings are present on a given set of NEs, it is necessary to define the “stacked ring bundle” (bundle). Bundle can be composed by major rings or sub-rings (no mix of major and sub ring is possible). PKT automatically creates a bundle of rings as soon as two rings are created on the same set of NEs. Name of the bundle is assigned by default to “Bundle x” where x is a number that univocally identifies the bundle. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Action > Packet > ERP > Create ERP Ring bundle. Result: The creation window is shown. ...................................................................................................................................................................................................
2
Enter: •
Enter the Bundle name
•
Select the ERP Rings
...................................................................................................................................................................................................
3
Click OK Result: The bundle is created E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-117 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
Add/remove ERP Ring in a bundle
....................................................................................................................................................................................................................................
Add/remove ERP Ring in a bundle When to use
The function adds/remove ERP Ring in a bundle. Related Information
Operator can add a new ring to a bundle, given that: • •
•
Ring is on the same set of NEs of already grouped ring(s) Ring is of the same type (major/sub) of already grouped rings (this condition is automatically verified if the previous condition is true, but can be useful to filter the list of rings to be proposed to operator) VLANs registered on the ring cannot be assigned to ring already grouped in the bundle.
• Removal of a ring from a bundle is always possible: operator has to take care of avoiding registering VLAN on the ring after the removal: PKT cannot perform consistency checks to avoid traffic loop. PKT automatically add a ring to an existing bundle created on the same set of NEs. PKT automatically remove a ring from an existing bundle when ring is deleted. This is true independently from the way the ring has been assigned to the bundle (i.e. either manually or automatically). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > ERP > ERP Ring bundle. Result: The creation window is shown. ...................................................................................................................................................................................................
2
Select the Bundle name Select the Action > ERP Bundle > Add Ring ...................................................................................................................................................................................................
3
Click OK
.................................................................................................................................................................................................................................... 1350 OMS 20-118 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protection (ERP) Management
Add/remove ERP Ring in a bundle
....................................................................................................................................................................................................................................
Result: The ring is added. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-119 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Overview
....................................................................................................................................................................................................................................
ERP Instance Management Overview Purpose
This document describes how to manage ITU-T G.8032 Ethernet Ring Protection v2 (ERP) instances inside 1350 OMS PKT product. Contents View the ERP instance list
20-121
Description of the list of ERP instances
20-122
Create/delete ERP instance
20-123
Implement/deimplement the ERP instance
20-125
Associate OAM to the ERP instance
20-126
Get a graphical view of the ERP instance
20-127
Modify Defined ERP instance
20-129
Modify implemented ERP instance
20-131
.................................................................................................................................................................................................................................... 1350 OMS 20-120 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
View the ERP instance list
....................................................................................................................................................................................................................................
View the ERP instance list When to use
The ERP Instance List window presents all the rings and their attributes. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet. Result: The menu of the Packet is shown. ...................................................................................................................................................................................................
2
Select ERP > ERP intances. Result: The list window is displayed.
See the following topic in this document: “Description of the list of ERP instances” (p. 20-122). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-121 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Description of the list of ERP instances
....................................................................................................................................................................................................................................
Description of the list of ERP instances Attributes of an ERP instances
The attributes displayed for each ERP instance are: •
User Label.
•
ERP Scope (Per Port, Per VLAN).
•
VLAN Id. VLAN used to tag R-APS PDU for this ERP instance.
•
VLAN Priority. Priority of R-APS PDU for this ERP instance.
•
Hold Off Time. Time to wait, after failure detection, before starting ERP protection.
•
WTR Time. Wait time to restore (minutes) in case of switch mode is revertive. If
• • • • • •
• •
Switch behavior is “revertive” default is 5; If Switch behavior is “not revertive” default is “not meaningful” and not modifiable. Guard Time. During guard time RPL owner discards the received R-APS OAM frames. Switch Behaviour(Revertive, Non Revertive). Behavior of switch following clear of failure. ERP State. (deactivated, idle, protection, manualSwitch, forcedSwitch, pending). Status of the ERP protection. Maintenance Entity Level. Maintenance Entity Level of the ERP instance. Switch On Ploc. (False, True). Include/exclude Partial loss of capacity (LAG) alarm
in the list of ERP Switch Criteria Switch On Cfm Alarm. (False, True). Include/exclude ETH OAM CFM alarms (AIS, Loss Of Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM), UNexpected Level (UNL) in the list of ERP Switch Criteria Provisioning State (Defined, Allocated, Implemented). Ring Userlabel.
•
Def.Time.
•
Working State (Normal).
•
Last Operation (None, Allocation, Deallocation, Implementation, Deimplementation).
•
Switch On Anm. (False, True). Include/exclude auto-negotiation mismatch alarm in
the list of ERP Switch Criteria. • •
Comment Availability Status. (Normal, Degraded, Failure).
.................................................................................................................................................................................................................................... 1350 OMS 20-122 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Create/delete ERP instance
....................................................................................................................................................................................................................................
Create/delete ERP instance When to use
The function creates ERP instances. Related Information
Definition is always possible. Checks to be done: • • •
•
• •
ERP instance user label has to be unique in the system R-APS VLAN Id must be inside the bundle of VLAN assigned to ERP for the domain ERP instance is defined R-APS VLAN id must not be used for in-fiber/in-band management channel: this check could be implicitly passed if management VLAN is not part of bundle of VLAN reserved for ERP. R-APS VLAN Id cannot have already been assigned to other ERP instances on the same ERP physical ring or by ERP instance on sub-rings that uses the current ring to close the virtual channel for R-APS Just one per-port ERP can be defined on a given physical ring If ring Id is different from default it must be unique inside the ERP instances of a given physical ring.
Deletion of ERP instance is possible only after de-implementation. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Action > Packet > ERP > Create ERP instances. Result: The creation window is shown. ...................................................................................................................................................................................................
2
In the General panel: •
Enter the User Label. Unique identifier of ERP instance inside PKT.
•
Enter a Comment. (optional)
•
Select the Activation Status. Enable/disable implementation of ERP instance.
•
Enter theR-APS VLAN Id. VLAN used to tag R-APS PDU for this ERP instance.
•
Enter the R-APS PCP. Priority of R-APS PDU for this ERP instance.
.................................................................................................................................................................................................................................... 1350 OMS 20-123 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Create/delete ERP instance
....................................................................................................................................................................................................................................
• • • •
Enter the Maintenance Entity Level. Maintenance Entity Level of the ERP instance. Select the Scope. (Per Port, Per VLAN) Select the PBB Domain from list. Domain where ERP instance is defined. Select the ERP Ring from list. Ring to be controlled by ERP instance.
•
Select the RPL Owner from list. NE having the RPL-owner role.
•
Select the RPL from list. Link/Port blocked by the ERP instance in nominal condition.
In the Timers panel: • •
• •
Select the Switch Behaviour. (Revertive, Non Revertive). Behavior of switch following clear of failure. Enter theWait Time To Restore (min). Wait time to restore (minutes) in case of switch mode is revertive. If Switch behavior is “revertive” default is 5; If Switch behavior is “not revertive” default is “not meaningful” and not modifiable. Enter the Hold Off Time (msec). Time to wait, after failure detection, before starting ERP protection. Enter the Guard Time (msec). Range from 10 to 2000 ms, with step of 10 ms. During guard time RPL owner discards the received R-APS OAM frames.
In the Failures panel select or deselect: • • • •
•
Auto-Negotiation Mismatch. Include/exclude auto-negotiation mismatch alarm in the
list of ERP Switch Criteria. (Enabled by default). Partial loss of capacity. Include/exclude Partial loss of capacity (LAG) alarm in the list of ERP Switch Criteria. Signal Degrade. Include/exclude Signal Degrade alarm in the list of ERP Switch Criteria. ETH OAM CFM Alarms. Include/exclude ETH OAM CFM alarms (AIS, Loss Of Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM), UNexpected Level (UNL) in the list of ERP Switch Criteria. Link OAM Critical link Events. Include/exclude link OAM critical link events alarm in the list of ERP Switch Criteria
...................................................................................................................................................................................................
3
Click OK Result: The ring is created E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-124 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Implement/deimplement the ERP instance
....................................................................................................................................................................................................................................
Implement/deimplement the ERP instance When to use
The function implements ERP instance. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > ERP > ERP Instances. Result: The list is shown. ...................................................................................................................................................................................................
2
Select the ring and select Implement. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-125 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Associate OAM to the ERP instance
....................................................................................................................................................................................................................................
Associate OAM to the ERP instance When to use
The function associates OAM to ERP instance. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > ERP > ERP Instances. Result: The list is shown. ...................................................................................................................................................................................................
2
Select the ERP Instance and select Associate OAM to ERP Instance. ...................................................................................................................................................................................................
3
For each item in the ERP Link List, select the following attributes: •
Select ERP Link from list.
•
Select OAM MA from list.
•
Click Associate.
...................................................................................................................................................................................................
4
Click OK E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-126 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Get a graphical view of the ERP instance
....................................................................................................................................................................................................................................
Get a graphical view of the ERP instance When to use
The function show a graphical view of the ERP instance. Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > ERP > ERP Instances. Result: The list is shown. ...................................................................................................................................................................................................
2
Select the ERP Instance and select ERP Graphical View.
.................................................................................................................................................................................................................................... 1350 OMS 20-127 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Get a graphical view of the ERP instance
....................................................................................................................................................................................................................................
Result: Figure 20-58 ERP Graphical View example
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-128 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Modify Defined ERP instance
....................................................................................................................................................................................................................................
Modify Defined ERP instance When to use
The function permit to modify attributes of a defined ERP instance. Related Information
In case the Ring or the scope has to be changed it is necessary to delete the ERP instance and create a new one. As a particular case the modification of RPL Owner requires to reset the RPL, so operator has to select RPL again. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > ERP > ERP instance. Result: The list is shown. ...................................................................................................................................................................................................
2
Select the object and select Modify. ...................................................................................................................................................................................................
3
In the General panel: •
Enter the User Label. Unique identifier of ERP instance inside PKT.
•
Enter a Comment. (optional)
•
Select the Activation Status. Enable/disable implementation of ERP instance.
•
Enter theR-APS VLAN Id. VLAN used to tag R-APS PDU for this ERP instance.
• •
Enter the R-APS PCP. Priority of R-APS PDU for this ERP instance. Enter the Maintenance Entity Level. Maintenance Entity Level of the ERP instance.
•
Select the RPL Owner from list. NE having the RPL-owner role.
•
Select the RPL from list. Link/Port blocked by the ERP instance in nominal condition.
.................................................................................................................................................................................................................................... 1350 OMS 20-129 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Modify Defined ERP instance
....................................................................................................................................................................................................................................
In the Timers panel: • •
• •
Select the Switch Behaviour. (Revertive, Non Revertive). Behavior of switch following clear of failure. Enter theWait Time To Restore (min). Wait time to restore (minutes) in case of switch mode is revertive. If Switch behavior is “revertive” default is 5; If Switch behavior is “not revertive” default is “not meaningful” and not modifiable. Enter the Hold Off Time (msec). Time to wait, after failure detection, before starting ERP protection. Enter the Guard Time (msec). Range from 10 to 2000 ms, with step of 10 ms. During guard time RPL owner discards the received R-APS OAM frames.
In the Failures panel select or deselect: • • • •
•
Auto-Negotiation Mismatch. Include/exclude auto-negotiation mismatch alarm in the
list of ERP Switch Criteria. Partial loss of capacity. Include/exclude Partial loss of capacity (LAG) alarm in the list of ERP Switch Criteria. Signal Degrade. Include/exclude Signal Degrade alarm in the list of ERP Switch Criteria. ETH OAM CFM Alarms. Include/exclude ETH OAM CFM alarms (AIS, Loss Of Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM), UNexpected Level (UNL) in the list of ERP Switch Criteria. Link OAM Critical link Events. Include/exclude link OAM critical link events alarm in the list of ERP Switch Criteria
...................................................................................................................................................................................................
4
Click OK Result: The ring is created E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-130 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Modify implemented ERP instance
....................................................................................................................................................................................................................................
Modify implemented ERP instance When to use
The function permit to modify attributes of an implemented ERP instance. Related Information
Attributes that can be modified for an implemented ERP instance are attributes that can be changed on the NE with no need to deactivate the ERP instance. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Select Search > Packet > ERP > ERP instance. Result: The list is shown. ...................................................................................................................................................................................................
2
Select the object and select Modify. ...................................................................................................................................................................................................
3
In the General panel: •
Enter the User Label. Unique identifier of ERP instance inside PKT.
•
Enter a Comment. (optional)
•
Select the Activation Status. Enable/disable implementation of ERP instance.
•
Enter the R-APS PCP. Priority of R-APS PDU for this ERP instance.
•
Select the RPL Owner from list. NE having the RPL-owner role.
•
Select the RPL from list. Link/Port blocked by the ERP instance in nominal condition.
In the Timers panel: • •
Select the Switch Behaviour. (Revertive, Non Revertive). Behavior of switch following clear of failure. Enter theWait Time To Restore (min). Wait time to restore (minutes) in case of switch mode is revertive. If Switch behavior is “revertive” default is 5; If Switch behavior is “not revertive” default is “not meaningful” and not modifiable.
.................................................................................................................................................................................................................................... 1350 OMS 20-131 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Instance Management
Modify implemented ERP instance
....................................................................................................................................................................................................................................
• •
Enter the Hold Off Time (msec). Time to wait, after failure detection, before starting ERP protection. Enter the Guard Time (msec). Range from 10 to 2000 ms, with step of 10 ms. During guard time RPL owner discards the received R-APS OAM frames.
In the Failures panel select or deselect: • • • •
•
Auto-Negotiation Mismatch. Include/exclude auto-negotiation mismatch alarm in the
list of ERP Switch Criteria. Partial loss of capacity. Include/exclude Partial loss of capacity (LAG) alarm in the list of ERP Switch Criteria. Signal Degrade. Include/exclude Signal Degrade alarm in the list of ERP Switch Criteria. ETH OAM CFM Alarms. Include/exclude ETH OAM CFM alarms (AIS, Loss Of Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM), UNexpected Level (UNL) in the list of ERP Switch Criteria. Link OAM Critical link Events. Include/exclude link OAM critical link events alarm in the list of ERP Switch Criteria
...................................................................................................................................................................................................
4
Click OK Result: The ring is created E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-132 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management PBB Fault Management
Overview
....................................................................................................................................................................................................................................
PBB Fault Management Overview Purpose
The Fault Localization allows the user to determine the list of elementary alarms affecting a managed resource. Contents PBB Fault Localization and navigation to AS
20-134
.................................................................................................................................................................................................................................... 1350 OMS 20-133 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management PBB Fault Management
PBB Fault Localization and navigation to AS
....................................................................................................................................................................................................................................
PBB Fault Localization and navigation to AS When to use
This function displays information about the fault present on the selected object. Related Information
The function is available for alarmed objects. For more information about Fault Localization, see: “Fault Localization” (p. 11-69). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Show the list of the objects. Select one of the following paths: •
Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Select
backbone EVCs. • •
Search > Packet > Services > Connection Less (Bridge) > B-VIDs
•
Search > Packet > ERP > ERP Rings
Search > Packet > ERP > ERP Instances
...................................................................................................................................................................................................
2
Select an item in the list and select Search > Fault Localization. Result: The Fault Localization list window is displayed.
See the following topic in this document: “Fault Localization” (p. 11-69). The list is not refreshed automatically, click Actualize button to refresh it. ...................................................................................................................................................................................................
3
Select an item in the list and click Search > External Navigation to > AS . Result: The Fault Management window is displayed with the alarm list.
See the following topic in this document: “Description of the list of Alarms” (p. 19-69) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-134 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management
Overview about Workflow
....................................................................................................................................................................................................................................
Workflow for PBB Management Overview about Workflow Workflow description
The workflow to manage PBB is part of the more general workflow for the Ethernet Service management. Transport Link Overwiew
1350OMS does support the provisioning of the infrastructure in term of TDM Links, WDM and Ethernet cables and (T-)MPLS links. The infrastructure is used for different supported layer (T-)MPLS or Ethernet. The infrastructure is named Transport Link. The Transport Link can be supported by: • • • •
A TDM path. The link is called Link Over TDM. It carries directly Ethernet Segments, Tunnels or PWs. A Tunnel/PW. The link is called Link Over (T-)MPLS. A Link Over TDM or a Link Over Cable (Martini) carries it. An Ethernet cable or a Martini cable. The link is called Link Over Cable. A WDM link. The link is called Link Over WDM.
Domain overview
In Connection Less Networks, the Domain represents an homogeneous set of Network Elements dedicated to MAC, Virtual, Provider or Provider Backbone Bridging. A Domain infrastructure is made of NE, ENE, Transport Links and Edge Ports managed together to supply a Connection Less infrastructure. The user is requested to assign the NE to a specific domain. The NE related resources are automatically uploaded and associated to it. The user is requested to assign the Transport Link to a specific domain. The NE related resources are automatically uploaded and associated to it. Domain main properties are: •
•
the Domain Type: – ETS – Bridge – T-MPLS the Bridge Type: – MAC –
Virtual
.................................................................................................................................................................................................................................... 1350 OMS 20-135 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Overview about Workflow
....................................................................................................................................................................................................................................
– – •
Provider Provider backbone Bridge
the Control Plane type: – ERP – STP – RSTP – PVSTP – –
MSTP none
Domain attribute dependencies: • •
The list of possible Bridge types depends on the selected Domain type The list of possible Control protocols depends on the selected Bridge type
•
In case of PBB the only possible choice for Control Protocol is ERP
.................................................................................................................................................................................................................................... 1350 OMS 20-136 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Create a PBB Domain
....................................................................................................................................................................................................................................
Create a PBB Domain When to use
This function allows the user to define a domain in the managed network. Related Information
For information, see: “Overview about Workflow ” (p. 20-135). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Action > Packet > Construction > Create Domain. ...................................................................................................................................................................................................
2
On the Create Window. To create a customer: •
Enter a User Label.
•
Enter a Domain Type: Bridge.
•
Enter an Bridge Type: PBB.
•
Enter a Control Protocol Type: ERP.
...................................................................................................................................................................................................
3
Click Ok. Result: The domain is created.
The Domain list is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-137 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Add NE to a Domain
....................................................................................................................................................................................................................................
Add NE to a Domain When to use
The user assign a NE to a domain. Related Information
It is possible to assign a group of NE in a single operation. See Action > Packet > Construction > Assign Resources to Domain
For information, see: “Overview about Workflow ” (p. 20-135). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Construction > Network Elements > Defined NEs. ...................................................................................................................................................................................................
2
Select the NE in the list. ...................................................................................................................................................................................................
3
Follow the path Action > Network Element > Assign Network Element to Domain. Result: The assign window is displayed. ...................................................................................................................................................................................................
4
Click the Bridge Domain field. Result: The list of available bridge domain is displayed. ...................................................................................................................................................................................................
5
Select the PBB domain and Click the check sign to confirm it. ...................................................................................................................................................................................................
6
Click Ok. Result: The NE is assigned to the Domain previously created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-138 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Add Transport Link to a Domain
....................................................................................................................................................................................................................................
Add Transport Link to a Domain When to use
The user assign a Transport Link to a domain. Related Information
It is possible to assign a group of Transport Link in a single operation. See also Action > Packet > Construction > Assign Resources to Domain
When the user assigns Transport Links, the related NE are automatically uploaded and associated to the domain. For information, see: “Overview about Workflow ” (p. 20-135). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Search > Packet > Construction > Transport Link. ...................................................................................................................................................................................................
2
Select the object in the list. ...................................................................................................................................................................................................
3
Follow the path Action >Transport Link> Assign Transport Link to Domain. Result: The assign window is displayed. ...................................................................................................................................................................................................
4
Click the Bridge Domain field. Result: The list of available bridge domain is displayed. ...................................................................................................................................................................................................
5
Select the PBB domain and Click the check sign to confirm it. ...................................................................................................................................................................................................
6
Click Ok.
.................................................................................................................................................................................................................................... 1350 OMS 20-139 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Add Transport Link to a Domain
....................................................................................................................................................................................................................................
Result: The NE is assigned to the Domain previously created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-140 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
ERP provisioning
....................................................................................................................................................................................................................................
ERP provisioning When to use
The function defines an ERP instance. Related Information
For information, see: “Ethernet Ring Protocol (ERP)” (p. 20-10). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Action > ... > Create ERP. ...................................................................................................................................................................................................
2
Provisioning of ERP INSTANCE properties in the General tab: •
ERP instance User label.
•
comment.
•
Activation status [active/not active] (used to enable/disable the ERP protocol).
•
RING VLAN Tag (used to tag R-APS OAM protocol frames): – R-APS VLAN ID [1..4093] (unique per ring or group of interconnected rings). –
R-APS PCP [0..7] (priority bits value for R-APS).
•
Maintenance Entity Level [0..7] (OAM level assigned to R-APS).
•
Scope of ERP instance [port/VLAN].
•
RPL Owner (NE that has the master role on ERP instance).
•
RPL (East/west link that is Blocked by RPL owner in nominal conditions).
...................................................................................................................................................................................................
3
Provide the Protocol Tuning in the Detail tab: •
Switch behavior [Revertive/Not Revertive].
•
Wait Time to Restore [0..12 Minutes,steps of 1].
•
Hold-Off time [0..1000 millisec, steps of 10].
•
Guard Time [10..2000 millisec, steps of 10].
.................................................................................................................................................................................................................................... 1350 OMS 20-141 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
ERP provisioning
....................................................................................................................................................................................................................................
•
Optional Alarms that can be included/excluded in the list of Switch Criteria: – Signal Degrade. – Partial Loss of Capacity (if ring ports are LAG). – Loss Of Continuity (CCM) defect. –
Link OAM Critical Events.
•
Ring Port.
•
MEP.
Note: If Loss of Continuity defect or Link OAM Critical Events are used as Switch Criteria it is necessary to assign Down MEPs to Ring Ports (on all the NEs inside the ring). ...................................................................................................................................................................................................
4
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-142 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Configure B-VID
....................................................................................................................................................................................................................................
Configure B-VID When to use
The function allows to define a B-VID in a PBB domain and to associate it to the ERP instance. Related Information
For information, see: “Ethernet Ring Protocol (ERP)” (p. 20-10). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Action > Packet > ... > Configure B_VID. Result: The configuration window is displayed. ...................................................................................................................................................................................................
2
Insert the following information: •
B-VID [1..4094]: service group identifier, unique network wide.
•
B-VID distribution:
•
–
Network-wide: B-VID is distributed on all the NEs in the PBB domain.
–
Crossed rings: B-VID is distributed on all the NEs of rings selected by user.
ERP instance, used to protect B-VID, is assigned for each crossed ring.
...................................................................................................................................................................................................
3
Click OK. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-143 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Create a PBB EVC
....................................................................................................................................................................................................................................
Create a PBB EVC When to use
This function consists in creating a PBB Ethernet Virtual Connection. Related Information
For information about PBB EVC, see: “PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the Multi Service GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Action > Packet > Services > Connection Less (Bridge) > Create Bridge EVC. Result: The creation window is displayed. ...................................................................................................................................................................................................
2
Fill the following data in the Specific panel: •
User label.
•
Service Type [EVPL, EPTL, EPL, EPLAN, EVPLAN, HSI, BTV, Broadcast].
•
Ethernet Service (optional): it is used to group together EVCs according to a user-selected criteria. Domain (PBB).
• •
Network Access Domain (optional): Network Access Domain (NAD) can be used to
partition the network into different administrative domains. A possible use is to limit the user to use only a set the of the network’s resources (NEs, ports, links). ...................................................................................................................................................................................................
3
Fill the following data in the Detail panel: •
I-SID [integer] (identifier of service, unique network wide).
•
B-VID [1-4094] (service group identifier, unique network wide).
•
Broadcast Domain Containment (Enabled, Disabled)
•
Set Standard VLAN type (0x8100) [True, False] (identifier for VLAN tagged frames at UNI).
.................................................................................................................................................................................................................................... 1350 OMS 20-144 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Create a PBB EVC
....................................................................................................................................................................................................................................
• •
IGMP Snooping State [Not Meaningful, Enabled, Disabled] (to mark if IGMP
snooping is enabled/disabled on the EVC). Configure the Storm Control: Service frame delivery assumes one of the following values: Deliver unconditionally, Deliver conditionally, Discard. Fill the following fields: – Unicast Service Frame Delivery. –
Multicast Service Frame Delivery.
–
Broadcast Service Frame Delivery.
If selected values is “Deliver Conditionally” it is possible to specify the Limitation of rate (per service). ...................................................................................................................................................................................................
4
Select info panel. •
The user can use the fields in the info panel to enter comments or other information.
...................................................................................................................................................................................................
5
Select PM panel. •
Set or unset PM enabled
• •
Select Granularity (24 h, 15 min) Select Involved TPs (All Points)
•
Select CSV Reporting (No Report, 24 h, 2 h)
•
Select purge Policy (Keep, On stop, On delete)
...................................................................................................................................................................................................
6
Select OAM panel. •
Set OAM Enabled. (Enable, Disable). The enabling of Eth OAM: – creates a MA with identifier equal to the EVC user label with “MA_” prefix. – enables CC with default period of 1 second, no intermediate points (MIP).
•
Select Priority.
•
Select Maintenance Domain.
...................................................................................................................................................................................................
7
Select Miscellaneous panel. •
Select C-VLAN Preservation.
•
Select C-VLAN COS Preservation.
When checked, it ensures that each packet exiting the EVC (at some egress UNI) has the same VLAN Id & Priority Bits information that it had when it entered the EVC (at some ingress UNI). This Attribute must be defined at EVC definition and is modifiable before EVC allocation.
.................................................................................................................................................................................................................................... 1350 OMS 20-145 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Create a PBB EVC
....................................................................................................................................................................................................................................
These two attributes are not meaningful for the relevant NEs. C-VLAN push/pop is configured on flow level. ...................................................................................................................................................................................................
8
Click Next Result: Figure 20-59 Create PBB EVC: Termination Selection
...................................................................................................................................................................................................
9
Select node and port for both originating and terminating sides. Click Next
.................................................................................................................................................................................................................................... 1350 OMS 20-146 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Create a PBB EVC
....................................................................................................................................................................................................................................
Result: Figure 20-60 Create PBB EVC: Termination Settings
...................................................................................................................................................................................................
10
The folderTermination Setting defines the traffic flows. Select the first termination from the upper selection box. • • •
Click traffic descriptor button. Select the traffic descriptor from the selection box and confirm. Select the policy mode. If you select color aware, you will select color profile. Select the classification priority-code 0-7 / DSCP code 0-63.
•
Select VLAN POP disabled.
•
Folder traffic classifier deals on VLAN id.
.................................................................................................................................................................................................................................... 1350 OMS 20-147 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Create a PBB EVC
....................................................................................................................................................................................................................................
• •
Folder Leaf Term deals on HSI. Folder Reuse Flows allows to copy and reuse flow characteristics.
...................................................................................................................................................................................................
11
Optionally you can setup Layer 2 Control Protocol. Figure 20-61 Ingress flow create
.................................................................................................................................................................................................................................... 1350 OMS 20-148 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Create a PBB EVC
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
12
You can monitor that the Ingress flow has been created: the relevant traffic descriptor is displayed in the bottom of the window Figure 20-62 Ingress Flow: create monitoring
...................................................................................................................................................................................................
13
Select button Egress Flow, folder Push Select following data: • • •
Class of service (guaranteed/best effort/regulated,...) If you select clear all fields, subsequent fields can be ignored. VLAN ID. It is an additional ID added to the stack.
.................................................................................................................................................................................................................................... 1350 OMS 20-149 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Create a PBB EVC
....................................................................................................................................................................................................................................
• •
Priority mode. If set to color aware fields green and yellow are active. Click Create Egress
You can monitor that the Egress flow has been created: the relevant traffic descriptor is displayed in the bottom of the window Figure 20-63 Egress Flow: Push
...................................................................................................................................................................................................
14
Create Ingress and Egress flows for the second termination. Click Next. ...................................................................................................................................................................................................
15
Select EVC state (implemented in this example).
.................................................................................................................................................................................................................................... 1350 OMS 20-150 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Create a PBB EVC
....................................................................................................................................................................................................................................
Click OK to confirm EVC creation. Figure 20-64 EVC Allocate and Implement
.................................................................................................................................................................................................................................... 1350 OMS 20-151 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Create a PBB EVC
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
16
To verify the successful creation, follow the path Search > Packet > Connection Less(Bridge) > Bridge EVC Figure 20-65 Search>Packet>Connection Less(Bridge)>Bridge EVC
Result: The Bridge EVC list is shown. Figure 20-66 Bridge EVC list
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-152 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
PBB EVC traffic classification
....................................................................................................................................................................................................................................
PBB EVC traffic classification When to use
For each EVC termination, user defines the traffic classification rules by associating a Traffic Classifier and QoS attributes. Related Information
For information, see: “PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Action > Packet > Services > Create Traffic Classifier. ...................................................................................................................................................................................................
2
Specify classification rules based on: •
VLAN (single or range)
•
Priority bit (single or range)
•
IP DSCP (single or range)
•
Payload type
...................................................................................................................................................................................................
3
Specify QoS attributes: •
Policing mode [color blind, color aware, none]
•
Color profile (applicable if policing mode is color blind or color aware)
•
CoS and bandwidth profile are specified associating a Traffic Descriptor. See “Traffic Descriptor Definition” (p. 20-154)
...................................................................................................................................................................................................
4
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-153 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
Traffic Descriptor Definition
....................................................................................................................................................................................................................................
Traffic Descriptor Definition When to use
The Traffic Descriptors describes the characteristics of an Ethernet segment in term of Class of Service (CoS) and bandwidth. Related Information
For information, see: “Overview about Workflow ” (p. 20-135). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the path Action > Packet > Services > Create Traffic Descriptor. Result: The creation window is displayed. ...................................................................................................................................................................................................
2
On the Create Traffic Descriptor Window. To create a Traffic Descriptor: •
Enter a User Label.
•
Select the Class of Service (Best Effort, Guaranteed, Regulated, Regulated1, Regulated3, Regulated4, Guaranteed2, Background). Enter a CIR value (set automatically to '0' if the selected Class of Service is 'Best Effort'). Enter a PIR value. Enter a CBS value (set automatically to '0' if the selected Class of Service is 'Best Effort'). Enter a PBS value (if the selected Class of Service is 'Guaranteed', PBS value is automatically set to CBS value - but could be modified).
• • • •
...................................................................................................................................................................................................
3
Click Ok. Result: The Traffic Descriptor is created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-154 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management Workflow for PBB Management
EVC Allocation and Implementation
....................................................................................................................................................................................................................................
EVC Allocation and Implementation When to use
To complete the Provider Bridge Workflow: create a Connection Less EVC, allocate, and implement it. Related Information
For information, see: “PBB Ethernet Virtual Connection” (p. 20-7). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main view: ...................................................................................................................................................................................................
1
Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Result: The Bridge EVC list window is displayed. ...................................................................................................................................................................................................
2
Select the EVC in the list and follow the path Action > Bridge EVC > Allocate. Result: The allocation window is displayed. ...................................................................................................................................................................................................
3
Click Ok. Result: The EVC is allocated.
The Provisioning State is changed to Allocated. ...................................................................................................................................................................................................
4
Select again the EVC in the list and follow the path Action > Bridge EVC > Implement. Result: The implementation window is displayed. ...................................................................................................................................................................................................
5
Click Ok. Result: The EVC is implemented.
The Provisioning State is changed to Implemented. E................................................................................................................................................................................................... N D O F S T E P S .................................................................................................................................................................................................................................... 1350 OMS 20-155 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management
Overview
....................................................................................................................................................................................................................................
In Band Management Overview Purpose
This section describes the procedure for the configuration of the In Band Management for the TSS160C and TSS10 Network Element in the PBB (Provider Backbone Bridge) Network when protected using the ERP protection schema. Contents Address Configuration of the Network Elements
20-157
Lag Port Creation (Via Zic)
20-165
NMS Start Supervision (NE Not Defined On NMS)
20-183
.................................................................................................................................................................................................................................... 1350 OMS 20-156 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Address Configuration of the Network Elements
....................................................................................................................................................................................................................................
Address Configuration of the Network Elements When to use
This function configures IP Address in the NE. Related Information Before you begin
The Network Element is correctly provisioned with the full set of boards required for the configuration of the PBB Core Network. Task
Using the ZIC configure the System ID, the LAN interface (if the NE is a Gateway NE) and (for TSS160C) enable the OSPF for the node. ...................................................................................................................................................................................................
1 Figure 20-67 TSS160C System ID Configuration
.................................................................................................................................................................................................................................... 1350 OMS 20-157 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Address Configuration of the Network Elements
....................................................................................................................................................................................................................................
From Communication > DCN Phys. If > IP Address menu open the view for the configuration of the System ID. ...................................................................................................................................................................................................
2 Figure 20-68 TSS160C System ID Configuration form
In the form fill the IP address field and the Subnet mask field.
.................................................................................................................................................................................................................................... 1350 OMS 20-158 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Address Configuration of the Network Elements
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3 Figure 20-69 TSS160C Q LAN Configuration (Gateway NE)
If the TSS160C is a Gateway NE, configure and enable also the Q LAN Interface. From Communication > DCN Phys. If > LAN menu open the view and configure the Q LAN. Note the configuration: •
OSI Protocol (Disabled) (N)
•
Internet Protocol (Enabled) (Y)
•
Integrated ISIS (Disabled) (N)
•
• Proxy Address Resolution Protocol (Enabled) (Y)
•
• Channel (MNGPLANE)
•
• OSPF (Disabled) (N) (This parameter refers to the enabling of the OSPF protocol on the LAN interface and as far as we know no OSPF should be configured on that network)
.................................................................................................................................................................................................................................... 1350 OMS 20-159 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Address Configuration of the Network Elements
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4 Figure 20-70 TSS160C Export of the Route
Some network topologies could require the export of routes (or static route) between routing protocols. For example, may need to export the static route to OSPF. To enable the reporting of the routes between different protocol open the ULC view from Communication > OSI ULC Report menu.
.................................................................................................................................................................................................................................... 1350 OMS 20-160 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Address Configuration of the Network Elements
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5 Figure 20-71 Tss160C OSI Routing Configuration
Once the view is opened enable the reporting you need. If no reporting is required set the parameters in the view as here depicted.
.................................................................................................................................................................................................................................... 1350 OMS 20-161 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Address Configuration of the Network Elements
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
6 Figure 20-72 TSS10 System ID Configuration
.................................................................................................................................................................................................................................... 1350 OMS 20-162 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Address Configuration of the Network Elements
....................................................................................................................................................................................................................................
From Communication > System IP Address menu, configure the System IP Address Figure 20-73 TSS10 System IP Address
.................................................................................................................................................................................................................................... 1350 OMS 20-163 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Address Configuration of the Network Elements
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
7 Figure 20-74 Tss10 LAN Interface Details
If the TSS10 is a Gateway NE, configure and enable also the Q LAN (LAN1) Interface. From Communication > DCN LAN Interface menu open the view and configure the LAN1. Note the configuration: •
Proxy Address Resolution Protocol (ARP) (Enabled) (Flagged on)
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-164 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
....................................................................................................................................................................................................................................
Lag Port Creation (Via Zic) When to use
This function creates a LAG port. Related Information
For the NNI ports that are designed to carry on also the management frame, the LAG port (normally used NNI side to close the Ethernet Ring), must be configured by ZIC (enabling the In Band Management) and uploaded by the NMS once the NE is reachable (the upload is automatically performed during the NE Define action performed by PKT). Refer to the following procedures: •
“Task for TSS160C” (p. 20-166)
•
“Task for TSS160C V1.12.04” (p. 20-174)
• Before you begin
The Network Element is correctly provisioned with the full set of boards required for the configuration of the PBB Core Network.
.................................................................................................................................................................................................................................... 1350 OMS 20-165 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
....................................................................................................................................................................................................................................
Task for TSS160C
TSS160C LAG Port Creation and Configuration: ...................................................................................................................................................................................................
1 Figure 20-75 TSS160C Link Aggregation Group Management
From the Link Aggregation Group Management tab, go to the bottom of the page and fill the fields related to: •
Size (e.g. 2)
•
Name (just the LAG ID, i.e. the numerical identifier) (e.g. 1)
•
Actor Admin Key (e.g. 1)
.................................................................................................................................................................................................................................... 1350 OMS 20-166 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
Once the LAG has been created, select the LAG port and set the Client Type as NNI: Figure 20-76 Tss160C LAG Configuration (Client Type)
.................................................................................................................................................................................................................................... 1350 OMS 20-167 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
....................................................................................................................................................................................................................................
Set the Admin State of the port to enable. Figure 20-77 Tss160C LAG Configuration (Administration State)
.................................................................................................................................................................................................................................... 1350 OMS 20-168 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
Once the port has been enabled configure the In Band Management selecting the In Fiber In Band tab: Figure 20-78 Tss160C In Fiber In Band
.................................................................................................................................................................................................................................... 1350 OMS 20-169 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Select Routing Protocol as ospf. Figure 20-79 Tss160C In Fiber In Band (OSPF)
.................................................................................................................................................................................................................................... 1350 OMS 20-170 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Complete the configuration activating the interface Figure 20-80 Tss160C In Fiber In Band Activate
...................................................................................................................................................................................................
6
Bind the ports in the LAG repeating the following steps for each port that is designed to be member of the LAG:
.................................................................................................................................................................................................................................... 1350 OMS 20-171 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
....................................................................................................................................................................................................................................
Select the local port and set the Client Type as linkagg. Figure 20-81 Tss160C port member of LAG
.................................................................................................................................................................................................................................... 1350 OMS 20-172 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
7
Click on Configure LAG link in order to open the view for the aggregation of the port to the LAG created before: Figure 20-82 Tss160C port member of LAG configuration
.................................................................................................................................................................................................................................... 1350 OMS 20-173 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
8
Once the view is opened select the Actor Admin Key of the LAG you want to associate: Figure 20-83 Tss160C port member of LAG Actor
Note: For the TSS160C V1.12.04, note the following: In that release the bind of the port (the action before) fails. In order to bind the ports with the LAG follows the special procedure provided by NE team. See “Task for TSS160C V1.12.04” (p. 20-174) E................................................................................................................................................................................................... N D O F S T E P S
Task for TSS160C V1.12.04
For the TSS160C V1.12.04 note the following: In that release the bind of the port (the action described in “Task for TSS160C” (p. 20-166)) fails. In order to bind the ports with the LAG follows the special procedure provided by NE team. ...................................................................................................................................................................................................
1
Connect to the CLI of the NE using the following command (by an PC or UNIX station that is able to reach the NE):
.................................................................................................................................................................................................................................... 1350 OMS 20-174 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
....................................................................................................................................................................................................................................
telnet ip address of ne 1123 ...................................................................................................................................................................................................
2
Get the physical interface: Cli:admin > int sh Result:
Port InterfaceType ClientType ServiceStatus AdminStatus Traffic =========================================================================== r1sr1sl13d0p1 eth (6) linkagg (3) 0 down (2) down (2) r1sr1sl13d0p2 eth (6) ets (1) 0 down (2) down (2) r1sr1sl13d0p3 eth (6) linkagg (3) 0 up (1) up (1) r1sr1sl13d0p4 eth (6) linkagg (3) 0 up (1) up (1) r1sr1sl13d0p6 eth (6) pnp (5) 0 up (1) up (1) r1sr1sl13d0p7 eth (6) linkagg (3) 0 up (1) up (1) r1sr1sl13d0p8 eth (6) ets (1) 0 down (2) down (2) r1sr1sl13d0p9 eth (6) ets (1) 0 down (2) down (2) r1sr1sl13d0p10 eth (6) ets (1) 0 down (2) down (2) ...................................................................................................................................................................................................
3
Get the lag ports: Cli:admin > linkagg sh Result: lag AdminKey LAG User Label LAG Size Admin State ------- ----------- ---------------------------------------- -------1 1 '' 2 enable (1) 2 2 '' 2 enable (1) 3 3 '' 1 enable (1) ...................................................................................................................................................................................................
4
Bind the port (e.g. ‘r1sr1sl13d0p1’ with ‘lag1’): Cli:admin > linkagg port r1sr1sl13d0p1 bind lag1 Result: .. message: waiting - other CLI command in progress .. message: successful completed command ...................................................................................................................................................................................................
5
Logout from CLI:
.................................................................................................................................................................................................................................... 1350 OMS 20-175 8DG42227DAAA 9.6 Issue 3 December 2012
----
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
....................................................................................................................................................................................................................................
Cli:admin > logout E................................................................................................................................................................................................... N D O F S T E P S
Task for TSS10
TSS10 LAG Port Creation and Configuration: ...................................................................................................................................................................................................
1 Figure 20-84 TSS10 Link Aggregation Group Management
From the Link Aggregation Group Management tab, go to the bottom of the page and fill the fields related to: •
Size (e.g. 2)
•
Name (just the LAG ID, i.e. the numerical identifier) (e.g. 1)
•
Actor Admin Key (e.g. 1)
•
Admin State to enable
•
EthClient Type to NNI
.................................................................................................................................................................................................................................... 1350 OMS 20-176 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
Once the port has been created enable the In Band Management: Figure 20-85 Tss10 Enable the In Band Management
.................................................................................................................................................................................................................................... 1350 OMS 20-177 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
Select the In-band Management tab and check the configuration (click on save if you need to modify the Management Plan Label) Figure 20-86 TSS60 In Fiber In Band Configuration
...................................................................................................................................................................................................
4
Bind the ports in the LAG repeating the following steps for each port that is designed to be member of the LAG:
.................................................................................................................................................................................................................................... 1350 OMS 20-178 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
....................................................................................................................................................................................................................................
Select the local port and set the Client Type as LAG: Figure 20-87 Tss10 portInLAG
.................................................................................................................................................................................................................................... 1350 OMS 20-179 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Click on Configure LAG link in order to open the view for the aggregation of the port to the LAG created before: Figure 20-88 Tss10 port member of LAG configuration
.................................................................................................................................................................................................................................... 1350 OMS 20-180 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
6
Once the view is opened select the Actor Admin Key of the LAG you want to associate: Figure 20-89 Tss10_portInLAGconfigActor
.................................................................................................................................................................................................................................... 1350 OMS 20-181 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
Lag Port Creation (Via Zic)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
7
Complete the configuration enablig the Admin State of the member port. Figure 20-90 Tss10_portInLAGadminState
Result: The configuration of the Network Element is now complete.
In order to reach the nodes from the NMS it is now required to configure the ip network in the ‘middle’ (between node and NMS) according to the DCN topology and the addresses plan. For a simple test, if the NMS is in the same sub network of the Q LAN interface of a gateway NE (e.g. a TSS160C), is possible to configure a static route on the NE (as explained before) and a static route on the NMS and verify if the node inside the ring are reachable from the NMS (ping). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-182 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
NMS Start Supervision (NE Not Defined On NMS)
....................................................................................................................................................................................................................................
NMS Start Supervision (NE Not Defined On NMS) When to use
Use this function to start the Supervision on a Network Element. Related Information
This task does not have any related information. Before you begin
Create the Network Elements NE Manager side, set the right addresses and verify that NMS is able to reach the nodes in the ring. Task
Once the Network Elements are reachable via NMS, it is possible to start the Supervision. ...................................................................................................................................................................................................
1 Figure 20-91 NMS Start Supervision
.................................................................................................................................................................................................................................... 1350 OMS 20-183 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
NMS Start Supervision (NE Not Defined On NMS)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
Once the supervision starts, select the Nodes Physical Manager side and ask for Synchronize NE. Figure 20-92 NMS Synchronize NE
.................................................................................................................................................................................................................................... 1350 OMS 20-184 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
NMS Start Supervision (NE Not Defined On NMS)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
From the Physical Manager, if you need, you can add the node in the MAPs. Figure 20-93 NMS add Node In Map
.................................................................................................................................................................................................................................... 1350 OMS 20-185 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
NMS Start Supervision (NE Not Defined On NMS)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
From the Physical Manager, create the Physical Connections, one for each Link Member of the LAG. Figure 20-94 NMS Create Physical Connection
.................................................................................................................................................................................................................................... 1350 OMS 20-186 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
NMS Start Supervision (NE Not Defined On NMS)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Here the Physical Connection Creation wizard of the Physical Manager: Figure 20-95 NMS Create Physical Connection wizard
Once the full set of Physical Connections related to the Links composing the LAG has been created, the next step is the definition of the nodes PKT side.
.................................................................................................................................................................................................................................... 1350 OMS 20-187 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
NMS Start Supervision (NE Not Defined On NMS)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
6
Select the node you need to define from the Available NE list of the PKT and ask for Define NE. Figure 20-96 NMS Define NE
.................................................................................................................................................................................................................................... 1350 OMS 20-188 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
NMS Start Supervision (NE Not Defined On NMS)
....................................................................................................................................................................................................................................
Result: During the Define NE operation the Ethernet Local Ports, the LAG Ports, and
the Physical Links (defined from the Physical Manager on the ports member of the LAGs) will be automatically uploaded. ...................................................................................................................................................................................................
7
For each node, ask for Ethernet Local Ports and verify the presence of the LAG port defined before via ZIC: Figure 20-97 NMS Ethernet Physical Port list
.................................................................................................................................................................................................................................... 1350 OMS 20-189 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
NMS Start Supervision (NE Not Defined On NMS)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
8
In order to build the Link Over LAG, select Action > Packet > Construction > Transport Link > Create LAG Link Over Cable From Ports as depicted in the snapshot: Figure 20-98 Create LAG Link over Cable
.................................................................................................................................................................................................................................... 1350 OMS 20-190 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
NMS Start Supervision (NE Not Defined On NMS)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
9
Select the nodes in the wizard, and the LAG ports extremities of the Link Over LAG and commit the creation: Figure 20-99 Create Link Over Cable
...................................................................................................................................................................................................
10
The Link Over LAG will be created using the LAG ports created before via ZIC and uploaded NMS side.
.................................................................................................................................................................................................................................... 1350 OMS 20-191 8DG42227DAAA 9.6 Issue 3 December 2012
Provider Backbone Bridge Network Management In Band Management
NMS Start Supervision (NE Not Defined On NMS)
....................................................................................................................................................................................................................................
Moreover it will refer to the Links built before using the Physical Manager (the links using as extremities the ports member of the LAG). Figure 20-100 NMS Link Over LAG list
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 20-192 8DG42227DAAA 9.6 Issue 3 December 2012
21
21 Broadcast TV Service Management
Overview Purpose
This chapter describes the BTV service emulation in the scope of Ethernet Connection Oriented and Connection Less management. Contents Section I: Introduction
21-3
Overview about Broadcast TV
21-4
Managing Broadcast TV Elements
21-5
View the list of Broadcast TV Elements
21-6
Create a BTV Element
21-8
Modify a BTV Element
21-11
Delete a BTV Element
21-14
View the details of the BTV Elements
21-16
Details of a BTV Elements
21-17
View the list of ETPs belonging to a BTV Element
21-18
Description of the list of BTV ENE inventory
21-19
Create an ETP in a BTV Element
21-20
Delete an ETP in a BTV Element
21-22
Section II: Workflow for BTV construction
21-24
Create path on 1350 OMS SDH application
21-25
Create Broadcast TV Element
21-26
Create Link Broadcast TV
21-29
Section III: Workflow for BTV Service Management
21-33
Create a Customer
21-34
Create Ethernet Service
21-35
Create a Connection Oriented EVC
21-37
................................................................................................................................................................................................................................... 1350 OMS 21-1 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management
Overview
....................................................................................................................................................................................................................................
Section IV: Bridge Based BTV Service
21-40
Overview about the Services
21-41
IGMP Snooping Management
21-42
IGMP Snooping State Management
21-44
.................................................................................................................................................................................................................................... 1350 OMS 21-2 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Overview
....................................................................................................................................................................................................................................
Section I: Introduction Overview Purpose
This section describes the BTV service emulation in the scope of Ethernet Connection Oriented management. Contents Overview about Broadcast TV
21-4
Managing Broadcast TV Elements
21-5
View the list of Broadcast TV Elements
21-6
Create a BTV Element
21-8
Modify a BTV Element
21-11
Delete a BTV Element
21-14
View the details of the BTV Elements
21-16
Details of a BTV Elements
21-17
View the list of ETPs belonging to a BTV Element
21-18
Description of the list of BTV ENE inventory
21-19
Create an ETP in a BTV Element
21-20
Delete an ETP in a BTV Element
21-22
.................................................................................................................................................................................................................................... 1350 OMS 21-3 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Overview about Broadcast TV
....................................................................................................................................................................................................................................
Overview about Broadcast TV Broadcast TV description
The user defines an EPLAN or an EVPLAN service. The choice depends on whether the SDH partially terminated path is shared or not with other services. The user is suggested to use the comment field to state that the service is a BTV service. The 1350 OMS PKT user defines an EVC belonging to an EPLAN or an EVPLAN service with the following characteristics: • •
Multipoint to multipoint. Unicast.
•
The EVC termination is chosen among the Ethernet Physical ports available on real NEs ending the SDH broadcast path.
The 1350 OMS PKT user defines a set of Ethernet Segments having common TD, TC, and Color Profile (if needed). The user is requested to define one Ethernet Segment for each Link Over TDM taking care about the assigned directionality: • •
For SDH broadcast path sources: each Ethernet Segment must start from a real NE and must end on the ENE playing the BTV role. For SDH broadcast path sinks: each Ethernet Segment must start from the ENE playing the BTV role and must end on a real NE.
Then, all built Ethernet Segments can be Allocated and Implemented, allowing the Broadcast traffic flowing. Note: Operations are in users hands. No specific congruence checks are performed by 1350 OMS PKT for EPLINE or EVPLINE services emulating BTV services.
.................................................................................................................................................................................................................................... 1350 OMS 21-4 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Managing Broadcast TV Elements
....................................................................................................................................................................................................................................
Managing Broadcast TV Elements Overview
The BTV Element management, part of the network construction, consists in: •
performing actions such as:
•
– creating, modifying, deleting BTV Elements. – creating, deleting ETPs. displaying BTV Element information such as: – – –
BTV Element list. ETP list. properties.
The BTV Element management chain gives the order in which the available actions can be performed. Figure 21-1 BTV Element management chain
.................................................................................................................................................................................................................................... 1350 OMS 21-5 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
View the list of Broadcast TV Elements
....................................................................................................................................................................................................................................
View the list of Broadcast TV Elements When to use
The Broadcast TV Element list presents all the ENEs managed (that is, already defined) by the 1350 OMS PKT, and their attributes. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Network Elements > Defined External NEs. Result: The list window is shown. ...................................................................................................................................................................................................
2
Set the filter condition to Role=BTV and click Filter.
.................................................................................................................................................................................................................................... 1350 OMS 21-6 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
View the list of Broadcast TV Elements
....................................................................................................................................................................................................................................
Result: The list window is shows all the available ENEs and their attributes according to the filter condition. Figure 21-2 Broadcast TV Element List window
The attributes displayed for each ENE are: • User Label. • •
Parent Subnetwork. ENE Role: BTV.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-7 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Create a BTV Element
....................................................................................................................................................................................................................................
Create a BTV Element When to use
This function consists in making visible for the 1350 OMS PKT a NE or a set of NEs not managed by the 1350 OMS PKT. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). The user is authorized to create a BTV Element in the main parent subnetwork (called MEN by default). Not managed NE are NE contained in an adjacent subnetwork not accessible for the 1350 OMS PKT. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
Note: It is authorized to create BTV Element, as an ENE, in the main parent subnetwork (called MEN by default). To get a positive result: • • • •
The parent subnetwork must exist. The Table B-1, “Limits for Subnetworks” (p. B-1) in the selected subnetwork must not be reached. The Table B-5, “Limits for ENEs” (p. B-2) must not be reached. The User Label must be different as one which is already used by another ENE.
Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Construction > Create External Network Element.
.................................................................................................................................................................................................................................... 1350 OMS 21-8 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Create a BTV Element
....................................................................................................................................................................................................................................
Result: Figure 21-3 Broadcast TV Element Creation window
...................................................................................................................................................................................................
2
To create an ENE: •
Enter a BTV Element User Label.
• •
Choose the Parent Subnetwork by using the sensitive help. Enter a Domain: choose a Provider Domain for BTV Service on Provider Bridge in Connection Less networks. Choose the ENE Role: BTV. Enter a Comment (optional).
• •
...................................................................................................................................................................................................
3
Click Ok.
.................................................................................................................................................................................................................................... 1350 OMS 21-9 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Create a BTV Element
....................................................................................................................................................................................................................................
Result: The BTV Element is created with an amount of ETPs, which are automatically created. See Table B-6, “Limits for ETPs in an ENE” (p. B-2)
The tree area, the BTV Element list and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-10 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Modify a BTV Element
....................................................................................................................................................................................................................................
Modify a BTV Element When to use
The function modifies BTV Element characteristics. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). The BTV Element modification gives the possibility to modify: • •
BTV Element User Label. Comment.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
If the User Label is modified, the new User Label must be different as one which is already used by another ENE.
Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Network Elements > Defined External NEs. Result: The list window is shown. ...................................................................................................................................................................................................
2
Set the filter condition to Role=BTV and click Filter. Result: The list window is shows all the available ENEs and their attributes according
to the filter condition. ...................................................................................................................................................................................................
3
Select an item in the list.
.................................................................................................................................................................................................................................... 1350 OMS 21-11 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Modify a BTV Element
....................................................................................................................................................................................................................................
Result: Figure 21-4 External Network Element Modification window
...................................................................................................................................................................................................
4
To modify BTV Element: •
Enter a New User Label (optional).
•
Modify the Comment (optional).
.................................................................................................................................................................................................................................... 1350 OMS 21-12 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Modify a BTV Element
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Click Ok. Result: Then, the Broadcast TV Element list, the tree area, and the opened graphical
views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-13 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Delete a BTV Element
....................................................................................................................................................................................................................................
Delete a BTV Element When to use
This function consists in deleting a BTV Element and its ETPs from the 1350 OMS PKT supervision. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The usage state of the ETPs belonging to the BTV Element must be idle.
Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Network Elements > Defined External NEs. Result: The list window is shown. ...................................................................................................................................................................................................
2
Set the filter condition to Role=BTV and click Filter. Result: The list window is shows all the available ENEs and their attributes according
to the filter condition. ...................................................................................................................................................................................................
3
Select one or more items in the list. ...................................................................................................................................................................................................
4
Select Action > from External Network Element > Delete or right-click the mouse and Select Delete. ...................................................................................................................................................................................................
5
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40).
.................................................................................................................................................................................................................................... 1350 OMS 21-14 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Delete a BTV Element
....................................................................................................................................................................................................................................
Result: After confirmation, the BTV Elements and their ETPs are removed.
The Broadcast TV Element list, the tree area, and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-15 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
View the details of the BTV Elements
....................................................................................................................................................................................................................................
View the details of the BTV Elements When to use
This function gets information about a BTV Element. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Network Elements > Defined External NEs. Result: The list window is shown. ...................................................................................................................................................................................................
2
Set the filter condition to Role=BTV and click Filter. Result: The list window is shows all the available ENEs and their attributes according
to the filter condition. ...................................................................................................................................................................................................
3
Select the ENE in the list. ...................................................................................................................................................................................................
4
Select Search > Properties. Result: The ENE properties window is displayed.
See the following topic in this document: “Details of a BTV Elements ” (p. 21-17) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-16 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Details of a BTV Elements
....................................................................................................................................................................................................................................
Details of a BTV Elements Attributes of a BTV Element
The attributes displayed for each ENE are: •
User Label.
•
Parent Subnetwork.
•
Domain.
•
ENE Role: BTV.
•
Comment.
.................................................................................................................................................................................................................................... 1350 OMS 21-17 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
View the list of ETPs belonging to a BTV Element
....................................................................................................................................................................................................................................
View the list of ETPs belonging to a BTV Element When to use
This function consists in displaying the External Termination Ports of a previously selected BTV Element and their attributes. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Network Elements > Defined External NEs. Result: The list window is shown. ...................................................................................................................................................................................................
2
Set the filter condition to Role=BTV and click Filter. Result: The list window is shows all the available ENEs and their attributes according
to the filter condition. ...................................................................................................................................................................................................
3
Select an item in the list. ...................................................................................................................................................................................................
4
Select Search > Inventory from External Network Element > ETP List. Result: The broadcast TV NE ETP list is displayed.
See the following topic in this document: “Description of the list of BTV ENE inventory” (p. 21-19) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-18 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Description of the list of BTV ENE inventory
....................................................................................................................................................................................................................................
Description of the list of BTV ENE inventory Attributes of an ETP
The attributes displayed for each ETP are: •
Identifier.
•
Transport Link.
•
Supported Layer (None, Ethernet, MPLS).
•
Interface Rate.
•
Usage State (Not meaningful, Idle, Busy).
•
Manager Control.
•
Client Type (ETS, ETB, ETS-P).
•
NAD.
.................................................................................................................................................................................................................................... 1350 OMS 21-19 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Create an ETP in a BTV Element
....................................................................................................................................................................................................................................
Create an ETP in a BTV Element When to use
This function consists in creating ETPs that represent Ethernet ports located in the selected BTV Element. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
In the ENE, the amount of ETPs must not exceed the maximum. See Table B-6, “Limits for ETPs in an ENE” (p. B-2) Note: When the BTV Element is created, the ETP is created by default.
Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Network Elements > Defined External NEs. Result: The list window is shown. ...................................................................................................................................................................................................
2
Set the filter condition to Role=BTV and click Filter. Result: The list window is shows all the available ENEs and their attributes according
to the filter condition. ...................................................................................................................................................................................................
3
Select an item in the list. ...................................................................................................................................................................................................
4
Select Action > External TP > Create ETP.
.................................................................................................................................................................................................................................... 1350 OMS 21-20 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Create an ETP in a BTV Element
....................................................................................................................................................................................................................................
Result: The ETP creation window is displayed. Figure 21-5 ETP Creation window
To create ETPs: • Enter the first ETP to create (That is a numerical value corresponding to the first ETP number to be used). • Enter the Number of ETP to create. Valid numerical value is between 1 and the Table B-6, “Limits for ETPs in an ENE” (p. B-2) which can be created on a ENE. See Table B-6, “Limits for ETPs in an ENE” (p. B-2) ...................................................................................................................................................................................................
5
Click Ok button. Result: The ETPs (added after the first ones automatically created at the ENE creation) are always created with Manager Control set to Disabled.
The ETPs are automatically generated by the 1350 OMS PKT and the ETP List is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-21 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Delete an ETP in a BTV Element
....................................................................................................................................................................................................................................
Delete an ETP in a BTV Element When to use
This function consists in deleting ETPs from a previously selected BTV Element. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The usage state of the ETPs belonging to the ENE must be idle.
Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Network Elements > Defined External NEs. Result: The list window is shown. ...................................................................................................................................................................................................
2
Set the filter condition to Role=BTV and click Filter. Result: The list window is shows all the available ENEs and their attributes according to the filter condition. ...................................................................................................................................................................................................
3
Select an item in the list. ...................................................................................................................................................................................................
4
Select Search > Inventory from External Network Element > ETP List. Result: The ETP list window is shown. ...................................................................................................................................................................................................
5
Select one or more items in the list. ...................................................................................................................................................................................................
6
Select Action > External TP > Delete or right-click the mouse and Select Delete.
.................................................................................................................................................................................................................................... 1350 OMS 21-22 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section I: Introduction
Delete an ETP in a BTV Element
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
7
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: After confirmation, the ETPs are removed from BTV Element.
The ETP Inventory list is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-23 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section II: Workflow for BTV construction
Overview
....................................................................................................................................................................................................................................
Section II: Workflow for BTV construction Overview Purpose
This section provides information about the workflow that is required for the BTV construction. Contents Create path on 1350 OMS SDH application
21-25
Create Broadcast TV Element
21-26
Create Link Broadcast TV
21-29
.................................................................................................................................................................................................................................... 1350 OMS 21-24 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section II: Workflow for BTV construction
Create path on 1350 OMS SDH application
....................................................................................................................................................................................................................................
Create path on 1350 OMS SDH application Overview
The first operation for BTV Service Management is the path creation on 1350 OMS SDH application. •
The Service Type is Ethernet.
•
The Service Rate is 1-Gb Rate Adaptive.
•
The Transport Rate is AU4-nV.
Figure 21-6 Path on 1350 OMS SDH
.................................................................................................................................................................................................................................... 1350 OMS 21-25 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section II: Workflow for BTV construction
Create Broadcast TV Element
....................................................................................................................................................................................................................................
Create Broadcast TV Element When to use
This function consists in making visible for the 1350 OMS PKT a NE or a set of NEs not managed by the 1350 OMS PKT. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). Not managed NE are NE contained in an adjacent subnetwork not accessible for the 1350 OMS PKT. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
Note: It is authorized to create an ENE in the main parent subnetwork (called by default). To get a positive result: • • • •
The parent subnetwork must exist. The Table B-1, “Limits for Subnetworks” (p. B-1)in the selected subnetwork must not be reached. The Table B-5, “Limits for ENEs” (p. B-2) must not be reached. The User Label must be different as one which is already used by another ENE.
Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Construction > Create External Network Element.
.................................................................................................................................................................................................................................... 1350 OMS 21-26 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section II: Workflow for BTV construction
Create Broadcast TV Element
....................................................................................................................................................................................................................................
Result: Figure 21-7 Broadcast TV Element Creation window
...................................................................................................................................................................................................
2
To create an ENE: •
Enter a BTV Element User Label.
•
Enter a Domain: choose a Provider Domain for BTV Service on Provider Bridge in Connection Less networks. Choose the ENE Role: Broadcast TV. Enter a Comment (optional).
• •
...................................................................................................................................................................................................
3
Click Ok.
.................................................................................................................................................................................................................................... 1350 OMS 21-27 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section II: Workflow for BTV construction
Create Broadcast TV Element
....................................................................................................................................................................................................................................
Result: The BTV Element is created with an amount of ETPs, which are automatically created. See Table B-6, “Limits for ETPs in an ENE” (p. B-2)
The tree area, the BTV Element list and the opened graphical views are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-28 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section II: Workflow for BTV construction
Create Link Broadcast TV
....................................................................................................................................................................................................................................
Create Link Broadcast TV When to use
This function consists in defining a Link Over TDM for BTV. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Construction > Create Link Broadcast TV.
.................................................................................................................................................................................................................................... 1350 OMS 21-29 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section II: Workflow for BTV construction
Create Link Broadcast TV
....................................................................................................................................................................................................................................
Result: The Link Over Broadcast TV creation window is displayed. Figure 21-8 Link Over TDM Broadcast TV Creation window
.................................................................................................................................................................................................................................... 1350 OMS 21-30 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section II: Workflow for BTV construction
Create Link Broadcast TV
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
To create a Link Over TDM Broadcast TV: •
Enter a Link User Label.
•
Enter a Comment (optional).
•
Select the Extremity A by using the sensitive help.
•
Select the Extremity A Termination by using the sensitive help (only the terminations with usage state equal to Idle are proposed). Select the Extremity Z by using the sensitive help. Select the Extremity Z Termination by using the sensitive help (only the terminations with usage state equal to Idle are proposed). Choose the Supported Layer: Ethernet. Choose the Transport Concatenation Rate: VC_4.
• • • • • • •
Enter the Concatenation level (priority which allows to increase the flexibility of SDH bandwidth management from 0 to 63). Insert the 1350 OMS SDH Path Id. Choose the Client Type: ETS. The 1350 OMS SDH Path Id is read from 1350 OMS SDH path window selecting the path > Show set attributes > Miscellaneous.
Figure 21-9 1350 OMS SDH Path Id
.................................................................................................................................................................................................................................... 1350 OMS 21-31 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section II: Workflow for BTV construction
Create Link Broadcast TV
....................................................................................................................................................................................................................................
The 1350 OMS SDH Path Id is assigned to every Link Over TDM created for the BTV Service. ...................................................................................................................................................................................................
3
Click Ok. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-32 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section III: Workflow for BTV Service Management
Overview
....................................................................................................................................................................................................................................
Section III: Workflow for BTV Service Management Overview Purpose
This section provides information about the workflow for BTV service management. Contents Create a Customer
21-34
Create Ethernet Service
21-35
Create a Connection Oriented EVC
21-37
.................................................................................................................................................................................................................................... 1350 OMS 21-33 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section III: Workflow for BTV Service Management
Create a Customer
....................................................................................................................................................................................................................................
Create a Customer When to use
This function allows the user to define the characteristics of the owner of one or more BTV Elements. Related information
After definition, the owner is permitted to use the services that are defined across the boundaries of the managed network. For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). For a description about customers, refer to the topic “Customer description” (p. 18-8). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The User Label must be different from the existing ones.
Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Create Customer. Result: The Customer creation window is displayed.
To create a customer: • Enter a User Label. • Enter a Company (optional). • Enter an Address (optional). •
Enter a Comment (optional).
...................................................................................................................................................................................................
2
Click Ok button. Result: The customer is created.
The tree area and the Customer list are updated. E................................................................................................................................................................................................... N D O F S T E P S .................................................................................................................................................................................................................................... 1350 OMS 21-34 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section III: Workflow for BTV Service Management
Create Ethernet Service
....................................................................................................................................................................................................................................
Create Ethernet Service When to use
This function consists in creating an Ethernet Service related to a selected customer. Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV Elements” (p. 21-5). For a description about customers, refer to the topic “Ethernet Service description” (p. 18-17). If the creation action is required from the Customer List, the Customer field of this creation window is automatically filled with the selected Customer. The Ethernet Service can also be created using the wizard. The wizard automatically create the Connection Oriented EVC associated to the service. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
A customer must exist.
•
The User Label must be different from the existing.
Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Ethernet Service Creation.
.................................................................................................................................................................................................................................... 1350 OMS 21-35 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section III: Workflow for BTV Service Management
Create Ethernet Service
....................................................................................................................................................................................................................................
Result: The Ethernet Service creation window is displayed. Figure 21-10 Create Ethernet Service
Execute the following steps: • Enter a Service User label. •
Select the Customer.
•
Select the Service Type: EVPLINE.
•
In the Comment field, the user indicates that the service is a BTV Service.
...................................................................................................................................................................................................
2
Click Ok button. Result: The Ethernet Service is created.
The tree area and the Ethernet Service list are updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-36 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section III: Workflow for BTV Service Management
Create a Connection Oriented EVC
....................................................................................................................................................................................................................................
Create a Connection Oriented EVC When to use
This function consists in creating an Ethernet Virtual Connection. Related information
For a description about BTV Elements, refer to the topic: “Managing Broadcast TV Elements” (p. 21-5). For a description about the Connection Oriented EVC, refer to the topic: “Overview about ETS Ethernet Virtual Connections” (p. 18-37). If this action is required from the Service List, the Ethernet Service field of the EVC Creation window, is filled with the service selected Service. To select the right Ethernet Service and EVC Type fields, report you to the Error! Reference source not found. If Termination part is not or partially filled, the user has the possibility to add EVC terminations from the Add EVC Termination menu. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
At least, one Ethernet Service must exist.
•
The User Label must be not in use.
• •
Only one Root termination is authorized. The EVC Type must be compatible with the service type of the associated Ethernet Service. The EVC Type must be compatible with the selected Traffic Type. The role of each EVC termination must be compatible with the EVC Type.
• • Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Connection Oriented (ETS) > Create EVC.
.................................................................................................................................................................................................................................... 1350 OMS 21-37 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section III: Workflow for BTV Service Management
Create a Connection Oriented EVC
....................................................................................................................................................................................................................................
Result: The Connection Oriented EVC creation window is displayed. Figure 21-11 EVC Any to any Creation window
.................................................................................................................................................................................................................................... 1350 OMS 21-38 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section III: Workflow for BTV Service Management
Create a Connection Oriented EVC
....................................................................................................................................................................................................................................
Execute the following steps: • Enter an EVC User Label. • Enter Ethernet Service. • Select a Type: Any to any. •
Select a Traffic Type: Unicast.
•
Select a Service Level (Premium, Gold, Silver, Bronze).
•
Enter a Comment (optional).
•
–
Enter an External Mark (optional). It can be used to identify external systems having relations with the EVC (for example an ownership). In Termination part, enter a list of EVC terminations by using Add EVC Termination button. Execute the following steps: Select the NE or ENE user label by using the sensitive help.
–
Select an Edge Port user label by using also the sensitive help.
–
Select the Role of the termination (Root, Leaf, or Both).
•
...................................................................................................................................................................................................
2
Click Ok button. Result: The EVC is created. ...................................................................................................................................................................................................
3
If EVC Type is Point to multipoint or Any to any, Ethernet Segments could be automatically created: In Ethernet part, if Create Ethernet box is selected, select a VLAN Model (Mapping or Tunneling). ...................................................................................................................................................................................................
4
Choose a Traffic Descriptor (by using the sensitive help). ...................................................................................................................................................................................................
5
If the chosen Traffic Descriptor is Regulated, choose a Color Profile (by using the sensitive help) which is associated to each Ethernet Segment. ...................................................................................................................................................................................................
6
Taking into account the EVC Type, the Traffic Type, the directionality, and the number of terminations provided, all the needed Ethernet Segments are automatically created. Result: The Connection Oriented EVC is created and the EVC list consequently
updated. The Ethernet Segment created directly from EVC must be allocated and implemented. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-39 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management
Overview
....................................................................................................................................................................................................................................
Section IV: Bridge Based BTV Service Overview Purpose
This section provides information about the Bridge based BTV Service. Contents Overview about the Services
21-41
IGMP Snooping Management
21-42
IGMP Snooping State Management
21-44
.................................................................................................................................................................................................................................... 1350 OMS 21-40 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section IV: Bridge Based BTV Service
Overview about the Services
....................................................................................................................................................................................................................................
Overview about the Services Workflow description
The management of Broadcast TV services, when the network is Connection Less based, is achieved by means of following steps: the building of Ethernet connectivity on the top of Provider Bridge and the optional configuration of IGMP Snooping on the desired Network Elements. The Workflow is the same as that explained in previous paragraphs “Section II: Workflow for BTV construction” (p. 21-24) and “Section III: Workflow for BTV Service Management” (p. 21-33) with following differences: • • •
the BTV Element is assigned to the domain created as provider. the EVC created is of type Connection Less. optionally the IGMP protocol can be configured as explained in following paragraph.
.................................................................................................................................................................................................................................... 1350 OMS 21-41 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section IV: Bridge Based BTV Service
IGMP Snooping Management
....................................................................................................................................................................................................................................
IGMP Snooping Management When to use
This procedure explains how to manage IGMP Snooping. Related information
The Internet Group Management Protocol (IGMP) is a protocol designed to connect users to a multicast tree for multimedia applications. IGMP is carried over IP. The IGMP Snooping is only supported on Domain where the Bridge Type of contained NEs is Provider, Virtual, or MAC Bridge. The IGMP Snooping is managed through navigation toward 1350 OMS EML. Each broadcast-channel supplier has one C-VLAN and one S-VLAN. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
The user workflow to manage IGMP snooping is: ...................................................................................................................................................................................................
1
Define the bridge domain and assign the 1850 TSS 320 equipment to the domain. ...................................................................................................................................................................................................
2
Choose one S-VLAN for each video-service supplier (the C-VLAN is chosen by the router). ...................................................................................................................................................................................................
3
Create the EVC for the video-service supplier. The EVC characteristics are: • •
Virtual resource sharing. Full-meshed VLAN distribution.
• • •
The S-VLAN identifying the video supplier. C-VLAN preservation is not mandatory (because of POP operation). The C-VLAN identifying the video supplier.
.................................................................................................................................................................................................................................... 1350 OMS 21-42 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section IV: Bridge Based BTV Service
IGMP Snooping Management
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Add one EVC termination for each host or DSLAM served by the video supplier • •
Associate to the termination a Traffic Descriptor that selects the C-VLAN corresponding to the video supplier which the host is subscribed to. For each defined DSLAM, EVC termination can optionally provide the PUSH operation.
...................................................................................................................................................................................................
5
Add one EVC termination for the BSR • •
Associate to the termination a Traffic Descriptor that selects the C-VLAN of the video supplier3. For the defined BSR, EVC termination Must provide the POP operation.
...................................................................................................................................................................................................
6
Allocate and implement the EVC. ...................................................................................................................................................................................................
7
For each 1850 TSS 320 , start the navigation toward 1350 OMS EML: •
Enable the IGMP snooping for the video supplier S-VLAN.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 21-43 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section IV: Bridge Based BTV Service
IGMP Snooping State Management
....................................................................................................................................................................................................................................
IGMP Snooping State Management IGMP Snooping reminder
This function is evolved to provide a reminder helping the management of services to enable the IGMP Snooping Protocol. This reminder is important to reach two main goals: • •
To remind the user to perform Navigation toward NEs only after having implemented the EVC supporting the IGMP Snooping. To remind the user to perform Navigation toward NEs before De-Implementing an EVC supporting the IGMP Snooping. This action also prevents errors during the de-implementation phase.
EVC Definition
At EVC definition level, the user can optionally define the value of igmpSnooping attribute. This operation is available only for EVPLAN, Extended EVPLAN, and BTV EVC types. In these cases, the possible values are: •
Enabled. Just to remind that the user has the intention to use the IGMP snooping
protocol on top of such EVC. Possible scenarios: – – •
To enable the IGMP snooping immediately after having implemented the EVC. To disable the IGMP snooping immediately before de-implemented the EVC.
Disabled. Just to remind that the user does not want to use the IGMP on that EVC.
EVC Implementation
When the user starts the EVC Implementation operation, and the attribute igmpEnabled is set to Enabled, a pop-up window is raised to remind the user to perform a navigation toward affected NE. This operation is available only for Extended EVPLAN and BTV EVCs. The pop-up window must be acknowledged by the user without further affect the implementation procedure. EVC De-Implementation
When the user starts the EVC De-Implementation operation and the attribute igmpEnabled is set to Enabled, a pop-up window is raised to remind the user to perform a navigation toward affected NE. This operation is available only for Extended EVPLAN and BTV EVC types.
.................................................................................................................................................................................................................................... 1350 OMS 21-44 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management Section IV: Bridge Based BTV Service
IGMP Snooping State Management
....................................................................................................................................................................................................................................
The pop-up window can be: • •
Acknowledged by the user with the option STOP the de-implementation procedure, letting the user complete all the needed navigation. Acknowledged by the user with the option CONTINUE the de-implementation procedure, when the user is aware that all Navigation Issues are already accomplished.
EVC Modification
The Attribute igmpEnabled can be modified in the following cases: •
The EVC ServiceType is EVPLAN, extended EVPLAN or BTV.
•
The EVC provisioningState can have any value. The following situations must be managed: – If the EVC is Implemented, the transition from Disable to Enable triggers the pop-up window. – If the EVC is Implemented, the transition from Enable to Disable triggers the second pop-up window. In all other cases, the modification of the igmpEnabled attribute is not allowed and an explicit exception is returned.
.................................................................................................................................................................................................................................... 1350 OMS 21-45 8DG42227DAAA 9.6 Issue 3 December 2012
Broadcast TV Service Management
IGMP Snooping State Management
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 21-46 8DG42227DAAA 9.6 Issue 3 December 2012
22
Network Supervision 22
Overview Purpose
This chapter describes how to manage alarms and performance monitoring. Contents Managing alarms
22-2
Overview about alarms
22-2
Alarms from ISA E/FE/GE board
22-3
Alarms from ISA ES1/4 board
22-4
Alarms from ISA ES16 board
22-6
Alarms or Events on SDH paths from 1350 OMS SDH
22-8
Alarm status management
22-9
Alarm correlation and generation toward AS Managing Fault Localization
22-11 22-12
Display the Fault Localization list
22-12
Description of Fault Localization
22-14
Manual Synchronization of Alarms on NE
22-15
Specific Behavior Client Signal Fail Alarm Management
22-16 22-16
................................................................................................................................................................................................................................... 1350 OMS 22-1 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing alarms
Overview about alarms
....................................................................................................................................................................................................................................
Managing alarms Overview about alarms Manage elementary alarms
1350 OMS PKT provides the following services to manage elementary alarms (see “Management Layers” (p. 11-5) and “Network architecture overview” (p. 11-7)): •
Current alarm management (with the history).
•
Fault Localization.
For every alarm raised, a specific clear is sent. In case of packet concatenation, only Packet GFP interface can generate alarms on TDM termination. Alarm probable cause
In the following, is given information about the probable cause of the alarm to understand their meaning and origin: •
LOS (Loss of Signal) alarm covers the defects that occur in the following cases: – Loss of electrical or optical power,. – Failed Auto-negotiation process (LOS defect),. – No synchronization (LOS defect),. – – –
• • • • •
No comma detection (LOF defect),. Card failure or card missing (ISA ES16),. URU alarm in case of incorrect manual provisioning of Ethernet accesses (ISA ES16). ISA NE raises a TSF (Trail Signal Failed) or DEG (trail signal Degraded) alarm after detecting a defect due to failed SDH VCs (TSF or TSD). ISA NE raises a PLM (Pay Load Mismatch) alarm after detecting an SDH VC problem (related to packet or virtual concatenation). ISA NE raises a GTM (GFP Type Mismatch) alarm after detecting a GFP format mismatch. ISA NE raises a LOF (Loss of Frame) alarm after detecting an Ethernet defect. ISA NE raises a CSF (Client Signal Failure) alarm when a failure is detected on one Customer Edge.
.................................................................................................................................................................................................................................... 1350 OMS 22-2 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing alarms
Alarms from ISA E/FE/GE board
....................................................................................................................................................................................................................................
Alarms from ISA E/FE/GE board Overview
In the following table is given the list of elementary alarms generated by ISA E/FE/GE boards and the mapping with elementary objects inside 1350 OMS SDH and 1350 OMS PKT. Such alarms must be managed through 1350 OMS SDH. Table 22-1
ISA E/FE/GE alarms
Alarm [Default severity = Path alarm ASAP]. Loss of GFP[MAJ].
Probable Cause.
Loss of frame.
NE object [1350 OMS PKT object]. GDataTransportCTPbid.
1350 OMS SDH Object. NAP.
[TDM termination]. AIS Alarm Indication Signal[NAL].
AIS.
GDataTransportCTPbid.
NAP.
SignalLabelMismatch[MAJ].
SignalLabelMismatch.
GDataTransportCTPbid.
Loss of Signal[MAJ].
Loss of Signal.
GMauTTP[Ethernet Port].
PORT.
URU on Physical Interface[MAJ].
Underlying Resource Unavailable.
GMauTTP[Ethernet Port].
PORT.
[TDM termination]. NAP.
[TDM termination].
.................................................................................................................................................................................................................................... 1350 OMS 22-3 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing alarms
Alarms from ISA ES1/4 board
....................................................................................................................................................................................................................................
Alarms from ISA ES1/4 board Overview
In the following table, the list of elementary alarms is given. These alarms are generated by ISA ES1/4 boards. The mapping with elementary objects inside 1350 OMS PKTis also given in the table. Such alarms must be managed directly from NE through SNMP. Table 22-2
ISA ES1/4 alarms or events
Alarm/Notif. [Default severity = Path alarm ASAP].
Board Release.
Loss of GFP[MAJ].
1.0.
TSF[MAJ].
1.0.
Probable Cause.
Loss of frame.
NE object. [1350 OMS PKT object].
GFP interface. [TDM termination].
Trail Signal Fail.
GFP interface. [TDM termination].
TSF[MAJ].
1.0.
Trail Signal Fail.
LAPS interface. [TDM termination].
Loss of Signal.
1.0.
Loss of Signal.
[MAJ].
ETHERNET Local. [Ethernet port].
GTM[MIN].
PLM[MAJ].
PLM[MAJ].
Notes.
1.0.
1.0.
1.0.
GFP Type Mismatch.
GFP interface.
Payload Mismatch.
GFP interface.
Payload Mismatch.
LAPS interface.
When the GFP interface is connected to an SDH Path, a correspondent alarm exists on SDH Path (NB: no SDH path alarm in case of SDH independence). When the LAPS interface is connected to an SDH Path, a correspondent alarm exists on SDH Path (NB: no SDH path alarm in case of SDH independence). It summarizes also URU (until URU is explicitly managed).
[TDM termination]. [TDM termination]. [TDM termination].
.................................................................................................................................................................................................................................... 1350 OMS 22-4 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing alarms
Alarms from ISA ES1/4 board
....................................................................................................................................................................................................................................
Table 22-2
ISA ES1/4 alarms or events
Alarm/Notif. [Default severity = Path alarm ASAP]. DEG[NAL].
Board Release.
1.0.
Probable Cause.
Degrade.
(continued) NE object. [1350 OMS PKT object].
GFP interface. [TDM termination].
DEG[NAL].
1.0.
Degrade.
LAPS interface. [TDM termination].
CSF.
1.2.
Client Signal Fail.
GFP interface. [TDM termination].
Notes.
When the GFP interface is connected to an SDH Path, a correspondent Bandwidth Reduced alarm exists on SDH Path (NB: no SDH path alarm in case of SDH independence). When the LAPS interface is connected to an SDH Path, a correspondent Bandwidth Reduced alarm exists on SDH Path (NB: no SDH path alarm in case of SDH independence). The CSF have to be always managed as it highlight problems in case of NE isolation and in case of SDH independence.
.................................................................................................................................................................................................................................... 1350 OMS 22-5 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing alarms
Alarms from ISA ES16 board
....................................................................................................................................................................................................................................
Alarms from ISA ES16 board Overview
In the following table is given the list of elementary alarms generated by ISA ES16 board and the mapping with elementary objects inside 1350 OMS PKT. Such alarms must be managed directly from NE (through SNMP). Table 22-3
ISA ES16 alarms or events
Alarm/Notif. [Default severity = Path alarm ASAP].
Board Release.
Loss of GFP[MAJ].
2.0.
TSF[MAJ].
2.0.
Probable Cause.
Loss of frame.
NE object. [1350 OMS PKT object].
GFP interface. [TDM termination].
Trail Signal Fail.
GFP interface. [TDM termination].
TSF[MAJ].
2.0.
Trail Signal Fail.
HDLC interface. [TDM termination].
TSF[MAJ].
2.0.
Trail Signal Fail.
LAPS interface. [TDM termination].
Loss of Signal.
2.0.
Loss of Signal.
[MAJ].
ETHERNET Local. [Ethernet port].
GTM[MIN].
Notes.
2.0.
GFP Type Mismatch.
When the GFP interface is connected to an SDH Path, a correspondent alarm exists on SDH Path (NB: no SDH path alarm in case of SDH independence). When the HDLC interface is connected to an SDH Path, a correspondent alarm exists on SDH Path (NB: no SDH path alarm in case of SDH independence). When the LAPS interface is connected to an SDH Path, a correspondent alarm exists on SDH Path (NB: no SDH path alarm in case of SDH independence). It summarizes also URU (until URU is explicitly managed).
GFP interface. [TDM termination].
.................................................................................................................................................................................................................................... 1350 OMS 22-6 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing alarms
Alarms from ISA ES16 board
....................................................................................................................................................................................................................................
Table 22-3
ISA ES16 alarms or events
Alarm/Notif. [Default severity = Path alarm ASAP]. PLM[MAJ].
PLM[MAJ].
PLM[MAJ].
DEG[NAL].
Board Release.
2.0.
2.0.
2.0.
2.0.
Probable Cause.
(continued) NE object. [1350 OMS PKT object].
Payload Mismatch.
GFP interface.
Payload Mismatch.
HDLC interface.
Payload Mismatch.
LAPS interface.
Degrade.
GFP interface.
[TDM termination]. [TDM termination]. [TDM termination]. [TDM termination].
DEG[NAL].
2.0.
Degrade.
HDLC interface. [TDM termination].
DEG[NAL].
2.0.
Degrade.
LAPS interface. [TDM termination].
CSF.
2.1.
Client Signal Fail.
Notes.
GFP interface. [TDM termination].
When the GFP interface is connected to an SDH Path, a correspondent Bandwidth Reduced alarm exists on SDH Path (NB: no SDH path alarm in case of SDH independence). When the HDLC interface is connected to an SDH Path, a correspondent Bandwidth Reduced alarm exists on SDH Path (NB: no SDH path alarm in case of SDH independence. When the LAPS interface is connected to an SDH Path, a correspondent Bandwidth Reduced alarm exists on SDH Path (NB: no SDH path alarm in case of SDH independence). The CSF have to be always managed as it highlight problems in case of NE isolation and in case of SDH independence.
.................................................................................................................................................................................................................................... 1350 OMS 22-7 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing alarms
Alarms or Events on SDH paths from 1350 OMS SDH
....................................................................................................................................................................................................................................
Alarms or Events on SDH paths from 1350 OMS SDH Overview
All SDH paths alarms are available on 1350 OMS SDH. Objects directly affected on 1350 OMS PKT are: • •
SDH Path,. Link Over TDM.
Table 22-4
SDH Path Alarm management
Alarm.
1350 OMS SDH Object.
Major.
Path.
Probable Cause.
TransportFailure.
Derived from alarms on 1350 OMS SDH element object. NAP,. Boundary CTP,. DATA PORT.
Major.
Path.
TransportIncomingFailure.
Boundary CTP.
Major.
Path.
ExBer.
NAP.
Major.
Path.
TransportOutgoingFailure.
Boundary CTP,.
Notes.
These three alarms contribute to the management of 1350 OMS SDH operational State.
DATA NAP. Minor.
Path.
BandwidthReduced.
DATA NAP.
Major.
PAth.
LCASProtocolError.
DATA NAP.
Useful to catch bandwidth reduction for path with packet concatenation.
.................................................................................................................................................................................................................................... 1350 OMS 22-8 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing alarms
Alarm status management
....................................................................................................................................................................................................................................
Alarm status management Overview
The following figure shows the 1350 OMS PKT entities affected by NE or 1350 OMS SDH alarms.
.................................................................................................................................................................................................................................... 1350 OMS 22-9 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing alarms
Alarm status management
....................................................................................................................................................................................................................................
Figure 22-1 Alarm status management
.................................................................................................................................................................................................................................... 1350 OMS 22-10 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing alarms
Alarm correlation and generation toward AS
....................................................................................................................................................................................................................................
Alarm correlation and generation toward AS Overview
The following figure is entirely related to 1350 OMS PKT and shows: •
how alarms or events are internally propagated,.
• •
which are the affected entities,. which objects generate alarms toward AS component.
Figure 22-2 Alarm correlation
.................................................................................................................................................................................................................................... 1350 OMS 22-11 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision
Display the Fault Localization list
....................................................................................................................................................................................................................................
Managing Fault Localization Display the Fault Localization list When to use
This function consists in displaying alarms for a Link Over TDM, a Link Over Cable, an Ethernet Segment or an LSP Tunnel. Related information
See the following topic in this document:“Fault Localization” (p. 11-69). If the Entity Type is equal to TDM termination (Ethernet Port,Edge Port), Show Alarms command is not available. The 1350 OMS PKT displays up to 100 alarms. When the number of alarms is superior to 100, a confirmation box is displayed. After confirmation, the truncated list is displayed. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Conditions
To get a positive result: •
The Availability status of the entity must be either Degraded or In Failure.
Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select one of the following menus: •
Search > Packet > Construction > Transport Links > Links Over TDM (Sdh/Sonet).
•
Search > Packet > Construction > Transport Links > Links Over Cable.
•
Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments.
•
Search > Packet > MPLS > LSP Tunnels. Result: The list window is shown.
...................................................................................................................................................................................................
2
Select an item in the list.
.................................................................................................................................................................................................................................... 1350 OMS 22-12 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing Fault Localization
Display the Fault Localization list
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
Select Search > Fault Localization. Result: The list window is displayed.
See the following topic in this document: “Description of Fault Localization” (p. 22-14) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 22-13 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing Fault Localization
Description of Fault Localization
....................................................................................................................................................................................................................................
Description of Fault Localization Attributes of Fault Localization
The attributes displayed for each entity are: •
User Label.
•
Entity type.
•
Alarm / Availability State.
•
Specific Fault Date.
•
Probable Cause.
•
Operator Label
•
NE User Label
•
Global Alarm Date
.................................................................................................................................................................................................................................... 1350 OMS 22-14 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Managing Fault Localization
Manual Synchronization of Alarms on NE
....................................................................................................................................................................................................................................
Manual Synchronization of Alarms on NE When to use
This function allows the user to re-synchronize, on NE basis, all alarms currently existing on a given NE. The operation can be started by the user. Related information
See the following topic in this document:“Fault Localization” (p. 11-69). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Network Elements > Defined NEs. Result: The list window is shown. ...................................................................................................................................................................................................
2
Select the NE and issue Action > Network Elements > Alarm Synchronization. ...................................................................................................................................................................................................
3
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: If the operation is confirmed, all existing alarms for the selected NE are
resynchronized toward Fault Management application and inside 1350 OMS PKT application. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 22-15 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Specific Behavior
Overview
....................................................................................................................................................................................................................................
Specific Behavior Client Signal Fail Alarm Management When to use
This procedure explains how to manage Client Signal Fail. Related Information
Following conditions must be verified when the CSF alarm feature is activated: • • •
Service is EPLINE, built upon a single SDH path with transparent GFP or EPLAN emulating BTV services. ISA NE at extremities supports CSF alarms and consequent actions (ES1/4 1.2, ES16 2.1). Autonegotiation must be enabled on local ports (Reminder: Autonegotiation is not supported on GE interfaces. In consequence, CSF cannot be enabled if GE is involved). Note: No check is done by the 1350 OMS PKT from this point of view because everything is managed by the user during Navigation.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
The global scenario is in the following provided: ...................................................................................................................................................................................................
1
Select an Ethernet Service. ...................................................................................................................................................................................................
2
Retrieve Edge Ports terminating the Ethernet Service. Result: For each retrieved Edge Port, a Navigation toward 1350 OMS EML is started
to configure the CSF consequent Action (laser shut down enabled). ...................................................................................................................................................................................................
3
Retrieve the Transport Link used by the service.
.................................................................................................................................................................................................................................... 1350 OMS 22-16 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision Specific Behavior
Client Signal Fail Alarm Management
....................................................................................................................................................................................................................................
Result: TDM terminations are retrieved.
For each retrieved TDM termination, a Navigation toward 1350 OMS EML is started to configure the CSF Capability Support (CSF bidirectional propagation). In case of BTV service emulation, the TDM termination interested to VC-AIS propagation are connected to Broadcast SDH path acting as Sources. After this scenario, GFP-CSF frame insertion (or VC-AIS propagation) and consequent actions are automatically configured on the PEs accordingly. ...................................................................................................................................................................................................
4
If the service is implemented or commissioned, the CSF feature and consequently action can be enabled or disabled. Service implementation. Result: CSF consequent action disabling (Mandatory for resetting the possible CSF
configuration, already present on the NE). CSF consequent action enabling. ...................................................................................................................................................................................................
5
If the service is de-implemented, the CSF feature and consequently action can be disabled. Result: CSF consequent action disabling.
Service de-implementation. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 22-17 8DG42227DAAA 9.6 Issue 3 December 2012
Network Supervision
Client Signal Fail Alarm Management
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 22-18 8DG42227DAAA 9.6 Issue 3 December 2012
23
Network Utilities 23
Overview Purpose
This chapter describes how to use NE audit, alignment, force alignment, reservation, and recovery. Contents Audit, Alignment, Reservation, Recovery
23-2
The AAR procedure
23-3
NE Audit tool
23-6
Results of Audit
23-8
Reservation tool
23-13
Align Up of Ethernet Domain Data
23-15
Start the audit, alignment, reserve procedure
23-16
Stop the audit, alignment, reserve procedure
23-17
View the list of auditable NEs
23-18
Description of the list of auditable NEs
23-19
Perform an audit on a NE
23-20
View the list of Audited NEs
23-22
Description of the list of Audited NEs
23-23
View the results of an audit
23-24
Perform an alignment on a NE
23-26
NE Alignment tool
23-27
Workflow to align up Ethernet Data
23-28
ISA Board Replacement Procedure
23-30
Perform a reservation on a NE
23-32
Restore procedure for ISA board
23-33
................................................................................................................................................................................................................................... 1350 OMS 23-1 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Overview
....................................................................................................................................................................................................................................
Audit, Alignment, Reservation, Recovery Overview Purpose
This section provides information about the Audit, Alignment, Reservation, and Recovery. Contents The AAR procedure
23-3
NE Audit tool
23-6
Results of Audit
23-8
Reservation tool
23-13
Align Up of Ethernet Domain Data
23-15
Start the audit, alignment, reserve procedure
23-16
Stop the audit, alignment, reserve procedure
23-17
View the list of auditable NEs
23-18
Description of the list of auditable NEs
23-19
Perform an audit on a NE
23-20
View the list of Audited NEs
23-22
Description of the list of Audited NEs
23-23
View the results of an audit
23-24
Perform an alignment on a NE
23-26
.................................................................................................................................................................................................................................... 1350 OMS 23-2 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
The AAR procedure
....................................................................................................................................................................................................................................
The AAR procedure Maintain the consistency of the image of the network
The aim of these tools is to check and maintain the consistency between the network and the 1350 OMS PKT database. The utilities supplied are Audit, Alignment, and Force Alignment, and Reserve and Recovery. • • •
“Audit” (p. 23-3) is in charge of detecting the differences between the network and the databases. “Alignment” (p. 23-4) and “Force Alignment” (p. 23-4) are in charge to fix discrepancies between the network and the databases. “Reservation” (p. 23-4) and “Recovery” (p. 23-5) are in charge to re build in the database, objects created without 1350 OMS PKT or before 1350 OMS PKT installation.
The utilities apply on all the network, one or a set of subnetworks, one or a set of NE. The tools works into a session. The session begins with the Start command and ends with the Stop command. Start procedure: The user has the possibility to start an audit, an alignment, or a
reservation on one or more NEs. At the beginning of an audit, the selected NEs are locked. Locked entities are not modifiable. All the read-only operations are available. Stop procedure: At any time of the audit, alignment, reserve session, the user can close
the session. An “unlock” of the locked NEs is done. Audit
The Audit identify the differences between the NE MIB in the network and the database of the PKT. The Audit reports differences in a text file. The Audit performs comparison on a per-functional domain basis. For each domain comparison is done on a per-elementary object basis. The Audit applies on a NE or list of NEs. Only SNMP board can be Audited. The Audit builds a file that contains all managed entities presenting differences between the network and the database. Differences are detected by NE. The audit file contains: •
The objects that exist in the database but not in the NE.
• •
The objects that exist in NE but not in database. The objects present both in the database and in the NE but having different setting.
The result of the audit procedure is stored in a text file available to the user. The user is in charge to display the results and proceed with the operations of align, force align, reserve, or recovery. For details on Audit tool, refer to “NE Audit tool” (p. 23-6). .................................................................................................................................................................................................................................... 1350 OMS 23-3 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
The AAR procedure
....................................................................................................................................................................................................................................
Alignment
The user can activate the Alignment on the audited NEs. The Alignment procedure does not affect the traffic existing on the network. The alignment procedure downloads to the network the entities contained in 1350 OMS PKT database and not contained in the NE. Force Alignment
The user can activate the Force Alignment on the audited NEs. The Force Alignment procedure affect the traffic existing on the network. The Force Alignment: • • •
Adds to NE the entities contained in 1350 OMS PKT database and not contained in the NE. Deletes the objects in the NE not contained in 1350 OMS PKT. Updates in the NE the objects presenting discrepancies in respect to the 1350 OMS PKT setting.
The Force Alignment aligns the characteristics of Transport Link, Traffic Descriptors, Traffic Classifiers, cross connections, LERconnections, and LSR connections. The specific data, like indexes, related to the NE and stored only in the 1350 OMS PKT database are update in the database. Reservation
The user can activate the Reservation on the audited NEs. Objects created without 1350 OMS PKT are not in the database, however they exist in the network and have resources associated. Reservation prevents the user from using network resources that are in-use but not already known by the 1350 OMS PKT. The network resources (terminations, MPLS labels, Transport Link bandwidth) are reserved. This reservation is visible by the operator by the fact that one or more terminations are no more available for creating new paths (Ethernet Segments, LSPs), and by a portion of reserved bandwidth consumed on the Transport Links. The associated objects are created inside the database (Traffic descriptors (MPLS and Ethernet), Traffic Classifier, Colour Profiles, Ethernet cross connections, LSR connections, and LER connections). A part from the connections, those objects are visible and usable by the operator after the reservation phase. The Reserve provides the discovery of an existing Ethernet network: •
NE and Ethernet physical ports.
•
Link Over TDM (supporting directly Ethernet or MPLS) and TDM termination points.
The NEs are retrieved defining the EML to which 1350 OMS PKT is connected and by 1350 OMS SDH (for E/FE/GE Q3 boards). .................................................................................................................................................................................................................................... 1350 OMS 23-4 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
The AAR procedure
....................................................................................................................................................................................................................................
This information is stored in 1350 OMS PKT database. This information is available for MPLS infrastructure or directly for Ethernet Service usage (Link Over TDM for Ethernet Segments and Ethernet physical ports). MPLS infrastructure is Link Over TDM devoted to MPLS. Ethernet Service usage involves Link Over TDM, Ethernet Segments, and Ethernet physical ports. Note: The Ethernet physical port can be used also to build the cable (or Martini cable or Ethernet cable). For details on Reservation tool, refer to “Reservation tool” (p. 23-13). Recovery
The user ask the Recovery on the reserved NE. The connectivity entities (like Ethernet Segments or MPLS LSP Tunnel) are built and then the discovered connectivity entities are stored in 1350 OMS PKT database. The LSP tunnel and VC-LSP are defined and allocated. The Ethernet Segments and EVCs are defined and allocated. The abstract objects are recovered inside the database. The paths are automatically created. Final provisioning state of LSPs and Ethernet Segment is commissioned. A minimum EVC, Ethernet services and Customers are created for holding the recovered Ethernet Segments. The user can be asked to help the system to recover managed connectivity when complex objects are not automatically recoverable by the system.
.................................................................................................................................................................................................................................... 1350 OMS 23-5 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
NE Audit tool
....................................................................................................................................................................................................................................
NE Audit tool Overview
The NE MIB Audit function available from 1350 OMS PKT can basically detect and then report two categories of misalignments: •
“Delta+” misalignments. “Delta+” misalignments refer to resources existing in 1350 OMS PKT DB but not in the NE MIB. The case occurs when 1350 OMS PKT implements Ethernet Services on a given ISA Board and then the Board itself must be replaced. The case occurs also when a MIB restore is launched to recover a previously stored MIB Backup. Alternatively, the case occurs when 1320CT and 1350 OMS EML users remove services or resources previously provisioned by 1350 OMS PKT.
•
“Delta-” misalignments. “Delta-” misalignments refer to resources existing in the NE MIB but not in 1350 OMS PKT DB. The case occurs when 1350 OMS PKT de-implements Ethernet Services on a given ISA Board and then the Board itself is replaced. The case occurs also when a MIB restore is launched to recover a previously stored MIB Backup. Alternatively, the case occurs the case when 1320CT and 1350 OMS EML users create new services or resources (bypassing security controls).
•
“Delta” misalignments. “Delta” misalignments refer to resources existing in both NE MIB and 1350 OMS PKT DB, but with different attribute values. The case occurs when 1320CT and 1350 OMS EML modify directly services or resources in the NE MIB bypassing security mechanism.
Recovery of the misalignments
If a misalignment exists between the 1350 OMS PKT and NEs, the audit feature provides the user with a means to detect. This situation happens in different cases: •
At installation time of the 1350 OMS PKT upon an existing network.
•
After a long period during which the 1350 OMS PKT has been disconnected from the network. After the local access control (LAC) has been granted on a NE. If the network has been configured without using the 1350 OMS PKT, operating the 1350 OMS EML or the Craft Terminal directly.
• •
The Audit operation consists in comparing the content of the NE MIB with the content of the 1350 OMS PKT database. The user selects one or more NEs and requests the audit. .................................................................................................................................................................................................................................... 1350 OMS 23-6 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
NE Audit tool
....................................................................................................................................................................................................................................
On the basis of the NE data uploaded from the NE MIB and the NE data stored in the database, the 1350 OMS PKT performs a comparison. The differences are classified as follow: 1. Data existing in the NE and missing in 1350 OMS PKT. 2. Data missing in the NE and existing in 1350 OMS PKT. 3. Different data using the same resources in NE and 1350 OMS PKT. The result of the audit procedure is stored in a text file that is made available to the user. On the basis of the information provided in the text file, the user can proceed with one of the following operations: • •
Display the audit result. Reservation-Recovery to resume the situation described in 1.
•
Alignment to resume the situation described in 2.
•
Forced alignment to resume the situation described 3. Alternatively the situation can be resumed as follow: the user can directly manage the conflict operating the 1350 OMS EML or the Craft Terminal.
When an audit is started on a NE, this NE is locked to avoid any modification of its MIB during the procedure life time. On a locked NE: • • • •
It is impossible for any user to delete this NE. Another audit session cannot work with this NE. One NE can be locked only by one audit. From outside the audit, alignment, reserve procedure is impossible to download or upload information into or from the NE MIB. from any session is possible to do any other operation (for example: display properties, allocate Ethernet Segment, create traffic profile …).
The “locked NE” information is stored in database. At the end of the procedure, the NEs locked in this procedure are unlocked. The audit result is stored in a text file in XML format.
.................................................................................................................................................................................................................................... 1350 OMS 23-7 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Results of Audit
....................................................................................................................................................................................................................................
Results of Audit Per domain comparison
Here are the domains compared during an audit (and for each domain, a list of concerned entities and their compared attributes): •
“Construction domain” (p. 23-8).
•
“Ethernet domain” (p. 23-8).
•
“MPLS domain” (p. 23-10).
•
“T-MPLS domain” (p. 23-11).
Construction domain
Attributes for Construction domain: •
•
•
Attributes of TDM terminations entities: – TDM termination User Label. –
Protocol type.
–
Supported layer.
Attributes of Ethernet Physical Ports entities: – Port User Label. –
Interface type.
–
Interface rate.
–
Duplex mode.
–
Auto Negotiation State.
–
Supported layer.
–
Aggregation Id.
– –
Aggregation Ports. Client type .
Attributes of Network Element entity – Bridge type.
Ethernet domain
Attributes for Ethernet domain: •
•
Attributes of interfaces entities for Edge ports and Ethernet end points: – Interface MIB index. –
Effective bandwidth.
–
Activation status (interface status).
–
VLAN Tag Protocol Type .
Attributes of Traffic Descriptors: –
Identifier.
–
COS.
.................................................................................................................................................................................................................................... 1350 OMS 23-8 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Results of Audit
....................................................................................................................................................................................................................................
•
•
– –
CIR.
– –
CBS. PBS.
Attributes of Traffic Classifiers entities: – Inflow Identifier. –
Classifier Identifier.
–
VLAN Identifier.
–
VLAN Max.
–
Priority.
– Priority MAX. Color Profiles entities – Color Profile MIB index. –
•
PIR.
Color for priority 0 to 7.
Attributes of Connections, for Inflow: –
Inflow Identifier.
–
Inflow Service type.
–
Inflow Interface index (only if In Service type equal to Ethernet),.
– Inflow MPLS Tunnel index (only if In Service Type equal to MPLS),. – Inflow MPLS Tunnel instance (only if In Service Type equal to MPLS). Attributes of Traffic entities for Inflow: – Traffic Descriptor Identifier. –
Connection cast type.
–
Policy Mode.
–
Color Profile Identifier.
–
VLAN Pop,.
– VLAN push (VLAN Id, Priority mode, Green priority, Yellow priority),. – the “In” and “Out” connection extremities information couple attributes. Attributes of Connections, for Outflow: –
Outflow Identifier.
–
Outflow Service type.
– Outflow Interface index (only if Out Service type equal to Ethernet). – Outflow MPLS Tunnel index (only if Out Service Type equal to MPLS). – in MPLS Tunnel instance (only if Out Service Type equal to MPLS). Attributes of Connections entities for Traffic Descriptor –
Traffic Descriptor MIB index.
–
Traffic type (cast type).
–
Policy mode.
–
Color Profile.
.................................................................................................................................................................................................................................... 1350 OMS 23-9 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Results of Audit
....................................................................................................................................................................................................................................
– –
VLAN Pop.
–
the “In” and “Out” connection extremities information couple attributes.
VLAN push (VLAN Id, Priority mode, Green priority, Yellow priority).
MPLS domain
Attributes of MPLS domain: •
•
•
•
Attributes of MPLS Interfaces entities –
Interface identifier.
–
Label.
–
Service Type.
–
Effective bandwidth.
–
Static MPLS label range (min and max integers).
–
Activation status (up or down).
Attributes of Traffic Descriptors entities – Traffic Descriptor MIB index. –
Traffic type or Qos (BE, EF, AF, traffic parameters (PIR, CIR, PBS, CBS).
–
Activation status (up or down).
Attributes of LSP tunnel cross connections entities – LSP tunnel identifier. –
MIB indexes (tunnel index and tunnel instance).
–
Type (LSR,LER Ingress, LER Egress).
–
Connection role.
–
Traffic Descriptor MIB index.
–
Cast type.
– –
Policy mode (enabled, disabled).
–
Ingress lower MPLS label.
–
Egress termination identifier.
–
Egress lower MPLS label.
–
Activation status (up or down).
Ingress termination identifier.
For VC-LSP LER connections, the entities are: – VC-LSP identifier. – – – – –
MIB indexes (tunnel index and tunnel instance). Type (LER Ingress or LER Egress). Traffic Descriptor MIB index. Cast type. Policy mode (enabled, disabled).
.................................................................................................................................................................................................................................... 1350 OMS 23-10 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Results of Audit
....................................................................................................................................................................................................................................
– –
LER connection (termination identifier, Lower PLS label, Upper MPLS label). Activation status (up or down) attributes.
T-MPLS domain
Attributes of T-MPLS domain: •
•
•
•
•
•
Attributes of Nodes: –
Egressing PHB profile.
–
Five Classes.
Attributes of Ports: –
Access ID.
–
Administrative State.
Attributes of T-MPLS Segments: –
Access ID.
–
Administrative State.
–
Segment Dir.
–
Trail Layer.
–
Traffic Descriptor MIB index.
–
In Label.
–
Out Label.
–
Mep Enabling.
Attributes of Cross Connections: –
Access ID.
–
Administrative state.
–
Segment Dir.
– Trail Layer. Attributes of Node TD: –
Access Id.
–
COS.
–
CIR.
–
PIR.
–
CBS.
–
PBS.
Attributes of Mep: –
Access ID.
–
Cv TX.
–
Cv RX.
.................................................................................................................................................................................................................................... 1350 OMS 23-11 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Results of Audit
....................................................................................................................................................................................................................................
•
Attributes of Protection Groups: – Access ID. – HoldOffTime. – RevertTime.
.................................................................................................................................................................................................................................... 1350 OMS 23-12 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Reservation tool
....................................................................................................................................................................................................................................
Reservation tool Overview
The reservation operation prevent the use of resources and allow the Recovery tool to insert in the 1350 OMS PKT database the resources discovered in the NE MIB and not present in the 1350 OMS PKT database: • •
Traffic Descriptors. Traffic Classifiers.
• • •
Color Profiles. Ethernet connections. MPLS connections.
Reservation for Ethernet domain
Reservation operation is in charge of reserving Traffic Descriptors, Color Profiles, Traffic Classifiers, and Ethernet cross connections. Entities present in the NE MIB but not known by 1350 OMS PKT, are imported into the 1350 OMS PKT with the special status of “reserved”. The status of “reserved” is used in the Recovery phase to rebuild Ethernet flows and services. All the entities marked as “reserved” are not visible to the user, except for Traffic Descriptors, Color Profiles, and Traffic Classifiers. They are immediately available to the user that can use them. The recovered entities, even if they are associated to flow on the NE (that is not provisioned by the 1350 OMS PKT), are not considered “in use”. For example, they can be deleted from the 1350 OMS PKT without affecting the NE. For Traffic Descriptors, Color Profiles, and Traffic Classifiers no duplicates are created. If a Traffic Descriptor recovered has the same of a Traffic Descriptor that exists into the 1350 OMS PKT, the latter entity is reused. The former one is associated to it. Traffic Descriptor attributes are CoS, CIR, PIR, CBS, PBS. Reservation for MPLS domain
Reservation operation is in charge of reserving MPLS Traffic Descriptors, LSP Tunnels connections, and VC-LSP connections. The NE MIB resources which have not been uploaded, are stored in the 1350 OMS PKT database. The 1350 OMS PKT resources are affected with the consumption of these resources. The user can recover and use the Traffic Descriptor used or not used by connections. The deletion of the Traffic Descriptor removes it from the 1350 OMS PKT database but leave it in the NE. A default user label is generated by the MPLS recovery component.
.................................................................................................................................................................................................................................... 1350 OMS 23-13 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Reservation tool
....................................................................................................................................................................................................................................
In the LSP Tunnel connections, the used MPLS labels are marked reserved for the Transport Link in the 1350 OMS PKT database. If two connections at the extremities of the path share the same MPLS label, the MPLS label consumed only once. The consuming bandwidth is affected on the corresponding Transport Links. For an LSR, the Transport Links affected are two. For a LER, the Transport Link affected is one. If two connections at the extremities of the path concern the same Transport Link bandwidth is consumed only once. In the VC-LSP connections, the used MPLS labels are marked “reserved” for the Transport Link in the 1350 OMS PKT database. If two connections at the extremities of the same LSP tunnel share the same MPLS label, the MPLS label is consumed only once. The consuming bandwidth is affected on the corresponding LSP tunnel or Transport Link. If two connections at the extremities of the same LSP tunnel share the same Transport Link, the bandwidth is consumed only once.
.................................................................................................................................................................................................................................... 1350 OMS 23-14 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Align Up of Ethernet Domain Data
....................................................................................................................................................................................................................................
Align Up of Ethernet Domain Data Overview
The Align Up function allows a selective (user driven) realignment between 1350 OMS PKT and NE content. The scope of this function is generic and can be applied in the contexts: • •
after a Network Manager migration to import from NE (overwriting data in the 1350 OMS PKT) the running value of the introduced Attribute. on user demand.
In both cases, the Audit function invocation is a necessary precondition. The function must carefully handle mismatch case. The updating inside 1350 OMS PKT forces the recomputation of EVC, Ethernet Segment, STI provisioning state, and the Transport Link Configuration State. The Align Up operation does not create nor delete new entities inside the 1350 OMS PKT Ethernet database but is only aimed to align attributes. As example see the following case. Suppose that the Activation state of an Edge Port is UP inside 1350 OMS PKT and the same port is DOWN inside the NE. After the Align Up, the Edge Port results with Activation State equal to DOWN also inside 1350 OMS PKT. This status change must be propagated also toward Ethernet connections which are using such Edge Ports (that is Ethernet Segments and/or EVCs). The Align Up function is only applicable on a NE after having performed an Audit on that NE. In particular, the Align Up function can be invoked only inside an AAR context (that is with the corresponding NE locked). After the Audit execution, the Audit result reports to the user all the differences existing between the NE image and the 1350 OMS PKT image. The user can then start the Align Up operation and can decide which objects must be aligned inside 1350 OMS PKT.
.................................................................................................................................................................................................................................... 1350 OMS 23-15 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Start the audit, alignment, reserve procedure
....................................................................................................................................................................................................................................
Start the audit, alignment, reserve procedure When to use
This function consists in preparing the 1350 OMS PKT to perform audit, alignment, reserve actions. Related information
For a description about Audit, Alignment, and Reservation, refer to the topic “The AAR procedure ” (p. 23-3). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Audit Align Reserve > Start AAR Procedure. ...................................................................................................................................................................................................
2
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: If the operation is confirmed, a lock of NEs is done just before starting the
audit procedure until the end of audit, alignment, reserve procedure. Once the audit, alignment, reserve procedure is started, in Action > Packet > Audit Align Reserve menu, the following commands are available: •
Network Elements for Audit.
•
Audited Network Elements.
•
Stop Procedure.
All the other 1350 OMS PKT functions are available. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 23-16 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Stop the audit, alignment, reserve procedure
....................................................................................................................................................................................................................................
Stop the audit, alignment, reserve procedure When to use
This function consists in ending the audit, alignment, reserve procedure. Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR procedure ” (p. 23-3). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. The AAR procedure must be started “Start the audit, alignment, reserve procedure” (p. 23-16). Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Audit Align Reserve > Stop AAR Procedure. ...................................................................................................................................................................................................
2
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: If the operation is confirmed, the audited NEs are unlocked. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 23-17 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
View the list of auditable NEs
....................................................................................................................................................................................................................................
View the list of auditable NEs When to use
The function presents all the NEs that are available for audit. Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR procedure ” (p. 23-3). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Audit Align Reserve. Result: The Audit Align Reserve menu is displayed. ...................................................................................................................................................................................................
2
Select NE for Audit. Result: The Auditable Network Element list window is displayed.
See the following topic in this document: “Description of the list of auditable NEs” (p. 23-19) Note: If a NE is already locked by another user, it does not appears in this list. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 23-18 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Description of the list of auditable NEs
....................................................................................................................................................................................................................................
Description of the list of auditable NEs Attributes of a auditable NE
The attributes displayed for each NE are: •
User Label.
•
Node User Label.
•
LAC State.
•
Lcation Name.
•
Type.
•
Operational State.
•
Working State.
•
Consistency State.
• •
Bridge Type.
•
Version.
•
IP Address.
•
ACCESS Module Label.
Comment.
.................................................................................................................................................................................................................................... 1350 OMS 23-19 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Perform an audit on a NE
....................................................................................................................................................................................................................................
Perform an audit on a NE When to use
This function consists in starting the audit on the previously selected NEs. Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR procedure ” (p. 23-3). For more details about audit on a NE, see: “NE Audit tool” (p. 23-6). For information about attributes compared in an Audit, see “Results of Audit” (p. 23-8). After confirmation, NE per NE, the 1350 OMS PKT uploads the NE MIB content and compares it with the 1350 OMS PKT database. In each domain, if an error occurs, the audit is stopped in this domain nevertheless the audit in the other domains goes on. If an audit is Partially done, the actions alignment and reservation are not available. Only a new audit is possible. During the same session, the user can audit again the same NE; In this case, only the latest audit result is at the user disposal. This new audit allows the user to target a new alignment (the alignment is allowed only once after an audit). The audit results are temporally stored into audit files. They are automatically deleted when the user stops the audit, alignment, reserve procedure. One file per audited NE is stored. The file contains the compared domains. When the audit is completed on all selected NEs, a message is displayed in the status bar. The main steps of the audit are listed into the 1350 OMS PKT Log file. If errors or warning occur, they are listed in this file too and in an error message window. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. The AAR procedure must be started “Start the audit, alignment, reserve procedure” (p. 23-16). Conditions
To get a positive result: • •
The NE must not be an E/FE board or a GE board. The NE LAC state must not be granted.
.................................................................................................................................................................................................................................... 1350 OMS 23-20 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Perform an audit on a NE
....................................................................................................................................................................................................................................
• •
The NE operational state must be enable. Lock state of selected NEs must be:
– –
Unlocked. Locked (due to an audit, alignment, reserve procedure launched on the NEs by the
user himself). Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Network Element > Network Element > NE for Audit. Result: The list window is shown. ...................................................................................................................................................................................................
2
Select one or more items in the list. ...................................................................................................................................................................................................
3
Select Action > Network Element > Start NE Audit. ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: When the audit is in progress on a selected NE, the NE is locked. Operations
that affect the NE are not authorized (For example: delete the NE, delete the transmission paths that has at least one NE concerned by audit, alignment session, …). When the audit is completed on all selected NEs, a message is displayed in the status bar. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 23-21 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
View the list of Audited NEs
....................................................................................................................................................................................................................................
View the list of Audited NEs When to use
After having performed an audit, this function displays the result of this audit. Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR procedure ” (p. 23-3). When the AAR procedure is stopped, the information about audited NEs is lost. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. The AAR procedure must be started “Start the audit, alignment, reserve procedure” (p. 23-16). The AAR session must be open. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Audit Align Reserve. Result: The Audit Align Reserve menu is displayed. ...................................................................................................................................................................................................
2
Select Audited NEs. Result: The Audited Network Element list window is displayed.
See the following topic in this document: “Description of the list of Audited NEs” (p. 23-23) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 23-22 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Description of the list of Audited NEs
....................................................................................................................................................................................................................................
Description of the list of Audited NEs Attributes of Audited NE
The attributes displayed for each audited network element are: •
User Label.
•
Creation Date.
•
Audit (Done, Partially Done, Not Done).
•
Alignment (Done, Partially Done, Not Done).
•
Reservation (Done, Partially Done, Not Done).
•
Forced Alignment (Done, Partially Done, Not Done).
•
Preparation (Done, Partially Done, Not Done).
.................................................................................................................................................................................................................................... 1350 OMS 23-23 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
View the results of an audit
....................................................................................................................................................................................................................................
View the results of an audit When to use
This function consists in starting the audit on the previously selected NEs. Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR procedure ” (p. 23-3). For information about attributes compared in an Audit, see “Results of Audit” (p. 23-8). When the AAR procedure is stopped, the information about audit results is lost. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. The AAR procedure must be started “Start the audit, alignment, reserve procedure” (p. 23-16). The AAR session must be open. Conditions
To get a positive result: • •
The NE must not be an E/FE board or a GE board. The NE LAC state must not be granted.
•
The NE operational state must be enable.
•
Lock state of selected NEs must be:
–
Unlocked.
–
Locked (due to an audit, alignment, reserve procedure launched on the NEs by the
user himself). Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Network Elements > Network Element. Result: The list window is shown. ...................................................................................................................................................................................................
2
Select one or more items in the list.
.................................................................................................................................................................................................................................... 1350 OMS 23-24 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
View the results of an audit
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
Select Action > Audited NE > Display Audit File. Result: The Audit NE file is displayed.
The files are automatically deleted when the user stops the audit, alignment, reserve procedure. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 23-25 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities Audit, Alignment, Reservation, Recovery
Perform an alignment on a NE
....................................................................................................................................................................................................................................
Perform an alignment on a NE When to use
This function consists in starting the alignment on the previously audited NEs. Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR procedure ” (p. 23-3). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. The AAR procedure must be started “Start the audit, alignment, reserve procedure” (p. 23-16). The AAR session must be open. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Network Elements > Audited NEs. Result: The list window is shown. ...................................................................................................................................................................................................
2
Select one or more items in the list. ...................................................................................................................................................................................................
3
Select Action > Audited NE > Align Down. ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 23-26 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities NE Alignment tool
Overview
....................................................................................................................................................................................................................................
NE Alignment tool Overview Purpose
This section provides information about the NE alignment tool. Contents Workflow to align up Ethernet Data
23-28
ISA Board Replacement Procedure
23-30
Perform a reservation on a NE
23-32
Restore procedure for ISA board
23-33
.................................................................................................................................................................................................................................... 1350 OMS 23-27 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities NE Alignment tool
Workflow to align up Ethernet Data
....................................................................................................................................................................................................................................
Workflow to align up Ethernet Data When to use
This function consists in starting the alignment on the previously audited NEs. Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR procedure ” (p. 23-3). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Start the Audit, Align, Reserve session from the Construction GUI. Select Action > Packet > Audit Align Reserve > Start Procedure. ...................................................................................................................................................................................................
2
Choose the NE (or the NEs) to be Audited from the Auditable Network Element List in the Construction GUI and select Start NE Audit from the popup menu. ...................................................................................................................................................................................................
3
Read the differences displaying the Audit file content. Select Search > Packet > Audit Align Reserve > Display Audit File. Result: The audit results are shown. ...................................................................................................................................................................................................
4
If the need is to perform an Align Up operation on Ethernet objects, start the Align Up operation from the Ethernet GUI. Select Action > Packet > Audit Align Reserve > Align Up. Result: The Align Up windows are shown. ...................................................................................................................................................................................................
5
On the Align Up windows, select one or more objects that must be realigned and confirm the choice with OK button.
.................................................................................................................................................................................................................................... 1350 OMS 23-28 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities NE Alignment tool
Workflow to align up Ethernet Data
....................................................................................................................................................................................................................................
Result: At that moment the Align Up function realign the 1350 OMS PKT database to the NE image. ...................................................................................................................................................................................................
6
After having realigned all needed objects, close the Align Up Window from Ethernet GUI. ...................................................................................................................................................................................................
7
End the Audit, Alignment, Reserve session from the Construction GUI. Select Action > Packet > Audit Align Reserve > Stop Procedure. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 23-29 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities NE Alignment tool
ISA Board Replacement Procedure
....................................................................................................................................................................................................................................
ISA Board Replacement Procedure When to use
The procedure describes the main steps needed to replace an ISA board that supports customer service or traffic under the supervision of 1350 OMS EML and 1350 OMS PKT systems. Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR procedure ” (p. 23-3). For more details, refer to the topic “Align Up of Ethernet Domain Data” (p. 23-15). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
The faulty ISA Board has been replaced with a new one, the MIB is void in the new Board. ...................................................................................................................................................................................................
2
ISA MIB is restored on the new Board through NE. The MIB stored at 1350 OMS EML is not fully aligned with the current status of 1350 OMS PKT DB. ...................................................................................................................................................................................................
3
1350 OMS PKT launches the Audit operation against the involved ISA. The Audit report identifies a set of mismatches. ...................................................................................................................................................................................................
4
Per each D- difference detected in the Audit report the user can: 1. Reserve the resource in the 1350 OMS PKT DB, acknowledging the NE configuration is OK. 2. Remove the resource from NE MIB through NE, acknowledging the NE configuration is not OK.
.................................................................................................................................................................................................................................... 1350 OMS 23-30 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities NE Alignment tool
ISA Board Replacement Procedure
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Per each D difference detected in the Audit report the user can: 1. Perform 1350 OMS PKT operations to realign 1350 OMS PKT to NE, acknowledging the NE configuration is OK. 2. Perform 1350 OMS EML operations to realign NE to 1350 OMS PKT, acknowledging the NE configuration is not OK. ...................................................................................................................................................................................................
6
Per all D+ difference detected in the Audit report the user can: 1. Align Down the 1350 OMS PKT configurations to the NE, acknowledging the 1350 OMS PKT configuration is OK. 2. Remove the resources from 1350 OMS PKT DB (through GUI or DB access), acknowledging the 1350 OMS PKT configuration is not OK. ...................................................................................................................................................................................................
7
Perform a final audit for a further alignment check. If any difference (D+ or D-) is found again, repeat the steps from Step 4 to Step 6 until a full alignment is obtained. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 23-31 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities NE Alignment tool
Perform a reservation on a NE
....................................................................................................................................................................................................................................
Perform a reservation on a NE When to use
This function consists in starting the reservation on the previously selected NEs. Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR procedure ” (p. 23-3). For more details about the reservation, refer to chapter “Reservation tool” (p. 23-13). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. The AAR procedure must be started “Start the audit, alignment, reserve procedure” (p. 23-16). The AAR session must be open. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Network Elements > Audited Network Elements. Result: The list window is shown. ...................................................................................................................................................................................................
2
Select one or more items in the list. ...................................................................................................................................................................................................
3
Select Action > Audit NE > NE Resource Reservation. ...................................................................................................................................................................................................
4
Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). Result: The Resources are reserved. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 23-32 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities NE Alignment tool
Restore procedure for ISA board
....................................................................................................................................................................................................................................
Restore procedure for ISA board Overview
The procedure describes the main steps to Restore the MIB for an ISA board that supports customer services or traffic. The board is supposed to be under the supervision of 1350 OMS EML and 1350 OMS PKT systems. The MIB is supposed to be saved in 1350 OMS EML repository. All the actions described in the previous “ISA Board Replacement Procedure” (p. 23-30) are still applicable, except the point Step 1 associated to the physical replacement of the ISA Board.
.................................................................................................................................................................................................................................... 1350 OMS 23-33 8DG42227DAAA 9.6 Issue 3 December 2012
Network Utilities
Restore procedure for ISA board
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 23-34 8DG42227DAAA 9.6 Issue 3 December 2012
24
24 Operation, Administration, and Maintenance (OAM) Management
Overview Purpose
This chapter describes how to manage Ethernet Operations, Administration, and Maintenance (OAM). Contents Ethernet OAM
24-3
OAM main functions
24-3
Create OAM Domain
24-7
List OAM Domains
24-8
Description of the list of OAM MD
24-9
OAM Domain Properties
24-10
Details of OAM MD
24-11
Modify OAM Domain
24-12
Configure OAM Domain
24-13
Deimplement OAM Domain
24-14
Inventory of OAM items from MD
24-15
Inventory of OAM monitored objects from MD
24-16
Maintenance Association (MA)
24-17
Maintenance Associations
24-17
List Maintenance Association (MA)
24-18
Description of the list of OAM MA
24-19
Properties of Maintenance Association (MA)
24-20
Details of the OAM MA
24-21
Modify Maintenance Association (MA)
24-22
Configure Maintenance Association (MA)
24-23
Enable/Disable Continuity Check (CC)
24-24
................................................................................................................................................................................................................................... 1350 OMS 24-1 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Management
Overview
....................................................................................................................................................................................................................................
Deimplement OAM MA
24-25
Inventory of OAM items from MA
24-26
Inventory of OAM monitored objects from MA
24-27
Maintenance Activation Maintenance Activation on EVC Loopback Loopback activation Linktrace Linktrace activation Delay measurement and Loss measurement
24-28 24-28 24-29 24-29 24-31 24-31 24-33
Packet Delay measurement
24-34
Packet Loss measurement
24-35
Configure Maintenance End Points
24-36
List the OAM ETH DM Tool
24-38
List the OAM ETH SLM Tool
24-40
Create ETH DM Tool
24-42
Create ETH SLM Tool
24-44
Activate/Deactivate OAM ETH DM Tool
24-46
Activate/Deactivate OAM ETH SLM Tool
24-47
Inventory from OAM ETH DM Tool
24-48
Inventory from OAM ETH SLM Tool
24-49
Configure OAM ETH DM Tool
24-50
Configure OAM ETH SLM Tool
24-52
.................................................................................................................................................................................................................................... 1350 OMS 24-2 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) OAM main functions Management Ethernet OAM ....................................................................................................................................................................................................................................
Ethernet OAM OAM main functions OAM Introduction
The ETH OAM allows the user to manage: • • • •
Maintenance Domains: Creation/modification/deletion. Maintenance Associations: Modification Creation/deletion are done automatically when ETH OAM is enabled on EVC, links, ports. Loopback. Linktrace.
•
List/inventories of related objects.
OAM Continuity Check
The Ethernet OAM Continuity Check (OAM CC) allows determining the reachability between groups of associated Ethernet Resources. The Ethernet OAM CC is a tool for pro-active maintenance; in fact as soon as the OAM CC tool is set up over Ethernet resources, such Ethernet Resources start exchanging autonomously OAM Continuity Check Messages (OAM CC PDU) and specific Alarms are sent by NEs whenever the reach ability between that Ethernet Resources is interrupted. Ethernet OAM Continuity Check is the base for other OAM activities: • •
Link Trace Management Loop Back Management
•
Ethernet MEF Performance management (Jitter and Delay evaluation).
The Set up of Ethernet OAM Continuity Check tool can be done on top of the following Technologies: • • •
Provider Bridge Domains ETS domain for EPTL services. T-MPLS Domains.
•
a combination of the above (E2E)
OAM Continuity Check terminology
The Ethernet OAM CC is realized according to ITU Y.1731 and IEEE 802.1ag Standards.
.................................................................................................................................................................................................................................... 1350 OMS 24-3 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) OAM main functions Management Ethernet OAM ....................................................................................................................................................................................................................................
The terminologies adopted by the two Standards are slightly different, and the following table reports a comparison between the two. Table 24-1
Terminology Mapping
ITU Y.1731 Terminology
IEEE 802.1ag Terminology
MD
Maintenance Domain
MD
Maintenance Domain
MEG
Maintenance Entity Group
MA
Maintenance Association
MEG Level
Maintenance Entity Group Level
MA Level
Maintenance Association Level
MEP
MEG End Point
MEP
MA End Point
OAM Continuity Check model
Ethernet OAM CC objects: •
“Maintenance Domain (MD)” (p. 24-4).
•
“Maintenance Association (MA) or Maintenance Entity Group (MEG)” (p. 24-5).
•
“Maintenance Edge Point (MEP)” (p. 24-5).
•
“Intermediate Maintenance Entity Point (MIP)” (p. 24-6).
Maintenance Domain (MD)
MD is the Network or a Network Portion where Fault on Connectivity is managed. .................................................................................................................................................................................................................................... 1350 OMS 24-4 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) OAM main functions Management Ethernet OAM ....................................................................................................................................................................................................................................
MD can be mapped as STP domain, or ETS domain (PortToPort and EPTL), or T-MPLS domain. For a given Domain it is possible to display all MDs existing in that domain. From a given MD it is possible to retrieve all the contained MA (Connectivity) and related configured MEPs (Connectivity extremities). Maintenance Association (MA) or Maintenance Entity Group (MEG)
MA realizes the association between Maintenance Entities (Maintenance Points) and Maintenance Domain. MA determines also the relationship existing among Maintenance Points The life cycle of MA (Creation/Deletion) is always linked to corresponding Connectivity object (EVC, Transport Link or Edge Port). MA Parameters are visible always contextually to the corresponding Connectivity object. MA Modification/Configuration is always possible from the corresponding Connectivity object. MA is defined by the following main attributes: •
MA name: made by a Format and a Name.
•
Monitored object. Monitored object can be one of the following: – (only for Virtual Bridge, Provider Bridge and ETS) VLAN: it can be the CVLAN in case of Virtual Bridge or the SVLAN in case of Provider Bridge
• • • •
– (only for T-MPLS) Pseudo-Wire or VSI MHF policy: which automatic policy is defined inside the MA for MIP Creation (default=inherited from MD) CCM Interval: delay between sending of CC PDU MEP List Table : list of Maintenance Points making part to the association and their Activation status Row Status: Activation status for the MA entry
Maintenance Edge Point (MEP)
MEP is a Maintenance Point located at the Edge of the Monitored Network. MEP can initiate and terminate OAMPDU frames. OAM activities can be started from MEP MEPs are explicitly created on Operator DemandEach MEP is always linked with PORT or, depending on involved technology, VLANID, PWID. The life cycle of MEP (Creation/Deletion) is always linked to corresponding Connectivity object extremity (or to the Connectivity object itself in the special case of the Edge Port). MEP Parameters are visible always contextually to corresponding Connectivity object extremity. .................................................................................................................................................................................................................................... 1350 OMS 24-5 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) OAM main functions Management Ethernet OAM ....................................................................................................................................................................................................................................
MEP Modification/Configuration is always possible from corresponding Connectivity object extremity. Each MEP is defined by the following main attributes: • • •
Identifier: unique in the MA, in the range 1-8191. Interface Reference: Port identifier (the MAC address of the Port is inherited). Direction : (UP, Down).
• • •
Priority: priority (0-7) to be used in CCM PDU messages. Enable/Disable Flag : aimed to dynamically start/stop OAM CC. Row Status: Activation status for the MEP entry.
•
Other attributes not connected to CC management are not included here and always set to their default value.
Intermediate Maintenance Entity Point (MIP)
MIP is an Intermediate Maintenance Entity Point. MIP can only react to OAMPDU frames (answering and/or forwarding). OAM activities cannot be started from MIP. Each MIP has a Direction concept (UP, Down). MIPs are automatically created depending on criteria defined on MD/MA objects. Monitored Objects
Objects monitored in a Maintenance Domain: • • • •
Ethernet Domain NE E2E EVC EVC
• • • •
EVC termination Transport Link Transport Link Termination Edge Port
.................................................................................................................................................................................................................................... 1350 OMS 24-6 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Create OAM Domain Management Ethernet OAM ....................................................................................................................................................................................................................................
Create OAM Domain When to use
The scope of this procedure is to define an OAM Domain. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Maintenance domain can be defined by user: • •
To define a domain different from the default one used by all Maintenance associations related to EVCs, links, ports To define maintenance levels different from the one assigned by default (0 on links and edge ports, 2 on EVC)
Maintenance domains provisioning state follows the evolutions of related MAs: •
implemented in the NEs as soon as the first monitored object requires it.
•
Deimplemented when no more monitored object requires it.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Actions > Packet > OAM CC> Create OAM MD. Result: The creation window is displayed. ...................................................................................................................................................................................................
2
Define the following attributes: •
Name.(User Label of Maintenance Domain, free text).
• •
Level. (8 OAM Levels are standardized). MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit: MIPs are created where a lower-level MEP exists; default: MIPs are created on all
intermediate points). Click OK button to confirm the operation. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-7 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) List OAM Domains Management Ethernet OAM ....................................................................................................................................................................................................................................
List OAM Domains When to use
The scope of this procedure is to list all the Maintenance Domains. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed.
See the following topic in this document: “Description of the list of OAM MD” (p. 24-9) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-8 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Description of the list of OAM MD Management Ethernet OAM ....................................................................................................................................................................................................................................
Description of the list of OAM MD Attributes of an OAM MD
The attributes displayed for each MD are: •
Name.(User Label of Maintenance Domain, free text).
•
Format
• •
Level. (8 OAM Levels are standardized).
•
MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit: MIPs are created where a lower-level MEP exists; default: MIPs are created on all
intermediate points). Provisioning State (Defined, Implemented)
.................................................................................................................................................................................................................................... 1350 OMS 24-9 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) OAM Domain Properties Management Ethernet OAM ....................................................................................................................................................................................................................................
OAM Domain Properties When to use
The scope of this procedure is to list all the Maintenance Domains. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item in the list and select Actions > Properties. Result: The Property window is displayed.
See the following topic in this document: “Details of OAM MD” (p. 24-11) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-10 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Details of OAM MD Management Ethernet OAM ....................................................................................................................................................................................................................................
Details of OAM MD Attributes of an OAM MD
The attributes displayed for each MD are: •
Name.(User Label of Maintenance Domain, free text).
•
Format
• •
Level. (8 OAM Levels are standardized).
• •
MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit: MIPs are created where a lower-level MEP exists; default: MIPs are created on all
intermediate points). Provisioning State (Defined, Implemented) Id
.................................................................................................................................................................................................................................... 1350 OMS 24-11 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Modify OAM Domain Management Ethernet OAM ....................................................................................................................................................................................................................................
Modify OAM Domain When to use
The scope of this procedure is to change attributes when MD is not implemented. Related Information
The user can change attributes when MD is not implemented. For more information, refer to: “OAM main functions” (p. 24-3) See also: “Configure OAM Domain” (p. 24-13) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item in the list and select Actions > Modify. Result: The modify window is displayed. ...................................................................................................................................................................................................
3
Modify one or more of the following attributes: •
Name.(User Label of Maintenance Domain, free text).
•
Level. (8 OAM Levels are standardized).
•
MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit: MIPs are created where a lower-level MEP exists; default: MIPs are created on all
intermediate points). Click OK button to confirm the operation. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-12 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Configure OAM Domain Management Ethernet OAM ....................................................................................................................................................................................................................................
Configure OAM Domain When to use
The scope of this procedure is to change attributes when MD is implemented. Related Information
The user can change attributes when MD is implemented. For more information, refer to: “OAM main functions” (p. 24-3) See also: “Modify OAM Domain” (p. 24-12) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item in the list and select Actions > OAM MD > Configure. Result: The configure window is displayed. ...................................................................................................................................................................................................
3
Modify one or more of the following attributes: •
Maintenance Domain .
•
Level. (8 OAM Levels are standardized).
•
MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit: MIPs are created where a lower-level MEP exists; default: MIPs are created on all
intermediate points). Click OK button to confirm the operation. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-13 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Deimplement OAM Domain Management Ethernet OAM ....................................................................................................................................................................................................................................
Deimplement OAM Domain When to use
The scope of this procedure is to deimplement MD. Related Information
The user can change attributes when MD is implemented. For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item in the list and select Actions > OAM MD > Deimplement. Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-14 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Inventory of OAM items from MD Management Ethernet OAM ....................................................................................................................................................................................................................................
Inventory of OAM items from MD When to use
The scope of this procedure is to list OAM items related to a Maintenance Domain. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item in the list and select Search > OAM MD. Result: The search menu is displayed. ...................................................................................................................................................................................................
3
Select one of OAM items related to a Maintenance Domain: • • •
MA MEP MIP Result: The list of the contained objects is displayed.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-15 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Inventory of OAM monitored objects from MD Management Ethernet OAM ....................................................................................................................................................................................................................................
Inventory of OAM monitored objects from MD When to use
The scope of this procedure is to list objects monitored in a Maintenance Domain. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item in the list and select Search > OAM MD. Result: The search menu is displayed. ...................................................................................................................................................................................................
3
Select the list of the objects monitored in the Maintenance Domain: •
List Bridge EVCs
•
List ETS EVCs
•
List E2E EVCs
•
List T-MPLS EVCs
•
List Bridge NEs Result: The list of the contained objects is displayed.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-16 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Maintenance Associations Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
Maintenance Association (MA) Maintenance Associations When to use
Maintenance associations are created/deleted following the enabling/disabling of ETH OAM on monitored resources Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Monitored Association (MA) instances: • •
There is one MA instance for each monitored object. The provisioning state of the MA instance follows the evolutions of related monitored object: – Created/implemented in the NEs as soon as the monitoring is enabled and object is implemented. –
Deimplemented/deleted when monitoring is disabled or object is deimplemented/deleted.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar, list the object to monitor: • •
EVC Link
•
Edge Port
...................................................................................................................................................................................................
2
Select the object and enable/disable OAM. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-17 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) List Maintenance Association (MA) Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
List Maintenance Association (MA) When to use
The scope of this procedure is to list all the Maintenance Associations. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item then select Search > Packet > OAM MA Result: The OAM MA list is displayed.
See the following topic in this document: “Description of the list of OAM MA” (p. 24-19) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-18 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Description of the list of OAM MA Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
Description of the list of OAM MA Attributes of an OAM MA
The attributes displayed for each MD are: •
Name.(User Label of Maintenance Domain, free text).
•
OAM MD
•
Format
•
MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit: MIPs are created where a lower-level MEP exists; default: MIPs are created on all
• •
intermediate points). CCM Interval. Priority.
•
Provisioning State (Defined, Implemented).
•
OAM Enabled.
.................................................................................................................................................................................................................................... 1350 OMS 24-19 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Properties of Maintenance Association (MA) Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
Properties of Maintenance Association (MA) When to use
The scope of this procedure is to list all the Maintenance Associations properties. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item then select Search > Packet > OAM CC> OAM MAs. Result: The list window is displayed. ...................................................................................................................................................................................................
3
Select one item then select Action > Properties Result: The OAM MA property window is displayed.
See the following topic in this document: “Details of the OAM MA” (p. 24-21) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-20 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Details of the OAM MA Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
Details of the OAM MA Attributes of an OAM MA
The attributes displayed for each MD are: •
Name.(User Label of Maintenance Domain, free text).
•
OAM MD
•
Format
•
MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit: MIPs are created where a lower-level MEP exists; default: MIPs are created on all
• •
intermediate points). CCM Interval. Priority.
•
Provisioning State (Defined, Implemented).
•
OAM Enabled.
•
Id.
.................................................................................................................................................................................................................................... 1350 OMS 24-21 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Modify Maintenance Association (MA) Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
Modify Maintenance Association (MA) When to use
The scope of this procedure is to change MA attributes. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) See also: “Configure Maintenance Association (MA) ” (p. 24-23) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item then select Search > Packet > OAM CC> OAM MAs. Result: The list window is displayed. ...................................................................................................................................................................................................
3
Select one item then select Action > Modify Result: The modification window is displayed. ...................................................................................................................................................................................................
4
Modify one or more attributes: •
Name.(User Label of Maintenance Domain, free text).
•
MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit: MIPs are created where a lower-level MEP exists; default: MIPs are created on all
• •
intermediate points). CCM Interval. Priority.
Click OK to confirm the operation. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-22 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Configure Maintenance Association (MA) Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
Configure Maintenance Association (MA) When to use
The scope of this procedure is to change MA configuration. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) See also: “Modify OAM Domain” (p. 24-12) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item then select Search > Packet > OAM CC> OAM MAs. Result: The list window is displayed. ...................................................................................................................................................................................................
3
Select one item then select Action > Configure Result: The Configure OAM MA window is displayed. ...................................................................................................................................................................................................
4
Modify one or more attributes: •
Maintenance Association.
•
VLAN Id (0-4095).
•
MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit: MIPs are created where a lower-level MEP exists; default: MIPs are created on all
•
intermediate points). CCM Interval.
Click OK or Apply to confirm the operation. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-23 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Enable/Disable Continuity Check (CC) Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
Enable/Disable Continuity Check (CC) When to use
The scope of this procedure is to Enable or Disable CC. Related Information
The user can change attributes when MA is implemented. For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item then select Search > Packet > OAM CC> OAM MAs. Result: The list window is displayed. ...................................................................................................................................................................................................
3
Select one item then select Action > Enable or Action > Disable. Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-24 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Deimplement OAM MA Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
Deimplement OAM MA When to use
The scope of this procedure is to deimplement MA. Related Information
The user can change attributes when MD is implemented. For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item then select Search > Packet > OAM CC> OAM MAs. Result: The list window is displayed. ...................................................................................................................................................................................................
3
Select one item in the list and select Actions > OAM MA > Deimplement. Select one of the options in the confirmation box. Refer to the procedure “Confirm the action” (p. 11-40). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-25 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Inventory of OAM items from MA Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
Inventory of OAM items from MA When to use
The scope of this procedure is to list OAM items related to a MA. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item then select Search > Packet > OAM CC> OAM MAs. Result: The list window is displayed. ...................................................................................................................................................................................................
3
Select one item in the list and select Search > OAM MA. Result: The search menu is displayed. ...................................................................................................................................................................................................
4
Select one of OAM items related to a MA: •
MD
• •
MEP MIP Result: The list of the contained objects is displayed.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-26 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Inventory of OAM monitored objects from MA Management Maintenance Association (MA) ....................................................................................................................................................................................................................................
Inventory of OAM monitored objects from MA When to use
The scope of this procedure is to list objects monitored in a MA. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > OAM CC> OAM MDs. Result: The list window is displayed. ...................................................................................................................................................................................................
2
Select one item then select Search > Packet > OAM CC> OAM MAs. Result: The list window is displayed. ...................................................................................................................................................................................................
3
Select one item in the list and select Search > OAM MA. Result: The search menu is displayed. ...................................................................................................................................................................................................
4
Select one of the objects monitored in the MA: •
NEs
• •
EVC
•
Edge Port
Link Result: The list of the contained objects is displayed.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-27 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Management
Maintenance Activation on EVC
....................................................................................................................................................................................................................................
Maintenance Activation Maintenance Activation on EVC When to use
This function activates Ethernet OAM on the EVC. Related Information
Ethernet OAM can be activated: •
at EVC creation time
•
on an implemented EVC
Ethernet OAM can be activated on the following objects: •
EVC
• •
Link Edge Port
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu select Search > Packet > Services > Connection Less EVC (Bridge) > Bridge EVCs. ...................................................................................................................................................................................................
2
Select the object and select Action > Start CC. ...................................................................................................................................................................................................
3
Insert the following parameters: •
Priority. (from 0 to 7
•
Select Maintenance Domain
Click OK to confirm the action. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-28 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Management
Loopback activation
....................................................................................................................................................................................................................................
Loopback Loopback activation When to use
The scope of this procedure is to activate loopback. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Actions > Packet > List one of the objects • •
EVC termination Transport Link Termination
•
Edge Port
...................................................................................................................................................................................................
2
Select one item then select Actions > Activate Loopback. Result: The Activate Loopback window is displayed. ...................................................................................................................................................................................................
3
Select the attributes: •
Source EVC Termination.
•
Destination EVC Termination.
•
Use a Transport Link Termination.
•
Transport Link.
•
Transport Link Termination.
•
Priority.
•
Time out.
Click OK or Apply to confirm the operation. .................................................................................................................................................................................................................................... 1350 OMS 24-29 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Loopback activation Management Loopback ....................................................................................................................................................................................................................................
Result: Loopback report is shown. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-30 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Linktrace activation Management Linktrace ....................................................................................................................................................................................................................................
Linktrace Linktrace activation When to use
The scope of this procedure is to activate Linktrace. Related Information
For more information, refer to: “OAM main functions” (p. 24-3) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task ...................................................................................................................................................................................................
1
From the main menu bar select Actions > Packet > List one of the objects: •
EVC termination
...................................................................................................................................................................................................
2
Select one item then select Actions > Activate Linktrace. Result: The Activate Linktrace window is displayed. ...................................................................................................................................................................................................
3
Select the attributes: •
Source EVC Termination.
•
Destination EVC Termination.
•
Use a Transport Link Termination.
•
Time to Live.
Click OK or Apply to confirm the operation. Result: Linktrace report is shown. Link Trace Report attributes:
• •
Date
•
LtmSent
Priority
.................................................................................................................................................................................................................................... 1350 OMS 24-31 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Linktrace activation Management Linktrace ....................................................................................................................................................................................................................................
•
NE UL
• •
Port UL
•
MAC Address
•
Ltm Behaviour
Transport Link UL
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-32 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Overview Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Delay measurement and Loss measurement Overview Purpose
The tool measures the delay time and the packet loss on Ethernet and T-MPLS services. Contents Packet Delay measurement
24-34
Packet Loss measurement
24-35
Configure Maintenance End Points
24-36
List the OAM ETH DM Tool
24-38
List the OAM ETH SLM Tool
24-40
Create ETH DM Tool
24-42
Create ETH SLM Tool
24-44
Activate/Deactivate OAM ETH DM Tool
24-46
Activate/Deactivate OAM ETH SLM Tool
24-47
Inventory from OAM ETH DM Tool
24-48
Inventory from OAM ETH SLM Tool
24-49
Configure OAM ETH DM Tool
24-50
Configure OAM ETH SLM Tool
24-52
.................................................................................................................................................................................................................................... 1350 OMS 24-33 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Packet Delay measurement Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Packet Delay measurement Description
The tool counts the delivery time of packets. For the measurement, the tool uses a specific packet. Since delay depends on packet length, the user can set a packet length value or choose a randomly generated value. For measure accuracy, the Continuity Check (CC) periods must be less than 1 ms before starting the Packet Delay tool. The Packet Delay measurement applies on: • •
EVC T-MPLS Tunnel
The Packet Delay measurement collect data on: •
Forward, Backward, Round-trip time
•
Absolute and delay variation time
The tool uses Performance Monitoring counters. The tool results are reported by CPM. To use DM tool, execute the following main steps: • • • •
Activate the tool Configure the board Start PM on dedicated counters Retrieve results by CPM
.................................................................................................................................................................................................................................... 1350 OMS 24-34 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Packet Loss measurement Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Packet Loss measurement Description
The Packet Loss tool counts lost packets. For the measurement, the tool counts CC packets. Traffic loss is estimated from CC packet loss. For measure accuracy, the Continuity Check (CC) periods must be less than 1 ms before starting the Packet Loss tool. The Packet Loss measurement applies on: • •
Ethernet Services Tunnel T-MPLS
The Packet Loss tool uses Performance Monitoring counters. The Packet Loss tool results are reported by CPM. To use SLM tool, execute the following main steps: • • •
Activate the tool Configure the board Start PM on dedicated counters
•
Retrieve results by CPM
.................................................................................................................................................................................................................................... 1350 OMS 24-35 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Configure Maintenance End Points Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Configure Maintenance End Points When to use
This function Configure Maintenance End Points of T-MPLS Tunnels. Related Information
For more information, refer to “Packet Delay measurement” (p. 24-34). For more information, refer to “Packet Loss measurement” (p. 24-35). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > MPLS and T-MPLS > T-MPLS Tunnels. Result: The tunnel list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Configure Maintenance End Points. Result: The Configure Maintenance End Points window is shown. ...................................................................................................................................................................................................
3
To Configure Tunnel for Connectivity Verification, Packet Loss measurement, set the following attributes: •
Click the box Enable MEPs
•
Select Enable CV/SLM; (none, CV, SLM)
•
Select CV/SLM Direction
•
Select CV/SLM Period
•
Select CV/SLM PHB
•
Select Packet Loss Probability
•
Select SLM PM Granularity
•
Select SLM PM Policy
•
Click the box OAM Signal Degraded
.................................................................................................................................................................................................................................... 1350 OMS 24-36 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Configure Maintenance End Points Management Delay measurement and Loss measurement .................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
To Configure Tunnel for Delay measurement, set the following attributes: •
Click the box Enable DM
•
Select DM Period
•
Select DM PHB
•
Packet Length: Select one of the following options: – Click the box Random Packet Length
•
– Select Packet Length value Select DM Granularity
•
Select DM Policy
...................................................................................................................................................................................................
5
Click Ok button. Result: Tunnel OAM parameters are configured. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-37 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) List the OAM ETH DM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
List the OAM ETH DM Tool When to use
The List window shows all the ETH DM Tools and their attributes. Related Information
For more information, refer to “Packet Loss measurement” (p. 24-35). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > OAM CC> OAM MDs. Result: The list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Search > ETH DM Tools. Result: The list window is displayed.
The attributes displayed for each DM Tool are: • User Label. • EVC. • MD Name •
MA Name
•
CCM Priority
•
CCM Interval
•
Frame Size
•
PM 15M
•
PM 24H
•
PM Policy
.................................................................................................................................................................................................................................... 1350 OMS 24-38 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) List the OAM ETH DM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
•
Provisioning State
•
Availability State
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-39 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) List the OAM ETH SLM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
List the OAM ETH SLM Tool When to use
The List window shows all the ETH SLM Tools and their attributes. Related Information
For more information, refer to “Packet Loss measurement” (p. 24-35). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > OAM CC> OAM MDs. Result: The list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Search > ETH SLM Tools. Result: The list window is displayed.
The attributes displayed for each SLM Tool are: • Session Identifier. • EVC. • MD Name •
MA Name
•
CCM Priority
•
CCM Interval
•
PM Unidir 15M
•
PM Unidir 24H
•
PM Bidir 15M
•
PM Bidir 24H
•
PM Frame Loss 15M
•
PM Frame Loss 24H
.................................................................................................................................................................................................................................... 1350 OMS 24-40 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) List the OAM ETH SLM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
•
PM Policy
• •
Provisioning State Availability State
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-41 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Create ETH DM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Create ETH DM Tool When to use
This function creates ETH DM Tool for ETH over T-MPLS EVC. Related Information
For more information, refer to “Packet Delay measurement” (p. 24-34). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Ethernet over T-MPLS > T-MPLS EVCs. Result: The EVC list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Create ETH DM Tool. Result: The Create ETH DM Tool window is shown. ...................................................................................................................................................................................................
3
To configure the tool creation, set the following attributes: •
Select Source MEP from list
•
Select Destination MEP from list
•
Select Priority (Value: 0-7)
•
Select Interval (100 ms, 1 s, 10 s, 1 min, 10 min)
•
Frame Length: Select one of the following options: –
Click the box Random Frame Size
•
– Select Frame Size value Select PM 15Min
•
Select PM 24H
•
Select PM Policy (Keep, Purge on Stop, Purge on delete)
.................................................................................................................................................................................................................................... 1350 OMS 24-42 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Create ETH DM Tool Management Delay measurement and Loss measurement .................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Click Ok button. Result: DM Tool is created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-43 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Create ETH SLM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Create ETH SLM Tool When to use
This function creates ETH SLM Tool for ETH over T-MPLS EVC. Related Information
For more information, refer to “Packet Loss measurement” (p. 24-35). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Ethernet over T-MPLS > T-MPLS EVCs. Result: The EVC list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Create ETH SLM Tool. Result: The Create ETH DM Tool window is shown. ...................................................................................................................................................................................................
3
To Configure Tunnel for Connectivity Verification, Packet Loss measurement, set the following attributes: •
Select First MEP from list
•
Select Second MEP from list
•
Select Priority (Value: 0-7)
•
Insert Session Identifier
• •
Select Interval (100 microsec, 500 microsec, 1 ms, 3.33 ms, 10 ms, 100 ms) Click PM Unidir 15Min
•
Click PM Unidir 24H
•
Click PM Bidir 24H
•
Click PM Frame Loss 15Min
.................................................................................................................................................................................................................................... 1350 OMS 24-44 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Create ETH SLM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
•
Click PM Frame Loss 24H
•
Select PM Policy (Keep, Purge on Stop, Purge on delete)
...................................................................................................................................................................................................
4
Click Ok button. Result: SLM Tool is created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-45 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Activate/Deactivate OAM ETH DM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Activate/Deactivate OAM ETH DM Tool When to use
This function activates or deactivates ETH DM Tool. Related Information
For more information, refer to “Packet Delay measurement” (p. 24-34). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > OAM CC> ETH DM Tool. Result: The list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Activate. or: Select Action > Deactivate. Result: The DM Tool is activated/Deactivated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-46 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Activate/Deactivate OAM ETH SLM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Activate/Deactivate OAM ETH SLM Tool When to use
This function activates or deactivates ETH SLM Tool. Related Information
For more information, refer to “Packet Loss measurement” (p. 24-35). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > OAM CC> ETH SLM Tool. Result: The list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Activate. or: Select Action > Deactivate. Result: The SLM Tool is activated/Deactivated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-47 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Inventory from OAM ETH DM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Inventory from OAM ETH DM Tool When to use
This function shows object related to an ETH DM Tool. Related Information
For more information, refer to “Packet Delay measurement” (p. 24-34). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > OAM CC> ETH DM Tool. Result: The list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Search > Inventory . Result: The list of related resources is shown. ...................................................................................................................................................................................................
3
Select one type of object: •
ETS EVC
•
Bridge EVC
•
T-MPLS EVC
•
EVC Terminations
• •
OAM MA OAM MEP Result: The list of related object is shown
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-48 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Inventory from OAM ETH SLM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Inventory from OAM ETH SLM Tool When to use
This function shows object related to an ETH SLM Tool. Related Information
For more information, refer to “Packet Loss measurement” (p. 24-35). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > OAM CC> ETH SLM Tool. Result: The list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Search > Inventory . Result: The list of related resources is shown. ...................................................................................................................................................................................................
3
Select one type of object: •
ETS EVC
•
Bridge EVC
•
T-MPLS EVC
•
EVC Terminations
• •
OAM MA OAM MEP Result: The list of related object is shown
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-49 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Configure OAM ETH DM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Configure OAM ETH DM Tool When to use
This function configures ETH DM Tool. Related Information
For more information, refer to “Packet Delay measurement” (p. 24-34). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > OAM CC> ETH DM Tool. Result: The list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Configure. Result: The Configure ETH DM Tool window is shown. ...................................................................................................................................................................................................
3
To configure the tool, set the following attributes: •
The field ETH-DM Tool is not modifiable.
•
The field Source MEP is not modifiable.
•
Select Destination MEP from list
•
Select Interval (100 ms, 1 s, 10 s, 1 min, 10 min)
•
Frame Length: Select one of the following options: –
Click the box Random Frame Size
•
– Select Frame Size value Select PM 15Min
•
Select PM 24H
.................................................................................................................................................................................................................................... 1350 OMS 24-50 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Configure OAM ETH DM Tool Management Delay measurement and Loss measurement .................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Click Ok button. Result: DM Tool is modified. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-51 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Configure OAM ETH SLM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Configure OAM ETH SLM Tool When to use
This function configures ETH SLM Tool. Related Information
For more information, refer to “Packet Loss measurement” (p. 24-35). For general information about DM/SLM Tool, refer to “Delay measurement and Loss measurement” (p. 24-33). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > OAM CC> ETH SLM Tool. Result: The list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Configure. Result: The Configure ETH SLM Tool window is shown. ...................................................................................................................................................................................................
3
To configure the tool, set the following attributes: •
Select ETH-SLM Tool from list
•
The field Interval is not modifiable
•
The field Session Identifier is not modifiable
•
Click PM Unidir 15Min
• •
Click PM Unidir 24H Click PM Bidir 24H
•
Click PM Frame Loss 15Min
•
Click PM Frame Loss 24H
...................................................................................................................................................................................................
4
Click Ok button.
.................................................................................................................................................................................................................................... 1350 OMS 24-52 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Configure OAM ETH SLM Tool Management Delay measurement and Loss measurement ....................................................................................................................................................................................................................................
Result: SLM Tool is modified. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 24-53 8DG42227DAAA 9.6 Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Management
Configure OAM ETH SLM Tool
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 24-54 8DG42227DAAA 9.6 Issue 3 December 2012
25
25 Circuit Emulation Service Management
Overview Purpose
This document describes the management of circuit emulation capable devices in the scope of packet transport networks. Contents CES Overview
25-4
Circuit Emulation Services definition
25-4
TDM client synchronization
25-8
Protection setup after link creation
25-9
CAC tolerance and modulation mode
25-11
Resource assignment to Packet Radio domain
25-12
Resource assignment to T-MPLS domain
25-14
Packet Radio domain OAM and protections
25-17
Packet Radio performance monitoring
25-19
Packet Radio protection group
25-20
Loopback management
25-21
T-MPLS domain OAM and protections
25-22
Packet Radio domain QoS management
25-24
Packet Radio domain inter-working
25-25
T-MPLS domain inter-working
25-26
Circuit Emulation Service Management
25-27
MEF8 CES terminated service
25-33
Generic Circuit Emulation implementation
25-36
MEF8 Circuit Emulation Service implementation
25-38
SATOP Circuit Emulation Service implementation
25-43
Generic Circuit Emulation Service OAM and protections
25-45
................................................................................................................................................................................................................................... 1350 OMS 25-1 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management
Overview
....................................................................................................................................................................................................................................
MEF8 Circuit Emulation Service OAM and protections
25-46
SATOP Circuit Emulation Service OAM and protections
25-48
Circuit Emulation AAR Network Operation
25-50
CES Takeover description
25-52
CES Procedures
25-53
Circuit Emulation Service graphical inventory
25-55
View the list of CES Domains (Packet Radio)
25-58
View the details of CES Domain (Packet Radio)
25-59
Inventory from CES Domain (Packet Radio)
25-60
Create CES Domain (Packet Radio)
25-61
Assign/Deassign resources to Packet Radio Domain
25-62
Assign/Deassign resources to T-MPLS Domain
25-63
View the list of CES NEs
25-64
Description of the list of CES NEs
25-65
View the details of CES NE
25-66
Details of CES NE
25-67
Inventory from CES NE
25-68
Inventory from Protection Group
25-70
View the list of CES Transport Links
25-71
Description of the list of CES Transport Links
25-72
View the details of CES Transport Link
25-73
Details of the CES Transport Link
25-74
Inventory from CES Transport Link
25-75
Inventory from CES Transport Link extremity
25-76
View the list of CES PDH Ports
25-78
Description of the list of CES PDH Ports
25-79
View the details of CES PDH Port
25-82
Details of CES PDH Port
25-83
Inventory from CES PDH Port
25-84
List CES Edge Ports
25-85
Description of the list of CES Port
25-86
View the details of CES Edge Port
25-87
Details of CES Port
25-88
Inventory from CES Edge Port
25-89
View the list of CES Links Over Radio
25-90
.................................................................................................................................................................................................................................... 1350 OMS 25-2 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management
Overview
....................................................................................................................................................................................................................................
Description of the list of CES Links Over Radio
25-91
View the details of CES Link Over Radio
25-92
Details of CES Link Over Radio
25-93
Inventory from CES Link Over Radio
25-94
Synchronization of CES Link Over Radio
25-96
View the list of CES Radio Ports
25-97
Description of the list of CES Radio Ports
25-98
View the details of CES Radio Port
25-99
Details of CES Radio Port
25-100
Inventory from CES Radio Port
25-101
View the list of CES VLAN Paths
25-102
Description of the list of CES VLAN Paths
25-103
Join CES tunnels
25-104
Stitch CES tunnels
25-105
View the list of Circuit Emulation Services
25-106
Description of the list of Circuit Emulation Services
25-107
View the list of CES Terminations
25-114
Description of the list of CES Terminations
25-115
Create Circuit Emulation Service
25-122
Inventory from CES
25-126
Configure CES
25-127
Routing display of CES
25-130
Configure CES terminations
25-131
Takeover procedure for MEF8 CES
25-132
Takeover procedure for SATOP CES
25-134
.................................................................................................................................................................................................................................... 1350 OMS 25-3 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation Services definition
....................................................................................................................................................................................................................................
CES Overview Circuit Emulation Services definition Supported network scenarios
Circuit emulation services are typically deployed in the scope of mobile back-hauling network scenarios. Figure 25-1 Mobile back-hauling scenario
The packet radio domain covers the access network, while the aggregation network can be: •
an SDH/SONET network inter-working at TDM level
•
another packet domain (e.g. T-MPLS, ETS) inter-working at Ethernet level
Network layering
The circuit emulation layer is a service layer that uses the Ethernet layer as underlying transport layer in the access network, where the physical transport is based on microwaves.
.................................................................................................................................................................................................................................... 1350 OMS 25-4 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation Services definition
....................................................................................................................................................................................................................................
Figure 25-2 Network layers in case of unterminated CE service
PKT manages both E1 terminated services covering the first scenario and also unterminated services covering the latter. When the access network does not need radio links, the T-MPLS domain may cover both the access and the aggregation networks. CES infrastructure
Circuit Emulation Services can be transported over Packet Radio technology or, over T-MPLS technology. To prepare the transport infrastructure, the user has to assign the transport resources (links or ports) to the relevant transport domain (Packet Radio or T-MPLS). Then, the system automatically configures the resources for Circuit Emulation Service support. The resources available as infrastructure at the CES layer, are shown as follows: • • •
the Packet Radio or T-MPLS domain is mirrored into CES domain the Link over Radio/Link over Cable or Link over T-MPLS is mirrored into CES transport link the PDH or Ethernet Port is mirrored into CES port
.................................................................................................................................................................................................................................... 1350 OMS 25-5 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation Services definition
....................................................................................................................................................................................................................................
Figure 25-3 Transport Layer representation
Supported External Products
Circuit Emulation Services supports the following products: •
•
9500 MPR family products: – 9500 MPR R1.3 – 9500 MPR R1.4 – 9500 MPR R2.1 TSS family products: – – –
TSS-5C R1.0 TSS-5C R7.x TSS-320 R4.0
.................................................................................................................................................................................................................................... 1350 OMS 25-6 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation Services definition
....................................................................................................................................................................................................................................
External Interfaces
PKT handles the following management interfaces: •
towards 9500 MPR
•
– NMD-IM Q3 (for the NE equipment) – CSG IDL (for port synchronization, transmission alarms and service provisioning) towards TSS – –
NMD-IM SNMP (for the equipment) CSG IDL (for port synchronization, transmission alarms and service provisioning)
TDM traffic encapsulation
The packetized TDM traffic is encapsulated according to one of the following standards: • •
MEF 8 IETF SAToP
MEF 8 vs. SAToP encapsulation
Comparing MEF8 and SATOP encapsulation types, it is clear that - from the switching point of view - the ECID label plays the role of the PW label, while the SVLAN plays the role of the LSP tunnel label. The transport of end-to-end TDM service in the Packet Radio network is based on MEF 8 encapsulation. In case of MEF8 encapsulation, the ECID identifies the emulated circuit being carried. This separates the identification of the emulated circuit from the Ethernet layer. ECID have local significance only, and are associated with a specific MAC address. In case of MEF8 over Packet Radio, the mapping between ECID and VLAN is 1:1.In case of MEF8 over 802.1ad, the packet can have single or double VLAN tag In case of MEF8 over T-MPLS, the packet can be untagged or single-tagged.
.................................................................................................................................................................................................................................... 1350 OMS 25-7 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
TDM client synchronization
....................................................................................................................................................................................................................................
TDM client synchronization Synchronization between CES terminations
Synchronization between CES terminations is needed at the termination where the TDM signal is reconstructed from the packets, using the following alternative options: • • •
clock recovered from the TDM network interface (TDM line timing) external reference clock source (External timing) recovering the clock from the packet network interface (Packet line timing). Timing recovery from Packet line relies on Synchronous Ethernet boards
Timing information is extracted from: •
the TDM network interface we have “synchronous” timing, where TDM clients must be traceable to the same synchronization source. In synchronous timing, synchronization network clock is available at TDM client (TDM end systems), not from the packet transport network (PTN). No TDM frequency transparency is required over the PTN
•
the packet network interface we have: –
–
“differential timing”, where the clock is recovered from a combination of data contained in the frames, and knowledge of a reference clock common to both CES edge nodes. In differential timing method, synchronization clock is available at node edges of PTN (CES edge nodes) and requires TDM frequency transparency through the PTN “adaptive timing”, where the clock is recovered from data in the frames, and the arrival time of the frames. The adaptive timing is required when no common clock is available for CES edge nodes or TDM clients. This method relies on the measuring the mean rate of packet arrivals to establish the rate of TDM interface at egress and does not require network synchronization or timing protocols (i.e. RTP), but requires TDM frequency transparency through the PTN
.................................................................................................................................................................................................................................... 1350 OMS 25-8 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Protection setup after link creation
....................................................................................................................................................................................................................................
Protection setup after link creation Workaround to setup the protection after link creation
Because of the change in the port naming rule, the user is recommended to avoid setting up protections before the radio links are taken in charge by NMS. If it is required to setup the protection after link creation in the NMS, the following user procedure must be used as workaround: • • • • •
Manually deassign the radio link from CE domain (automatic unlock sent to NPR) Manually remove the radio link from NPR (object deletion sent by NPR to PKT) -> if needed, PKT automatically deletes the radio link Manually resynchronize ports from NPR: unprotected port is deleted and protecting port is created Manually resynchronize ports from PKT: unprotected port is deleted and protecting port is created Manually create radio link in NPR (object creation sent by NPR to PKT): PKT automatically creates the protecting radio link (since it is a protecting one, assignment to CE domain is forbidden)
Protection schemes
There are two protection schemes: • •
1+1 HSB (hot standby) 1+1 FD (frequency diversity)
.................................................................................................................................................................................................................................... 1350 OMS 25-9 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Protection setup after link creation
....................................................................................................................................................................................................................................
Figure 25-4 CES 9500 MPR Protection schemes
.................................................................................................................................................................................................................................... 1350 OMS 25-10 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
CAC tolerance and modulation mode
....................................................................................................................................................................................................................................
CAC tolerance and modulation mode Relation between CAC tolerance and modulation mode
The modification of the CAC tolerance implies to update the homonymous attribute on all domain nodes. The modification of the CAC tolerance impacts the way CAC checks are performed on radio ports, in accordance with the modulation mode, as summarized by the following picture. Figure 25-5 CES Relation between CAC tolerance and modulation mode
The loose CAC tolerance is meaningful only in case of adaptive radio modulation mode. In such case, CAC for TDM2TDM and TDM2ETH traffic is performed with respect to the peak bandwidth. In case of loose CAC tolerance, if the effective bandwidth is reduced to the minimum capacity, all TDM2TDM and TDM2ETH traffic is disconnected and only ETH2ETH traffic is preserved. In case of adaptive modulation mode and strict CAC tolerance, CAC for TDM2TDM and TDM2ETH traffic is performed with respect to the 4QAM bandwidth, while the peak bandwidth is exploited only by ETH2ETH services. In all cases, ifSpeed reports the correct capacity value for CAC.
.................................................................................................................................................................................................................................... 1350 OMS 25-11 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Resource assignment to Packet Radio domain
....................................................................................................................................................................................................................................
Resource assignment to Packet Radio domain Port assignment to Packet Radio domain
The user selects one MPR PDH or Ethernet port and assigns it to Packet Radio domain. The assigned port is automatically inserted in the scope of the Packet Radio domain as edge port. In case of Ethernet physical port, it is automatically activated by the system. The following table summarizes the port technologies that can be assigned at the edge of a Packet Radio domain. Port technology
Can be assigned as edge port
Ethernet
Yes
Radio
No
PDH
Yes
Port deassignment from Packet Radio domain
The user selects one MPR PDH or Ethernet port and deassigns it from Packet Radio domain. The deassigned port is automatically removed from the scope of the Packet Radio domain as edge port. PKT checks that there are no supported services using that port, i.e. that the used bandwidth is zero for this port. The used bandwidth is set by the manager that is responsible for service provisioning on this port. Transport Link assignment to Packet Radio domain
The user selects one link over radio or link over cable and assigns it to Packet Radio domain. The assigned link is automatically inserted in the scope of the Packet Radio domain as transport link. One protecting radio link (as recognized by means of the naming rule) cannot be assigned to the Packet Radio domain. In case of link over cable, its Ethernet terminations are automatically activated by the system (if not already active). When the manager allocates one service over the TL, it increments the link reserved CIR in order to lock the link and prevent its deletion. Transport Link deassignment from Packet Radio domain
The user selects one link over radio or link over cable and deassigns it from Packet Radio domain. The deassigned link is automatically removed from the scope of the Packet Radio domain as transport link. PKT checks that no services use that transport link. In case of link over cable, its Ethernet terminations are not automatically deactivated by the system, since it is not known if they support inband DCN.
.................................................................................................................................................................................................................................... 1350 OMS 25-12 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Resource assignment to Packet Radio domain
....................................................................................................................................................................................................................................
Transport Link manual synchronization
PKT supports the manual synchronization of the CE transport link: •
in case of cable transport technology, the synchronize command is disabled
•
in case of radio transport technology, the synchronize command is enabled and uploads the available bandwidth from both radio ports: in case of mismatch, the minimum value is reported on the transport link and a warning message is returned to the user
DCN inband management
MPR does not manage opticsIMIfDataManagementPlaneLabel MIB object. Currently inband DCN is configured at commissioning time via dedicated VLAN that MPR does not recognizes as dedicated to DCN. The CPU is connected to one Ethernet physical port that has been characterized as DCN port via proprietary tables
.................................................................................................................................................................................................................................... 1350 OMS 25-13 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Resource assignment to T-MPLS domain
....................................................................................................................................................................................................................................
Resource assignment to T-MPLS domain TSS-5C PDH Port assignment to T-MPLS domain
The user selects one TSS-5C PDH port and assigns it to T-MPLS domain; then it is inserted as CES port under the T-MPLS domain. No change with respect to common TSS behavior is foreseen about the assignment of TSS-5C Ethernet physical ports and SDH terminations to T-MPLS domain. TSS-5C ETH Port assignment to T-MPLS domain
In case of Ethernet physical port, it is a port shared for Ethernet and CE services and therefore it is inserted both as ETH edge port and CES port under the T-MPLS domain. PKT manages the reserved bandwidth for Ethernet and CE services: • •
CIR allocated for EVC CIR allocated for CES
PKT sums up the reserved CIR allocated by each manager and locks the port preventing deassignment from T-MPLS domain. It is up to the user to ensure that the bandwidth reserved for EVC and for CES do not exceed the interface rate. The following table summarizes the different services that are supported at the edge of a T-MPLS domain Port technology
When assigned to T-MPLS domain, it must inserted into
Ethernet
T-MPLS edge port list, CES port list
PDH
CES port list
TSS-5C Port deassignment from T-MPLS domain
The user selects one TSS-5C PDH or Ethernet port and deassigns it from T-MPLS domain. PKT checks that there are no supported services using that port. The deassigned port is automatically removed from the scope of the T-MPLS domain as: •
CES port and T-MPLS edge port, in case of Ethernet physical port
•
CES port, in case of PDH port
Link over T-MPLS reservation for CES
When one T-MPLS PW gets implemented, it is automatically inserted in the list of Links over T-MPLS. Each link over T-MPLS must be used alternatively either for EVC or for CES. The management of the following attributes must be introduced in the Link over T-MPLS: •
Supported service: EVC, CES
.................................................................................................................................................................................................................................... 1350 OMS 25-14 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Resource assignment to T-MPLS domain
....................................................................................................................................................................................................................................
The link over T-MPLS is inserted in: • •
when the supported service is EVC: it is inserted in the Ethernet transport link list when the supported service is CES: it is inserted in the CES transport link list and T-MPLS PW terminations are inserted into CES port list (with interface type = T-MPLS)
When allocating the CES over the Link over T-MPLS, PKT updates the reserved CIR/PIR/CBS/PBS as follows: • •
reserved PIR = reserved CIR = ΣCES CIR , where the sum extends to all CES allocated over this Link reserved PBS = reserved CBS = ΣCES CBS , where the sum extends to all CES allocated over this Link
When the reserved bandwidth parameters are different from zero, the T-MPLS PW can not be deimplemented, therefore preventing CES transport link removal. Management of T-MPLS PW control word and supported service
The following attributes are introduced in the T-MPLS PW: • •
Supported service: EVC (default), CES Control word: disabled (default), enabled
The supported service can be configured by user at any time, even when the T-MPLS PW is implemented. The supported service is meaningful only inside PKT scope: •
when the supported service is EVC, the corresponding Link over T-MPLS is notified only to Ethernet manager
•
when the supported service is CES, the corresponding Link over T-MPLS is notified only to CES manager
From PKT architecture point of view, changing the supported service implies to move the Link over T-MPLS from one manager’s scope to the other. Therefore, the supported service cannot be modified if any of the Link over T-MPLS bandwidth parameters (reserved CIR, reserved PIR, reserved CBS, reserved PBS) is different from zero. When the supported service is EVC, the user has the option to configure also the control word enabling/disabling, independently of the T-MPLS PW’s configuration status (allocated or implemented). When the supported service is CES, then: • •
the control word is automatically enabled by PKT the PW bandwidth parameters are pre-filled by PW creation wizard with the following default values (the user can modify them): –
CIR = PIR = 2432 Kbit/s
–
CBS = PBS = 2900 bytes (2*MTU as suggested value)
The above values allow to support one CE service for all possible values of payload size (independently from the underlying layer).
.................................................................................................................................................................................................................................... 1350 OMS 25-15 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Resource assignment to T-MPLS domain
....................................................................................................................................................................................................................................
The control word is provisioned to the NE via TL1 only to the T-MPLS PW termination segments. TSS-5C NE configure timestamp frequency
The system supports the configuration of the RTP timestamp frequency, used by CE services with differential timing mode and RTP enabled. The system checks that there are no implemented CES on the TSS NE to be configured. The TSS-5C timestamp frequency supported range is: • • •
77.76 MHz 25 MHz (default) 16.384 MHz
.................................................................................................................................................................................................................................... 1350 OMS 25-16 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Packet Radio domain OAM and protections
....................................................................................................................................................................................................................................
Packet Radio domain OAM and protections Alarm correlation
PKT manages reports the elementary alarms generated by MPR and also correlates them to transport resources. The alarm correlation can be: • •
horizontal: the originating alarmed resource is an elementary object and the correlated resource is a transport object at the same layer vertical: the originating alarmed is resource is a transport object and the correlated resource is a transport object at the client layer
Figure 25-6 Horizontal and vertical alarm correlation in Packet Radio domain
Both horizontal and vertical correlation are always enabled on Packet Radio domain. The availability status of the client transport object has the value: •
transport failure, in case of horizontal correlation
•
server transport failure, in case of vertical correlation
.................................................................................................................................................................................................................................... 1350 OMS 25-17 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Packet Radio domain OAM and protections
....................................................................................................................................................................................................................................
MPR R1.4 URU alarm management
Since R1.4 MPR sends URU in the following cases and on the following objects: •
All E1 TTP in case of PDH card failure
• •
All Radio TTP in case of Radio card failure All E1 TTP, radio TTP and MAU entries in case of Core card failure (apart from radio TTP involved only in MPT to MPT connections switched by the same RAD_ACC) The involved MAU entry in case of SFP failure
•
PKT correlates the URU to the impacted CE services according to the following propagation chain: •
Horizontal: URU on PDH port (PDH card failure) -> CES transport failure
•
Vertical: URU on Radio/ETH port (Radio card failure or SFP failure) -> Radio/Cable link transport failure -> VLAN tunnel server transport failure -> CES server transport failure
Elementary alarms on 9500MPR PDH ports
PKT receives via CSG the elementary alarms on PDH ports and persists them in database. At PKT startup the PDH elementary alarms are automatically resynchronized. The Underlying Resource Unavailable (URU) alarm represents equipment failures (e.g. card missing) that affect services. Alarms on PDH ports are synchronized from active problem table PKT correlates horizontally the PDH port failure to the impacted CES •
LOS on PDH port -> CES transport failure
Since MPR R2.1, the LosCesFrame alarm is supported on PDH port. The LosCesFrame alarm replaces the LOF alarm on CES termination supported by MPR R1.4. Elementary alarms on 9500MPR radio ports
PKT receives via CSG the elementary alarms on radio ports and persists them in database. At PKT startup the radio elementary alarms are automatically resynchronized. PKT correlates vertically the Radio elementary alarms to the impacted CE services according to the following propagation chain: •
alarm (e.g. cableLoss) on Radio port -> Radio link transport failure -> VLAN tunnel server transport failure -> CES server transport failure
.................................................................................................................................................................................................................................... 1350 OMS 25-18 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Packet Radio performance monitoring
....................................................................................................................................................................................................................................
Packet Radio performance monitoring 9500MPR PDH port performance monitoring
The operator can enable PM on a given CES at creation time or manually later, specifying the desired granularity: 15min or 24h. The enabling is performed via navigation to JUSM. MPR supports current and historical counters on the PDH ports for monitoring both the incoming and outgoing E1 signal. They are persisted in NE agent cache memory. The management has to start/stop one counter for each direction. So PM counters are available to monitor the signal in both directions at the edge of the MPR network in case of PDH edge port. PDH measures are currently stored by NMS in the same database as SDH measures, different from the Ethernet database. An architectural evolution of the CPM component for PKT is required to manage PDH PM. 9500MPR Radio port performance monitoring
Managed via navigation to JUSM. MPR supports 15min/24h maintenance counters on radio ports. EMLIM elaborates historical counters via periodic samples. At radio level it is possible to monitor both the single radio link termination and the radio link protected termination. It is also possible to monitor the Ethernet packets enqueued in the queues assigned to pass-through Ethernet services. MPR supports only free running maintenance counters on Ethernet queues of radio ports. All these counters are available only in transmission. PKT is not requested to manage PM counters on radio ports. 9500MPR Ethernet port performance monitoring
Managed via navigation to JUSM. MPR supports only free running maintenance counters on Ethernet ports. EMLIM currently does not elaborate historical counters via periodic samples. These counters are available both in transmission and reception. PKT not requested to manage maintenance counters.
.................................................................................................................................................................................................................................... 1350 OMS 25-19 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Packet Radio protection group
....................................................................................................................................................................................................................................
Packet Radio protection group Radio protection group switch commands via navigation
The operation of the radio protection group switch position is managed via navigation to JUSM Switch position synchronization of single radio protection group
The operator is allowed to select one protection group and to start manually the synchronization operation of the switch position for the selected protection group. PKT retrieves and updates the current active switch position, the current switch command, the current switch criteria and re-triggers alarm correlation for the involved radio links and supported services.
.................................................................................................................................................................................................................................... 1350 OMS 25-20 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Loopback management
....................................................................................................................................................................................................................................
Loopback management 9500MPR Loopback management
PDH loopback is a loop and continue -> only one traffic direction is impacted. When the PDH loopback is activated, MPR sends an event telling which is the involved port, the direction and the type (internal, external). Radio loopback is a simple loop -> both traffic directions are affected. When the Radio loopback is activated on ODU300 access, MPR sends an event telling which is the involved radio port, the direction and the type (internal, external). In order to alert the operator that the loopback operation has affected the traffic: •
In case of simple loop, MPR sends LOF on the CES termination that does not receive the signal (loop and AIS insertion - so that AIS alarm would be raised on egress PDH port - is not supported)
•
In case of loop and continue, no alarm is raised but the port state reports on JUSM the active loopback (the loopback activation event is not managed by PKT)
Switch position synchronization of single radio protection group
The operator is allowed to select one protection group and to start manually the synchronization operation of the switch position for the selected protection group. PKT retrieves and updates the current active switch position, the current switch command, the current switch criteria and re-triggers alarm correlation for the involved radio links and supported services.
.................................................................................................................................................................................................................................... 1350 OMS 25-21 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
T-MPLS domain OAM and protections
....................................................................................................................................................................................................................................
T-MPLS domain OAM and protections TSS-5C PDH Port assignment to T-MPLS domain
PKT manages reports the elementary alarms generated by TSS and also correlates them to transport resources. The alarm correlation can be: • •
horizontal: the originating alarmed resource is an elementary object and the correlated resource is a transport object at the same layer vertical: the originating alarmed is resource is a transport object and the correlated resource is a transport object at the client layer
Figure 25-7 Horizontal and vertical alarm correlation in T-MPLS domain
Vertical correlation is always enabled on T-MPLS domain: • •
from PW to MPLS Tunnel from ETH CES port to CES
Horizontal correlation is always enabled on T-MPLS domain: • •
from PDH CES port to CES from CES Termination to CES
The availability status of the client transport object has the value: •
transport failure, in case of horizontal correlation
•
server transport failure, in case of vertical correlation
.................................................................................................................................................................................................................................... 1350 OMS 25-22 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
T-MPLS domain OAM and protections
....................................................................................................................................................................................................................................
TSS-5C NE configure PDH degrade thresholds
The system supports the configuration of the degrade thresholds, that are used to generate and clear the degrade alarm on PDH ports. The system checks that there are no implemented CES on the TSS NE to be configured. The supported ranges and default values are: • • • •
PDH degrade observation interval range: 2-10 seconds PDH degrade observation interval default: 5 seconds PDH degrade raise threshold range: 0-1000 errors PDH degrade raise threshold default: 30 errors
• •
PDH degrade clear threshold range: 0-1000 errors PDH degrade clear threshold default: 20 errors
The raise threshold must be strictly higher than the clear threshold. Elementary alarms on TSS-5C PDH ports
PKT receives via CSG the elementary alarms on PDH ports and persists them in database. At PKT startup the PDH elementary alarms are automatically resynchronized. PKT correlates horizontally the PDH port failure to the impacted CES, e.g.: •
LOS on PDH port -> CES transport failure
Elementary alarms on TSS-5C Ethernet ports
PKT receives via CSG the elementary alarms on Ethernet ports and persists them in database. At PKT startup the Ethernet elementary alarms are automatically resynchronized. PKT correlates vertically the ETH elementary alarms to the impacted CE services according to the following propagation chain: • •
Edge port: alarm (e.g. LOS) on ETH port -> CES server transport failure Link over cable : alarm (e.g. LOS) on ETH port -> Cable link transport failure -> Tunnel server transport failure -> CES server transport failure
Correlation of elementary alarms to link over PDH
PKT correlates elementary PDH interface alarms to link over PDH, if any.
.................................................................................................................................................................................................................................... 1350 OMS 25-23 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Packet Radio domain QoS management
....................................................................................................................................................................................................................................
Packet Radio domain QoS management Provisioning of ports (via navigation)
The configuration of specific PDH interface characteristics that are independent of the CE service are supported via navigation to MPR JUSM. The configuration of all Radio interface characteristics that are independent of the CE service are supported via navigation to MPR JUSM.
.................................................................................................................................................................................................................................... 1350 OMS 25-24 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Packet Radio domain inter-working
....................................................................................................................................................................................................................................
Packet Radio domain inter-working inter-working
The Packet Radio domain can physically interwork with other domains either at the PDH or Ethernet level. Table 25-1
Allowed interface type, depending on link technology
Link technology
Interface type NNI
IWI
Link over radio
Yes
No
Link over cable
Yes
Yes
Link over PDH
No
Yes
In particular, a link over cable or a link over PDH can be used as the domain inter-working interface in the cases described by the following RATS. • • • •
PKT is requested to manage inter-working Ethernet cable links between Packet Radio domain and ETS domain. PKT is requested to manage inter-working Ethernet cable links between Packet Radio domain and T-MPLS domain. PKT is requested to manage inter-working Ethernet cable links between Packet Radio domain and PB domain. PKT is requested to manage inter-working PDH cable links between Packet Radio domain and SDH domain. The SDH domain is managed by SDH application. The PDH IWI cable is uploaded from NPR.
E2E PDH: Manual synchronization of PDH inter-working links
PKT manages the upload via NPR-NBI of PDH links that terminate e.g. on 9500MPR or on TSS NE’s. The upload is triggered manually by operator, as in the link over cable case. NPR creates the PDH IWI link characterizing it with PDH technology. The NPR message response contains, for each extremity, the node userlabel and the port userlabel. PKT ensures that in DB both nodes that terminate the PDH link are present: one of them is e.g. the MPR/TSS NE, while the other could be any OMSN NE or other not-managed NE. PKT gets via NPR-NBI also the NE type and Node ID of the not-managed NE. E2E PDH: Management of network role on PDH port
When the operator assigns one PDH port as edge port to the Packet Radio domain, the network role has the following values: •
UNI -> when there is not PDH IWI link
•
E-NNI -> when the PDH port is the termination of a PDH IWI link
CE manager must be aware of the PDH network role since this network role is reported in the CES routing display. .................................................................................................................................................................................................................................... 1350 OMS 25-25 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
T-MPLS domain inter-working
....................................................................................................................................................................................................................................
T-MPLS domain inter-working Management of inter-domain link: T-MPLS domain – SDH domain
PKT is requested to manage inter-working PDH cable links between T-MPLS domain and SDH domain. The SDH domain is managed by SDH application. The PDH IWI cable is uploaded from NPR.
.................................................................................................................................................................................................................................... 1350 OMS 25-26 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation Service Management
....................................................................................................................................................................................................................................
Circuit Emulation Service Management Circuit Emulation Service security
PKT supports the capability to prevent the setup of misconnections. Port segregation
Port segregation is supported by MPR both on Ethernet and radio ports. If more than two ports must be segregated, one MIB entry is created for each segregated port pair. Generic Circuit Emulation Service creation and allocation
A Circuit Emulation Service is a transport connection between remote E1 ports, where the PDH stream is segmented and encapsulated into Ethernet packets. The service can be terminated by PDH ports at both ends or unterminated: in the latter case the PDH stream is not reconstructed at one service termination and the PDH traffic is forwarded to the client equipment either encapsulated into Ethernet packets or into channelized STM-n. The service CIR is automatically computed by PKT: •
based on interface type, service profile and clock source in case of MEF-8
•
based on payload size in case of SATOP, CBS is not managed in case of MEF-8.
Manual join a tunnel to a CES
The Tunnel is the object that represents the transport route within a given domain. The CES itself is the transport object that can represent the routing across different domains: • •
The different domains are the nodes of the routing graph The Tunnel is the connectivity inside one graph node
Two different Tunnels associated to distinct domains (no e2e Tunnel is created) can be manually joined or stitched to the CES in order to realize one e2e CES: •
Join is possible if one Tunnel already supporting CES and the Tunnel being joined are connected by one transport link
•
Stitch is possible if one Tunnel already supporting CES and the Tunnel being stitched share one logical port
Because of Tunnel join or stitching, one CES can be supported by one or many Tunnels and one Tunnel can support one or more CES. Tunnel joined to CES: after join, the CES is supported by one tunnel in each crossed domain and the two tunnels are connected by one transport link
.................................................................................................................................................................................................................................... 1350 OMS 25-27 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation Service Management
....................................................................................................................................................................................................................................
Figure 25-8 CES after join
Tunnel stitched to CES: after stitching, the CES is supported by one tunnel in each crossed domain and the two tunnels share the same logical E1 port Figure 25-9 CES after stich
.................................................................................................................................................................................................................................... 1350 OMS 25-28 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation Service Management
....................................................................................................................................................................................................................................
After tunnel join or stich, no new e2e CES object is created, but the e2e CES preserves the identity of the CES across a single domain: • •
When the CES is supported by one single Tunnel, then it is a CES fragment When the CES is supported by many Tunnels (i.e. it joins or stitches different Tunnel fragments), then it is an e2e CES
The Tunnel is created in PKT database when the service is created. At service creation time, PKT creates one pair of Tunnel segments in each crossed NE. At service creation time, PKT creates one XC in each crossed NE. Management of CES CoS and encapsulation type
The following new attributes are introduced on CES: •
CoS: G, G2, R1, R, R3, R4, BE, BK
• •
Encapsulation type: MEF8, SATOP Transport type: CesOverPacketRadio, CesOverT-MPLS
The Class of Service (CoS) is configurable only in case of CesOverT-MPLS. The encapsulation type and transport type are automatically computed by PKT depending on the underlying transport domain: Table 25-2
Relation between CES transport type and encapsulation type
Domain
Transport type
Encapsulation type
Packet Radio
CesOverPacketRadio
MEF8
T-MPLS
CesOverT-MPLS
SATOP
CES CoS compatibility check with T-MPLS PW PHB Profile
The CES CoS specified by operator at CES creation time must be compatible with the PHB Profile of the supporting T-MPLS PW – aka Link over T-MPLS. In fact, if a 5-classes PHB Profile was associated to the T-MPLS PW, then not all CoS are not supported. Table 25-3
CoS supported vs. T-MPLS PHB Profile
CoS
Supported in PHB Profile #1
Supported in PHB Profile #2
G
Y
Y
G2
Y
Y
R1
N
Y
R(2)
Y
Y
R3
N
Y
R4
Y
Y
BE
Y
Y
.................................................................................................................................................................................................................................... 1350 OMS 25-29 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation Service Management
....................................................................................................................................................................................................................................
Table 25-3
CoS supported vs. T-MPLS PHB Profile
(continued)
CoS
Supported in PHB Profile #1
Supported in PHB Profile #2
BK
N
Y
PKT does not check that: • •
the requested CES CoS is compatible with the supported CoS of the selected Link over T-MPLS (bottom-up CES creation) the automatically created Link over T-MPLS supports the requested CES CoS (top-down CES creation)
If the operator chooses one CoS that is not supported by the T-MPLS PW, then the CES traffic will be treated as belonging to the nearest lower supported CoS when forwarded in the T-MPLS network. Management of tunnel type
The Tunnel creation: • • •
in case of MEF8 over Packet Radio domain, PKT creates Packet-Radio Tunnel in case of SATOP over T-MPLS domain, PKT creates T-MPLS Tunnel in case of MEF8 over 802.1ad or T-MPLS domain (where it corresponds to one p2p EVC), PKT creates Ethernet Tunnel
•
in case of PDH over SDH domain (where it corresponds to one SDH Path), PKT creates SDH Tunnel
Therefore the Tunnel is characterized by a type that is automatically computed by PKT according to the underlying transport technology: Packet-Radio, T-MPLS, ETH, SDH. Routing display of CES
The operator can open the graphical routing display of one CES. PKT shows the CES routing display in two layers: •
CES (i.e. PW) layer: it shows the crossed Tunnel
•
Tunnel layer: it shows all crossed link over radio or link over cable or link over T-MPLS
At the CES layer, the following resources are displayed: •
Edge nodes (A and Z)
• • •
Edge ports (PDH port or physical Ethernet) CES terminations Tunnel termination segments
•
Tunnel
.................................................................................................................................................................................................................................... 1350 OMS 25-30 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation Service Management
....................................................................................................................................................................................................................................
At the Tunnel layer, the following resources are displayed: • • • • •
Edge and transit nodes NNI ports (Radio port or physical Ethernet or logical T-MPLS PW terminations) of edge and transit nodes Radio links (in case of 1+1 protection, the radio link with working protection role is displayed) or cable links or T-MPLS links: Tunnel segments (termination and intermediate) Cross-connections between tunnel segments
PKT shows graphically the above resources by means of a dedicated icon: clicking on the icon, the resource properties are displayed. Figure 25-10 CES routing display
.................................................................................................................................................................................................................................... 1350 OMS 25-31 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation Service Management
....................................................................................................................................................................................................................................
Figure 25-11 Tunnel routing display
Manual deallocation and deletion of CES
PKT manages the unreservation of database resources for selected CE service and the CE service removal from database. The CES deallocation triggers the automatic Tunnel deallocation. The CES deletion triggers the automatic Tunnel deletion.
.................................................................................................................................................................................................................................... 1350 OMS 25-32 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
MEF8 CES terminated service
....................................................................................................................................................................................................................................
MEF8 CES terminated service Basic creation and allocation over Packet Radio
PKT is requested to support the following service profiles (corresponding to a particular radio compression): • •
TDM2TDM TDM2ETH
TDM services are switched on local MAC address basis (each PDH board is assigned an internal MAC address). The default service profile that is proposed to the operator is: • •
TDM2TDM for terminated services TDM2ETH for unterminated services
In case of underlying radio infrastructure, the operator can select any service profile. In case of underlying Ethernet physical infrastructure (link over cable or edge port), only the TDM2ETH service profile is admitted. The TDM2TDM service is characterized by one specific VLAN on network basis. MPR supports TDM2TDM services with proprietary encapsulation, i.e. not MEF-8. For this reason a TDM2TDM service profile must be terminated at the edge of the MPR network. Therefore, in case of unterminated CES, the TDM2ETH service profile must be used and the MAC DA of the Ethernet frame outgoing from one GE interface must manually configured by operator. Details
The main service characteristic is the VLAN ID (in the range 2..4080): it is selected by operator or it can be automatically selected by the system. VLAN ID must be unique per service in all MPR network, otherwise loss of E1 signal could occur. In case of TDM2TDM service profile, the PW label (aka ECID) is automatically computed by MPR and is 1:1 with the service VLAN. In case of TDM2ETH service profile, the ECID can be selected by operator for each service direction. The following CES attributes can always be modified upon operator request: • • •
userlabel service group comment1/comment2/comment3
• •
text1/text2/text3 signal mode to framed/unframed
The following CES attributes can be modified only when the CES is defined: • •
ECID A->Z ECID Z->A
•
Destination MAC address
.................................................................................................................................................................................................................................... 1350 OMS 25-33 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
MEF8 CES terminated service
....................................................................................................................................................................................................................................
All MEF8 CES terminations of all PDH ports belonging to the same card must be configured with the same TDM clock source type. The service creation fails if another service already exists that terminates on the same E1 card and has a different type. Two ports belong to the same card if their slot number “x” is the same; the card slot number is represented in the port’s ifIndex: “60 ‘x’ ‘nn’”. The NE MAC address is used as source address in case of TDM2ETH service profile and is configured by the management system as destination address of the remote NE. In case of TDM2TDM NE MAC address is never used. MPR does not support one MAC address per Ethernet interface. The TDM clock source has to be configured in the NE at XC creation time. The ECID Tx identifies uniquely the PDH destination port in the scope of the card. In fact, the core unit switches packets based on VLAN, while the PDH card switches packets based on ECID Tx. Each CES has an associated Packet-Radio tunnel, representing the Ethernet infrastructure for circuit emulation. In case of MPR NE, the association between CES and Tunnel is 1:1. PKT is requested to apply admission control checks at allocation time. The bandwidth reserved on a given port depends on port technology and also on service characteristics. A new MIB object has been introduced representing the allocated bandwidth for one E1 service over one radio interface: cesCfgBandwidth on opticsIMCESoEthMIB. This MIB object is used to provide the E1 bandwidth occupation vs the radio interface. In general, however, the bandwidth reserved by the service on each interface depends on interface type, service profile and TDM clock source according to the following table. Table 25-4
E1 service bandwidth occupation for MPR R1.3/R1.4
Interface
Service Profile
TDM clock source
Service CIR [Mbit/sec]
Radio
TDM2TDM
Differential
22.852
Radio
TDM2ETH
Differential
22.569
Radio
TDM2ETH
Adaptive
21.844
Ethernet
TDM2ETH
Differential
25.443
Ethernet
TDM2ETH
Adaptive
24.482
The TDM2TDM encapsulation occupies more bandwidth than TDM2ETH one, since it incorporates also some protection overhead. In particular, in case of TDM2ETH service profile, E1 service bandwidth occupation depends also on RTP presence or not. RTP presence depends on TDM clock source value: • •
differential -> RTP present adaptive -> RTP not present
.................................................................................................................................................................................................................................... 1350 OMS 25-34 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
MEF8 CES terminated service
....................................................................................................................................................................................................................................
At allocation time, PKT creates one XC in each crossed NE. MEF8 CES allocation over Packet Radio on MPT radio ports
The bandwidth reserved by one E1 signal is different for ODU300 and MPT ODU. The bandwidth occupied by one E1 signal is computed from a configuration table, using as inputs the following parameters: • •
radio interface type service profile (TDM2TDM, TDM2ETH)
•
TDM clock source (differential, adaptive)
Table 25-5
E1 service bandwidth occupation since MPR R2.1
Interface type
Service Profile
TDM clock source
Service CIR [Mbit/sec]
Radio ODU300
TDM2TDM
Differential
22.852
Radio ODU300
TDM2ETH
Differential
22.569
Radio ODU300
TDM2ETH
Adaptive
21.844
Radio MPT
TDM2TDM
Differential
21.667
Radio MPT
TDM2ETH
Differential
22.579
Radio MPT
TDM2ETH
Adaptive
21.853
Ethernet
TDM2ETH
Differential
25.443
Ethernet
TDM2ETH
Adaptive
24.482
.................................................................................................................................................................................................................................... 1350 OMS 25-35 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Generic Circuit Emulation implementation
....................................................................................................................................................................................................................................
Generic Circuit Emulation implementation relationships between E1 and PW tables
The following picture shows the relationships between E1 and PW tables – depending on NE type – both in case of MEF-8 and SATOP services. Figure 25-12 SNMP MIB relationships between E1 and PW tables
Manual deimplementation of CES
PKT manages the removal of provisioned CE connectivity in the network. The CES deimplementation triggers the automatic Tunnel deimplementation. In case of MPR NE, the automatic pwCTDMCfg deletion is implemented by NE agent when PKT requests the pw deletion: if the pwCGenTDMCfgIndex value of associated pwCTDMTable entry is no longer contained in any other pwCGenTDMCfgIndex object, then the referenced pwCTDMCfgTable entry (that indexed by pwCGenTDMCfgIndex value) has to be deleted.
.................................................................................................................................................................................................................................... 1350 OMS 25-36 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Generic Circuit Emulation implementation
....................................................................................................................................................................................................................................
In case of TSS NE, it is manager (PKT, ZIC) responsibility to maintain 1:1 association between pwEntry and pwCTDMCfgEntry. Therefore PKT will be in charge of explicit pwCTDMCfgEntry deletion. If ZIC allows to reuse the same pwCTDMCfgEntry for two different pw entries, this will cause a failure when PKT tries to deimplement (i.e. delete in the NE) one those services. PKT operator workaround to overcome failure: •
run an audit: the failed service connection will be recognized as allocated (i.e. deleted in the NE)
•
retry the deimplementation of the failed service: the deimplementation will be successful the second time
.................................................................................................................................................................................................................................... 1350 OMS 25-37 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
MEF8 Circuit Emulation Service implementation
....................................................................................................................................................................................................................................
MEF8 Circuit Emulation Service implementation flows supported by 9500MPR NE
When implementing the MEF-8 service, PKT is requested to configure the following flow connections in the 9500MPR NE: • • •
PDH to Radio Radio to Radio Radio to Ethernet
•
PDH to Ethernet
MEF8 CES terminated service implementation
TDM2TDM service profile provisioning PDH To Radio Traffic Flow
The system automatically performs the following provisioning steps: • •
configuration of the PDH port signal mode to unframed/framed Tunnel Termination Segment Creation via SNMP: – creation of Ethernet ingress flow associated to PDH port (service ID = PDH port ifIndex, service type = Ethernet) and corresponding to tunnel termination –
•
creation of TC associated to the VLAN assigned by operator that has to be pushed and represented by the corresponding tunnel segment attribute – creation of CES over Ethernet profile corresponding to the service profile pointing to the ingress flow and represented by the corresponding tunnel segment attribute Tunnel Segment Creation via SNMP: –
• •
creation of Ethernet egress flow associated to Radio port (server ID = Radio port ifIndex, service type = Ethernet) and corresponding to tunnel segment creation of cross-connection between tunnel segments CES termination profile creation via SNMP: nothing to be provisioned
• •
CES termination creation via SNMP: nothing to be provisioned Tunnel Termination Segment Configuration via SNMP: nothing to be provisioned
Radio To Radio Traffic Flow
The provisioning sequence is the same as above. Radio To PDH Traffic Flow
The provisioning sequence is unchanged. Radio To Ethernet Traffic Flow
Ethernet to Radio connection is not allowed in case of TDM2TDM service profile. PDH To Ethernet Traffic Flow
Ethernet to Radio connection is not allowed in case of TDM2TDM service profile.
.................................................................................................................................................................................................................................... 1350 OMS 25-38 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
MEF8 Circuit Emulation Service implementation
....................................................................................................................................................................................................................................
Ethernet To Radio Traffic Flow
Ethernet to Radio connection is not allowed in case of TDM2TDM service profile. MEF8 CES unterminated service implementation
TDM2ETH service provisioning PDH To Radio Traffic Flow (MPR NE)
In case of MPR NE, the system automatically performs the following provisioning steps: • •
configuration of the PDH port signal mode to unframed/framed CES Termination Profile Creation via SNMP: – creation of PW TDM CFG object (fixed payload size = 256, fixed RTP header = true, TDM clock source specified by operator and represented by corresponding CES termination attribute)
•
CES Termination Creation via SNMP: – creation of a PW entry (fixed type = e1Satop(17), ifIndex of the PDH port) -> as a side effect, the NE creates automatically one PW TDM entry that PKT has to configure (TDMboundPWlabel = ECID Rx, PSNboundPWlabel = ECID Tx, PW TDM CFG reference to previously created entry) according to corresponding CES termination attributes Tunnel Termination Segment Creation via SNMP: – creation of Ethernet ingress flow associated to PDH port (service ID = PDH port ifIndex, service type = Ethernet) and corresponding to tunnel termination – creation of TC associated to the VLAN assigned by operator that has to pushed and represented by corresponding tunnel segment attribute
•
–
•
•
creation of CES over Ethernet profile corresponding to the service profile pointing to the ingress flow and to the PW entry (CESCfgPwIndex is set to point to pwIndex) and characterized by tunnel segment’s service profile attribute. Tunnel Segment Creation via SNMP: – creation of Ethernet egress flow associated to Radio port (server ID = Radio port ifIndex, service type = Ethernet) and corresponding to tunnel segment creation of cross-connection between tunnel segments
.................................................................................................................................................................................................................................... 1350 OMS 25-39 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
MEF8 Circuit Emulation Service implementation
....................................................................................................................................................................................................................................
PDH To Radio Traffic Flow (TSS NE)
In case of TSS NE, the system will perform automatically the following provisioning steps: • •
configuration of the PDH port signal mode to unframed/framed Tunnel Termination Segment Creation via SNMP: – creation of Ethernet ingress flow associated to PDH port (service ID = PDH port ifIndex, service type = Ethernet) and corresponding to tunnel termination –
•
• •
•
creation of TC associated to the VLAN assigned by operator that has to pushed and represented by corresponding tunnel segment attribute – creation of CES over Ethernet profile corresponding to the service profile pointing to the ingress flow and characterized by tunnel segment’s service profile attribute. CESCfgPwIndex is not initialized Tunnel Segment Creation via SNMP: – creation of Ethernet egress flow associated to Radio port (server ID = Radio port ifIndex, service type = Ethernet) and corresponding to tunnel segment creation of cross-connection between tunnel segments Ces Termination Profile Creation via SNMP: – creation of PW TDM CFG object (fixed payload size = 256, fixed RTP header = true, TDM clock source specified by operator and represented by corresponding CES termination attribute) CES Termination Creation via SNMP: –
•
creation of a PW entry (fixed type = E1SATOP, ifIndex of the PDH port) -> as a side effect, the NE creates automatically one PW TDM entry that PKT has to configure (TDMboundPWlabel = ECID Rx, PSNboundPWlabel = ECID Tx, PW TDM CFG reference to previously created entry) according to corresponding CES termination attributes Tunnel Termination Segment Configuration via SNMP: – CESCfgPwIndex is set to point to pwIndex
MEF8 CES terminated service implementation
TDM2TDM service profile provisioning PDH To Radio Traffic Flow
The system automatically performs the following provisioning steps: • •
configuration of the PDH port signal mode to unframed/framed Tunnel Termination Segment Creation via SNMP: – creation of Ethernet ingress flow associated to PDH port (service ID = PDH port ifIndex, service type = Ethernet) and corresponding to tunnel termination – –
creation of TC associated to the VLAN assigned by operator that has to be pushed and represented by the corresponding tunnel segment attribute creation of CES over Ethernet profile corresponding to the service profile pointing to the ingress flow and represented by the corresponding tunnel segment attribute
.................................................................................................................................................................................................................................... 1350 OMS 25-40 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
MEF8 Circuit Emulation Service implementation
....................................................................................................................................................................................................................................
•
Tunnel Segment Creation via SNMP: – creation of Ethernet egress flow associated to Radio port (server ID = Radio port ifIndex, service type = Ethernet) and corresponding to tunnel segment
• • • •
creation of cross-connection between tunnel segments CES termination profile creation via SNMP: nothing to be provisioned CES termination creation via SNMP: nothing to be provisioned Tunnel Termination Segment Configuration via SNMP: nothing to be provisioned
Radio To Radio Traffic Flow
The provisioning sequence is the same as above with the exception that ECID Tx/Rx values must not be provisioned (NE configures automatically the zero value). MPR requires the configuration of TDM clock source, payload size and RTP header also on transit nodes: these attributes are conventionally aligned in the scope of the XC object (only in case of transit node and TDM2ETH service profile). Radio To Ethernet Traffic Flow
The provisioning sequence is the same as for the PDH-Radio cross-connection with the addition of the destination MAC address provisioning in the PW table and with the exception that ECID Tx/Rx values must not be provisioned (NE configures automatically the zero value). PDH To Ethernet Traffic Flow
The provisioning sequence is the same as for the PDH-Radio cross-connection with the addition of the destination MAC address provisioning in the PW table. Ethernet To Radio Traffic Flow
MPR does not allow to configure a VLAN range at an Ethernet input port for association to one service flow, but only one single specific VLAN. Ethernet to Radio connection is allowed in case of TDM2ETH service profile. It is a MEF-8 encapsulation with VLAN tag (EtherType 0x8100). It is configured in the same way as radio to Ethernet traffic flow. Radio available bandwidth management during MEF8 CES implementation
The radioPDHTTPBidAvailableBandwith object is used to check if a cross-connection of a TDM signal to/from Radio Direction is feasible (Connection Admission Control) and it is updated automatically by the NE when the cross-connection is created or deleted. CE manager is requested to manage the available bandwidth on Radio ports since the NE also supports ATM services that contend for bandwidth with CE services. In fact, the CAC checks performed by CE manager at allocation time ensure that there is enough available bandwidth on the radio links selected by the routing algorithm, as far as only circuit emulation services are concerned.
.................................................................................................................................................................................................................................... 1350 OMS 25-41 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
MEF8 Circuit Emulation Service implementation
....................................................................................................................................................................................................................................
CE manager is therefore requested to implement the following behavior: • • • •
upload the available bandwidth of the radio port, when the radio link is notified to the Packet Radio domain automatically synchronize the available bandwidth of the radio port during audit operation support manual synchronization of available bandwidth on CE transport link with radio transport technology synchronize the available bandwidth of the radio port before starting CES implementation, for all radio ports along the CES route
The available bandwidth attribute is reported on CE transport links belonging to Packet Radio domain, together with the reserved bandwidth for CE services. MEF8 CES configuration
For a TDM2TDM CES, PKT allows the configuration of the following CES attributes: •
signal mode to framed/unframed (also at run-time)
• •
VLAN (only if the CES is defined) PM enabling/granularity (also at run-time)
Signal mode configuration to framed/unframed is not traffic impacting and it is performed in both PDH ports. VLAN ID is reconfigured in the tunnel segments. PM enabling and granularity is reconfigured in the PDH CES terminations. PM enabling and granularity is reconfigured in the PDH CES terminations. • •
ECID A->Z/ Z->A (only when the CES is defined) destination MAC address (only when the CES is defined)
•
TDM clock source (only when the CES is defined or allocated)
ECID A->Z/ Z->A and destination MAC address are reconfigured in both CES terminations. TDM clock source is reconfigured in both CES terminations. MEF8 CES termination configuration
The CES termination configuration allows to modify the following attributes. For a CES of TDM2TDM service profile, PKT allows to configure the following CES termination attributes: •
PM enabling/granularity
For a defined CES of TDM2ETH service profile, PKT allows additionally to configure the following PW termination attributes: •
destination MAC address
ECID Tx/Rx and TDM clock source are reconfigured only on CES basis. .................................................................................................................................................................................................................................... 1350 OMS 25-42 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
SATOP Circuit Emulation Service implementation
....................................................................................................................................................................................................................................
SATOP Circuit Emulation Service implementation Connections configured by PKT
When implementing the SATOP service, PKT is requested to configure only the following flow connections in the TSS-5C NE: • •
PDH TO T-MPLS T-MPLS TO PDH
SATOP CES implementation
It is assumed that the operator has already provisioned via PKT the required T-MPLS infrastructure for transporting the service across the T-MPLS domain; this implies that PKT has already performed via TL1 the PW segment creation with the following characteristics: • •
Control word set to ‘Enable’ Status set to ‘On’
The PW is requested to be verified as not already used by Ethernet over T-MPLS services. The system automatically performs the following provisioning steps: 1. PDH port configuration, consisting of below settings (without ordered sequence) consisting of below settings (without ordered sequence) • [only in case of TSS-5C] Signal mode provisioning to a value different from ‘disabled’ via SNMP • Administrative status provisioning to ‘up’ via SNMP 2. CES profile entry creation (pwCTDMCfgTable) – if not already existing - with setting of payload size, clock source and other profile parameters 3. CES termination creation consisting of below settings: • pwIndex retrieval via SNMP GET-NEXT operation • •
pwEntry entry creation via SNMP by management action, including pwType configuration to: e1Satop pwIfIndex is set equal to ifIndex of the ifEntry associated with the PW (computed from TL1 PW AID according to the well-known naming rule)
• The NE automatically creates one pwCTDMTable entry 4. CES termination configuration and activation consisting of below settings: • pwCTDMIfIndex must point to E1 ifIndex • pwCGenTDMCfgIndex must point to CES profile entry •
set of pwCTDMClassOfService and other PW parameters to the value requested by operator
.................................................................................................................................................................................................................................... 1350 OMS 25-43 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
SATOP Circuit Emulation Service implementation
....................................................................................................................................................................................................................................
• •
pwRowStatus set to ‘up’ value The NE automatically configures pwCTDMBandwidth according to payload size and underlying layer of output PW interface and performs both CAC and QoS checks between SNMP PW and TL1 PW
.................................................................................................................................................................................................................................... 1350 OMS 25-44 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Generic Circuit Emulation Service OAM and protections
....................................................................................................................................................................................................................................
Generic Circuit Emulation Service OAM and protections CES termination alarms enabling/disabling
The alarms on the PDH port are automatically: • •
enabled when setting the PDH port signal mode to framed/unframed/framedFAS/framedCRC disabled when setting the PDH port signal mode to disabled
It is not possible to suppress alarm notifications related to Ethernet ports. Correlation of PDH port alarms to supported services
PKT manages the PDH port alarms horizontal correlation to CES. In case of unterminated CES, PKT manages the Ethernet port alarm vertical correlation to CES. Correlation of CES termination alarms to service
PKT manages the horizontal correlation of CES termination’s loss of frame to CES availability status transport failure. CES fault localization
In case of faulty CE service, PKT manages the inventory of elementary alarms affecting the service. The fault localization operates in the reverse direction of the correlation process. The CES fault localization must take into account the value of the CES availability status. In case of transport failure, the root cause is a PDH port alarm or a CES termination alarm. In case of server transport failure, the root cause could be: • • •
a radio port alarm an Ethernet port alarm a T-MPLS PW alarm
LOF on CES termination is also generated as the consequence of remote fault on a radio/cable link. Since the radio link failure does not trigger the automatic AIS insertion in the PDH signal (or FDI insertion in the VLAN tunnel), then the NE that terminates the CES does not receive any signal and therefore generates the LOF alarm on CES termination. PKT must therefore be able to inform the operator that the CES failure is due to the server layer (radio/cable) fault and that it is not due to the PDH layer fault. This is achieved introducing a new fault probable cause in the availability status, i.e. the server transport failure.
.................................................................................................................................................................................................................................... 1350 OMS 25-45 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
MEF8 Circuit Emulation Service OAM and protections
....................................................................................................................................................................................................................................
MEF8 Circuit Emulation Service OAM and protections Elementary alarms on MEF8 CES termination
The following table shows the elementary alarms managed on the MEF8 CES termination. Table 25-6 SNMP table CESoETHCfgTable
MEF8 CES termination alarms
NE Probable Cause
Description
PKT object
opticsIMAlarmLossOfFrameRaise
Loss of frame
CES termination
PKT Probable Cause LOF
PKT severity (fixed ASAP) Major
PKT manages the horizontal correlation of CES termination alarms towards the impacted CES: •
LOF on CES termination -> transport failure of CES
Correlation of link over radio alarms to supported services
Correlation of link over radio alarms to supported services (vertical correlation) is ALWAYS performed. PKT has to vertically correlate the radio link failure to the impacted services (keeping into account the radio protection switch position). The vertical correlation is performed by means of vertical alarm propagation from layer to layer: • •
from radio link to VLAN tunnel from VLAN tunnel to CES
The vertical correlation is performed according to two different algorithms, depending whether the radio link is protected or unprotected. Due to the vertically correlated alarm, the CES availability status indicates that there is a server transport failure. Vertical correlation in case of unprotected radio linkThe CES is in failure if there is a radio link failure: •
Unprotected link over radio failure -> server transport failure on VLAN tunnel -> server transport failure on CES
The CES is degraded if there is a radio link degrade: •
Unprotected link over radio degrade -> server transport degrade on VLAN tunnel -> server transport degrade on CES
Vertical Correlation In Case Of Protected Radio Link
The CES is in failure only if there is a LossProt on main radio port: •
LossProt on main radio port -> server transport failure on VLAN tunnel -> server transport failure on CES
.................................................................................................................................................................................................................................... 1350 OMS 25-46 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
MEF8 Circuit Emulation Service OAM and protections
....................................................................................................................................................................................................................................
The CES is degraded only if there is NOT a LossProt on main radio port and if there is a degrade on both main and spare radio links: • •
Link over radio double degrade (or single failure + single degrade) -> server transport degrade on VLAN tunnel -> server transport degrade on CES Link over radio single failure -> no propagation to VLAN tunnel and CES
•
Link over radio single degrade -> no propagation to VLAN tunnel and CES
PKT triggers the vertical correlation from radio link transport failure to client VLAN tunnels and CES as follows: • •
Link over radio double failure -> server transport failure on VLAN tunnel -> server transport failure on CES Link over radio double degrade (or single failure + single degrade) or single failure -> server transport degrade on VLAN tunnel -> server transport degrade on CES
In the last case, the CES degrade must be interpreted as a warning for the user to perform the fault localization to check if the CES is really impacted or not, since the NE does not notify if the active link is faulty or not. LossProt alarm on protected Radio port
Since R2.1 and in case of radio link protection, MPR supports the LossProt alarm on main radio port. The LossProt alarm is not propagated to the radio link. PKT reports this alarm on the radio port and correlates it directly to the client VLAN tunnel and CES.
.................................................................................................................................................................................................................................... 1350 OMS 25-47 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
SATOP Circuit Emulation Service OAM and protections
....................................................................................................................................................................................................................................
SATOP Circuit Emulation Service OAM and protections Elementary alarms on SATOP CES termination
The following table shows the elementary alarms managed on the SATOP CES termination Table 25-7
SATOP CES termination alarms
SNMP table
NE Probable Cause
Description
pwCTDMTable (NOT SUPPORTED)
opticsIMAlarmJitterBufferOverrunRaise
Jitter buffer overrun: the number of times an over-run condition has occurred exceeded threshold.
pwCTDMTable
opticsIMAlarmJitterBufferUnderrunRaise
Jitter buffer underrun: the number of times an under-run condition has occurred exceeded threshold.
pwCTDMTable
opticsimAlarmMalformedFramesRaise
pwCTDMTable
PKT PKT object Probable Cause
PKT severity (fixed ASAP)
CES termination
JBO
Major
CES termination
JBU
Major
Malformed frames: The malformed packet counter resets every 1sec. If the threshold is not reached within the 1sec period, the alarm is not reported
CES termination
MAF
Major
opticsIMAlarmStraypacketsRaise
Stray packets: The stray packet counter resets every 1sec. If the threshold is not reached within the 1sec period, the alarm is not reported
CES termination
SPKT Major
pwCTDMTable
opticsIMAlarmExcessivepacketLossRaise
Excessive packet loss: By the end of each monitoring window, the packet loss rate is compared with threshold value. If the threshold is reached for 3 continuous window time, the alarm is reported
CES termination
ELOP Major
pwCTDMTable
opticsIMAlarmRemotepacketlossRaise
Remote packet loss: When remote packet loss happen (receive valid packets with R-bit set) for 3 continous seconds, the alarm is reported. The alarm is cleared if there is no remote packet loss for 10 seconds
CES termination
RLOP Major
pwCTDMTable
opticsIMAlarmInvalidTdmDataRaise
Invalid TDM data: L bit is set in SAToP Control Word, it indicate that TDM data carried in the payload is invalid due to an attachment circuit fault. L bit is cleared in SAToP Control Word
CES termination
INTD Major
The counter resets every 1sec. If the threshold is not reached within the 1sec period, the alarm is not reported
The counter resets every 1sec. If the threshold is not reached within the 1sec period, the alarm is not reported.
.................................................................................................................................................................................................................................... 1350 OMS 25-48 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
SATOP Circuit Emulation Service OAM and protections
....................................................................................................................................................................................................................................
PKT manages the horizontal correlation of CES termination alarms towards the impacted CES, e.g.: •
LOF on CES termination -> transport failure of CES
Circuit Emulation Service QoS management
The CE service class by default is transported by guaranteed packet traffic.
.................................................................................................................................................................................................................................... 1350 OMS 25-49 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation AAR Network Operation
....................................................................................................................................................................................................................................
Circuit Emulation AAR Network Operation Audit of 9500 MPR NE
PKT compares the resource attributes in database with the NE attributes and marks the resource consistency status according to the comparison result: • •
normal not-aligned
The audit of CE resources is in charge of CE manager and it is integrated in the scope of the global AAR procedure. The audited CE resources are: • •
CE node CE port CE ports include – CE edge ports (PDH or Ethernet) – CE transport link extremities (Ethernet only)
•
Tunnel XC Tunnel XCs include: – – –
Tunnel segments Tunnel cross-connects CE service terminations
For audit purposes, all Tunnel segment and CES termination attributes are mirrored in the tunnel XC. Audit of TSS-5C NE
The audit of T-MPLS PW terminations is performed by T-MPLS manager. The audited CE resources are: • •
CE node CE ports, including: CE edge ports (PDH)
•
Tunnel XC including: CE service terminations
For audit purposes, all CES termination attributes are mirrored in the tunnel XC. Audit: ATM Xconn upload
During the audit operation, the upload involves the cross-connection with ATM2ATM or ATM2ETH service profile, that are synchronized and stored in PKT database. The retrieved ATM Xconns are visualized in the Xconn list retrievable from the containing Packet Radio node. The operator can then inspect the VLANID used by each ATM Xconn. ATM Xconns are ignored by force-align down and Takeover operations. .................................................................................................................................................................................................................................... 1350 OMS 25-50 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
Circuit Emulation AAR Network Operation
....................................................................................................................................................................................................................................
Alignment: 9500 MPR NE align down
PKT creates in the NE resources that are missing in the NE and present in the database. PKT marks the resource consistency status according to the alignment result: • •
normal failed-to-align
Alignment: 9500 MPR NE forced align down
PKT creates in the NE resources that are missing in the NE and present in the database and, in case of conflicting values related to resources present in both databases, aligns the NE value to the NMS value. PKT marks the resource consistency status according to the alignment result: • •
normal failed-to-align
Alignment: TSS-5C NE forced align down
PKT forced align down procedure apply to TSS-5C NE.
.................................................................................................................................................................................................................................... 1350 OMS 25-51 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Overview
CES Takeover description
....................................................................................................................................................................................................................................
CES Takeover description Reservation: 9500 MPR NE
PKT creates in database resources that are present in the NE and missing in NMS database. PKT marks the consistency status of the uploaded resources as “reserved”. Reservation: TSS-5C NE
Starting from CES NE, the user can retrieve all discovered XCs: the XC attributes include the SNMP PW attributes uploaded from NE. MEF8 CES Takeover
PKT is requested to upload MEF8 CES connectivity already implemented in the network and to display it to the user. The Takeover procedure works in PKT database exploiting the “reserved” resources. At the end of the procedure, those resources that have been successfully recognized as components of the recovered CES connectivity are marked as normal. The Takeover operation can be started on: •
CES port: the system discovers automatically all services crossing the port
•
CES node: the system discovers automatically all services crossing the node
The algorithm pursues on VLANID and service profile basis the discovered cross-connections in that port (or node) continuing the discovery in the adjacent node, until an edge port is reached. SATOP CES Takeover
The Takeover procedure is applied to SATOP CES, assuming that the T-MPLS PW infrastructure has been already discovered and assigned to CES Domain.
.................................................................................................................................................................................................................................... 1350 OMS 25-52 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Overview
....................................................................................................................................................................................................................................
CES Procedures Purpose
This section provides an information about the CES procedures. Contents Circuit Emulation Service graphical inventory
25-55
View the list of CES Domains (Packet Radio)
25-58
View the details of CES Domain (Packet Radio)
25-59
Inventory from CES Domain (Packet Radio)
25-60
Create CES Domain (Packet Radio)
25-61
Assign/Deassign resources to Packet Radio Domain
25-62
Assign/Deassign resources to T-MPLS Domain
25-63
View the list of CES NEs
25-64
Description of the list of CES NEs
25-65
View the details of CES NE
25-66
Details of CES NE
25-67
Inventory from CES NE
25-68
Inventory from Protection Group
25-70
View the list of CES Transport Links
25-71
Description of the list of CES Transport Links
25-72
View the details of CES Transport Link
25-73
Details of the CES Transport Link
25-74
Inventory from CES Transport Link
25-75
Inventory from CES Transport Link extremity
25-76
View the list of CES PDH Ports
25-78
Description of the list of CES PDH Ports
25-79
View the details of CES PDH Port
25-82
Details of CES PDH Port
25-83
Inventory from CES PDH Port
25-84
List CES Edge Ports
25-85
Description of the list of CES Port
25-86
View the details of CES Edge Port
25-87
Details of CES Port
25-88
Inventory from CES Edge Port
25-89
.................................................................................................................................................................................................................................... 1350 OMS 25-53 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures ....................................................................................................................................................................................................................................
View the list of CES Links Over Radio
25-90
Description of the list of CES Links Over Radio
25-91
View the details of CES Link Over Radio
25-92
Details of CES Link Over Radio
25-93
Inventory from CES Link Over Radio
25-94
Synchronization of CES Link Over Radio
25-96
View the list of CES Radio Ports
25-97
Description of the list of CES Radio Ports
25-98
View the details of CES Radio Port
25-99
Details of CES Radio Port
25-100
Inventory from CES Radio Port
25-101
View the list of CES VLAN Paths
25-102
Description of the list of CES VLAN Paths
25-103
Join CES tunnels
25-104
Stitch CES tunnels
25-105
View the list of Circuit Emulation Services
25-106
Description of the list of Circuit Emulation Services
25-107
View the list of CES Terminations
25-114
Description of the list of CES Terminations
25-115
Create Circuit Emulation Service
25-122
Inventory from CES
25-126
Configure CES
25-127
Routing display of CES
25-130
Configure CES terminations
25-131
Takeover procedure for MEF8 CES
25-132
Takeover procedure for SATOP CES
25-134
.................................................................................................................................................................................................................................... 1350 OMS 25-54 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Circuit Emulation Service graphical inventory
....................................................................................................................................................................................................................................
Circuit Emulation Service graphical inventory E2E PDH: Navigation toward SDH manager
The operator can navigate from one CES towards the associated SDH path if the following conditions are verified: • • •
the SDH path has been already manually implemented the CES termination corresponds to the local termination of one Link over PDH the SDH path termination corresponds to the remote termination of the same Link over PDH
In order to start the navigation towards SDH GUI server and open the SDH path routing display, the operator has to open the CES routing display, select the SDH network icon and right-click. The navigation command is enabled only if the above conditions are true. Show properties of Tunnel
PKT manages the display of Tunnel properties listed in: •
Table 25-8, “Generic Tunnel attributes.” (p. 25-55)
•
Table 25-9, “Packet Radio Tunnel attributes” (p. 25-56)
•
There are no specific T-MPLS Tunnel attributes.
Table 25-8 PKT attr name
Generic Tunnel attributes.
PKT attr val
Comment
Description
Userlabel
String
Automatically computed by PKT by VLAN conversion to string
Friendly name
Configuration state
{defined, allocated, implemented}
It tells whether the needed resources has been reserved or not, in database only or also in the network
Target configuration state
Availability status
{normal, server-transportfailure}
Type
{Packet-Radio, T-MPLS, Ethernet, Sdh}
Alarm status
It represents the Tunnel transport layer
Tunnel type
The following table shows the specific Packet-Radio tunnel attributes.
.................................................................................................................................................................................................................................... 1350 OMS 25-55 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Circuit Emulation Service graphical inventory
....................................................................................................................................................................................................................................
Table 25-9 PKT attr name VLAN-ID
Packet Radio Tunnel attributes PKT attr val
feb-80
Comment Operator: not modifiable after service creation.
Description Ethernet tunnel identifier
Tunnel label.
Listing of tunnels
PKT manages the list of all tunnels, filterable by domain Inventory from tunnel
PKT manages the inventory of: • •
the supported CE services the server CE transport links
The inventory is started selecting the tunnel and then right-click to open the desired target list. Show properties of tunnel segment
Tunnel segments can be retrieved from dedicated inventory (from transport link extremity or from edge port) or tunnel routing display PKT manages the display of CE termination properties listed in: •
Table 25-10, “Generic Tunnel segment attributes” (p. 25-56)
•
“MEF8 CES termination attributes” (p. 25-116)
•
There are no specific T-MPLS Tunnel segment attributes.
Table 25-10 PKT attr name
Generic Tunnel segment attributes
PKT attr val
Configuration state
{defined, allocated, implemented}
Alarm status
{normal, server-transport-failure}
Consistency status
{normal, not-aligned, failed-to-align}
Comment
Description
It tells whether the needed resources has been reserved or not, in database only or also in the network
Target configuration state Alarm status
Download disable management
MIB alignment between NMS and NE
.................................................................................................................................................................................................................................... 1350 OMS 25-56 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Circuit Emulation Service graphical inventory
....................................................................................................................................................................................................................................
Tunnel Xconn attributes Table 25-11 PKT attr name
Generic Tunnel Xconn attributes
PKT attr val
Master
SNMP table
SNMP attr name
SNMP attr val
Description
Configuration state
{defined, allocated, implemented}
PKT
Target configuration state
Consistency status
{normal, not-aligned, failed-to-align}
PKT
MIB alignment between NMS and NE
.................................................................................................................................................................................................................................... 1350 OMS 25-57 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the list of CES Domains (Packet Radio)
....................................................................................................................................................................................................................................
View the list of CES Domains (Packet Radio) When to use
The function lists the CES Domains. Related information
PKT manages the display of all Packet Radio domains For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Services menu is shown. ...................................................................................................................................................................................................
2
Select Circuit Emulation > CES Domain. Result: The CES Domain list is shown.
The attributes displayed for each domain are: • User Label. • CAC tolerance. (strict, loose). Connection admission control policy. Meaningful only in case of CES over Packet Radio. • Transport type. (CesOverPacketRadio, CesOverT-MPLS). Server Transport technology. • Minimun Vlan Type • Maximum Vlan Type E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-58 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the details of CES Domain (Packet Radio)
....................................................................................................................................................................................................................................
View the details of CES Domain (Packet Radio) When to use
The function show the properties of a CES Domain. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > CES Domain. Result: The CES Domain list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Circuit Emulation > Properties. Result: The CES Domain Properties window is shown.
The attributes displayed for each domain are: • User Label. • CAC tolerance. (strict, loose). Connection admission control policy. Meaningful only in case of CES over Packet Radio. • Transport type. (CesOverPacketRadio, CesOverT-MPLS). Server Transport technology. • Minimun Vlan Type • Maximum Vlan Type E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-59 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES Domain (Packet Radio)
....................................................................................................................................................................................................................................
Inventory from CES Domain (Packet Radio) When to use
The function lists objects related to a CES Domain . Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Inventory from Packet Radio domain
PKT manages the inventory of resources contained in one Packet Radio domain: •
CES nodes
• •
Transport links CES edge ports
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > CES Domain. Result: The CES Domain list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > CES Domain Select one of resources contained in the CES Domain: •
CES nodes
• •
Transport links CES edge ports Result: The list of resource is shown.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-60 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Create CES Domain (Packet Radio)
....................................................................................................................................................................................................................................
Create CES Domain (Packet Radio) When to use
The function creates the CES Domain. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Construction > Create Domain. Result: The Create Domain window is shown. ...................................................................................................................................................................................................
2
Insert User Label. Select Type (CE). Packet Radio Select Vlan space. (100-200, 1001, 2000-4080). Select Used Vlan space. (100-110, 1001, 2000-2005). Result: The CES Domain is created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-61 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Assign/Deassign resources to Packet Radio Domain
....................................................................................................................................................................................................................................
Assign/Deassign resources to Packet Radio Domain When to use
The function assigns/deassign resources the CES Domain. Related information
The resources to assign/deassign: • • • •
MPR PDH Port Ethernet Port Link Over Cable Link Over Radio
For a description about the action, refer to the topic“Resource assignment to Packet Radio domain” (p. 25-12). For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
For procedure refer to “Assign resources to a Domain” (p. 13-27). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-62 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Assign/Deassign resources to T-MPLS Domain
....................................................................................................................................................................................................................................
Assign/Deassign resources to T-MPLS Domain When to use
The function assigns/deassign resources the CES Domain. Related information
The resources to assign/deassign: • • •
TSS-5C PDH Port TSS-5C Ethernet Port Link Over T-MPLS
For a description about the action, refer to the topic“Resource assignment to T-MPLS domain” (p. 25-14). For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
For procedure refer to “Assign resources to a Domain” (p. 13-27). E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-63 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the list of CES NEs
....................................................................................................................................................................................................................................
View the list of CES NEs When to use
The function lists CES NE. Related information
PKT manages the list of all nodes supporting CES, filterable by domain. For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Services menu is shown. ...................................................................................................................................................................................................
2
Select Circuit Emulation > CES NE. Result: The Circuit Emulation Services NE list is shown.
See the following topic in this document: “Description of the list of CES NEs” (p. 25-65) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-64 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES NEs
....................................................................................................................................................................................................................................
Description of the list of CES NEs Attributes of a CES NE
The attributes displayed for each NE are: •
User Label.
•
Network Element Type.
•
Operational State.
•
Takeover Active
•
NE CAC tolerance. (strict, loose). Connection admission control policy. Meaningful
• •
only in case of CES over Packet Radio. The CAC tolerance represents whether NE CAC checks are performed wrt minimum or maximum radio interface capacity. PKT displays this information to inform the user that the traffic implemented on this NE can be dropped in case of bandwidth degradation and in case of loose tolerance. Consistency State.(normal, not-aligned, failed-to-aligned). Alignment beetwen NMS and NE. MAC Address. L2 address.
.................................................................................................................................................................................................................................... 1350 OMS 25-65 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the details of CES NE
....................................................................................................................................................................................................................................
View the details of CES NE When to use
The function lists CES NE properties. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > CES NE. Result: The Circuit Emulation Services NE list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Properties. Result: The Circuit Emulation Services NE list is shown.
See the following topic in this document: “Details of CES NE” (p. 25-67) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-66 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Details of CES NE
....................................................................................................................................................................................................................................
Details of CES NE Attributes of a CES NE
The attributes displayed for each NE are: •
User Label.
•
Network Element Type.
•
Operational State.
•
Takeover Active
•
NE CAC tolerance. (strict, loose). Connection admission control policy. Meaningful
only in case of CES over Packet Radio. Supported only by MPR NE. The CAC tolerance represents whether NE CAC checks are performed wrt minimum or maximum radio interface capacity. This information informs the user that the traffic implemented on this NE can be dropped in case of bandwidth degradation and in case of loose tolerance. Loose= CAC disabled. Value meaningful only in case of radio adaptive modulation mode • • •
Consistency State.(normal, not-aligned, failed-to-aligned). Alignment beetwen
NMS and NE. MAC Address.(00 0B 32 B6 C2 11). L2 address. Timestamp frequency. (77760kHz, 25000kHz[default], 16384kHz). Supported by
TSS NE only • •
PDH deg interval. (Range 2-10 sec; 5 sec default)
•
PDH deg clear thr. (Range 0-1000 errors; 20 default). Supported by TSS NE only
•
Physical impedance. (ohm). Not managed
PDH deg raise thr. (Range 0-1000 errors; 30 default). Supported by TSS NE only
Note that: • •
MAC address is not meaningful in case of PDH technology Signal mode is not meaningful in case of Ethernet port
.................................................................................................................................................................................................................................... 1350 OMS 25-67 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES NE
....................................................................................................................................................................................................................................
Inventory from CES NE When to use
The function lists objects related to CES NE. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Inventory from CES node
PKT manages the inventory of resources contained in one CES node: •
PDH ports
• • •
Ethernet ports Radio ports (radio link extremities) T-MPLS ports (T-MPLS link extremities)
• •
Protection groups Xconn
The Xconn list includes TDM2TDM, TDM2ETH, ATM2ATM and ATM2ETH connections. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > CES NE. Result: The Circuit Emulation Services NE list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Click Action > CES NE Select one of resources contained in one CES node: •
PDH ports
•
Ethernet ports
•
Radio ports (radio link extremities)
.................................................................................................................................................................................................................................... 1350 OMS 25-68 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES NE
....................................................................................................................................................................................................................................
• • •
T-MPLS ports (T-MPLS link extremities) Protection groups Xconn Result: The list of resources is shown, according to the selected type.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-69 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from Protection Group
....................................................................................................................................................................................................................................
Inventory from Protection Group When to use
The function lists objects related to Protection Group. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Inventory from Protection Group
PKT manages the inventory of resources contained in one Protection Group: •
Contained Radio ports
•
Packet Radio Node container
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
List the protection groups. Refer to the procedure “Inventory from CES NE” (p. 25-68) Result: The protection group list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Click Search > Protection group Select the type of resources related to the protection group: •
Radio ports
•
Packet Radio Node Result: The list of resources is shown, according to the selected type.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-70 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the list of CES Transport Links
....................................................................................................................................................................................................................................
View the list of CES Transport Links When to use
The function lists CES Transport Links. Related information
PKT manages the list of all CE transport links, filterable by domain. For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Services menu is shown. ...................................................................................................................................................................................................
2
Select Circuit Emulation > CES Transport Links. Result: The Transport Links list is shown.
See the following topic in this document: “Description of the list of CES Transport Links” (p. 25-72) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-71 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Transport Links
....................................................................................................................................................................................................................................
Description of the list of CES Transport Links Attributes of a CES Transport Link
The attributes displayed for each Transport Link are: •
User Label.
•
Domain.
•
Transport Type
• •
Transport Link Technology.
•
PseudoWire Id.
•
CIR
• •
CBS
•
PBS
•
Reserved CIR
•
Reserved CBS
•
Reserved PIR
•
Reserved PBS
VLAN Id.
PIR
.................................................................................................................................................................................................................................... 1350 OMS 25-72 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the details of CES Transport Link
....................................................................................................................................................................................................................................
View the details of CES Transport Link When to use
The function lists Properties of CES Transport Links. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > CES Transport Links. Result: The list is shown. ...................................................................................................................................................................................................
2
Select one item in the list Select Action > Properties. Result: The Transport Links Property List is shown.
See the following topic in this document: “Details of the CES Transport Link” (p. 25-74) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-73 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Details of the CES Transport Link
....................................................................................................................................................................................................................................
Details of the CES Transport Link Attributes of a CES Transport Link
PKT manages the display of the following CE transport link properties. Table 25-12 PKT attr name
CE transport link attributes
PKT attr val
Comment
Description
Userlabel
string
Same as Core link userlabel
Friendly name
Bandwidth
Mb/s
Same as Core link rate
Committed net bandwidth
Peak bandwidth
Mb/s
Meaningful only in case of radio underlying technology. Equal to rate otherwise
Peak net bandwidth
Available bandwidth on NE
Mb/s
In case of link over radio, it corresponds to uploaded Radio ports available bandwidth
Net available bandwidth on NE
Used CIR
Mb/s
Computed from implemented CE services
Used bandwidth for implemented CE services
Reserved CIR
Mb/s
Computed from allocated and implemented CE services
Reserved bandwidth for allocated and implemented CE services
Transport technology
{radio, cable}
It represents the underlying physical transport layer
Transport technology
Transport type
It represents the underlying {CesOverPacketRadio, transport technology CesOverTMPLS}
Transport type
The underlying technology of one CE transport link can be radio or Ethernet cable or link over T-MPLS. In case of radio link protection, there is only one CE transport link.
.................................................................................................................................................................................................................................... 1350 OMS 25-74 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES Transport Link
....................................................................................................................................................................................................................................
Inventory from CES Transport Link When to use
The function lists objects related to CES Transport Link. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Inventory from CES Transport Link
PKT manages the inventory of resources contained in one CES Transport Link: •
CE Transport Link extremities
The extremity underlying technology can be Ethernet physical or radio or T-MPLS port. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > CES Transport Link. Result: The CES Transport Link list is shown. ...................................................................................................................................................................................................
2
Select one edge port in the list Select Search > CES Transport Link > Select the type of resources contained in one Transport Link: •
CE Transport Link extremities Result: The resources are shown, according to the selected type.
For attributes description refer to “Description of the list of CES Port” (p. 25-86) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-75 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES Transport Link extremity
....................................................................................................................................................................................................................................
Inventory from CES Transport Link extremity When to use
The function lists objects related to CES Transport Link extremities. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Inventory from CES Transport Link extremities
PKT manages the inventory of resources contained in one CES Transport Link extremities: • • •
the physical port or SDH termination or T-MPLS PW termination associated to the CE transport link extremity the containing CES node the supported Tunnel segments. “Show properties of tunnel segment” (p. 25-56)
The CE transport link extremities are displayed together with the CE edge ports in a single CE port list. In case of NNI port type, only the CE transport link extremity inventories are meaningful. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
List CES Transport Link extremities. Refer to the procedure “Inventory from CES Transport Link” (p. 25-75) Result: The CES Transport Link extremity list is shown. ...................................................................................................................................................................................................
2
Select one item in the list Click Search > CES Transport Link extremity Select the type of resources related to one CES Transport Link extremity: •
SDH Terminations
•
T-MPLS PW Terminations
.................................................................................................................................................................................................................................... 1350 OMS 25-76 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES Transport Link extremity
....................................................................................................................................................................................................................................
•
CES nodes
•
Tunnel segments Result: The resources are shown according to the selected type.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-77 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the list of CES PDH Ports
....................................................................................................................................................................................................................................
View the list of CES PDH Ports When to use
The function lists CES PDH Ports. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Services menu is shown. ...................................................................................................................................................................................................
2
Select CES Ports. Result: The CES Port list is shown.
See the following topic in this document: “Description of the list of CES PDH Ports” (p. 25-79) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-78 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES PDH Ports
....................................................................................................................................................................................................................................
Description of the list of CES PDH Ports Attributes of a CES PDH Port
Depending on the used underlying infrastructure, for the attributes description, refer to Table 25-13, “9500MPR PDH port attributes” (p. 25-79) or Table 25-14, “TSS-5C PDH port attributes” (p. 25-80). Table 25-13 PKT attr name
9500MPR PDH port attributes
PKT attr val
Master
SNMP table
SNMP attr name
SNMP attr val
Description
userLabel
String
NE: uploaded by Core
see 1
ifMib::ifIndex
InterfaceIndex: INTEGER
Friendly name
technology
PDH
NE: uploaded by Core
ifTable
ifMib::ifType
ds1 (18) for MPR also in case of e1 PDH port
Characteristic technology
interfaceRate
Integer
NE: uploaded by Core & exported to CEM
ifTable
ifMib::ifSpeed
2048 Kbit/s
Net bandwidth
signal mode
{framed, unframed, disabled}
PKT. This attribute is managed by CES
E1pPITTPTable e1pPITTPSignalMode INTEGER
alarm status
TDM frame type
Computed by PKT
Alarm status Alarm severity assignment profile
ASAP profile
Pointer to fixed ASAP
Severity assigned by PKT
Network role
{UNI, E-NNI}
PKT
N.A.
N.A.
N.A.
Network role
TDM rate
{e1, ds1}
NE: uploaded by Core
ifTable
ifMib::ifType
ds1 (18) or e1(19)
TDM service rate
Consistency status
{normal, not-aligned, failed-to-align}
MIB alignment between NMS and NE
.................................................................................................................................................................................................................................... 1350 OMS 25-79 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES PDH Ports
....................................................................................................................................................................................................................................
Table 25-13 PKT attr name Encapsulation type
9500MPR PDH port attributes
PKT attr val
Master
(continued)
SNMP table
{cesUnstructured, NE: uploaded atmIma} by Core
SNMP attr name
SNMP attr val
Description
E1pPITTPTable e1pPITTPEncapsType
Notes:
1.
The port userLabel is computed, starting from the retrieved integer value, using the UFL library (User Friendly Label) according to the naming rule of the 9500MPR NE. Table 25-14 PKT attr name
PKT attr val
TSS-5C PDH port attributes Master
SNMP table
SNMP attr name
SNMP attr val
Description
ifMib::ifIndex
InterfaceIndex: INTEGER
Friendly name
userLabel
String
NE: uploaded by Core
technology
PDH
NE: uploaded by Core
ifTable
ifMib::ifType
e1 (19)
Characteristic technology
interfaceRate
Integer
NE: uploaded by Core & exported to CEM
ifTable
ifMib::ifSpeed
2048 Kbit/s
Net bandwidth
signal mode
{unframed, disabled (default), framedFAS, framedCRC}
PKT. This attribute is shown in the associated CES port
E1pPITTPTable e1pPITTPSignalMode INTEGER
alarm status
TDM frame type
Computed by PKT
Alarm status Alarm severity assignment profile
ASAP profile
Pointer to fixed ASAP
Severity assigned by PKT
Network role
{UNI, E-NNI}
PKT
N.A.
N.A.
N.A.
Network role
TDM rate
{e1, ds1}
NE: uploaded by Core
ifTable
ifMib::ifType
ds1 (18) or e1(19)
TDM service rate
.................................................................................................................................................................................................................................... 1350 OMS 25-80 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES PDH Ports
....................................................................................................................................................................................................................................
Table 25-14 PKT attr name
PKT attr val
TSS-5C PDH port attributes Master
SNMP table
(continued)
SNMP attr name
SNMP attr val
Description MIB alignment between NMS and NE
Consistency status
{normal, not-aligned, failed-toalign}
Administrative status
{up, down}
Loopback status
PKT: {disabled(default), Managed line, read-only by internal} Core (NE supports also loopback configuration).
PKT. Managed by CEM at CES implementation time
ifTable
ifAdminStatus
up(1), down(2)
E1pPITTPTable e1pPITTPLoopback disabled(0), line(1), internal(2)
Administrative status
Loopback status
.................................................................................................................................................................................................................................... 1350 OMS 25-81 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the details of CES PDH Port
....................................................................................................................................................................................................................................
View the details of CES PDH Port When to use
The function lists the properties of CES PDH Ports. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > CES Ports. Result: The CES Port list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Properties. Result: The CES Port property window is shown.
See the following topic in this document: “Details of CES PDH Port” (p. 25-83) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-82 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Details of CES PDH Port
....................................................................................................................................................................................................................................
Details of CES PDH Port Attributes of a CES PDH Port
The attributes displayed for each Port are: •
User Label.
•
Interface Technology.
•
Interface Type.
•
Network Element .
•
Domain.
•
Transport Type
• •
Transport Link.
• •
Reserved Capacity.
•
Signal Mode
•
Administrative State
•
Consistency State
•
Alarm Status
•
MAC Address
•
Radio Interface Type
•
CBS
•
PIR
•
PBS
•
Reserved CBS
•
Reserved PIR
•
Reserved PBS
Maximum Capacity. Used Bandwidth
Show properties of PDH port
PKT GUI displays the PDH port properties listed in: in case of MPR NE in case of TSS-5C NE
.................................................................................................................................................................................................................................... 1350 OMS 25-83 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES PDH Port
....................................................................................................................................................................................................................................
Inventory from CES PDH Port When to use
The function lists objects related to CES PDH Port. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Inventory from PDH Port
Selecting one PDH port, PKT supports the inventory of the supported CES, if any. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > ... > CES PDH Port. Result: The PDH Port list is shown. ...................................................................................................................................................................................................
2
Select one item in the list Click Search > PDH Port Select the type of resources related to one Edge Port: •
Container CES Result: The resources are shown according to the selected type.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-84 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
List CES Edge Ports
....................................................................................................................................................................................................................................
List CES Edge Ports When to use
The function lists CES Edge Port. Related information
PKT manages the list of all CES edge ports, filterable by domain. For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Services menu is shown. ...................................................................................................................................................................................................
2
Select Circuit Emulation > CES Ports. Result: The CES Port list is shown.
See the following topic in this document: “Description of the list of CES Port” (p. 25-86) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-85 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Port
....................................................................................................................................................................................................................................
Description of the list of CES Port Attributes of a CES Port
The CES port merges the attributes of CES edge port and CE transport link extremity. The CE transport link extremity properties are displayed together with the CE edge port properties. In case of NNI port type, only the CE transport link extremity properties are meaningful. Table 25-15
The CES port attributes
PKT attr name
PKT attr val
Comment
userlabel
String
Friendly name
network role
{ENNI, UNI}
Network role
technology
{PDH, radio, eth}
Underlying technology
admin status
{up, down}
Administrative status
ASAP profile
Pointer to fixed ASAP
Alarm severity assignment profile. Not yet managed
consistency status
{normal, not-aligned, failed-to-align}
MIB alignment between NMS and NE
DCN label
integer
DCN label. Meaningful only in case of ETH port
peak bandwidth
Number
Net bandwidth corresponding to the maximum capacity that can be allocated to services
.................................................................................................................................................................................................................................... 1350 OMS 25-86 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the details of CES Edge Port
....................................................................................................................................................................................................................................
View the details of CES Edge Port When to use
The function lists the properties of CES Edge Port. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > CES Ports. Result: The CES Port list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Properties. Result: The CES Port property window is shown.
See the following topic in this document: “Details of CES Port” (p. 25-88) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-87 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Details of CES Port
....................................................................................................................................................................................................................................
Details of CES Port Attributes of a CES Port
The CES port merges the attributes of CES edge port and CE transport link extremity. Transport Link extremity
The extremity underlying technology can be Ethernet physical or radio or T-MPLS port. The CE transport link extremity properties are displayed together with the CE edge port properties: in case of NNI port type, only the CE transport link extremity properties are meaningful. Edge Port
The CE edge port properties are displayed together with the CE transport link extremity properties. In case of UNI port type, only the CE edge port properties are meaningful. The underlying technology can be PDH or Ethernet physical. In case of Ethernet physical underlying technology, the edge port is characterized by the additional attributes. Table 25-16
Ethernet port attributes
PKT attr name Acceptable frame type
PKT attr val {all, only-tagged}
Description Filtering based on frame tag
NOT MANAGED Port VLAN ID
0-4094
VLAN ID for untagged frames
NOT MANAGED Port priority
0-7
Priority for untagged frames
NOT MANAGED VLAN member set
VLAN range
Filtering based of frame VLAN ID
NOT MANAGED admin status
{up, down}
Administrative status
Alarm status
{critical, major, minor, warning, cleared}
Alarm status
ASAP profile
Pointer to fixed ASAP
Alarm severity assignment profile
Consistency status
{normal, not-aligned, failed-to-align}
MIB alignment between NMS and NE
.................................................................................................................................................................................................................................... 1350 OMS 25-88 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES Edge Port
....................................................................................................................................................................................................................................
Inventory from CES Edge Port When to use
The function lists objects related to CES Edge Port. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Inventory from CES Edge Port
PKT manages the inventory of: •
the supported CE service terminations
•
the containing CES node
From GUI perspective, the CE edge ports are displayed together with the CE transport links in a single CE port list: in case of UNI port type, only the CE edge port inventories are meaningful. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > CES Port. Result: The Edge Port list is shown. ...................................................................................................................................................................................................
2
Select one item in the list Select Search > Edge Port Select the type of resources related to Edge Port: •
CE Service terminations
•
CES Nodes Result: The resources are shown according to selected type.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-89 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the list of CES Links Over Radio
....................................................................................................................................................................................................................................
View the list of CES Links Over Radio When to use
The function lists CES Link Over Radio. Related information
PKT displays the list of all links over radio, filtered by domain. For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction. Result: The Construction menu is shown. ...................................................................................................................................................................................................
2
Select Circuit Emulation > CES Link Over Radio. Result: The Transport Links list is shown.
See the following topic in this document: “Description of the list of CES Links Over Radio” (p. 25-91) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-90 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Links Over Radio
....................................................................................................................................................................................................................................
Description of the list of CES Links Over Radio Attributes of a CES Link Over Radio Table 25-17 PKT attr name
Link over radio attributes PKT attr val
Comment
Description
Userlabel
string
Computed by NPR
Friendly name
Rate
Mb/s
Computed from radio port bandwidth
Committed net bandwidth
Peak rate
Mb/s
Computed from radio port peak bandwidth
Peak net bandwidth
Protection role
{none, working, protecting}
Computed from the radio port naming rule
Traffic bearing role in case of radio link protection
Protection type
{unprotected, 1+1}
Computed from the presence or not of the radio protection group
Protection type
Availability status
{normal, in-failure}
Alarm status
.................................................................................................................................................................................................................................... 1350 OMS 25-91 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the details of CES Link Over Radio
....................................................................................................................................................................................................................................
View the details of CES Link Over Radio When to use
The function shows the properties of CES Link Over Radio. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
List the Link Over Radio Refer to the procedure “View the list of CES Links Over Radio” (p. 25-90) Result: The Link Over Radio list is shown. ...................................................................................................................................................................................................
2
Select one item in the list Select Action > Properties. Result: The Link Over Radio property window is shown.
See the following topic in this document: “Details of CES Link Over Radio” (p. 25-93) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-92 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Details of CES Link Over Radio
....................................................................................................................................................................................................................................
Details of CES Link Over Radio Attributes of a CES Link Over Radio Table 25-18 PKT attr name
Link over radio attributes PKT attr val
Comment
Description
Userlabel
string
Computed by NPR
Friendly name
Rate
Mb/s
Computed from radio port bandwidth
Committed net bandwidth
Peak rate
Mb/s
Computed from radio port peak bandwidth
Peak net bandwidth
Protection role
{none, working, protecting}
Computed from the radio port naming rule
Traffic bearing role in case of radio link protection
Protection type
{unprotected, 1+1}
Computed from the presence or not of the radio protection group
Protection type
Availability status
{normal, in-failure}
Alarm status
.................................................................................................................................................................................................................................... 1350 OMS 25-93 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES Link Over Radio
....................................................................................................................................................................................................................................
Inventory from CES Link Over Radio When to use
The function lists objects related to CES Link Over Radio. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Inventory from CES Link Over Radio
PKT supports the inventory of: •
radio interface terminations
• •
supported CES peer radio link (in case of 1+1 link protection)
Tunnel inventory from link over radio
PKT supports the inventory of: •
supported Tunnels
selecting the desired link over radio and then right-click to open the supported VLAN tunnel list Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
List the Link Over Radio Refer to the procedure “View the list of CES Links Over Radio” (p. 25-90) Result: The Link Over Radio list is shown. ...................................................................................................................................................................................................
2
Select one item in the list Click Search > Link Over Radio Select the type of resources related to the Link Over Radio: •
Radio Interface Termination
•
Supported CES
.................................................................................................................................................................................................................................... 1350 OMS 25-94 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES Link Over Radio
....................................................................................................................................................................................................................................
• •
Peer Radio Link (in case of 1+1 protection) Supported Tunnel Result: The resource list is shown according to the selected type.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-95 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Synchronization of CES Link Over Radio
....................................................................................................................................................................................................................................
Synchronization of CES Link Over Radio When to use
The function manually upload CES Link Over Radio. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
List the Link Over Radio Refer to the procedure “View the list of CES Links Over Radio” (p. 25-90) Result: The Link Over Radio list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Synchronize. Result: The selected Link Over Radio is updated. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-96 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the list of CES Radio Ports
....................................................................................................................................................................................................................................
View the list of CES Radio Ports When to use
The function lists CES Radio Port. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction. Result: The Construction menu is shown. ...................................................................................................................................................................................................
2
Select .... CES Radio Port. Result: The CES Radio Port list is shown.
See the following topic in this document: “Description of the list of CES Radio Ports” (p. 25-98) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-97 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Radio Ports
....................................................................................................................................................................................................................................
Description of the list of CES Radio Ports Attributes of a CES Radio Port Table 25-19
radio port properties
PKT attr name
PKT attr val
Description
userLabel
String
Friendly name
technology
RADIO
Characteristic technology
Modulation mode
{preset, adaptive}
Modulation operation mode
Modulation
{4QAM, 16QAM, 32QAM, 64QAM, 128QAM, 256QAM}
Modulation type
Channel spacing
{7Mhz, 14Mhz, 28MHz, 56Mhz}
Channel spacing
Capacity
130.56Mb/s
Committed gross bandwidth
Maximum capacity
130.56Mb/s
Peak gross bandwidth
Bandwidth
129158Kbit/s
Committed net bandwidth
Peak bandwidth
Kbit/s
Peak net bandwidth
Tx Frequency
10.8GHz
Transmit frequency
Rx Frequency
11.33GHz
Receive frequency
Shifter
530.0MHz
Delta between transmit and receive frequencies
Alarm status
Alarm status
ASAP profile
Alarm severity assignment profile
Available bandwidth on NE
Mb/s
Net available bandwidth
Consistency status
{normal, failed, notAligned}
Alignment between NE and NMS MIB
Radio interface type
{ODU300, MPT}
.................................................................................................................................................................................................................................... 1350 OMS 25-98 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the details of CES Radio Port
....................................................................................................................................................................................................................................
View the details of CES Radio Port When to use
The function shows properties of CES Radio Port. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
List the CES Radio Port Refer to the procedure “View the list of CES Radio Ports” (p. 25-97) Result: The CES Radio Port list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Result: The CES Radio Port property window is shown.
See the following topic in this document: “Details of CES Radio Port” (p. 25-100) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-99 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Details of CES Radio Port
....................................................................................................................................................................................................................................
Details of CES Radio Port Attributes of a CES Radio Port Table 25-20
radio port properties
PKT attr name
PKT attr val
Description
userLabel
String
Friendly name
technology
RADIO
Characteristic technology
Modulation mode
{preset, adaptive}
Modulation operation mode
Modulation
{4QAM, 16QAM, 32QAM, 64QAM, 128QAM, 256QAM}
Modulation type
Channel spacing
{7Mhz, 14Mhz, 28MHz, 56Mhz}
Channel spacing
Capacity
130.56Mb/s
Committed gross bandwidth
Maximum capacity
130.56Mb/s
Peak gross bandwidth
Bandwidth
129158Kbit/s
Committed net bandwidth
Peak bandwidth
Kbit/s
Peak net bandwidth
Tx Frequency
10.8GHz
Transmit frequency
Rx Frequency
11.33GHz
Receive frequency
Shifter
530.0MHz
Delta between transmit and receive frequencies
Alarm status
Alarm status
ASAP profile
Alarm severity assignment profile
Available bandwidth on NE
Mb/s
Net available bandwidth
Consistency status
{normal, failed, notAligned}
Alignment between NE and NMS MIB
Radio interface type
{ODU300, MPT}
.................................................................................................................................................................................................................................... 1350 OMS 25-100 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES Radio Port
....................................................................................................................................................................................................................................
Inventory from CES Radio Port When to use
The function lists objects related to CES Radio Port. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Inventory from CES Radio Port
PKT manages the inventory of resources related to a Radio Port: •
Radio Link
•
Protection group (1+1 protection)
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
List the CES Radio Port Refer to the procedure “View the list of CES Radio Ports” (p. 25-97) Result: The CES Radio Port list is shown. ...................................................................................................................................................................................................
2
Select one item in the list Click Search > Radio Port Select the type of resources related to the Radio Port: •
Radio Link
•
Protection group (1+1 protection) Result: The resource list is shown according to the selected type.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-101 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the list of CES VLAN Paths
....................................................................................................................................................................................................................................
View the list of CES VLAN Paths When to use
The function lists CES VLAN Path. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Services menu is shown. ...................................................................................................................................................................................................
2
Select Circuit Emulation > CES VLAN Path. Result: The CES VLAN Path list is shown.
See the following topic in this document: “Description of the list of CES VLAN Paths” (p. 25-103) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-102 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES VLAN Paths
....................................................................................................................................................................................................................................
Description of the list of CES VLAN Paths Attributes of a CES VLAN Path
The attributes displayed for each VLAN Path are: •
User Label.
•
Tunnel Type
• •
Working State.
•
Service State.
•
Availability Status
Configuration State.
.................................................................................................................................................................................................................................... 1350 OMS 25-103 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Join CES tunnels
....................................................................................................................................................................................................................................
Join CES tunnels When to use
The function adds a tunnel to a Circuit Emulation Service. Related information
Refer to the description “Manual join a tunnel to a CES” (p. 25-27) For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > Circuit Emulation Services. Result: The Circuit Emulation Services list is shown ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Circuit Emulation Services > Join. Select Tunnel to join. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-104 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Stitch CES tunnels
....................................................................................................................................................................................................................................
Stitch CES tunnels When to use
The function lists Circuit Emulation Services. Related information
Refer to the description “Manual join a tunnel to a CES” (p. 25-27) For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Circuit Emulation Services list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > Circuit Emulation Services > Stitch. Select Tunnel to stitch. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-105 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the list of Circuit Emulation Services
....................................................................................................................................................................................................................................
View the list of Circuit Emulation Services When to use
The function lists Circuit Emulation Services. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). The service CIR is automatically computed by PKT: • •
based on interface type, service profile and clock source in case of MEF-8 based on payload size in case of SATOP, CBS is not managed in case of MEF-8.
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services. Result: The Services menu is shown. ...................................................................................................................................................................................................
2
Select Circuit Emulation > Circuit Emulation Services. Result: The Circuit Emulation Services list is shown.
See the following topic in this document: “Description of the list of Circuit Emulation Services” (p. 25-107) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-106 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of Circuit Emulation Services
....................................................................................................................................................................................................................................
Description of the list of Circuit Emulation Services Attributes of a CES Services
The CES PW list is the same as the CES list. The attributes displayed for each Services are: •
User Label.
•
Service Group
• •
Domain.
•
NAD Value.
•
Service State.
• •
Working State
•
Service Profile
•
Availability State
•
Ecid A-Z
•
Ecid Z-A
•
MAC Address AZ
•
Service Group Id
•
Encapsulation Type
•
Transport Type
•
CIR
•
CBS
•
PIR
•
PBS
• •
Class Of Service
•
Packet Replace policy
•
Packet Filter Pattern
•
Payload Suppression
•
Average Packet Loss Time Window
• •
Excessive Packet Loss Threshold
•
Alarm Clearing Threshold
•
Stray Packet Detection
•
Stray Packet Threshold
•
Malformed Packet Threshold
•
Buffer Overrun Threshold
Signal Type.
Configuration State
Jitter buffer deppth
Alarm Raising Threshold
.................................................................................................................................................................................................................................... 1350 OMS 25-107 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of Circuit Emulation Services
....................................................................................................................................................................................................................................
•
Buffer Underrun Threshold
• •
Remote Packet Loss Threshold
•
Egress RTP synchro source
•
Expected Ingress RTP Payload Type
•
Engress RTP Payload Type
Packet Loss Threshold
Attributes are described in the following: •
“Generic CES attributes” (p. 25-108)
•
“MEF8 attributes” (p. 25-109)
•
“SATOP CES attributes” (p. 25-110)
Generic CES attributes Table 25-21 PKT attr name
Generic CES attributes
PKT attr val
Master
Description
Service group
string
Operator: always modifiable
Friendly name for service group
Userlabel
string
Operator: always modifiable
Friendly name
Comment1, Comment2, Comment3
string
Operator: always modifiable
User comment
Text1, Text2, Text3
string
Operator: always modifiable
User text
Availability status
{normal, degraded, transport-failure, server-transport-failure, server-transport-degrade}
Computed automatically by PKT. It tells whether the service has been affected by failure of any used resource
Alarm status
Service rate
e1 (2048 Kb/s)
Operator: no more modifiable after service definition
Service rate
CoS
{G, G2, R1, R, R3, R4, BE, BK}
Operator: modifiable at any time.
Class Of Service
CoS=G is fixed in case of CesOverPacketRadio Transport type
{CesOverPacketRadio, CesOverT-MPLS}
Automatically computed by PKT based on domain type
Transport type
Encapsulation type
{MEF8, SATOP}
Automatically computed by PKT based on domain type
Encapsulation type
.................................................................................................................................................................................................................................... 1350 OMS 25-108 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of Circuit Emulation Services
....................................................................................................................................................................................................................................
Table 25-21
Generic CES attributes
(continued)
PKT attr name
PKT attr val
Master
Description
Configuration state
{defined, allocated, implemented}
Automatically computed by PKT. It tells whether the needed resources has been reserved or not, in database only or also in the network
Target configuration state
PM enabling
{false, true}
Operator: modifiable at any time. It indicates if PM should be automatically enabled at service implementation time on PDH terminations. The only supported value is false.
Performance monitoring enabling
PM granularity
{15min, 24h}
Operator: modifiable at any time. It indicates the granularity of the PM counters. Both directions are monitored. Meaningful only if PM enabling is true.
PM counter granularity
CIR
Kb/s
It is automatically computed by PKT
Service committed rate
CBS
Bytes
It is automatically computed by PKT. It is not managed in case of MEF-8
Service burst size
MEF8 attributes
The following table shows the specific MEF8 CES attributes. Table 25-22
MEF8 CES attributes
PKT attr name
PKT attr val
Comment
Signal mode
{framed, unframed}
Service profile
{TDM2TDM, Operator: no more modifiable after service definition. TDM2ETH} The service compression type
Frame encapsulation type
Payload size
121, 256
Size of TDM payload in bytes
Operator: always modifiable to framed/unframed. This attribute is mirrored to the PDH ports
Operator: modifiable only when CES is in defined state. Configurable by operator only in case of MEF8 TDM2ETH service profile. It is fixed and equal to 121 bytes in case of TDM2TDM or equal to 256 bytes in case of TDM2ETH. In case of TDM2ETH it could be configured but the configuration is not yet supported.
Description TDM frame type
.................................................................................................................................................................................................................................... 1350 OMS 25-109 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of Circuit Emulation Services
....................................................................................................................................................................................................................................
Table 25-22 PKT attr name
MEF8 CES attributes
PKT attr val
TDM clock source
{adaptive, differential}
(continued) Comment
Description
Configurable only when the service is in defined or allocated state.
TDM clock source
Configurable only in case of TDM2ETH service profile. In case of TDM2TDM profile, it is fixed to differential. In the same card, it is not possible to use both differential and adaptive clock source. ECID A->Z
feb-80
Operator: modifiable only when the CES is defined. In case of MPR, it is to be configurable only in case of TDM2ETH service profile (in case of TDM2TDM it is equal to VLAN). In case of TSS5 it has to be configured in both cases
ECID Z->A
feb-80
Operator: modifiable only when the CES is defined. In case of MPR, it is to be configurable only in case of TDM2ETH service profile (in case of TDM2TDM it is equal to VLAN). In case of TSS5 it has to be configured in both cases
Destination MAC address
00 22 fa bd a3 b6
Operator: modifiable only when the CES is defined.
VLAN-ID
feb-80
Operator: not modifiable after service creation.
Configurable only in case of TDM2ETH service profile. It is the MAC address of the Ethernet remote peer
Emulated circuit (PW) identifier in the A->Z direction
Emulated circuit (PW) identifier in the Z->A direction
MAC address of CE remote peer
Ethernet tunnel identifier
Tunnel label.
Note that: • •
MAC address is not meaningful in case of PDH technology Signal mode is not meaningful in case of Ethernet port
SATOP CES attributes
The following table shows the list of SATOP CES attributes. Table 25-23 PKT attr name Signal mode
SATOP CES attributes
PKT attr val {unframed, framedFAS, framedCRC}
Master Operator. This attribute is mirrored to the PDH ports. The NE supports also the value disabled when there is no supported service.
When modifiable not modifiable
Description TDM frame type
.................................................................................................................................................................................................................................... 1350 OMS 25-110 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of Circuit Emulation Services
....................................................................................................................................................................................................................................
Table 25-23 PKT attr name Payload size
SATOP CES attributes
PKT attr val Bytes: 128, 256(default)
(continued)
Master Operator. SATOP standard allows the following payload sizes, depending on service rate:
When modifiable
Description
modifiable only when CES is in defined state
Size of TDM payload in bytes
modifiable also at run-time when the service is implemented
TDM clock source
e1: 32, 64, 128, 256(default), 384, 512, 640 480
ds1: 96, 192(default), 288, 384,
TDM clock source
{adaptive, differential, tdmLine, system(default)}
Operator.
RTP header used
TRUE
NE
Not configurable
Usage of RTP header
Jitter buffer depth
Microseconds: range from 1000 us (default) to 16000 us in step of 125 us
Operator
configurable only when the service is in defined or allocated state
Size buffer (in microseconds)used to accommodate to the PSNspecific packet delay variation
Packet replace policy
{allOnes(default), Operator implementationSpecific}
modifiable also at run-time when the service is implemented
Packet replace policy
Packet filler pattern (NOT SUPPORTED)
(0..255):
modifiable also at run-time when the service is implemented
Packet filler pattern
255 (default)
RTP header is always inserted all cases. In case "adaptive", although the receiving Node does not care the RTP header in received CES PW, but the transmitting Node will always send RTP header.
Operator. It is modifiable only when: packet replace policy = filler.
.................................................................................................................................................................................................................................... 1350 OMS 25-111 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of Circuit Emulation Services
....................................................................................................................................................................................................................................
Table 25-23 PKT attr name
SATOP CES attributes
PKT attr val
(continued)
Master
When modifiable
Description
Payload suppression
{enable, disable(default)}
Operator
modifiable also at run-time when the service is implemented
Payload suppression
Average packet loss time window
Milliseconds: integer 1000(default)
Operator
modifiable also at run-time when the service is implemented
Average packet loss time window
Excessive packet loss threshold
[0..100]: 10 (default)
Operator
modifiable also at run-time when the service is implemented
Excessive packet loss threshold
Alarm raising threshold
Milliseconds: unsigned32
NE
modifiable also at run-time when the service is implemented
Time of defect detection for alarm reporting
NE
modifiable also at run-time when the service is implemented
Time of defect undetection for alarm clearing
3000(default) Alarm clearing threshold
Milliseconds: unsigned32 10000(default)
Stray packets detection
{false(default), true}
Operator
modifiable also at run-time when the service is implemented
Stray packets detection
Stray packets threshold
[1..300]:
Operator.
modifiable also at run-time when the service is implemented
Stray packets threshold
Operator.
modifiable also at run-time when the service is implemented
Malformed packets threshold
Operator.
modifiable also at run-time when the service is implemented
Buffer overrun threshold
300 (default) Malformed packets threshold
[1..300]:
Buffer overrun threshold
[1..300]:
300 (default)
300 (default)
.................................................................................................................................................................................................................................... 1350 OMS 25-112 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of Circuit Emulation Services
....................................................................................................................................................................................................................................
Table 25-23 PKT attr name
SATOP CES attributes
PKT attr val
Buffer underrun threshold
[1..300]:
Remote packet loss threshold
[1..300]:
Master
Description
modifiable also at run-time when the service is implemented
Buffer underrun threshold
Operator.
modifiable also at run-time when the service is implemented
Remote packet loss threshold
Operator.
modifiable also at run-time when the service is implemented
Packet loss threshold
300 (default) [1..300]:
When modifiable
Operator.
300 (default)
Packet loss threshold
(continued)
1 (default) Timestamp frequency (NOT SUPPORTED)
{0[default], 77760kHz, 25000kHz, 16384kHz}
Operator.
configurable only when the service is in defined or allocated state
Timestamp frequency per session
Expected ingress RTP payload type
[0..127]:
Operator.
modifiable also at run-time when the service is implemented
Expected RTP payload type of incoming packets
Operator.
modifiable also at run-time when the service is implemented
RTP payload type of outgoing packets
101(default)
Egress RTP payload type
[0..127]:
101(default)
There are no specific T-MPLS Tunnel attributes. All T-MPLS transport attributes are managed via TL1 and reported in the properties of the T-MPLS PW corresponding to the Link over T-MPLS. There are no specific T-MPLS Tunnel segment attributes. All T-MPLS transport segment attributes are managed via TL1 and reported in the properties of the T-MPLS PW termination corresponding to the Link over T-MPLS termination.
.................................................................................................................................................................................................................................... 1350 OMS 25-113 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
View the list of CES Terminations
....................................................................................................................................................................................................................................
View the list of CES Terminations When to use
The function lists Circuit Emulation Services Terminations. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4).CES PW terminations are the same as CES terminations. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > Circuit Emulation Services. Result: The CES list is shown. ...................................................................................................................................................................................................
2
Select one item in the list Select Search > Circuit Emulation > CES Terminations. Result: The CES Termination list is shown.
See the following topic in this document: “Description of the list of CES Terminations” (p. 25-115) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-114 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Terminations
....................................................................................................................................................................................................................................
Description of the list of CES Terminations Attributes of a CES termination
CE service terminations can be retrieved via dedicated inventory (from CES or from edge port) or via CES routing display. Attributes are described in the following: •
“Generic CES termination attributes” (p. 25-115)
•
“MEF8 CES termination attributes” (p. 25-115)
•
“SATOP CES termination attributes” (p. 25-116)
The following table shows the specific MEF8 service termination attributes. Generic CES termination attributes
The following table shows the Generic attributes. Table 25-24 PKT attr name
Generic CES termination attributes PKT attr val
Comment
Description
Userlabel
String
It is the port userlabel
Port ifIndex
TDM rate
e1 (2Mb/s)
It corresponds to service rate and PDH port TDM rate
TDM rate
Transport type
{CesOverPacketRadio, Automatically computed by PKT CesOverT-MPLS} based on domain type
Transport type
Encapsulation type
{MEF8, SATOP}
Automatically computed by PKT based on domain type
Encapsulation type
PM enabling
{false, true}
Meaningful only in case of PDH termination. The only supported value is false.
Performance monitoring enabling
PM granularity
{15min, 24h}
Always both directions are monitored. Meaningful only if PM enabling is true.
PM counter granularity
Consistency status
{normal, not-aligned, failed-to-align}
Download disable management
MIB alignment between NMS and NE
MEF8 CES termination attributes
The following table shows the specific MEF8 service termination attributes.
.................................................................................................................................................................................................................................... 1350 OMS 25-115 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Terminations
....................................................................................................................................................................................................................................
Table 25-25 PKT attr name
MEF8 CES termination attributes
PKT attr val
Comment
Description
Service profile
{TDM2TDM, The service compression type TDM2ETH}
Frame encapsulation type
ECID Tx
feb-80
PW egress label. It is equal to ECID Z->A on node A (and to ECID A->Z on node Z)
Emulated circuit (PW) identifier in the egress direction
ECID Rx
feb-80
PW ingress label. It is equal to ECID A->Z on node A (and to ECID Z->A on node Z). It must be checked that no two ports receive the same ingress label
Emulated circuit (PW) identifier in the ingress direction
Destination MAC address
00 22 fa bd a3 b6
In case of MPR NE it has to be provisioned only on ETH termination
MAC address of CE remote peer
TDM clock source
{adaptive, differential}
Meaningful only in case of PDH termination
TDM clock source
Payload size
121, 256
It is fixed and equal to 121 bytes in case of TDM2TDM or equal to 256 bytes in case of TDM2ETH. In case of TDM2ETH it could be configured but the configuration is not yet supported.
Size of TDM payload
RTP header used
{false, true}
Meaningful only in case of PDH termination:
Usage of RTP header
-
false in case of adaptive clock source
-
true in case of differential clock source
Note that: • •
MAC address is not meaningful in case of PDH technology Signal mode is not meaningful in case of Ethernet port
The following table shows the specific Packet-Radio tunnel segment attributes. PKT attr name VLAN
PKT attr val feb-80
Comment VLAN tunnel identifier
Description VLAN tunnel identifier
SATOP CES termination attributes
The following table shows the specific SATOP CES termination attributes.
.................................................................................................................................................................................................................................... 1350 OMS 25-116 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Terminations
....................................................................................................................................................................................................................................
Table 25-26 PKT attr name
PKT attr val
SATOP CES termination attributes Comment
SNMP MIB
Description
Payload size
128, 256(default)
The value of this object indicates the Payload Size (in bytes) to be defined during the SNMP PW setUp.
pwCTDMCfgPayloadSize
Size of TDM payload in bytes
TDM clock source
{adaptive, differential, tdmLine, system(default)}
The clock used to play out the data at the PSN-bound IWF.
pwCTDMCfgClockSource
TDM clock source
RTP header used
TRUE
If set to false, an RTP header is not pre-pended to the TDM packet. Meaningful only in case of PDH termination: in case of SATOP it is always true.
pwCTDMCfgRtpHdrUsed
Usage of RTP header
Jitter buffer depth
[1000-16000]
The value shall be in units of microsecond. The value ranges from 1000 us (microseconds) = 1ms to 16000 us = 16ms in step of 125 us.
pwCTDMCfgJtrBfrDepth
Size buffer used to accommodate to the PSNspecific packet delay variation
(1000 us default)
Packet replace policy
{allOnes(default), This parameter determines the value to be played when CE bound packets implementaover/underflow the jitter buffer, or are tionSpecific} missing for any reason. This byte pattern is sent (played) on the TDM line. Selecting implementationSpecific implies an agent-specific algorithm. Selecting filler requires the setting of pwTDMCfgPktFiller. The default value is allones, i.e. play AIS.
pwCTDMCfgPktReplacePolicy
Packet replace policy
Packet filler pattern (NOT SUPPORTED)
[0..255]
Filler byte pattern played out on the TDM interface. The default value is 255,i.e. play all ones, equal to AIS indications.
pwCTDMCfgPktFiller
Packet filler pattern
Payload suppression
{enable, disable(default)}
Selecting enable means that payload suppression is allowed. Payload may be omitted in order to conserve bandwidth. Selecting disable means no suppression under any condition. Object MAY be changed at any time
pwCTDMCfgPayloadSuppression
Payload suppression
255 (default)
.................................................................................................................................................................................................................................... 1350 OMS 25-117 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Terminations
....................................................................................................................................................................................................................................
Table 25-26 PKT attr name
PKT attr val
SATOP CES termination attributes
(continued)
Comment
SNMP MIB
Description
Average packet loss time window
Integer: 1000(default)
The length of time over which the average packet loss rate should be computed to detect excessive packet loss rate. The value shall be in units of millisecond. The default value is 1000 millisecond (1 s)
pwCTDMCfgAvePktLossTimeWindow
Average packet loss time window
Excessive packet loss threshold
[0..100]:
Excessive packet loss is detected by computing the average number of lost packetloss over a pwTDMCfgAvePktLossTimeWindow amount of time and comparing it with this threshold value. The rate is expressed in number of packets.
pwCTDMCfgExcessivePktLossThreshold
Excessive packet loss threshold
Alarms are only reported when the defect state persists for the length of time specified by this object. Object MAY be changed only when the related PW is defined as not active. The value shall be in units of milisec.
pwCTDMCfgAlarmThreshold
Time of defect detection for alarm reporting
Alarm MUST be cleared after the corresponding defect is undetected for the amount of time specified by this object. Object MAY be changed only when the related PW is defined as not active. The value shall be in units of milisec.
pwCTDMCfgClearAlarmThreshold
Time of defect undetection for alarm clearing
10 (default)
Alarm raising threshold
Milliseconds: unsigned32 3000(default)
Alarm clearing threshold
Milliseconds: unsigned32
10000(default)
Stray packets detection
{true, false(default)}
Enable or Disable the Stray packet detection mechanism for the Pseudowire.
pwCTDMCfgStrayPacketDetect
Stray packets detection
Stray packets threshold
[1..300]:
The number of stray packets in the Pseudowire within 1 second must be met in order to declare an alarm, if pwCTDMCfgStrayPacketDetect was set to True. Stray packet: If the SSRC field of incoming Pseudowire packets do not match the configured value of inssrc, the packet is discarded and stray packet count is incremented.
pwCTDMCfgStraypacketsThreshold
Stray packets threshold
300 (default)
.................................................................................................................................................................................................................................... 1350 OMS 25-118 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Terminations
....................................................................................................................................................................................................................................
Table 25-26 PKT attr name Malformed packets threshold
PKT attr val [1..300]
300 (default)
SATOP CES termination attributes
(continued)
Comment
SNMP MIB
Description
The number of Malformed packets in the Pseudowire within 1 second must be met in order to declare an alarm. Malformed packets: are detected by mismatch between the expected packet size (taking the value of the L bit into account) and the actual packet size inferred from the PSN and PW demultiplexing layers. When RTP is used, lack of correspondence between the PT value and that allocated for this direction of the PW is used for this purpose as well.
pwCTDMCfgMalformedPacketsThreshold
Malformed packets threshold
The number of times a newly-arriving packet dropped due to Buffer overrun in the Pseudowire within 1 second must be met in order to declare an alarm.
pwCTDMCfgBufferOverrunThreshold
Buffer overrun threshold
The number of times a packet needed to be played out and the jitter buffer was empty in the Pseudowire within 1 second must be met in order to declare an alarm.
pwCTDMCfgBufferUnderrunThreshold
Buffer underrun threshold
The number of received packets with their R bit set in the Pseudowire within 1 second must be met in order to declare an alarm.
pwCTDMCfgRemotePacketLossThreshold
Remote packet loss threshold
Buffer overrun threshold
[1..300]:
Buffer underrun threshold
[1..300]:
Remote packet loss threshold
[1..300]:
Packet loss threshold
[1..300]: 1(default)
The number of lost packets in the Pseudowire within 1 second must be met in order to declare an alarm. This threshold is used to report opticsIMAlarmLossOfCESoETHFrameRaise (aka LOPS) on opticsIME1PathITTPTable
Packet loss pwCTDMthreshold CfgCESoETHFrameLossThreshold
Timestamp frequency (NOT SUPPORTED)
{0[default], 77760kHz, 25000kHz, 16384kHz}
This value is differential timestamp frequency of the system (in units of KHz). The default (0) means that global setting is inherited from opticsIMCESoEthDifferentialTimestampFrequency
pwCTDMDifferentialTimestampFrequency
300 (default)
300 (default)
300 (default)
Timestamp frequency per session
.................................................................................................................................................................................................................................... 1350 OMS 25-119 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Terminations
....................................................................................................................................................................................................................................
Table 25-26 PKT attr name Expected ingress RTP synchro source
Actual ingress RTP synchro source
PKT attr val
SATOP CES termination attributes
(continued)
Comment
SNMP MIB
Description
integer:
The expected value of Synchronization Source (SSRC) field of the RTP header of the incoming pseudowire packets.
pwCTDMRTPHdrSsrcIn
2* PW ingress label (default)
Supported by NE as read-only: therefore reported only on CES termination.
Expected RTP synchronization source label of incoming packets
integer
The actual value of Synchronization Source (SSRC) field of the RTP header of the incoming pseudowire packets.
pwCTDMRTPHdrSsrcInActual
Expected RTP synchronization source label of incoming packets
pwCTDMRTPHdrSsrcOut
RTP synchronization source label of outgoing packets
Supported by NE as read-only: therefore reported only on CES termination. integer:
The value of Synchronization Source (SSRC) field of the RTP header of the outgoing pseudowire packets.
2* PW egress label (default)
Supported by NE as read-only: therefore reported only on CES termination.
Expected ingress RTP payload type
[0..127]: 101(default)
The expected value of the Payload Type field of the RTP header on the incoming Pseudowire packets.
pwCTDMRTPPayloadTypeIn
Expected RTP payload type of incoming packets
Actual ingress RTP payload type
[0..127]
The actual value of the Payload Type field of the RTP header on the incoming Pseudowire packets.
pwCTDMRTPPayloadTypeInActual
Actual RTP payload type of incoming packets
Egress RTP synchro source
Supported by NE as read-only: therefore reported only on CES termination. Egress RTP payload type
[0..127]: 101(default)
The value of the Payload Type field of the RTP header on the outgoing Pseudowire packets.
pwCTDMRTPPayloadTypeOut
RTP payload type of outgoing packets
NE CIR
INTEGER
This value indicates the total amount of bandwidth necessary to carry the TDM Service required.
pwCTDMBandwidth
Committed information rate computed by NE
It is a read-only value of the CES termination
.................................................................................................................................................................................................................................... 1350 OMS 25-120 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Description of the list of CES Terminations
....................................................................................................................................................................................................................................
Table 25-26 PKT attr name CoS
SATOP CES termination attributes
(continued)
PKT attr val
Comment
SNMP MIB
{G(default), G2, R1, R, R3, R4, BE, BK}
This value indicates the Class of Service the TDM service is expected to be carried in the PW
pwCTDMClassOfService
Description Class of Service
.................................................................................................................................................................................................................................... 1350 OMS 25-121 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Create Circuit Emulation Service
....................................................................................................................................................................................................................................
Create Circuit Emulation Service When to use
The function creates a Circuit Emulation Service. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Dedicated wizard for CES creation
In case of SATOP CES, the operator can select if the CES will be created in bottom-up or top-down mode, by toggling the top-down flag: • •
in bottom-up mode, the operator must select the single link transporting the service in top-down mode, no transport link can be selected and the system automatically picks up one unused link or it creates a new one on the fly
In case of MEF8 CES, the system automatically applies a routing algorithm to identify the transport links crossed by the service. Wizard for SATOP CES creation
Some CES attributes are present both for MEF8 and SATOP services, but with different range of values, as described in Table 25-22, “MEF8 CES attributes” (p. 25-109) section and Table 25-23, “SATOP CES attributes” (p. 25-110). Depending on domain type selection, the system automatically computes the corresponding encapsulation type (MEF8, SATOP) and the wizard should present the appropriate range of values for that encapsulation type. Therefore, the operator can configure the following tabs: •
in case of MEF8: Generic, Info, MEF8 and QoS
•
in case of SATOP: Generic, Info, RTP, QoS and OAM
The RTP, QoS and OAM tabs are disabled in case of MEF8, since the corresponding attributes are not supported by MPR. The management of SATOP requires also to introduce new CES attributes. CES automatic allocation and routing
The CE service can be optionally allocated in cascade right after creation time. The CES allocation triggers the automatic Tunnel allocation. PKT supports the automatic routing of CE services. It automatically identifies the needed radio/cable/T-MPLS links for transporting the service and reserves the needed bandwidth on these links. The automatic routing is applied to the Tunnel layer.
.................................................................................................................................................................................................................................... 1350 OMS 25-122 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Create Circuit Emulation Service
....................................................................................................................................................................................................................................
For a description about Manual deallocation and deletion of CES, refer to the topic “Manual deallocation and deletion of CES ” (p. 25-32). Unterminated.PKT supports the creation and allocation of CE services with one Ethernet termination. The CES service profile must be TDM2ETH. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Action > Packet > Services > Circuit Emulation > Create CES. Result: The Create Circuit Emulation Service window is shown.
The step Create CES is highlighted. ...................................................................................................................................................................................................
2
In the step Create CES, click Generic tab. In the Generic tab, insert the following information: •
Insert User Label
• •
Select CES Domain from list Select Transport Type from list
•
Select Encapsulation Type from list
•
Select Service Profile from list (for MEF8 only)
•
Select Clock Source from list
•
Select Service Rate from list
•
Select Payload size from list
•
Select Signal Type from list
•
Insert External Mark
• •
Select NAD from list Select Service Group from list
...................................................................................................................................................................................................
3
In the step Create CES, click Info tab. In the Info tab, insert the following optional information: •
Comment 1
•
Comment 2
.................................................................................................................................................................................................................................... 1350 OMS 25-123 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Create Circuit Emulation Service
....................................................................................................................................................................................................................................
•
Comment 3
• •
Text 1
•
Text 3
Text 2
...................................................................................................................................................................................................
4
In the step Create CES, click MEF8 tab. In the MEF8 tab, insert the following information: •
Insert R_APS VLAN Id (for MEF8 only)
•
Insert Ecid A-Z (for MEF8 only)
•
Insert Ecid Z-A (for MEF8 only)
•
Insert Destination MAC Address. Meaningful only if TDM2ETH CES. (in hex characters). (for MEF8 only)
...................................................................................................................................................................................................
5
In the step Create CES, click QOS tab. In the QOS tab, insert the following information: •
Select Class Of Service from list
•
Insert Jitter buffer depth (for SATOP only)
•
Select Payload Suppression (Enable, Disable) (for SATOP only)
...................................................................................................................................................................................................
6
In the step Create CES, click OAM tab. In the OAM tab, insert the following information: •
Select Packet Replace Policy from list (for SATOP only)
•
Insert Packet Filter Pattern (for SATOP only)
•
Insert Average Packet Loss Time Window (for SATOP only)
• •
Insert Excessive Packet Loss Threshold (for SATOP only) Insert Alarm Raising Threshold (for SATOP only)
•
Insert Alarm Clearing Threshold (for SATOP only)
•
Insert Stray Packet Detection. (True, False). (for SATOP only)
•
Insert Stray Packet Threshold (for SATOP only)
•
Insert Malformed Packet Threshold (for SATOP only)
•
Insert Buffer Overrun Threshold (for SATOP only)
•
Insert Buffer Underrun Threshold (for SATOP only)
•
Insert Remote Packet Loss Threshold (for SATOP only)
•
Insert Packet Loss Threshold (for SATOP only)
•
PM enabling
•
PM granularity
.................................................................................................................................................................................................................................... 1350 OMS 25-124 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Create Circuit Emulation Service
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
7
In the step Create CES, click RTP tab. In the RTP tab, insert the following information: • • •
Insert RTP header used (for SATOP only. When RTP header is NOT used, all remaining following attributes in tab are greyed) Select Expected Ingress RTP Payload Type from list (for SATOP only) Select Egress RTP Payload Type from list (for SATOP only)
...................................................................................................................................................................................................
8
Click Next. Result: The step CES Terminations is highlighted. ...................................................................................................................................................................................................
9
In the step CES Terminations, select termination A and termination Z. ...................................................................................................................................................................................................
10
Click Next. Result: The step Available actions is highlighted. ...................................................................................................................................................................................................
11
In the step Available actions, select one or more available actions. ...................................................................................................................................................................................................
12
Click OK. Result: The step Circuit Emulation Service is created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-125 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Inventory from CES
....................................................................................................................................................................................................................................
Inventory from CES When to use
The function lists objects related to Circuit Emulation Services. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Inventory from CES
PKT manages the inventory of: •
CE service terminations
•
Server Tunnels. “Show properties of Tunnel” (p. 25-55)
The inventory from PW is the same as the inventory from CES. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > Circuit Emulation Services. Result: The CES list is shown. ...................................................................................................................................................................................................
2
Select one item in the list Click Search > CES Select the type of resources related to the CES: •
CE Service terminations
•
Server Tunnels Result: The resource list is shown according to the selected type.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-126 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Configure CES
....................................................................................................................................................................................................................................
Configure CES When to use
The function configures Circuit Emulation Services. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Allocated SATOP CES configuration
When the CES is in allocated state, PKT allows the configuration of the following attributes: • • •
Signal mode PM enabling/granularity TDM clock source
• • • •
Jitter buffer depth Packet replace policy Packet filler pattern Payload suppression
• • •
Average packet loss time window Excessive packet loss threshold Alarm raising threshold
• • •
Alarm clearing threshold Stray packets detection Stray packets threshold
• • • •
Malformed packets threshold Buffer overrun threshold Buffer underrun threshold Remote packet loss threshold
• •
Packet loss threshold Expected ingress RTP payload type
• •
Egress RTP payload type CoS
The attributes are automatically reconfigured in both CES terminations. Implemented SATOP CES configuration
When the CES is in implemented state, PKT allows the configuration of the following attributes: • •
Signal mode PM enabling/granularity
.................................................................................................................................................................................................................................... 1350 OMS 25-127 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Configure CES
....................................................................................................................................................................................................................................
• •
TDM clock source Packet replace policy
• • • • •
Packet filler pattern Payload suppression Average packet loss time window Excessive packet loss threshold Alarm raising threshold
• • •
Alarm clearing threshold Stray packets detection Stray packets threshold
• • • •
Malformed packets threshold Buffer overrun threshold Buffer underrun threshold Remote packet loss threshold
• • • •
Packet loss threshold Expected ingress RTP payload type Egress RTP payload type CoS
The attributes are automatically reconfigured in both CES terminations. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > Circuit Emulation Services. Result: The CES list is shown. ...................................................................................................................................................................................................
2
Select one item in the list Select Search > Circuit Emulation > CES Configuration. Result: The CES Configuration window is shown. ...................................................................................................................................................................................................
3
Modify attributes and click OK
.................................................................................................................................................................................................................................... 1350 OMS 25-128 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Configure CES
....................................................................................................................................................................................................................................
Result: The CES is re-Configured. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-129 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Routing display of CES
....................................................................................................................................................................................................................................
Routing display of CES When to use
The function creates a Circuit Emulation Service. Related information
For a description about Circuit Emulation Services, refer to the topic “Routing display of CES” (p. 25-30). For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Services > Circuit Emulation > CES. Result: The Create Circuit Emulation Service list is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Search > CES > Routing Display. Result: The graphical routing display is open. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-130 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Configure CES terminations
....................................................................................................................................................................................................................................
Configure CES terminations When to use
The function configures Circuit Emulation Services terminations. Related information
For a description about Circuit Emulation Services, refer to the topic “Circuit Emulation Services definition” (p. 25-4). SATOP CES termination configuration
The CES termination configuration allows to modify the following attributes: •
PM enabling/granularity
The other CES attributes are reconfigured only on CES basis. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From MS-GUI main window: ...................................................................................................................................................................................................
1
List CES terminations. Refer to the procedure “View the list of CES Terminations” (p. 25-114) Result: The CES ermination tlist is shown. ...................................................................................................................................................................................................
2
Select one item in the list. Select Action > CES termination > Configuration. Result: The CES Configuration window is shown. ...................................................................................................................................................................................................
3
Modify attributes and click OK Result: The CES is re-Configured. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-131 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Takeover procedure for MEF8 CES
....................................................................................................................................................................................................................................
Takeover procedure for MEF8 CES When to use
The procedure permit to take in charge Network Elements and Connectivity when the PKT is deployed in a network where (network wide) such connectivity is already in place. Related information
CES Takeover operations start from: •
CES Ports
•
CES NEs
For more information refer to: “CES Takeover description” (p. 25-52) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. Conditions
The topology of the network must be already defined. Ports and Transport link must be assigned to Packet radio domain (MEF8) or T-MPLS (SATOP) domain. Task for MEF8 CES
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select the object to start the CES Takeover using one of the following command: •
Search > Packet > Services > Circuit Emulation > CES Port.
•
Search > Packet > Services > Circuit Emulation > CES NE. Result: The list of the selected objects is shown.
...................................................................................................................................................................................................
2
Select one item in the list Select Action > Takeover Result: NE Cross Connections are uploaded.
PKT recursively discovers all the Cross Connections composing a CES. If the Cross Connections form a complete CES, The CES is automatically created on PKT DB. Port used bandwidth is updated. The CES Provisioning Status is set to Implemented .................................................................................................................................................................................................................................... 1350 OMS 25-132 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Takeover procedure for MEF8 CES
....................................................................................................................................................................................................................................
Note: If Cross Connections are present on NE and do not belong to any CES, they are loaded on DB with reserved consistency state. The user can delete unused Cross Connections. Note: If a Node is not reachable, CES discovery algorithm cannot be completed. The uploaded Cross Connections are not correlated to any CES. Therefore they are loaded on DB with reserved consistency state. When the node is reachable again, the user restart the action to complete the Takeover. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-133 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Takeover procedure for SATOP CES
....................................................................................................................................................................................................................................
Takeover procedure for SATOP CES When to use
The procedure permit to take in charge Network Elements and Connectivity when the PKT is deployed in a network where (network wide) such connectivity is already in place. Related information
For more information refer to: “CES Takeover description” (p. 25-52) For more information refer to: “T-MPLS Takeover description” (p. 18-130) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. Conditions
The topology of the network must be already defined. Ports and Transport link must be assigned to Packet radio domain (MEF8) or T-MPLS (SATOP) domain. Task for SATOP CES
From MS-GUI main window: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Link Over Cable. Assign Links Over Cable to T-MPLS domain. For details refer to the procedure “Assign a Link Over Cable to a Domain” (p. 14-60). Result: The selected Links Over Cable are assigned to T-MPLS domain ...................................................................................................................................................................................................
2
Execute the T-MPLS PW Takeover: Select Search > Packet > T-MPLS > T-MPLS domain.. Select the T-MPLS domain. Select Action > T-MPLS > Takeover All Note: In a large network the Takeover from the domain requires a long time to execute. The user can start the Takeover only from involved nodes.
.................................................................................................................................................................................................................................... 1350 OMS 25-134 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management CES Procedures
Takeover procedure for SATOP CES
....................................................................................................................................................................................................................................
Result: T-MPLS Tunnels and PseudoWires are discovered and created in the PKT
DB. ...................................................................................................................................................................................................
3
Assign PWs to CES Domain. For details refer to the procedure “Assign resources to a Domain” (p. 13-27). ...................................................................................................................................................................................................
4
Start the CES Takeover from a CES port or from a CES NE. Refer to “Task for MEF8 CES” (p. 25-132) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 25-135 8DG42227DAAA 9.6 Issue 3 December 2012
Circuit Emulation Service Management
Takeover procedure for SATOP CES
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 25-136 8DG42227DAAA 9.6 Issue 3 December 2012
Part IV: Advanced Functions
Overview Purpose
This document part provides conceptual information and procedures to accomplish typical network management tasks. Contents Chapter 26, TSS-320 versus TSS-40 with packet ring
26-1
Chapter 27, Performance Monitoring
27-1
Chapter 28, Enhanced Procedures
28-1
................................................................................................................................................................................................................................... 1350 OMS IV-1 8DG42227DAAA 9.6 Issue 3 December 2012
Advanced Functions
Overview
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS IV-2 8DG42227DAAA 9.6 Issue 3 December 2012
26
26 TSS-320 versus TSS-40 with packet ring
Overview Purpose
This chapter provides the conceptual information and the associated tasks for managing Ethernet Virtual Connection over the T-MPLS tunnel with packet ring facility. Contents Create T-MPLS Tunnel and PW (SNI)
26-2
Create T-MPLS tunnel 320-40 (SNI)
26-2
Create T-MPLS PW 320-40 (SNI) Create T-MPLS Tunnel and PW (DNI)
26-14 26-21
Create T-MPLS tunnel 320-40 (DNI)
26-21
Create T-MPLS PW 320-40 (DNI)
26-33
Create EVC over T-MPLS 320-40
26-40
Create EVC over T-MPLS 320-40
26-40
Verify creation of EVC over T-MPLS 320-40
26-58
................................................................................................................................................................................................................................... 1350 OMS 26-1 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
....................................................................................................................................................................................................................................
Create T-MPLS Tunnel and PW (SNI) Create T-MPLS tunnel 320-40 (SNI) When to use
The scope of this procedure is to create the T-MPLS tunnel between TSS-40 and TSS-160/320. Related Information
The reference network is shown below. Figure 26-1 Reference Network
.................................................................................................................................................................................................................................... 1350 OMS 26-2 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
....................................................................................................................................................................................................................................
Before you begin
All needed conditions are detailed along the procedure. Task ...................................................................................................................................................................................................
1
From the main menu bar select Actions > Packet > T-MPLS > Create T-MPLS tunnel. Figure 26-2 Actions>Packet>T-MPLS>Create T-MPLS tunnel
...................................................................................................................................................................................................
2
In the Create T-MPLS tunnel box: •
enter User Label name
•
Topology = Point to Point
.................................................................................................................................................................................................................................... 1350 OMS 26-3 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
....................................................................................................................................................................................................................................
•
Protection Level = Packet Ring Bidir
•
Flow = bidirectional
Figure 26-3 Create T-MPLS tunnel
...................................................................................................................................................................................................
3
Select folder Quality of Service. Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile. ...................................................................................................................................................................................................
4
Select folder OAM
.................................................................................................................................................................................................................................... 1350 OMS 26-4 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
....................................................................................................................................................................................................................................
Set fields Alarm Enable, CV (Connectivity Verification) Enable, CV Period, PM granularity. Click on Next. ...................................................................................................................................................................................................
5
In step2 you will select: •
the first extremity working
•
the first extremity protection
•
the second extremity
Select the node relevant to the first extremity working and to the first extremity protection (Node 122 in this case). Figure 26-4 Point to point Packet Ring bidir protected T-MPLS tunnel
.................................................................................................................................................................................................................................... 1350 OMS 26-5 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
6
Select the port for the first extremity working. It is the SDH port used by the SDH path connecting Node 41 to Node 122. Figure 26-5 Selection of the port
...................................................................................................................................................................................................
7
Analogously select the first extremity protection port on the same node.
.................................................................................................................................................................................................................................... 1350 OMS 26-6 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
8
Select the second extremity, in our case node TSS-40_41 Figure 26-6 Select the second extremity (node)
...................................................................................................................................................................................................
9
Select the port working and protecting, according to the physical connections previously created.
.................................................................................................................................................................................................................................... 1350 OMS 26-7 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
....................................................................................................................................................................................................................................
Figure which follows shows all selected extremities. Figure 26-7 P2P bid prot T-MPLS tunnel: selected extremities
.................................................................................................................................................................................................................................... 1350 OMS 26-8 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
10
Select the constraint. It is the one relevant to the main tunnel. Figure 26-8 P2P: constraint
.................................................................................................................................................................................................................................... 1350 OMS 26-9 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
11
Extremities and constraint have been selected. Click on Apply to confirm. Figure 26-9 P2P bid prot T-MPLS tunnel: selected extremities and constraint
.................................................................................................................................................................................................................................... 1350 OMS 26-10 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
12
The tunnel has been created. To verify the creation issue Search > Packet > T-MPLS > T-MPLS Tunnels. Figure 26-10 Search>Packet>T-MPLS>T-MPLS Tunnels
.................................................................................................................................................................................................................................... 1350 OMS 26-11 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
13
The tunnel is created with status defined. Select the created tunnel in the list and issue, using the right mouse button, Actions > Allocate. Figure 26-11 Tunnel list
...................................................................................................................................................................................................
14
Implement the tunnel. Figure 26-12 Actions>Implement T-MPLS Tunnel
.................................................................................................................................................................................................................................... 1350 OMS 26-12 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS tunnel 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
15
The tunnel is now implemented. Figure 26-13 The tunnel is implemented
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 26-13 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS PW 320-40 (SNI)
....................................................................................................................................................................................................................................
Create T-MPLS PW 320-40 (SNI) When to use
The scope of this procedure is to create a pseudo wire within a T-MPLS tunnel. Related Information
All needed conditions are detailed along the procedure. Before you begin
All needed conditions are detailed along the procedure. Task ...................................................................................................................................................................................................
1
From the main bar select Actions > Packet > T-MPLS > Create T-MPLS Pseudo Wire. Figure 26-14 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire
.................................................................................................................................................................................................................................... 1350 OMS 26-14 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS PW 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
In the Create T-MPLS Pseudo Wire box select: •
User Label
•
Topology = Point to Point
•
Flow = Bidirectional
Figure 26-15 Create T-MPLS Pseudo Wire
...................................................................................................................................................................................................
3
Select folder Quality of Service
.................................................................................................................................................................................................................................... 1350 OMS 26-15 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS PW 320-40 (SNI)
....................................................................................................................................................................................................................................
Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile. Note: These values must be consistent with those specified for the relevant tunnel ...................................................................................................................................................................................................
4
Select OAM values. Click on Next. ...................................................................................................................................................................................................
5
Select the extremities. The modality of selection is the same as described for the above procedure of tunnel create.
.................................................................................................................................................................................................................................... 1350 OMS 26-16 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS PW 320-40 (SNI)
....................................................................................................................................................................................................................................
The constraint is the above mentioned tunnel. Figure 26-16 Point to Point Bidirectional T-MPLS PW
.................................................................................................................................................................................................................................... 1350 OMS 26-17 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS PW 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
6
Select Search > Packe t> T-MPLS > T-MPLS Pseudo Wire. Figure 26-17 Search>Packet>T-MPLS>T-MPLS Pseudo Wire
...................................................................................................................................................................................................
7
The list of the T-MPLS pseudo wires is shown below. The PW just created is Allocated. Figure 26-18 T-MPLS Pseudo Wires
.................................................................................................................................................................................................................................... 1350 OMS 26-18 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS PW 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
8
Select the relevant Pseudo Wire and issue Actions > Implement T-MPLS Pseudo wire. Figure 26-19 PW Implementation
...................................................................................................................................................................................................
9
The T-MPLS Pseudo wire is now implemented. Figure 26-20 T-MPLS Pseudo wire implemented
...................................................................................................................................................................................................
10
The Pseudo Wire is seen as a T-MPLS Transport Link in the area of the Services. From the main menu bar issue Search > Packet > Services > T-MPLS > T-MPLS Transport Links to list the Transport Links.
.................................................................................................................................................................................................................................... 1350 OMS 26-19 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (SNI)
Create T-MPLS PW 320-40 (SNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
11
The list of the T-MPLS Transport Links is displayed. It includes the Pseudo Wire just created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 26-20 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
....................................................................................................................................................................................................................................
Create T-MPLS Tunnel and PW (DNI) Create T-MPLS tunnel 320-40 (DNI) When to use
The scope of this procedure is to create the T-MPLS tunnel between TSS-40 and TSS-160/320. Related Information
The reference network is shown below. Figure 26-21 Reference Network
.................................................................................................................................................................................................................................... 1350 OMS 26-21 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
....................................................................................................................................................................................................................................
Before you begin
All needed conditions are detailed along the procedure. Task ...................................................................................................................................................................................................
1
From the main menu bar select Actions > Packet > T-MPLS > Create T-MPLS tunnel. Figure 26-22 Actions>Packet>T-MPLS>Create T-MPLS tunnel
...................................................................................................................................................................................................
2
In the Create T-MPLS tunnel box enter: •
the User Label
the Topology = Point to Point the Protection Level = Packet Ring Bidir Open .................................................................................................................................................................................................................................... 1350 OMS 26-22 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
....................................................................................................................................................................................................................................
the Flow = bidirectional Figure 26-23 Create T-MPLS tunnel
...................................................................................................................................................................................................
3
Select folder Quality of Service. Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile. ...................................................................................................................................................................................................
4
Select folder OAM
.................................................................................................................................................................................................................................... 1350 OMS 26-23 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
....................................................................................................................................................................................................................................
Set fields Alarm Enable, CV (Connectivity Verification) Enable, CV Period, PM granularity. Click on Next. ...................................................................................................................................................................................................
5
In step2 you will select: •
the first extremity working
•
the first extremity protection
•
the second extremity
Select the node relevant to the first extremity working (Node 122 in this case). Figure 26-24 Point to point Packet Ring bidir protected T-MPLS tunnel open sink
.................................................................................................................................................................................................................................... 1350 OMS 26-24 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
6
Select the port. It is the SDH port used by the SDH path connecting Node 41 to Node 122. Figure 26-25 Selection of the port
...................................................................................................................................................................................................
7
Analogously select the first extremity protection
.................................................................................................................................................................................................................................... 1350 OMS 26-25 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
8
Select the second extremity, in our case node TSS-40_41 Figure 26-26 Select the second extremity (node)
...................................................................................................................................................................................................
9
Select the port working and protecting, according to the physical connections previously created.
.................................................................................................................................................................................................................................... 1350 OMS 26-26 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
....................................................................................................................................................................................................................................
Figure which follows shows all selected extremities. Figure 26-27 P2P bid prot T-MPLS tunnel open sink: selected extremities
.................................................................................................................................................................................................................................... 1350 OMS 26-27 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
10
Select the constraint. It is the one relevant to the main tunnel. Figure 26-28 P2P open sink: constraint
.................................................................................................................................................................................................................................... 1350 OMS 26-28 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
11
Extremities and constraint have been selected. Click on Apply to confirm. Figure 26-29 P2P bid prot T-MPLS tunnel open sink: selected extremities and constraint
.................................................................................................................................................................................................................................... 1350 OMS 26-29 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
12
The tunnel has been created. To verify the creation issue Search > Packet > T-MPLS > T-MPLS Tunnels. Figure 26-30 Search>Packet>T-MPLS>T-MPLS Tunnels
.................................................................................................................................................................................................................................... 1350 OMS 26-30 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
13
The tunnel is created with status defined. Select the created tunnel in the list and issue, using the right mouse button, Actions > Allocate. Figure 26-31 Tunnel list
...................................................................................................................................................................................................
14
Implement the tunnel. Figure 26-32 Actions>Implement T-MPLS Tunnel
.................................................................................................................................................................................................................................... 1350 OMS 26-31 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS tunnel 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
15
The tunnel is now implemented. Figure 26-33 The tunnel is implemented
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 26-32 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS PW 320-40 (DNI)
....................................................................................................................................................................................................................................
Create T-MPLS PW 320-40 (DNI) When to use
The scope of this procedure is to create a pseudo wire within a T-MPLS tunnel. Related Information
All needed conditions are detailed along the procedure. Before you begin
All needed conditions are detailed along the procedure. Task ...................................................................................................................................................................................................
1
From the main bar select Actions > Packet > T-MPLS > Create T-MPLS Pseudo Wire. Figure 26-34 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire
.................................................................................................................................................................................................................................... 1350 OMS 26-33 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS PW 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
In the Create T-MPLS Pseudo Wire box select: •
User Label
•
Topology = Dual Point to Point
•
Flow = Bidirectional
Figure 26-35 Create T-MPLS Pseudo Wire
...................................................................................................................................................................................................
3
Select folder Quality of Service
.................................................................................................................................................................................................................................... 1350 OMS 26-34 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS PW 320-40 (DNI)
....................................................................................................................................................................................................................................
Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile. Note: these values must be consistent with those specified for the relevant tunnel ...................................................................................................................................................................................................
4
Select OAM values. Click on Next. ...................................................................................................................................................................................................
5
Select the extremities. The modality of selection is the same as described for the above procedure of tunnel create.
.................................................................................................................................................................................................................................... 1350 OMS 26-35 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS PW 320-40 (DNI)
....................................................................................................................................................................................................................................
The constraint is the above mentioned tunnel. Figure 26-36 Dual Point to Point Bidirectional T-MPLS PW
.................................................................................................................................................................................................................................... 1350 OMS 26-36 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS PW 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
6
Select Search > Packet > T-MPLS > T-MPLS Pseudo Wire Figure 26-37 Search>Packet>T-MPLS>T-MPLS Pseudo Wire
...................................................................................................................................................................................................
7
The list of the T-MPLS pseudo wires is shown below. The PW just created is Allocated. Figure 26-38 T-MPLS Pseudo Wires
.................................................................................................................................................................................................................................... 1350 OMS 26-37 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS PW 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
8
Select the relevant Pseudo Wire and issue Actions > Implement T-MPLS Pseudo wire. Figure 26-39 PW Implementation
...................................................................................................................................................................................................
9
The T-MPLS Pseudo wire is now implemented. Figure 26-40 T-MPLS Pseudo wire implemented
...................................................................................................................................................................................................
10
The Pseudo Wire is seen as a T-MPLS Transport Link in the area of the Services. From the main menu bar issue Search > Packet > Services > T-MPLS > T-MPLS Transport Links to list the Transport Links.
.................................................................................................................................................................................................................................... 1350 OMS 26-38 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create T-MPLS Tunnel and PW (DNI)
Create T-MPLS PW 320-40 (DNI)
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
11
The list of the T-MPLS Transport Links is displayed. It includes the Pseudo Wire just created. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 26-39 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Overview
....................................................................................................................................................................................................................................
Create EVC over T-MPLS 320-40 Create EVC over T-MPLS 320-40 When to use
The scope of this procedure is to create an EVC over T-MPLS. Related Information
All needed conditions are detailed along the procedure Before you begin
All needed conditions are detailed along the procedure Task ...................................................................................................................................................................................................
1
From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS EVC Figure 26-41 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC
...................................................................................................................................................................................................
2
Folder Specific is already selected.
.................................................................................................................................................................................................................................... 1350 OMS 26-40 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
Select the following attributes: •
User Label
• • •
Select Service type, e.g. Service type=EVPLAN Ethernet service and type are not meaningful Select domain=T-MPLS
.................................................................................................................................................................................................................................... 1350 OMS 26-41 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
• •
Select traffic type=unicast. For service type=BTV, traffic type=multicast Select resource sharing=Full. It describes the resource reservation (UNI and link).
Figure 26-42 Create T-MPLS EVC: Specific
...................................................................................................................................................................................................
3
Select folder Detail.
.................................................................................................................................................................................................................................... 1350 OMS 26-42 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
Default values are OK. ...................................................................................................................................................................................................
4
Select folder Info. This folder houses only textual comments. ...................................................................................................................................................................................................
5
Select folder PM Execute the suitable selections. ...................................................................................................................................................................................................
6
Select folder Miscellaneous. Execute the suitable selections. Click Next. ...................................................................................................................................................................................................
7
Select the node. Select the port. Figure 26-43 Create T-MPLS EVC: Terminations Selection
.................................................................................................................................................................................................................................... 1350 OMS 26-43 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
8
Select the second node and the port. Figure 26-44 Terminations Selection
...................................................................................................................................................................................................
9
Termination Setting. It is the definition of the traffic flows.
.................................................................................................................................................................................................................................... 1350 OMS 26-44 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
Click Traffic Descriptor button. Select the traffic descriptor from the selection box and Click V-sign to confirm. Note: Traffic Descriptor values (CIR, PIR,....) must be contained in the corresponding values of the PW being associated.
.................................................................................................................................................................................................................................... 1350 OMS 26-45 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
See TransportLlink selection phase of the EVC over T-MPLS tunnel create (this procedure) Figure 26-45 Termination Settings
...................................................................................................................................................................................................
10
Select policy mode. If you select color aware, you will select color profile
.................................................................................................................................................................................................................................... 1350 OMS 26-46 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
Select classification priority-code0-7 / DSCP code 0-63 Select VLAN POP disabled ...................................................................................................................................................................................................
11
Folder Traffic Classifier deals on VLAN id Folder Leaf Term deals on HSI Folder Reuse Flows allows to copy and reuse flow characteristics.
.................................................................................................................................................................................................................................... 1350 OMS 26-47 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
12
Click Create. Figure 26-46 Ingress flow create
.................................................................................................................................................................................................................................... 1350 OMS 26-48 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
13
You can monitor that the Ingress flow has been created: after create the relevant traffic descriptor is displayed in the bottom of the window Figure 26-47 Ingress Flow: create monitoring
.................................................................................................................................................................................................................................... 1350 OMS 26-49 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
14
Select button Egress Flow, folder Push Select: •
Class of service (guaranteed/best effort/regulated)
•
If you select Clear all fields, subsequent fields can be ignored.
.................................................................................................................................................................................................................................... 1350 OMS 26-50 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
• •
VLAN ID. It is an additional ID added to the stack. Priority Mode. If set to Color Aware fields Green Priority and Yellow Priority are
active. Figure 26-48 Egress Flow: Push
.................................................................................................................................................................................................................................... 1350 OMS 26-51 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
15
Click Create Egress You can monitor that the Egress flow has been created: after create the relevant traffic descriptor is displayed in the bottom of the window Figure 26-49 Create Egress monitoring
.................................................................................................................................................................................................................................... 1350 OMS 26-52 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
16
Select folder Spoke Transport Link selection Figure 26-50 Spoke Transport Link selection
...................................................................................................................................................................................................
17
Select the other port (on TSS-146)
.................................................................................................................................................................................................................................... 1350 OMS 26-53 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
All fields are already set with the selections made for the first port. Select Create Ingress. Figure 26-51 Create Ingress node A
.................................................................................................................................................................................................................................... 1350 OMS 26-54 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
18
Select Create Egress. Click Next button. Figure 26-52 Create Egress node A
.................................................................................................................................................................................................................................... 1350 OMS 26-55 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
19
Select the Pseudo Wire just created . Figure 26-53 Select the transport link
...................................................................................................................................................................................................
20
Select EVC state (implemented).
.................................................................................................................................................................................................................................... 1350 OMS 26-56 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Create EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
Click OK to confirm EVC creation. Figure 26-54 T-MPLS EVC Allocate and Implement
E................................................................................................................................................................................................... N D O F S T E P S .................................................................................................................................................................................................................................... 1350 OMS 26-57 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Verify creation of EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
Verify creation of EVC over T-MPLS 320-40 When to use
The scope of this procedure is to verify the creation of EVC over T-MPLS. Related Information
This task does not have any related information. Before you begin
This task does not have any preconditions. Task ...................................................................................................................................................................................................
1
From the main menu bar select Search > Packet > Services > T-MPLS > T-MPLS EVCs. Figure 26-55 Search>Packet>Services>T-MPLS>T-MPLS EVCs
.................................................................................................................................................................................................................................... 1350 OMS 26-58 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring Create EVC over T-MPLS 320-40
Verify creation of EVC over T-MPLS 320-40
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
The list of the T-MPLS EVCs is displayed. Figure 26-56 T-MPLS EVCs
...................................................................................................................................................................................................
3
Allocate the EVC Figure 26-57 Allocate the EVC
...................................................................................................................................................................................................
4
Implement the EVC Figure 26-58 EVC implemented
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 26-59 8DG42227DAAA 9.6 Issue 3 December 2012
TSS-320 versus TSS-40 with packet ring
Verify creation of EVC over T-MPLS 320-40
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS 26-60 8DG42227DAAA 9.6 Issue 3 December 2012
27
Performance Monitoring 27
Overview Purpose
This chapter provides the conceptual information and the associated tasks for the Performance Monitoring management of the1350 OMS PKT application. Contents PM in EVC create
27-2
PM in EVC create
27-2
Performance Monitoring activate
27-7
PM activate
27-7
PM consistency PM consistency PM Reports create PM Reports create PM report generate PM report generate
27-12 27-12 27-15 27-15 27-19 27-19
................................................................................................................................................................................................................................... 1350 OMS 27-1 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM in EVC create
PM in EVC create
....................................................................................................................................................................................................................................
PM in EVC create PM in EVC create When to use
The scope of this procedure is to set PM characteristics in the phase of EVC create. Related Information
This task does not have any related information. Before you begin
This task does not have any preconditions.
.................................................................................................................................................................................................................................... 1350 OMS 27-2 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM in EVC create
PM in EVC create
....................................................................................................................................................................................................................................
Task ...................................................................................................................................................................................................
1
During the EVC creation phase select PM folder on the creation window. Figure 27-1 EVC definition: PM folder
...................................................................................................................................................................................................
2
You have to set:
.................................................................................................................................................................................................................................... 1350 OMS 27-3 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM in EVC create
PM in EVC create
....................................................................................................................................................................................................................................
• PM active or not • granularity (15 ', 24 h) • CSV reporting (typically 2 h) • policy, which deals on maintaining PM data (keep/Purge on stop/Purge on Delete/Not meaningful) Figure 27-2 EVC definition: PM policy
.................................................................................................................................................................................................................................... 1350 OMS 27-4 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM in EVC create
PM in EVC create
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
When creating a measure, via Actions > Create Measure Figure 27-3 Create Measure
.................................................................................................................................................................................................................................... 1350 OMS 27-5 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM in EVC create
PM in EVC create
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Enter the following attributes: • •
measure name (userlabel) . The measure name can be modified only if the measure status is PLANNED. start/end time. If you do not specify start/end time, you can subsequently activate manually the measure by means of the command Measure Start, otherwise the Measure will be started at the Start Time and stopped at the Stop time.
•
granularity. The granularity is the monitoring frequency, i.e. the frequency of historical data counters grouping. You can select: – 24 hours . Data are grouped per day. – 15 minutes. Data are grouped per quarter of hour.
• • • •
flow (aggregate/flow/aggregate flow) Automatic Purge of the Measure (TRUE/FALSE) Purge State of the Measure (when stopped/when terminated) Automatic deletion Hystorical Data (TRUE/FALSE)
...................................................................................................................................................................................................
5
Click on button OK to confirm the creation. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 27-6 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring Performance Monitoring activate
PM activate
....................................................................................................................................................................................................................................
Performance Monitoring activate PM activate When to use
The scope of this procedure is to activate PM. Related Information
This task does not have any related information. Before you begin
This task does not have any preconditions. Task ...................................................................................................................................................................................................
1
From the measure list issue Actions menu. Figure 27-4 Measure: Actions menu options
.................................................................................................................................................................................................................................... 1350 OMS 27-7 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring Performance Monitoring activate
PM activate
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
From the main menu bar the user can issue Search > PM > PM domains on NML. Figure 27-5 Search>PM>PM domains
...................................................................................................................................................................................................
3
The list of the PM domains on NML is displayed. Select Ethernet domain and issue the Search menu. Figure 27-6 Ethernet domain: Search menu
.................................................................................................................................................................................................................................... 1350 OMS 27-8 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring Performance Monitoring activate
PM activate
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
The corresponding Actions menu is shown below. Figure 27-7 Ethernet domain: Actions menu
...................................................................................................................................................................................................
5
You may select a PM transport and subsequently the Actions menu. Figure 27-8 PM transport: Actions menu
.................................................................................................................................................................................................................................... 1350 OMS 27-9 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring Performance Monitoring activate
PM activate
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
6
From the PM transport you can find the PM TP list. Figure 27-9 PM TP list
...................................................................................................................................................................................................
7
Select a PMTP and issue Actions>Start TP Figure 27-10 Start TP dialog box
.................................................................................................................................................................................................................................... 1350 OMS 27-10 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring Performance Monitoring activate
PM activate
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
8
Select a PMTP and issue Actions>Stop TP Figure 27-11 Stop TP dialog box
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 27-11 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM consistency
PM consistency
....................................................................................................................................................................................................................................
PM consistency PM consistency When to use
The scope of this procedure is to execute consistency checks on PM data. Related Information
This task does not have any related information. Before you begin
This task does not have any preconditions.
.................................................................................................................................................................................................................................... 1350 OMS 27-12 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM consistency
PM consistency
....................................................................................................................................................................................................................................
Task ...................................................................................................................................................................................................
1
From the measure list select the measure and issue Actions>Measure consistency Figure 27-12 Measure consistency
...................................................................................................................................................................................................
2
From the PM NE select Actions>Generate Audit Figure 27-13 NE: Actions>Generate Audit
.................................................................................................................................................................................................................................... 1350 OMS 27-13 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM consistency
PM consistency
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
The Generate Audit box allows to launch the operation. Figure 27-14 Generate Audit
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 27-14 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM Reports create
PM Reports create
....................................................................................................................................................................................................................................
PM Reports create PM Reports create When to use
The scope of this procedure is to create PM Reports. Related Information
This task does not have any related information. Before you begin
This task does not have any preconditions.
.................................................................................................................................................................................................................................... 1350 OMS 27-15 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM Reports create
PM Reports create
....................................................................................................................................................................................................................................
Task ...................................................................................................................................................................................................
1
From the measure issue Actions>Create Report Profile. Figure 27-15 Create Report Profile
.................................................................................................................................................................................................................................... 1350 OMS 27-16 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM Reports create
PM Reports create
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
You can issue the correlation of the Measure with Report Profile. Figure 27-16 Correlation Measure with Report Profile
.................................................................................................................................................................................................................................... 1350 OMS 27-17 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM Reports create
PM Reports create
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
You can issue the uncorrelation of the Measure from Report Profile. Figure 27-17 Uncorrelation Measure with Report Profile
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 27-18 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM report generate
Overview
....................................................................................................................................................................................................................................
PM report generate PM report generate When to use
The scope of this procedure is to generate PM Reports. Related Information
This task does not have any related information. Before you begin
This task does not have any preconditions. Task ...................................................................................................................................................................................................
1
From PM TP Actions menu you can select the generate of the suitable report. Figure 27-18 PM TP Actions menu
.................................................................................................................................................................................................................................... 1350 OMS 27-19 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM report generate
PM report generate
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
2
It is required to export TPs to CSV file. Figure 27-19 Export TPs to CSV file
.................................................................................................................................................................................................................................... 1350 OMS 27-20 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM report generate
PM report generate
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
3
You can generate Measure PM Report to CSV file. Figure 27-20 Generate Measure PM Report to CSV file
.................................................................................................................................................................................................................................... 1350 OMS 27-21 8DG42227DAAA 9.6 Issue 3 December 2012
Performance Monitoring PM report generate
PM report generate
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
4
Or generate PM tabular report. Figure 27-21 Generate PM tabular report
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 27-22 8DG42227DAAA 9.6 Issue 3 December 2012
28
Enhanced Procedures 28
Overview Purpose
This chapter provides collect procedures dedicated to specific purpose. Contents TSS 5 In Band Management
28-3
Overview
28-3
T-MPLS Subnetwork topology
28-4
In-band configuration
28-8
Resources reservation for In fiber Inband Ethernet Linear Protection
28-11 28-16
Link Over EVC
28-18
Link over EVC: unlock EVC
28-20
Link over EVC creation
28-22
Link over EVC deletion
28-24
Link over EVC: Alarms
28-25
Link over EVC: OAM
28-26
Link over EVC: assign and deassign
28-27
Link over EVC: Transport Link configuration
28-28
Link over EVC: activation and deactivation
28-29
Link over EVC: Usage within an EVC
28-30
Link over EVC: AAR
28-31
Link over EVC: Routing Display
28-32
Link over EVC: Inventory
28-33
Ethernet Linear Protection (ELP)
28-34
Add protection to PB EVC
28-39
................................................................................................................................................................................................................................... 1350 OMS 28-1 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures
Overview
....................................................................................................................................................................................................................................
Remove protection from EVC
28-41
Configure protection
28-42
ELP Protection properties
28-43
Description of the properties
28-44
Send APS command to protection group
28-45
Manual alignment of protection group
28-47
Implement a protected EVC
28-48
Deimplement a protected EVC
28-49
Disabled operations
28-50
Alarm propagation for protected EVCs
28-51
OAM on protected EVC
28-52
Inventory of Transport Link from protected EVC
28-54
Inventory of MA from protected EVC
28-55
Routing Display of protected EVC
28-56
.................................................................................................................................................................................................................................... 1350 OMS 28-2 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
Overview
....................................................................................................................................................................................................................................
TSS 5 In Band Management Overview About the in-band management
The equipment of the family TSS 320, 100 etc. are able to take in charge and manage other devices (TSS-3, TSS-5 etc.) usually on the customer side. The local management is made by DCN, in the case of remote devices the management is implemented by reserving a channel on the fiber link. On the cable PKT realizes user services that are added to the service reserved to the control. Management systems such as PKT must take into account the resources already allocated in the managing equipment during both the allocation of new resources for the user, but especially during the reserve release. In case of release of all the resources you should not put down the ports when the channel management must remain active. The ZIC configures the "IN BAND MANAGEMENT". The cable port is configured with an IP address reserved for the equipment to manage (add route) and a VLAN = 4094 reserved for the management of the NE (VLAN-DCN). In the case of TSS-5, T-MPLS management requires a structuring of the cable tunnel and the pseudowire. The PKT, to learn about the resources allocated by the ZIC should do a Takeover that is not working with TSS-5/T-MPLS. Therefore needs to be rebuilt in PKT "hand" made the management structure and take it up with the ZIC Allocated in order to reserve resources at PKT. These resources must be recognizable not be erased by the operator.
.................................................................................................................................................................................................................................... 1350 OMS 28-3 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
T-MPLS Subnetwork topology
....................................................................................................................................................................................................................................
T-MPLS Subnetwork topology Single T-MPLS sub-network
OMS uses the Router as a gateway (next hop) to manage the TSS nodes. A VSI is configured on TSS-320 to transport the management traffic received from OMS (via Router). The VSI consists of an incoming port from the Router, PWs connecting to the remote TSS-5s, and a local interface to TSS-320. Initially, when the OMS sends traffic towards TSS-5, the Router sends ARP request towards TSS-320. The VSI on TSS-320 broadcasts this request over all ports/PWs of the VSI. When the ARP response is received from TSS-5 the VSI learns the MAC address over the PW and forwards it to the Router. The Router resolves the IP to MAC address of TSS-5. All further traffic from the OMS (via Router) is sent with MAC address of TSS-5. The VSI on TSS-320 forwards this traffic on a specific PW based on the destination MAC address of the packet. In this topology all IP addresses are on the same IP subnet.
.................................................................................................................................................................................................................................... 1350 OMS 28-4 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
T-MPLS Subnetwork topology
....................................................................................................................................................................................................................................
Multiple T-MPLS subnetworks with separate physical connection
Each T-MPLS network has nodes in different IP subnetworks. For e.g. TSS-5 – {a, b, and c} are in a different subnetwork compared to TSS-5-{x, y, and z}. A separate physical connection is provided from the Router to the TSS-320 for each subnetwork. The VSIs forward traffic similar to the single T-MPLS subnetwork topology.
.................................................................................................................................................................................................................................... 1350 OMS 28-5 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
T-MPLS Subnetwork topology
....................................................................................................................................................................................................................................
Multiple T-MPLS subnetworks with single physical connection
Each T-MPLS network has nodes in different IP subnetworks. For e.g. TSS-5 – {a, b, and c} are in a different subnetwork compared to TSS-5- {x, y, and z}. A single physical connection is provided from the Router the TSS-320 for each subnetwork. Outgoing traffic from the Router is tagged with a different VLAN for each IP subnetwork. On the TSS-320, each VLAN’s traffic is associated with a different VSI. The VSIs forward traffic similar to the single T-MPLS subnetwork topology.
.................................................................................................................................................................................................................................... 1350 OMS 28-6 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
T-MPLS Subnetwork topology
....................................................................................................................................................................................................................................
Protection
In the protected solutions, the PW and the Tunnel may take an alternate path for protection.
.................................................................................................................................................................................................................................... 1350 OMS 28-7 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
In-band configuration
....................................................................................................................................................................................................................................
In-band configuration Configuration Notes Figure 28-1 TSS-5 interworking with TSS160/320
Configuration requirements •
VLAN tag The TSS5 requires a VLAN tag on management traffic. The router sends untagged traffic. The TSS160/320 is not able to push a VLAN tag onto incoming traffic. As a result there are 2 options: 1. Reconfigure router to insert a VLAN tag onto the port interfacing with the Gateway TSS 160/320. 2. Insert another TSS5 between the router and the gateway. The VLNC4x will push a VLAN on the incoming management traffic.
•
One T-MPLS tunnel required per TSS5 shelf. In addition, if protection is required, 1 protection tunnel per TSS5 is required. For inband management of the TSS5s, the network (internal) IP address on the TSS5s must be in the same subnet as the router. The serviceport (external) IP address must be in a different subnet.
•
.................................................................................................................................................................................................................................... 1350 OMS 28-8 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
In-band configuration
....................................................................................................................................................................................................................................
•
•
Inband management of both the VLNC4x and the VLNC6x requires only 1 tunnel. However, 1 pseudo-wire (PW) is required for the VLNC4x and one PW for the VLNC6x. A transit T-MPLS tunnel is required on a node that is not terminating the given tunnel. For instance, tunnel #3 is terminated on TSS5 #3. So TSS5 #1 and TSS5 #2 must have a transit tunnel provisioned to forward the management traffic to TSS5 #3.
Tunnel and Pseudo-Wire Configuration
TSS5 T-MPLS Tunnel and Pseudo-Wire Configuration for Inband Management •
The management tunnel depicted above is a terminated T-MPLS tunnel. The traffic descriptor associated with the management tunnel, should have a CIR=PIR. This value can be increased if necessary. The value for CBS and PBS can be any value.
•
The two tunnels depicted above are for management of both the VLNC4x and the VLNC6x. PW #1 above is the PW for inband management of the VLNC4x. PW #2 above is the PW for inband management of the VLNC6x. Port a-100 is an internal port on the VLNC4x. It is dedicated to inband management. It is used as the UNI port for the PW #1. Port a-100 is used in R7.0.1 and above. In release R7.0.0, the UNI port will be port a-60. Port d2-4 is the backplane port to the VLNC6x. It is the UNI port for the PW #2.
•
Configuration details
Configuration via ZIC •
A management VLAN must be chosen. This management VLAN must be provisioned on each VLNC4x and on each VLNC6x, in every TSS5 shelf: – System -> Configuration -> Service Network –
•
Set Host-id and management VLAN.
For inband management to function for each VLNC4x: – create TUNNEL with the decided label. – create PW with decided label.
.................................................................................................................................................................................................................................... 1350 OMS 28-9 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
In-band configuration
....................................................................................................................................................................................................................................
– –
Apply TD with CIR= 10, PIR= 20, CBS= 15, PBS= 25 to tunnel e PW. Create a null GUA Traffic Descriptor for ETS service.
– •
Create VPWS, set name, set port a-100, associate PW and traffic descriptor created before.(policing mode disable). For inband management to function for each VLNC6x: – Set a VPWS service similar to the prior VPWS changing the port: d2-4.
.................................................................................................................................................................................................................................... 1350 OMS 28-10 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
Resources reservation for In fiber Inband
....................................................................................................................................................................................................................................
Resources reservation for In fiber Inband When to use
The procedure allocate in the PKT all the resources allocated in the NEs for the In fiber InBand management. Related information
For a description of in-band management, refer to “Overview” (p. 28-3). For a network classification of in-band management, refer to“T-MPLS Subnetwork topology” (p. 28-4). For configuration requirements, refer to“Configuration Notes” (p. 28-8). For Tunnel and Pseudo-wire settings, refer to“Tunnel and Pseudo-Wire Configuration” (p. 28-9). For a description of configuration steps, refer to“Configuration details” (p. 28-9). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. Procedure
Following steps should be done to execute correctly the Takeover with online command: From MS-GUI main window: ...................................................................................................................................................................................................
1
Search the physical connections setting characteristics. Select Search > physical > physical connections. Select the TSS-320 ->TSS-5 physical connection. Result: Physical connection setting characteristics are shown ...................................................................................................................................................................................................
2
Search the TSS-5 setting characteristics. Select Search > EML > NE. Select the TSS5. Select Search > NE > Show equipment. In the ZIC window of the selected device: Select System > Configuration > Network Connectivity to see VLAN ID, IP address, Management Priority.
.................................................................................................................................................................................................................................... 1350 OMS 28-11 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
Resources reservation for In fiber Inband
....................................................................................................................................................................................................................................
Select System > T-MPLS > Port summary to see information on T-MPLS Ports. Select System > T-MPLS > Tunnel Management > Tunnel summary to view transit/termination tunnel, in/out Labels, L2 Encapsulation profile, PHB profile. Select System > T-MPLS > Quality Of Service to see Traffic Descriptor (CIR, PIR, PBS, CBS). Select System > Quality Of Service > ETS Flow > TD to see Traffic Descriptor of ETS Flow Services. Result: TSS-5 setting characteristics are shown. ...................................................................................................................................................................................................
3
Search the TSS-320 setting characteristics. Select Search > EML > NE. Select the TSS320. Select Search > NE > Show equipment. In the ZIC window of the selected device: Select T-MPLS > Tunnel management, (filtered by), search. In the list, select the Tunnel to see Traffic Descriptor, Label Identifiers. Select T-MPLS > PW management, (filtered by), search. In the list, select the Pseudo Wire to see Traffic Descriptor, Label Identifiers. Select Communication > InFiber In Band Management, (Select Board), search, (Select Port), Details to see VLAN ID label. Result: TSS-320 setting characteristics are shown. ...................................................................................................................................................................................................
4
If not created, Create one or more domains that corresponds to the scenario already acting in field : from the Construction application Select Action > Packet > Costruction > Create Domain.
.................................................................................................................................................................................................................................... 1350 OMS 28-12 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
Resources reservation for In fiber Inband
....................................................................................................................................................................................................................................
Insert the User Label, Domain Type, Bridge Type and STP Type compliant with the attributes already present. Figure 28-2 Create Domain
Result: The list Domain window is shown with new Domain. ...................................................................................................................................................................................................
5
If not created, Define the Network Elements to the PKT environment : from the Construction application. Select Action > Packet > Costruction > Define NE.
.................................................................................................................................................................................................................................... 1350 OMS 28-13 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
Resources reservation for In fiber Inband
....................................................................................................................................................................................................................................
Insert the User Label, Working Mode and STP Type compliant with the attributes already present. Figure 28-3 Define NE
...................................................................................................................................................................................................
6
If not created, Select the Network Elements to be added from the list, click the confirm button. The Defined Network Element List updated. When the NEs are added, assign the resources already present or create them. Select Action > Packet > Costruction > Assign Resources to Domain. Result: The list Network Element window is shown with new NE. ...................................................................................................................................................................................................
7
If the Customer is not created, Select Action > Packet > Services > Create Customer. Insert the informations compliant with the attributes already present.
.................................................................................................................................................................................................................................... 1350 OMS 28-14 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures TSS 5 In Band Management
Resources reservation for In fiber Inband
....................................................................................................................................................................................................................................
Result: The Customer list is shown with new elements. ...................................................................................................................................................................................................
8
Create Traffic Descriptor that corresponds to the scenario already acting in field : Select Action > Packet > Services > Create Traffic Descriptor. ...................................................................................................................................................................................................
9
Create Traffic Classifier that corresponds to the scenario already acting in field : Select Action > Packet > Services > Create Traffic Classifier. ...................................................................................................................................................................................................
10
Create the Tunnel that corresponds to the scenario already acting in field : Select Action > Packet > T-MPLS > Create T-MPLS Tunnel. Insert the parameters compliant with the attributes already present. Note: For the general settings, refer to “T-MPLS tunnel create” (p. 17-14). Result: The tunnel list window is shown with new object. ...................................................................................................................................................................................................
11
Create the PseudoWire that corresponds to the scenario already acting in field : Select Action > Packet > T-MPLS > Create T-MPLS Pseudo Wire. Insert the parameters compliant with the attributes already present. Note: For the general settings, refer to “ T-MPLS-Create PW” (p. 17-21). Result: The PW list window is shown with new object. ...................................................................................................................................................................................................
12
Create one or more EVC (with the Service in automatic mode) that corresponds to the scenario already acting in field : Select Action > Packet > Services > T-MPLS > Create T-MPLS EVC. Insert the parameters compliant with the attributes already present. Insert VLAN ID reserved for the management of the NE (Standard value is 4094). Insert Service Type EVPLAN. Note: For the general settings, refer to “Create EVC over T-MPLS EVPLAN” (p. 17-72). Result: The list EVC window is shown with new EVC. ...................................................................................................................................................................................................
13
Allocate the object related to the in band management. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-15 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures
Abbreviations
....................................................................................................................................................................................................................................
Ethernet Linear Protection Overview Purpose
ELP is a VLAN-based Ethernet Linear Protection based on ITU-T G.8031/Y.1342 (Ethernet Protection Switching). Contents Link Over EVC
28-18
Link over EVC: unlock EVC
28-20
Link over EVC creation
28-22
Link over EVC deletion
28-24
Link over EVC: Alarms
28-25
Link over EVC: OAM
28-26
Link over EVC: assign and deassign
28-27
Link over EVC: Transport Link configuration
28-28
Link over EVC: activation and deactivation
28-29
Link over EVC: Usage within an EVC
28-30
Link over EVC: AAR
28-31
Link over EVC: Routing Display
28-32
Link over EVC: Inventory
28-33
Ethernet Linear Protection (ELP)
28-34
Add protection to PB EVC
28-39
Remove protection from EVC
28-41
Configure protection
28-42
ELP Protection properties
28-43
Description of the properties
28-44
Send APS command to protection group
28-45
Manual alignment of protection group
28-47
Implement a protected EVC
28-48
Deimplement a protected EVC
28-49
Disabled operations
28-50
Alarm propagation for protected EVCs
28-51
OAM on protected EVC
28-52
.................................................................................................................................................................................................................................... 1350 OMS 28-16 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Overview
....................................................................................................................................................................................................................................
Inventory of Transport Link from protected EVC
28-54
Inventory of MA from protected EVC
28-55
Routing Display of protected EVC
28-56
.................................................................................................................................................................................................................................... 1350 OMS 28-17 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link Over EVC
....................................................................................................................................................................................................................................
Link Over EVC Description
Link over EVC is lets a higher layer to use an EVC as an infrastructure. In case of a single domain, Link over EVC is permit to manage scenarios otherwise handled through E2E. One EVC plus two Transport Links makes a Link over EVC Since more than one EVC can coexist over the same Edge Port, the same Transport Link can be used to form multiple Link over EVCs. Edge Port is the extremity of one of the interworking links added to the EVC to obtain the Link over EVC. Only the case of Link over EVC built over T-MPLS EVCs and assigned to Provider Bridge domain is considered here. Once an EVC has been used to form a Link over EVC, it is locked and can't be modified. It is marked “for infrastructure” The created Link over EVC is visible in its own list in construction and can be used, for the most part, as a normal link and assigned to a Domain in which it will be used to build EVCs. Involved objects
A Link over EVC is composed by an EVC and two interworking links are required. The system checks that: • • • • • •
the EVC is not used to form another Link over EVC there exist two Transport Links that are connected to the two extremities of the EVC the two Transport Links have the same Technology. The technology can be either SDH, Cable, VCG LAG or LAG in case of Transport Links with SDH or VCG LAG Technology, both links have the same Protocol Type (either GFP, LAPS or HDLC); both links are bi-directional (no unidirectional links allowed) the extremities of the two links that are not UNI for the EVC (the extremities are not extremities of the Link over EVC): the extremities: – they are not assigned to any domain – they are not both belonging to ENEs (at most one extremity of the Link over EVC may belong to an ENE)
Bandwidth usage
The bandwidth used on the lower layer EVCs is allocated on the ports where they have their termination, i.e. the internal ports of the interworking links. .................................................................................................................................................................................................................................... 1350 OMS 28-18 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link Over EVC
....................................................................................................................................................................................................................................
On the external ports of the interworking links, only the bandwidth of the created Links over EVC is allocated (in the above figure you can see that of the 3 Mb/s allocated on the internal ports, only 2 Mb/s are allocated on the external ports, because one of the EVCs has not been used to form a Link over EVC). The Link over EVC has its own bandwidth and, on it, it is allocated the bandwidth used by higher layer EVCs that use that Link over EVC. A check of the available bandwidth is performed on the two Transport Links that have been identified during previous checks. Since those Transport Links will be, together with the specified EVC, the infrastructure of the Link over EVC to be created, the bandwidth of the Link over EVC will consume the bandwidth of the Transport Links and, hence, both Transport Links must have enough free bandwidth to host the Link over EVC. Both Transport Links must have a capacity of at least the PIR of the EVC and they must have an available bandwidth of at least the CIR of the EVC. for each Transport Link: •
Egress Shaping Rate of external port >= PIR of EVC
•
Available Bandwidth of external port >= CIR of EVC Note: “external port” is the port of the Transport Link that is not a UNI for the EVC Available Bandwidth = Egress Shaping Rate - sum of CIR .
“sum of CIR” is the sum of the CIR of all the Links over EVC terminated by that port.
.................................................................................................................................................................................................................................... 1350 OMS 28-19 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: unlock EVC
....................................................................................................................................................................................................................................
Link over EVC: unlock EVC When to use
The operator un-marks an EVC as an infrastructure thus preventing it to be used to form a Link over EVC. Related Information
For more information, refer to “Link Over EVC” (p. 28-18). Unlock EVC operation is only provided to work-around rare emergency situations where there exists an EVC that is marked to be used for infrastructure (locked) but it's not used for a Link over EVC and the operator does not want to use it to form a Link over EVC. Lock EVC is not a user operation. It is accomplished when an EVC is used to form a Link over EVC. Lock EVC prevents the following operation on the locked EVC. • •
provisioning state changes (de-implementation) topology changes (add/remove termination, add/remove flow)
• • •
modification (modify EVC, modify Termination, modify Flow) configuration (configure EVC, configure Termination, configure Flow) modification/configuration of any object used by the EVC (configuration of Edge Ports, configuration of Transport Links)
•
join of a E2E EVC
Any operation that does not modify the EVC can be performed on it (list, properties, navigations from/to other objects, etc.). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select a locked EVC. ...................................................................................................................................................................................................
2
Select Action > Un-Lock.
.................................................................................................................................................................................................................................... 1350 OMS 28-20 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: unlock EVC
....................................................................................................................................................................................................................................
Result: The system checks that the EVC is not used to form any Link over EVC and un-marks (unlocks) the EVC.
If the EVC is used in aLink over EVC, the operation is rejected. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-21 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC creation
....................................................................................................................................................................................................................................
Link over EVC creation When to use
The function creates a Link over EVC. Related Information
For more information, refer to “Link Over EVC” (p. 28-18). To create a Link over EVC, an EVC and two interworking links are required. See “Involved objects” (p. 28-18) A check of the available bandwidth is performed on the two involved Transport Links. Both Transport Links must have a capacity of at least the PIR of the EVC and they must have an available bandwidth of at least the CIR of the EVC. See “Bandwidth usage” (p. 28-18) Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Action > Packet > Construction > Create Link Over EVC. ...................................................................................................................................................................................................
2
The operator specifies: •
EVC
•
userlabel
•
comment (optional) Result: The system locks the EVC as exported for infrastructure.
The system locks the two involved interworking Links. Link over EVC has the following characteristics: • the userlabel provided by the operator •
the commentprovided by the operator
•
the CIR of the specified EVC
.................................................................................................................................................................................................................................... 1350 OMS 28-22 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC creation
....................................................................................................................................................................................................................................
• •
the PIR of the specified EVC the extremities of the two interworking Transport Links that are not connected to the two extremities of the EVC
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-23 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC deletion
....................................................................................................................................................................................................................................
Link over EVC deletion When to use
The function deletes a Link over EVC. Related Information
For more information, refer to “Link Over EVC” (p. 28-18). If not assigned to any Domain, a Link over EVC can be deleted. Link over EVC is not assigned when: • •
if this was the last/only Link over EVC the two interworking Transport Links were part of, the latter are no more locked and can be freely operated the operation of un-export is invoked for the EVC
As result of a deletion, the Link over EVC is decomposed to an EVC and two interworking Links. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select Search > Packet > Construction > Link Over EVC. ...................................................................................................................................................................................................
2
Select a Link over EVC and select Action > Delete. Result: The system un-locks the EVC.
The system un-locks the two involved interworking Links. If the un-export of the EVC fails, the Link over EVC is anyway deleted and an error is reported to the operator, warning him/her that the involved EVC is yet marked and that the should be manually invoked to unmark it. See “Link over EVC: unlock EVC” (p. 28-20) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-24 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: Alarms
....................................................................................................................................................................................................................................
Link over EVC: Alarms Alarms on the interworking Transport Links
Alarms on the interworking Transport Links or on the EVC are propagated to the Link over EVC. Alarms on the Link over EVC are propagated normally. The Link over EVC introduces a couple correlation kinds: • •
whenever the EVC is alarmed the Link over EVC is alarmed too whenever one interworking Transport Link is alarmed the Link over EVC is alarmed too
In addition, since the Link over EVC is a link, alarms on it must be propagated to other kinds of link
.................................................................................................................................................................................................................................... 1350 OMS 28-25 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: OAM
....................................................................................................................................................................................................................................
Link over EVC: OAM OAM over link and OAM over EVC
OAM over link has limitations if applied to the Link over EVC. OAM is not allowed OAM on the Link over EVC OAM over EVC is handled normally if applied to an EVC that uses the Link over EVC. On the higher level EVC(s) that use the Link over EVC, no MIPs are create within the Link over EVC (only at its extremity). .The Link over EVC must be considered a link from all points of view.
.................................................................................................................................................................................................................................... 1350 OMS 28-26 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: assign and deassign
....................................................................................................................................................................................................................................
Link over EVC: assign and deassign Assign Link over EVC to Domain
Being the Link over EVC a link from most points of view, it must be possible to assign it to a Domain. The only kind of Domain allowed to accept such a link is Provider Bridge. As for any other link kind, whenever a Link over EVC is assigned to a Domain, the system must check that the extremities of the link reside on two NEs that have a Working Mode compatible with the chosen Domain. The main difference in respect to another link kind is that the first Link over EVC to be assigned to a Domain causes all the other Links over EVC that are made with one or both of its interworking links, to be assigned to the same Domain (this is in order to prevent that the same real port is assigned to two different domains). If, for a mistake of the operator, a Link over EVC "LEVC1" is made by an interworking Transport Link "Link1", that is part of another Link over EVC assigned to Domain "PB1", and by an interworking Transport Link "Link2", that is part of another Link over EVC assigned to Domain "PB2", this means that "LEVC1" can't be assigned to any domain at all. Once a Link over EVC is assigned to a Domain, the usual mechanics of the used bandwidth management apply to its (virtual not real) extremities. Refer to the general function to assign a resource to a domain. Deassign Link over EVC from Domain
If not already used by an EVC, a Link over EVC assigned to a (Provider Bridge) Domain can be de-assigned from it by the operator (as for other kinds of link). To move a Link over EVC from a Domain to another, all the Links over EVC that share with the former at least one interworking Transport Link, needs not to be assigned to any Domain (i.e. any of those Links over EVC must be de-assigned from the Domain it belongs to). The procedure to move a Link over EVC from a Domain to another is: 1. De-assign the Link over EVC (LOE1) from its Domain (DOM1) 2. De-assign from DOM1 any Link over EVC sharing at least one interworking Transport Link with LOE1. Any Link over EVC that shares an interworking TL with LOE1 either is assigned to DOM1 or not assigned to any Domain. 3. Assign LOE1 to the new Domain (DOM2) Refer to the general function to deassign a resource from a domain.
.................................................................................................................................................................................................................................... 1350 OMS 28-27 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: Transport Link configuration
....................................................................................................................................................................................................................................
Link over EVC: Transport Link configuration Limitations
The configuration of the extremities of the Link over EVC, from a bridge perspective, is subject to limitations in its applicability. The Link over EVC extremities are not real interfaces in the NE, rather they are virtual ports internally created by PKT. This means, among other things, that when the operator requests the configuration of a Link over EVC, he is warned by the system that the configuration will affect all the Links over EVC that shares the same interworking Transport Links. In addition, the system will prevent the operator to configure a Link over EVC if it shares only one interworking Transport Link with another Link over EVC (because this would cause the other Link over EVC to have its extremities misaligned). From a bridge perspective, it is possible to configure only the extremities of a Link over EVC, also because the interworking links which make part of it do not belong to any bridge Domain (hence they could not be configured in a bridge perspective) and, in addition, have two extremities that have different Client Types. As for other bridge Transport Links the configurable attributes are: • • •
Acceptable Frame Type P-VID Ingress Filtering
• • • •
VLAN Type Default User Priority Priority Bit Mapping PCP
Refer to the general function to configure a transport link.
.................................................................................................................................................................................................................................... 1350 OMS 28-28 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: activation and deactivation
....................................................................................................................................................................................................................................
Link over EVC: activation and deactivation The activation of the extremities
The activation of the extremities of the Link over EVC is subject to limitations in its applicability. The Link over EVC extremities are not real interfaces in the NE, rather they are virtual ports internally created by PKT. This means that when the operator requests the activation of a Link over EVC, he is warned by the system that the activation will affect all the Links over EVC that shares the same interworking Transport Links. If the activation is in the scope of the implementation of an EVC that uses the Link over EVC, the operator is not warned. The deactivation of the extremities
The deactivation of the extremities of the Link over EVC is subject to limitations in its applicability. The Link over EVC extremities are not real interfaces in the NE, rather they are virtual ports internally created by PKT. This means, among other things, that when the operator requests the deactivation of a Link over EVC, he is warned by the system that the deactivation will affect all the Links over EVC that shares the same interworking Transport Links. If the deactivation is in the scope of the de-implementation of an EVC that uses the Link over EVC, the operation is not performed at all if there's another Link over EVC with the same interworking Transport Links and that is used by an EVC that is at least partially implemented.
.................................................................................................................................................................................................................................... 1350 OMS 28-29 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: Usage within an EVC
....................................................................................................................................................................................................................................
Link over EVC: Usage within an EVC Work around
There are limitations to be worked around in order to make correctly interact the Link over EVC with STP. The capability of the Link over EVC to correctly interact with (i.e. let pass through) the BPDU of the xSTP protocol used by the higher level EVC, depends on how the underlying EVC is made. • •
capability of the inner EVC to encapsulate the BPDU and transport them; frames allowed to transit into the inner EVC.
A T-MPLS EVC complies with 1), but the compliancy with 2) depends on the TCs present in the EVC Terminations of the inner EVC. This means, for example, that an EVC with a set of TCs that makes only pass frames with VIDs in the range 10-100, will never be able to make STP/RSTP BPDUs to pass (they are untagged...). In this case the operator can approach this problem in different ways: • •
use the Link over EVC only in domains with STP Type = None/Disabled; configure the extremities of the Link over EVC to have Forced Port State = Forwarding;
• •
have the Link over EVC accept any kind of frame (Default TC = Don't Care); create a second Link over EVC used only for BPDU to pass.
.................................................................................................................................................................................................................................... 1350 OMS 28-30 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: AAR
....................................................................................................................................................................................................................................
Link over EVC: AAR AAR
The Link over EVC extremities are not real interfaces in the NE, rather they are virtual ports internally created by PKT. For this reason, in the scope of AAR, they are not considered at all. This means that AAR will be performed, instead, on the real ports that support the virtual extremities.
.................................................................................................................................................................................................................................... 1350 OMS 28-31 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: Routing Display
....................................................................................................................................................................................................................................
Link over EVC: Routing Display Routing Display
The routing display of the Link over EVC shows its components (interworking TLs + EVC) The routing display of the Link over EVC shows its three components, i.e. the two interworking Transport Links and the EVC. It is possible to navigate from the EVC to the routing display of the EVC itself.
.................................................................................................................................................................................................................................... 1350 OMS 28-32 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Link over EVC: Inventory
....................................................................................................................................................................................................................................
Link over EVC: Inventory EVC to Link over EVC
Starting from an EVC marked "for infrastructure" navigates to the Link over EVC built on it. Link over EVC to EVC
Starting from a Link over EVC navigates to the EVC marked "for infrastructure" that makes part of it. Link over EVC to Transport Link
Starting from a Link over EVC shows the list of Transport Links that support it. The list shows two Transport Links. Transport Link to Link over EVC
Starting from a Transport Link shows the list of Links over EVC that are supported by it.
.................................................................................................................................................................................................................................... 1350 OMS 28-33 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Ethernet Linear Protection (ELP)
....................................................................................................................................................................................................................................
Ethernet Linear Protection (ELP) Description
TSS-3 R2.2 introduces a VLAN-based Ethernet Linear Protection based on ITU-T G.8031/Y.1342 (Ethernet Protection Switching). Albeit the ITU standard foresees a number of different protection schemes, PKT is going to support only bidirectional 1:1 linear protection (the only one supported by TSS-3). Ethernet Linear Protection (ELP) applies to Virtual Bridge and Provider Bridge EVCs. This specification is going to focus on the Provider Bridge case (even if most of what is said is applicable to the Virtual Bridge case too). The protection is “linear” and, hence, only applies to “linear” connectivity, i.e. EVCs with a linear route. In short, ELP aims to provide an alternative route to the traffic of an EVC, so that, if there's a failure on the main route, the traffic is switched on the other route quickly and with minimal impacts. In order to achieve this, the following elements are needed: • • •
a linear connectivity to protect (i.e. a Virtual or Provider Bridge EVC); an alternate route; one MA running on the route to protect (using Down MEPs, of course);
• •
one MA running on the alternate route (using Down MEPs, of course); a Protection Group that associates the main and the alternate route and that manages the protection switch.
Whenever on the main route there's a failure that prevents traffic, the failure is detected by OAM CC and the Protection Group performs the switch on the alternate route. Independently from the protection, the EVC as a whole can be monitored by an OAM CC through a MA. ITU-T G.8031/Y.1342 is a VLAN based protection, this means that what is protected is the VLAN used as a transport for the frames (i.e. the S-VID in the Provider Bridge case). The EVC to protect has it's S-VID distributed over its data plane, in addition, the alternate route must have the protecting S-VID distributed all over the ports that belongs to it. The protecting S-VID can be the same S-VID of the EVC or a different one depending on what supported by the involved NEs (e.g. TSS-3 R2.2 only supports different VIDs). Since STP and EPL conflicts, when EPL is used no STI must be running on the involved ports. This means either that STP is disabled on the involved NEs (STP Type = None/Disabled) or that STP Force Port State is "Forwarding" for the involved ports. As a consequence, the routes of the involved EVC must be fully linear, with no cycles, nor branches inside (otherwise, without STP, traffic would multiply until fully fill the transport links capacity). .................................................................................................................................................................................................................................... 1350 OMS 28-34 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Ethernet Linear Protection (ELP)
....................................................................................................................................................................................................................................
This specification has been developed with in mind the T-MPLS protection (tunnel protection). Since the differences of the two cases (the EVC is an object conceptually very different than the Tunnel), it has not always been possible to stick to the same approach. Even if it could already be obvious (or it will be obvious in the following), it's worth to specify now that ELP only applies to EVCs with VLAN Distribution = Not Full Meshed. The T-MPLS approach: why we can't follow it completely
In the T-MPLS approach, when we have a Tunnel to protect, we are able to create another Tunnel and associate the two under a Protection Group, so that the first Tunnel is the working one and the second Tunnel is the protecting one. As a first try, an identical approach based on having a working EVC and a protecting EVC was firstly analyzed and, after some reasoning, discarded because, in reality, the "protecting EVC" is not an EVC at all (it has no EVC Terminations), but simply an alternate route, a protecting data plane. We discovered that modeling the alternate route as an EVC (which isn't) brings a lot of conceptual and practical problems that made us discard it. The proper way to model a protected EVC is to have one EVC and two data planes: We found a couple of approaches to achieve this kind of model. Link over EVC and Protecting Data Plane
The approach hereby described consists in having the direct creation of the data plane (that in the case of EVC Fragment is not a big issue) while removing the need for E2E (so that we can safely ignore the E2E issues we would have with this approach). We need two things: • •
1. direct creation of protecting data plane within the Add Protection operation; 2. link over EVC.
Direct creation of protecting data plane
A new operation "Add Protection" is available to the operator that, through it, is able to add a "Protecting Data Plane" to an existing EVC. The Protecting Data Plane is specified in Add Protection by passing a number of Transport Links and, optionally, one or two E-NNI port(s). Even if the Protection Group must be provisioned to the involved NEs, it's not needed to make it a distinct object at PKT level: it could just be a set of properties that are visible/enabled when the EVC is under protection. Link over EVC over T-MPLS
This feature is already described by its own set of RATS.
.................................................................................................................................................................................................................................... 1350 OMS 28-35 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Ethernet Linear Protection (ELP)
....................................................................................................................................................................................................................................
Pros and cons
Pros: •
there exist only a single EVC with two data planes;
•
there is clear distinction between the working route, the protecting route and the protected EVC; alarm correlation works on a single EVC (it could be feasible to allow alarm correlation only if the EVC is under OAM CC); only one domain in most cases -> no E2E
• • •
in case of single link EVC, an even simpler procedure (and with minimal development effort) could be used
Cons: •
• • •
a new entity is introduced (even if it's only a "sub object" of the EVC) and operations are needed to manage it, alternatively, if few operations are provided to the operator to manage it, it will be difficult for him to handle this kind of object; effort to realize Link over EVC impacts caused by Link over EVC this approach was designed to avoid E2E, if E2E is needed despite the link over EVC, creating a Protecting Data Plane for an E2E EVC can be not trivial for the operator and difficult to understand/manage (it seems also a problem from the development point of view)
EVC attributes to support ELP
New attributes are added to the EVC in order to support ELP. These new attributes are meaningful only for protected EVCs. Notice that, while Protection is always meaningful, when Protection is no all the other attributes are not meaningful. Table 28-1
EVC attributes for ELP
Attribute name
Attribute type
Default
Master
Protection
{yes, no}
no
PKT
NE object name (SNMP)
Whether the EVC is protected or not Revertive
{yes, no}
yes
PKT
opticsIMEthLinearPGType
Whether traffic switches back after recovery of working resource
.................................................................................................................................................................................................................................... 1350 OMS 28-36 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Ethernet Linear Protection (ELP)
....................................................................................................................................................................................................................................
Table 28-1
EVC attributes for ELP
(continued)
Attribute name
Attribute type
Default
Master
NE object name (SNMP)
Revert time
0, ..., 12 min
5 min
PKT
opticsIMEthLinearPGWTR
Time before switching back (meaningful only in case of revertive protection) Holdoff time
0, 100, 200 … 10000 ms
0 ms
PKT
opticsIMEthLinearPGHoldoff
working
NE
opticsIMEthLinearPGProtectingActive
Hold off time before switching Active
{working, protecting}
Current switch position (i.e. which data plane is carrying traffic) Current request
{No Request (Working Active), No Request (Protection Active), Lockout, Forced Switch, Signal Fail - W, Signal Fail - P, Manual Switch (Protection/Active), Wait-to-Restore, Do-not-Revert, FOP, Manual Switch (Working Active), Exercise (Working Active), Exercise (Protection Active), Reverse Request (Working Active), Reverse Request (Protection Active)}
No Request (Working Active)
NE
opticsIMEthLinearPGProtectionstatus
Last APS command executed for the protection group Pending request
{none, Pending Signal Fail}
none
NE
opticsIMEthLinearPGPendingRequest
The pending APS command that will executed when current request clears (i.e. it tells whether there's a lower priority automatic switch request blocked by a higher priority manual request) APS Priority
0, ..., 7
7
PKT
opticsIMEthLinearPGAPSPriority
Priority of ethernet frames with ETH-APS information (default value (7) is the highest priority)
.................................................................................................................................................................................................................................... 1350 OMS 28-37 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Ethernet Linear Protection (ELP)
....................................................................................................................................................................................................................................
Protect an EVC
Protection is applied to an EVC under the following conditions: •
the EVC has VLAN Distribution = Not Full Meshed;
• • •
the EVC is not already protected; the values specified for the attributes of the protection are valid; the S-VID for the Protecting Data Plane is different than the S-VID of the EVC;
•
the EVC is “linear”. the EVC is “linear” when (the following conditions imply that the EVC is at least allocated): –
•
• •
it has its EVC Terminations in exactly two NEs (i.e. it has at least two EVC Terminations in two different NEs, but there can be more than two EVC Terminations as long as the involved NEs are no more than two); – it has a data plane (which is going to become the Working Data Plane) that is “linear”, i.e. it's and end-to-end chain of Transport Links from an extremity NE (i.e. a NE where an EVC Termination is) to the other; the specified Protecting Data Plane is “linear” and has the same extremities of the Working Data Plane, i.e. it's and end-to-end chain of Transport Links from an extremity NE (i.e. a NE where an EVC Termination is) to the other; the involved Domain has STP Type = None/Disabled or all the involved ports have Forced Port State = Forwarding; the NEs at the extremities support Ethernet Linear Protection.
Unprotect an EVC
The system does the following: •
if the EVC is Implemented or Partially Implemented, un-provisions the protection from the involved NEs: – – – –
•
un-provisions the Protection Group; un-provisions the two involved MAs; un-provisions the Protecting Data Plane; any failure during this phase ends the procedure leaving the EVC with Provisioning State = Partially Implemented and Protection = Yes
if the un-provisioning has been successful or if the EVC is Allocated: – removes the Protection Group; – removes the two involved MAs; – –
removes the Protecting Data Plane; any failure during this phase causes a rollback and exits with the EVC in the same state it was before this phase.
.................................................................................................................................................................................................................................... 1350 OMS 28-38 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Add protection to PB EVC
....................................................................................................................................................................................................................................
Add protection to PB EVC When to use
The operator is able to turn an unprotected EVC into a protected one. Related Information
The operator is able to turn an existing unprotected EVC into a protected one, by specifying the S-VLAN to be used for the protection and the route of the protection. The "Add protection" command is only enabled/visible for those EVCs with Protection = no. For more information, refer to “Ethernet Linear Protection (ELP)” (p. 28-34). For more information, refer to “Protect an EVC” (p. 28-38). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select a S-VID for the Protecting Data Plane. ...................................................................................................................................................................................................
2
Select the route of the Protecting Data Plane as a list of Transport Links. ...................................................................................................................................................................................................
3
(see “EVC attributes to support ELP” (p. 28-36) for ELP attributes of the EVC, for the meaning of each attribute, the allowed values and the default values) Select the attributes of the protection •
Revertive
• • •
Revert time (meaningful only if Revertive is "yes") Hold-off time APS priority
.................................................................................................................................................................................................................................... 1350 OMS 28-39 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Add protection to PB EVC
....................................................................................................................................................................................................................................
Result: Once all the checks are passed: the protection is added to the EVC only in the PKT DB.
• •
the Protecting Data Plane is added to the EVC; two MAs are created, one for each data plane, with each MA having two Down MEPs (one Down MEP for each extremity of the associated data plane);
• –
a Protection Group is created with two Protection Units: the one with Working Role associated to the Working Data Plane and to the Working MA; the one with Protecting Role associated to the Protecting Data Plane and to the Protecting MA;
– • •
the EVC's Protection attribute is set to "yes"; if anything goes wrong during this phase, a rollback is done and the state of the EVC remains unchanged;
if the EVC is Implemented the protection is provisioned to the involved NEs: • the Protecting Data Plane is provisioned; • • •
the two MAs are provisioned and OAM CC is enabled on them; the Protectiong Group is provisioned; if at any step there's a failure the EVC becomes Partially Implemented and the procedure ends.
if the STP Type of the Domain is not None/Disabled, all the ports in the data planes of the EVC have their Forced Port State locked on Forwarding (i.e. that attribute can't be configured for those ports). In the above procedure, any failure during the provisioning of any element needed for the protection (Protecting Data Plane, OAM objects, Protection Group) causes the EVC to become Partially Implemented and stops the procedure but always exits with a protected EVC (although not fully implemented in some cases) . ,whenever a failure occurs during the provisioning phase, at the end the EVC is Partially Implemented and has Protection = yes. ...................................................................................................................................................................................................
4
If, after an Add Protection, an EVC that initially was Implemented becomes Partially Implemented, the operator can recover the situation in one of these three ways: • •
•
de-implement the EVC and obtain an allocated protected EVC (then it's possible to continue by re-trying the implementation of the EVC or removing the protection); remove the protection from the EVC, thus obtaining (in case of success) an implemented unprotected EVC (if successful the EVC could yet remain in Partially Implemented state and it could be necessary to implement it to update its Provisioning State); implement the EVC, thus obtaining (in case of success) an implemented protected EVC.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-40 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Remove protection from EVC
....................................................................................................................................................................................................................................
Remove protection from EVC When to use
The operator is able to turn a protected EVC into an unprotected one. Related Information
The operator specifies the protected EVC from which the protection must be removed. The "Removed protection" command is only enabled/visible for those EVCs with Protection = yes. For more information, refer to “Ethernet Linear Protection (ELP)” (p. 28-34). For more information, refer to “Unprotect an EVC” (p. 28-38). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
List the EVC ...................................................................................................................................................................................................
2
Select the protected EVC, select Remove protection E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-41 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Configure protection
....................................................................................................................................................................................................................................
Configure protection When to use
This function configures the attributes of the Protection Group. Related Information
For more information, refer to “Ethernet Linear Protection (ELP)” (p. 28-34). For more information, refer to “EVC attributes to support ELP” (p. 28-36). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select a Protected EVC. ...................................................................................................................................................................................................
2
(see “EVC attributes to support ELP” (p. 28-36) for ELP attributes of the EVC, for the meaning of each attribute, the allowed values and the default values) Modify the attributes of the protection: • • •
Revertive Revert time (meaningful only if Revertive is "yes") Hold-off time
•
APS priority Result: Attributes are modified.
E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-42 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
ELP Protection properties
....................................................................................................................................................................................................................................
ELP Protection properties When to use
The protection-specific attributes of the EVC are shown in a dedicate tab of the properties window. Related Information
For more information, refer to “Ethernet Linear Protection (ELP)” (p. 28-34). For more information, refer to “EVC attributes to support ELP” (p. 28-36). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select a Protected EVC. ...................................................................................................................................................................................................
2
Select one item in the list. Select Search > Properties. Result: The Property window is displayed.
See the following topic in this document: “Description of the properties” (p. 28-44) E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-43 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Description of the properties
....................................................................................................................................................................................................................................
Description of the properties Attributes specific for ELP
The attributes displayed are: •
Protection (no, yes).Whether the EVC is protected or not
•
Revertive (yes, no).Whether traffic switches back after recovery of working resource.
•
Revert time (from 0 to 12 min; default: 5).Time before switching back (meaningful
• • •
• •
only in case of revertive protection) Hold-off time (0, 100, 200 … 10000 ms; default: 0). Hold off time before switching Active (working, protecting).Current switch position (i.e. which data plane is carrying traffic) Current request (No Request (Working Active), No Request (Protection Active), Lockout, Forced Switch, Signal Fail - W, Signal Fail - P, Manual Switch (Protection/Active), Wait-to-Restore, Do-not-Revert, FOP, Manual Switch (Working Active), Exercise (Working Active), Exercise (Protection Active), Reverse Request (Working Active), Reverse Request (Protection Active)). Last APS command executed for the protection group Pending request (none, Pending, Signal Fail). APS Priority (from 0 to 7; default: 7). Priority of ethernet frames with ETH-APS
information.
.................................................................................................................................................................................................................................... 1350 OMS 28-44 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Send APS command to protection group
....................................................................................................................................................................................................................................
Send APS command to protection group When to use
The operator is able to send APS commands to the NE. Related Information
The operator is able to send APS commands to the NE, so to affect the selection of the active data plane. For more information, refer to “Ethernet Linear Protection (ELP)” (p. 28-34). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select a Protected and Implemented EVC. ...................................................................................................................................................................................................
2
Select the send APS command. Chose one of the following commands: •
Clear (default value); to clear any initiated command
•
Lockout of Protection (LO); to fix the selector position to the working connection
•
Forced Switch (FS); for working connection: switches the selector from the working
•
•
•
connection to the protection connection (unless a higher priority switch request (i.e., LO) is in effect) Manual Switch (MS); for working connection: switches the selector from the working connection to the protection connection (unless an equal or higher priority switch request (i.e., LO, FS, SF or MS) is in effect) Manual Switch (MS-W); for protection connection: switches the selector from the protection connection to the working connection (unless an equal or higher priority switch request (i.e., LO, FS, SF, MS, MS-W) is in effect); Exercise (EXER); tests if the APS communication is operating correctly, and does not modify the selector Note: Freeze, Clear Freeze, Lockout and Clear Lockout have been excluded because not supported by our NEs.
.................................................................................................................................................................................................................................... 1350 OMS 28-45 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Send APS command to protection group
....................................................................................................................................................................................................................................
Result: The system checks that the specified EVC is protected and implemented and then sends the command to one of the two NEs at the extremities of the EVC. If one of the two NEs is an ENE, the provisioning is mandatory in the other NE. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-46 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Manual alignment of protection group
....................................................................................................................................................................................................................................
Manual alignment of protection group When to use
The operator is able to manually align the NE mastered attributed of the Protection Group/Protection Units. Related Information
An alignment operation is available to the operator to manually align the NE mastered attributed of the Protection Group/Protection Units. Manual alignment is useful in case automatic alignment fails for various reasons (NE isolation, crash of EoT BB or Adaptation BB, etc.). For more information, refer to “Ethernet Linear Protection (ELP)” (p. 28-34). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select a Protected and Implemented EVC. ...................................................................................................................................................................................................
2
Select the Switch command synchronization command. Result: The system uploads the PG/PUs attributes from one of the involved NEs and
refreshes the GUI. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-47 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Implement a protected EVC
....................................................................................................................................................................................................................................
Implement a protected EVC When to use
The operator is able to implement a protected EVC. Related Information
The implementation of a protected EVC, in addition to what is done for un-protected EVCs, involves the provisioning of the protecting Data Plane, the two MAs for the working and protecting Data Planes and the provisioning of the Protection Group. For more information, refer to “Ethernet Linear Protection (ELP)” (p. 28-34). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select a Protected EVC. ...................................................................................................................................................................................................
2
Select the Implement command. Result: The EVC is in implemented state. E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-48 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Deimplement a protected EVC
....................................................................................................................................................................................................................................
Deimplement a protected EVC When to use
The operator is able to deimplement a protected EVC. Related Information
The de-implementation of a protected EVC, in addition to what is done for un-protected EVCs, involves the un-provisioning of the Protection Group, of the two MAs for the working and protecting Data Planes and of the protecting Data Plane. For more information, refer to “Ethernet Linear Protection (ELP)” (p. 28-34). Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select a Protected and Implemented EVC. ...................................................................................................................................................................................................
2
Select the Deimplement command. Result: The EVC is in allocated state . E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-49 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Disabled operations
....................................................................................................................................................................................................................................
Disabled operations Deallocation is disabled
A Provider Bridge EVC can be protected only when at least allocated, hence de-allocation is disabled. To enable de-allocation is necessary to remove the protection from the EVC. Change topology is disabled
A protected Provider Bridge EVC has its topology locked so any operation that changes the topology is disabled. The following operations are not allowed for a protected EVC: • •
add termination remove termination
• • • •
add transport link remove transport link add flow remove flow
NNIs is Locked
The NNIs that are referred by a Protection Group (i.e. the extremities of the working and protecting data planes) can't be configured or they could have different configuration and that's not allowed. For each protected EVC there exist four NNIs that are the extremities of its two Data Planes (two NNIs for the working Data Plane and two NNIs for the protecting Data Plane), in order for the protection to work properly the working NNI and the protecting NNI that are in the same NE must have the same configuration. This means, among other things, that when an EVC is protected the NNIs at the extremities of its Data Planes can't be configured anymore by the operator (they are locked). any explicit configuration operation on those ports is refused by the system.
.................................................................................................................................................................................................................................... 1350 OMS 28-50 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Alarm propagation for protected EVCs
....................................................................................................................................................................................................................................
Alarm propagation for protected EVCs Propagation from Transport Link to EVC
At the moment, in the scope of bridge EVCs, there's no propagation at all of alarms from Transport Link to EVC. This is due to the fact that a failure on a single Transport Link in a connectionless scenario does not mean, in general, any failure for the supported EVC(s). The case of the protected EVC is different: there are two linear routes and this means that if two links on the two routes stop working, the EVC is alarmed. This kind of correlation/propagation could be done by PFM BB basing on the currently active route. Anyway, in order to simplify the management of alarms it has been decided to not implement this kind of correlation and, instead, leave this task to the OAM on the EVC. In other words, if the operator wants to know whether the EVC is working or not, he will have to activate the OAM CC on it and watch OAM alarms.
.................................................................................................................................................................................................................................... 1350 OMS 28-51 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
OAM on protected EVC
....................................................................................................................................................................................................................................
OAM on protected EVC OAM for data planes
In order for ELP to work, there's the need of a MA for each Data Plane. This means that a new kind of MA is introduced: after the MA for EVC, the MA for Edge Port and the MA for Transport Link we have the MA for Data Plane. OAM on protected EVC
The EVC has two VIDs : the VID of the protected route/data plane (i.e. the original S-VID) and the VID of the protection. If the protection route is active the NEs at the extremity of the EVC take care to "convert" the OAM packets, that originally were created for the S-VID, so to work with the protection VID. The internal NEs of the protection route are not even aware of the protection and, in order to make OAM work, must have a MA with protection S-VID. The operator must be aware of the protection when operating the OAM over the protected EVC. For example, when the operator requests an OAM LB specifying the MAC address of a MIP, he/she must be aware of the currently active route and know that if a MIP on the other route will be chosen, the loopback will fail for sure. Analogously, in the case of OAM LT, the operator must be aware of the protection in order to correctly interpret the results of the link trace. Performance Monitoring
PM on protected EVC has no impacts at all for what concerns ELP Audit
The new items with protected EVCs are: • •
protected Data Plane Data Plane MAs
•
Protection Group
First two items must be handled by PKT at high level (toward the operator and internally within the DB) but the related NE elementary objects (VLAN member sets, MDs, MAs, MEPs) are already managed by PKT. This means that no new management is needed for these objects on the AAR side In the audit results we will only see the Protection Group entity that, will encompass attributes of both the Protection Group and the Protection Unit.
.................................................................................................................................................................................................................................... 1350 OMS 28-52 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
OAM on protected EVC
....................................................................................................................................................................................................................................
Force align down
The Protection Group, introduced for ELP, needs to be part of all the AAR procedures. The provisioning sequence for the ELP is: 1. VLAN Member set on Data Plane 2. Data Plane MAs and MEPs 3. Protection Group + Protection Units This order is fixed both for provisioning and for un-provisioning . Reservation and take-over
The Protection Group and Protection Unit information are saved during reservation to be used during the take-over. For the operator, operations are identical to the ones done in the un-protected case.
.................................................................................................................................................................................................................................... 1350 OMS 28-53 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Inventory of Transport Link from protected EVC
....................................................................................................................................................................................................................................
Inventory of Transport Link from protected EVC When to use
This command shows the list of Transport Links of the Working Data Plane or of the Protecting Data Plane. Related Information
For a protected PB EVC the Search > Transport Links contextual menu is replaced by two menu items: • •
Working Data Plane Transport Links Protecting Data Plane Transport Links
Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select a Protected EVC. ...................................................................................................................................................................................................
2
Select the Search command. Result: The following sub menu are shown:
•
Working Data Plane Transport Links
•
Protecting Data Plane Transport Links
...................................................................................................................................................................................................
3
Select the desired data plane. Result: The list shows the Transport Links belonging to the selected Data Plane E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-54 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Inventory of MA from protected EVC
....................................................................................................................................................................................................................................
Inventory of MA from protected EVC When to use
This command shows the list of MA of the Working Data Plane or of the Protecting Data Plane. Related Information
From a protected EVC the operator can navigate to the MA associated to its Working Data Plane or its Protecting Data Plane. Before you begin
The system is running. The system is properly configured. The system is connected by MS-GUI. The MS-GUI is set to map mode. Task
From the MS-GUI Main menu: ...................................................................................................................................................................................................
1
Select a Protected EVC. ...................................................................................................................................................................................................
2
Select the Search command. Result: The following sub menu are shown:
•
Working Data Plane MA
•
Protecting Data Plane MA
...................................................................................................................................................................................................
3
Select the desired data plane. Result: The list shows the MA belonging to the selected Data Plane E................................................................................................................................................................................................... N D O F S T E P S
.................................................................................................................................................................................................................................... 1350 OMS 28-55 8DG42227DAAA 9.6 Issue 3 December 2012
Enhanced Procedures Ethernet Linear Protection
Routing Display of protected EVC
....................................................................................................................................................................................................................................
Routing Display of protected EVC Routing Display request
The Routing Display command shows both the route of the Working Data Plane and of the Protecting Data Plane. The operator is able to understand which is the working Data Plane and which is the protecting Data Plane. Any additional action from the operator is required.
.................................................................................................................................................................................................................................... 1350 OMS 28-56 8DG42227DAAA 9.6 Issue 3 December 2012
Appendix A: Use script changeNeShOperatorLabel.sh
Use the script changeNeShOperatorLabel.sh to change NEShOperator When to use
The script changeNeShOperatorLabel.sh allows to change the NEShOperator label in PKT Related Information
This task does not have any related information. Before you begin
This task does not have any preconditions. Task ...................................................................................................................................................................................................
1
Login as bmml user into the system. ...................................................................................................................................................................................................
2
Set to the correct directory: cd /usr/Systems/PKT__/databases/dbbmml/admin/create ...................................................................................................................................................................................................
3
Run the script: $ ./changeNeShOperatorLabel.sh ...................................................................................................................................................................................................
4
Verify that the migration of the data has been correctly executed checking the file changeNeShOperatorLabel.lst.
................................................................................................................................................................................................................................... 1350 OMS A-1 8DG42227DAAA 9.6 Issue 3 December 2012
Use script changeNeShOperatorLabel.sh
Use the script changeNeShOperatorLabel.sh to change NEShOperator
.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................
5
Remove the files: changeNeShOperatorLabel.lst and changeNeShOperatorLabel.sql E................................................................................................................................................................................................... N D O F S T E P S
Where Variable
Description
BM Id
is the 1354BMETH instance identification number
BM version
is the 1354BMETH version
old_shOperatorLabel
userlabel to be modified
new_shOperatorLabel
new value of the userlabel
.................................................................................................................................................................................................................................... 1350 OMS A-2 8DG42227DAAA 9.6 Issue 3 December 2012
Appendix B: Application Limits
Limits Overview
This appendix provides a reminder of every limits and constraints that are managed by the 1350 OMS PKT application. Table B-1
Limits for Subnetworks
Maximum number of subnetworks
500
Maximum number of subnetwork levels
4
Maximum number of NEs or ENEs in one subnetwork
60
Maximum number of subnetworks in one subnetwork
250
Table B-2
Limits for Service Nodes
Maximum number of service nodes
Table B-3
See the NE limitation Table B-4, “Limits for NEs” (p. B-1)
Limits for Domains
Maximum number of domains managed by 1350 OMS PKT Table B-4
500
Limits for NEs
Maximum number of NEs managed by 1350 OMS PKT
2500
................................................................................................................................................................................................................................... 1350 OMS B-1 8DG42227DAAA 9.6 Issue 3 December 2012
Application Limits
Limits
....................................................................................................................................................................................................................................
Table B-5
Limits for ENEs
Maximum number of ENEs managed by 1350 OMS PKT Table B-6
20000
Limits for ETPs in an ENE
Maximum number of ETPs per ENE
100
Maximum number of ETPs at ENE creation
10
Maximum number of Edge ETPs at ENE creation
5
Table B-7
Limits for LSPs
Maximum number of LSPs Table B-8
Limits for Customers
Maximum number of Customers Table B-9
250000
Limits for Ethernet Services
Maximum number of Ethernet Services Table B-10
108000
250000
Limits for Ethernet Virtual Connections
Maximum number of Ethernet virtual connections (EVC)
250000
Maximum number of EVC terminations
500000
Table B-11
Limits for Ethernet Transport Links
Maximum number of Ethernet Transport Links (ETS)
500000
Maximum number of Ethernet Transport Link terminations
1000000
Maximum number of Ethernet Transport Links (ETB)
100000
.................................................................................................................................................................................................................................... 1350 OMS B-2 8DG42227DAAA 9.6 Issue 3 December 2012
Application Limits
Limits
....................................................................................................................................................................................................................................
Table B-12
Limits for Ethernet Segments
Maximum number of Ethernet Segments Table B-13
Limits for Ethernet edge physical ports
Maximum number of Ethernet edge physical ports Table B-14
600000
25000
Limits for Ethernet Traffic Descriptors
Maximum number of Ethernet Traffic Descriptors
2000
Maximum number of Ethernet Traffic Descriptors per NE
Table B-22, “Limits for each board” (p. B-4)
Table B-15
Limits for Ethernet Traffic Classifiers
Maximum number of Ethernet Traffic Classifiers
5000
Maximum number of Ethernet Traffic Classifiers per NE
Table B-22, “Limits for each board” (p. B-4)
Table B-16
Limits for Ethernet Color Profiles
Maximum number of Ethernet Color Profiles
2000
Maximum number of Ethernet Color Profiles per NE
Table B-22, “Limits for each board” (p. B-4)
Table B-17
Limits for Ethernet switches
Maximum number of Ethernet Switches
2000000
.................................................................................................................................................................................................................................... 1350 OMS B-3 8DG42227DAAA 9.6 Issue 3 December 2012
Application Limits
Limits
....................................................................................................................................................................................................................................
Table B-18
Limits for VLAN Types
Maximum number of VLAN Types
128
Maximum number of VLAN Types constraints
200000
Table B-19
Limits for MPLS Transport Links
Maximum number of Best Effort VC-LSPs & LSP tunnels per Transport Link (FW & BW) Table B-20
200
Limits for MPLS Traffic Descriptors
Maximum number of MPLS Traffic Descriptors
200
Maximum number of MPLS Traffic Descriptors per NE
200
Table B-21
Limits for MPLS VC-LSPs
Maximum number of VC-LSPs
504000
Depending of NE type are defined different limits for each object that 1350 OMS PKT provisions on the boards. The table these limits: Table B-22
Limits for each board
Board Type
ES1 3FE
ES1 8FE
ES1 8FX
Board Version
Traffic Descriptor Limit
Color Profile Limit
Cross Connection limit
Traffic Classifier Limit
1.0
1
Not supported
16
16
1.1 / 1.1B
8
Not supported
1512
512
1.0
1
Not supported
16
16
1.1 / 1.1B
8
Not supported
1512
512
1.1 / 1.1B / 1.2
8
Not supported
1512
512
.................................................................................................................................................................................................................................... 1350 OMS B-4 8DG42227DAAA 9.6 Issue 3 December 2012
Application Limits
Limits
....................................................................................................................................................................................................................................
Table B-22
Limits for each board
Board Type
Board Version
(continued)
Traffic Descriptor Limit
Color Profile Limit
Cross Connection limit
Traffic Classifier Limit
ES4 8FE
1.1 / 1.1B / 1.2
8
Not supported
1512
512
ISA PR EA S1P
1.0
200
Not supported
2000
2000
1.1 / 1.2
200
256
2000
5000
1.0
200
Not supported
2000
5000
1.1 / 1.2
200
256
2000
5000
1.0
200
Not supported
2000
5000
1.1 / 1.2
200
256
2000
5000
ES16- No Access Module
2.0
200
256
20000
20000
ES16 - Access Module: 14FE
2.0
200
256
20000
20000
ES16 - Access Module: 4GE
2.0
200
256
20000
20000
ES16 - No Access Module
2.1
200
256
20000
20000
ISA PR EA 4ETH
ISA PR EA 1GEP
.................................................................................................................................................................................................................................... 1350 OMS B-5 8DG42227DAAA 9.6 Issue 3 December 2012
Application Limits
Limits
....................................................................................................................................................................................................................................
.................................................................................................................................................................................................................................... 1350 OMS B-6 8DG42227DAAA 9.6 Issue 3 December 2012
Appendix C: List of Abbreviations
Abbreviations List Abbreviation
Meaning
100Base-T
100 Mb/s IEEE standard Physical Ethernet interface.
10Base-TX
10 Mb/s IEEE standard Physical Ethernet interface.
1355VPN
Virtual Private Network manager (Alcatel-Lucent product).
14FE
Board type.
1678MCC
Alcatel-Lucent equipment.
1GEP
Board type.
3FE
Board type.
4ETH
Board type.
4GE
Board type.
802.1ad
IEEE standard (Provider Edge Bridging).
802.1D
IEEE standard (MAC Bridge).
802.1p
IEEE standard (Priority Queuing).
802.1Q
IEEE standard (Virtual Bridge).
802.1X
IEEE standard. Port Based Network Access Control.
8FE
Board type.
8FX
Board type.
AAR
Audit/Align/Reserve (as a single function).
ACL
Access Control List.
ADM
Add and Drop Multiplexer.
AF
Assured Forwarding.
AIS
Alarm Indication Signal.
ALMAP
Alcatel-Lucent MAnagement Platform.
ANSI
American National Standards Institute.
................................................................................................................................................................................................................................... 1350 OMS C-1 8DG42227DAAA 9.6 Issue 3 December 2012
List of Abbreviations
Abbreviations
....................................................................................................................................................................................................................................
Abbreviation
Meaning
AS
Alarm Surveillance; Alarm Surveillance interface.
ASAP
Alarm Severity Assignment Profile.
ATM
Asynchronous Transfer Mode.
BA
Broadband Access.
BE
Best Effort.
BM
Broadband Management, Broadband Manager.
BPDU
Bridge Protocol Data Units.
BSR
Broadband Service Router.
BTV
Broadcast Tele Vision.
BW
BandWidth.
CAC
Check Admission Control.
CBS
Committed Burst Size.
CCITT
Telegraph and Telephone International Consultative Committee.
CD-ROM
Compact Disk Read Only Memory.
CE
Customer Edge.
CES
Circuit Emulation Service.
CE-VLAN
Customer Edge VLAN.
CIR
Committed Information Rate.
CIST
Common and Internal Spanning Tree.
CM
Connect Manager.
CNA
CMISE Element Network Adapter.
CORBA
Common Object Requesting Broker Architecture.
CoS
Class of Service.
CP
Connection Profile; Connectivity Problem.
CPE
Customer Premise Equipment.
CSF
Client Signal Failure.
CTP
Connection Termination Point.
C-VLAN
Customer VLAN.
DB
Database.
DEG
Degraded Signal.
DSCP
Differentiated Services Code Point.
DSLAM
Digital Subscriber Line Access Multiplexer.
DWDM
Dense Wavelength Division Multiplexing.
DXC
Cross-Connect.
.................................................................................................................................................................................................................................... 1350 OMS C-2 8DG42227DAAA 9.6 Issue 3 December 2012
List of Abbreviations
Abbreviations
....................................................................................................................................................................................................................................
Abbreviation
Meaning
E/FE
Ethernet and Fast Ethernet board.
E/FE/GE
Ethernet/Fast Ethernet/Gigabit Ethernet.
E2E
End to End.
EBS
Excess Burst Size.
EF
Expedited Forwarding.
EIR
Excess information Rate.
E-LAN
Ethernet LAN.
E-LINE
Ethernet Line.
ELR
Effective Line Rate.
E-LSP
EXP inferred LSP.
EML
Element Management Layer.
ENE
External Network Element.
eOMS
Element Management System.
EOT
Ethernet Over Transport; end-of-task.
EPL
Ethernet Private Line.
EPLAN
Ethernet Private LAN.
EPLANE
Ethernet Private Local Area Network Emulation.
EPLINE
Ethernet Private Line.
EPTL
Ethernet Private Transparent Line.
EPTLINE
Ethernet Private Line.
ES
Ethernet Switching equipment.
ES1
ISA Ethernet Switch equipment.
ES1/4
ISA Ethernet Switch equipment.
ES16
ISA Ethernet Switch equipment.
ES4
ISA Ethernet Switch equipment.
ETB
Ethernet Transport Bridging.
ETH
Ethernet.
ETP
External Termination Point.
E-TREE
Ethernet tree service type.
ETS
Ethernet Transport Service.
ETSI
European Telecommunications Standards Institute.
EVC
Ethernet Virtual Connection.
EVP
Ethernet Virtual Private.
EVPL
Ethernet Virtual Private Line.
.................................................................................................................................................................................................................................... 1350 OMS C-3 8DG42227DAAA 9.6 Issue 3 December 2012
List of Abbreviations
Abbreviations
....................................................................................................................................................................................................................................
Abbreviation
Meaning
EVPLAN
Ethernet virtual private LAN.
EVPLINE
Ethernet Virtual Private Line.
FAD
Function Access Domain.
FE
Fast Ethernet.
FM
Fault Management.
FR
Fault Report.
FW
Farward.
GARP
Generic Attribute Registration Protocol.
Gbit
Giga bits.
Gbit/s
Gigabits per Second.
Gbps
Gigabits per Second.
GE
Gigabit Ethernet.
GENOS
generic OS-to-OS.
GFP
Generic Frame Protocol.
GMPLS
Generalized Multi Protocol Label Switching.
GMRP
GARP Multiple Registration Protocol.
GTM
GFP Type Mismatch Alarm.
GUI
Graphical User Interface.
GVRP
GARP VLAN Registration Protocol.
HA
High Availability.
HDLC
High Level Data Link Control.
HSI
High Speed Internet.
HTML
HyperText Markup Language.
I/O
input/output.
Id
identify, identifier; identification.
IEEE
Institute of Electrical and Electronics Engineers.
IETF
Internet Engineering Task Force.
IGMP
Internet Group Management Protocol.
IM
Information Manager.
IP
Internet Protocol.
ISA
Industry Standard Architecture.
ISA E/FE
ISA Ethernet Switch equipment.
ISA E/FE/GE
ISA 10/100 Eth /ISA Gb Eth.
ISA ES
ISA Ethernet Switch.
.................................................................................................................................................................................................................................... 1350 OMS C-4 8DG42227DAAA 9.6 Issue 3 December 2012
List of Abbreviations
Abbreviations
....................................................................................................................................................................................................................................
Abbreviation
Meaning
ISA ES1
ISA Ethernet Switch equipment.
ISA ES1/4
ISA Ethernet Switch equipment.
ISA ES16
ISA Ethernet Switch equipment.
ISA ES4
ISA Ethernet Switch equipment.
ISA PR
Integrated Service Adapter Packet Ring.
ISA PR EA
Integrated Service Adapter Packet Ring Edge Aggregator.
ISA PR ES16
ISA Ethernet Switch equipment.
ISP
Internet Service Provider.
IWI
Interworking Interface.
Kb/s
Kilo bits per second.
Kbit
Kilo bits.
Kbit/s
Kilo bits per second.
L2CP
Layer 2 Control Protocol.
LAC
Local Access Control.
LACP
Link Aggregation Control Protocol.
LAG
Link Aggregation Group.
LAN
Local Area Network.
LAPS
Link Access Procedure for SDH.
LER
Label Edge Router.
LO
Low Order.
LOF
Loss-of-Frame.
LOS
Loss-of-Signal.
LSP
Label Switched Path.
LSR
Label Switched Router.
MAC
Media Access Control.
MAN
Metropolitan Area Network.
MAU
Medium Attachment Unit.
max
maximum.
Mb/s
Mega bits per second.
Mbps
Megabits per second.
MEF
Metro Ethernet Forum.
MEN
Metro Ethernet Network.
MEP
Maintenance End Point.
MIB
Management Information Base.
.................................................................................................................................................................................................................................... 1350 OMS C-5 8DG42227DAAA 9.6 Issue 3 December 2012
List of Abbreviations
Abbreviations
....................................................................................................................................................................................................................................
Abbreviation
Meaning
min
minimum.
MISTP
Multiple Instance Spanning Tree Protocol.
MPLS
Multiple Protocol Label Switching.
MPtoMP
Multi Point to Multi Point.
MS-GUI
Multi Service - Graphical User Interface.
MSTI
Multiple Spanning Tree Instance.
MSTP
Multiple Spanning Tree Protocol (also called MISTP).
MW
Middleware equipment.
MW-INT
Middleware Interface.
NA
Network Adapter.
NAD
Network Access Domain.
NAP
Network Access Point.
NBI
Northbound Interface.
NE
Network Element.
NML
Network Management Layer.
NMS
Network Management System.
NNI
Network-to-Network Interface.
NV
Native View.
OAM
Operations, Administration, and Maintenance.
OMSN
Optical Multi-Services Node.
OS
Operating System, as in UNIX; Operations System; Optical Section.
OSK
Operation System Kernel.
OTH
Optical Transport Hierarchy.
PAE
Port Access Entity.
PBS
Peak Burst Size.
PC
personal computer.
PCP
Priority Code Point.
PDF
Portable Document Format.
PE
Provider Edge or Edge node.
PHB
Per Hop Behaviour.
PIR
Peak Information Rate.
PKT
Packet.
PLM
Payload Label Mismatch.
PLS
Physical Layer Signalling.
.................................................................................................................................................................................................................................... 1350 OMS C-6 8DG42227DAAA 9.6 Issue 3 December 2012
List of Abbreviations
Abbreviations
....................................................................................................................................................................................................................................
Abbreviation
Meaning
PM
Performance Monitoring.
PMC
Process Monitoring Control.
POP
Point Of Presence.
PPT
Ethernet Physical Port.
PR EA
Packet Ring Edge Aggregator (ISA Ethernet Switch equipment).
P-tagged
Proprietary tagged frame.
PtoMP
Point to Multi Point.
PtoP
Point to Point.
PTP
Physical Termination Point.
P-VLAN
Provider VLAN.
PVSTP
Per-VLAN Spanning Tree Protocol.
PW
Pseudo Wire.
Q3
CMISE-based OSI Inteface.
QoS
Quality of Service.
Q-TAG
Standard VLAN tag.
Q-tagged
Standard VLAN tagged frame.
RM
Regional Manager. Ring Manager.
RMP
routed multipoint.
RPR
Risilient Packet Ring.
RSTP
Rapid Spanning Tree Protocol.
S1P
Board type.
SC
Service Connect.
SDH
Synchronous Digital Hierarchy.
SLA
Service Level Agreement.
SMF
System Management Functions.
SML
Service Management Layer.
SNMP
Simple Network Management Protocol.
SNMP NE
Either an ISA board or a 4G NE.
SONET
Synchronous Optical Network.
STI
Spanning Tree Instance.
STP
Spanning Tree Protocol.
SUBM
Alcatel-Lucent SUBMarine equipments.
S-VLAN
Service VLAN.
TCI
Tag Control Information.
.................................................................................................................................................................................................................................... 1350 OMS C-7 8DG42227DAAA 9.6 Issue 3 December 2012
List of Abbreviations
Abbreviations
....................................................................................................................................................................................................................................
Abbreviation
Meaning
TDM
Time Division Multiplexing.
TL
Transport Link.
TL1
Transaction Language 1.
T-MPLS
Transport Multiple Protocol Label Switching.
TNA
TL1 Network Adapter.
TOS
Type Of Service.
TSF
Trail Signal Failure.
TSS
Transport Service Switch.
TU
Transport Unit.
UI
User Interface.
UNI
User Network Interface.
URU
Underlying Resource Unavailable.
VC
Virtual Container; Virtual Connection.
VC12
Virtual Container 1/2 Mbit/s.
VC-LSP
Virtual Connection - Label Switched Path.
VID
VLAN Identifier.
VLAN
Virtual Local Area Network.
VPAS
Virtual Private Access Services.
VPHS
Virtual Private Hub Services.
VPLAN
Virtual private LAN.
VPLS
Virtual Private LAN Services.
VPN
Virtual Private Network.
VPWS
Virtual Private Wire Services.
VT
Virtual Terminal
WDM
Wavelength Division Multiplexing.
XC
Cross-Connect.
XML
Extensible Markup Language.
XoS
XML-over-socket.
.................................................................................................................................................................................................................................... 1350 OMS C-8 8DG42227DAAA 9.6 Issue 3 December 2012
Index
Symbols
EmlAdapter process, 4-3
.data log file suffix, 6-2 .dataflow log file suffix, 6-2
NmlAdapter process, 4-3 Added value modules
.log log file suffix, 6-2
1350 OMS HA, 1-5
*_dbi.log, 6-2
1350 OMS OI, 1-5
*Gui.log, 6-3 ............................................................. Numerics
1350 OMS applications, 1-2
Administration functions, 11-43 Administrator, 11-71 Also see: System management AF See: Assured Forwarding See: Assured Forwarding (AF)
Alignment, 23-4, 23-26 Also see: Utilities Also see: Utilities after deletion and recreation of SDH Path, 12-61 offline procedure AlignDBSDHPathID, 12-61 All to One Bundling attribute See: User Network Interface (UNI) allTracesModify.log, 6-3 Any to Any See: Service classification
definition, 1-2
Alarm management See: Fault Management
supported NEs, 1-4
Alarm synchronization, 22-15
Backup and restore, 2-2
Alarms
instances, 2-1
1350 OMS PKT application General information, 11-3
AlmAdapter process, 4-3
Applications
Process Monitoring, 2-1
1354BM.log, 6-2
AS_Current_IM process, 4-3
ascurusm.log, 6-3
1678MCC NE
AS_Historic_IM process, 4-3
Assured Forwarding (AF), 11-66, 15-5
Add port, 13-141 Overview, 13-140 Remove port, 13-143 ............................................................. A AAR
See: Utilities Access control default operator profiles, 5-2 Access Control Data Base, 11-71 Adapters
Align Up See: Utilities AlignDBSDHPathID See: Alignment AlignDBSDHPathID Tool definition, 10-2 operating principals, 10-2
Audience intended for this document, lxix, lxx Audit See: Utilities Audit results, 23-8, 23-24 Also see: Utilities Also see: Utilities
Run AlignDBSDHPathID Tool task, 10-3
for Construction domain, 23-8
tool location and execution, 10-2
for MPLS domain, 23-10
for Ethernet domain, 23-8
for T-MPLS domain, 23-11
AlmAdapter process, 4-3 .................................................................................................................................................................................................................................... 1350 OMS IN-1 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Auditable NEs See: Utilities Audited NEs See: Utilities Autonegotiation, 11-52 Also see: Network Topology Construction
Configure Edge Port, 19-83 Create, 19-49
Add NE to a Domain, 19-91
Delete, 19-56
Configure a NE, 19-98
Delete Termination, 19-81
Create a Customer, 19-104
Details, 19-58
Create an Ethernet Service, 19-107
.............................................................
Inventory Transport Link, 19-64
B BA
List, 19-47 See: Broadband Access (BA)
Modify, 19-53
Back hauling, 11-31
Overview, 19-6
Backups
Remove Transport Link, 19-63
Application backups, 2-2
Routing Display, 18-75
Full system backups, 2-2
Show PM, 18-74
Bandwidth Profile, 19-17
Bridge Workflow, 19-88
Show STI, 19-119
Create and configure EVC, 19-111 Create Domain, 19-90 Domain configuration, 19-88 Domain Configuration, 19-94 Domain definition, 19-88 Domain Modification, 19-96 Ethernet Physical Port configuration, 19-102
Default operations, 19-19
Start PM, 18-71
EVC provisioning, 19-20
Stop PM, 18-72
Link Over TDM configuration, 19-100
Manual operations, 19-19
Synchronize PM, 18-73
NE configuration, 19-89
per CoS, 19-18
Terminations, 19-72
Overwiew, 19-88
per EVC, 19-18
View Provider Bridge Flows, 19-26
Traffic Descriptor Definition, 19-109
per UNI, 19-18, 19-18 QoS, 19-19
Bridge NE, 19-22
Broadband Access (BA), 11-8
See: Best Effort (BE)
Bridge Network See: Ethernet Transport Bridging (ETB)
Broadcast Containment See: Broadcast Domain Containment
BmAdaptationModifyTrace.log, 6-3
Bridge Traffic management See: Ethernet Transport Bridging (ETB)
Broadcast Domain Containment
BmMplsModifyTrace.log, 6-3, 6-3
Bridge Transport Link
BE Best Effort (BE), 11-66
Bridge Edge Port
Activate, 19-41
Activate, 19-45
Add to EVC, 19-62
Configure, 19-83
Configure, 19-30
Deactivate, 19-46
deactivate, 19-42
List, 19-43
Details, 19-38
Description, 20-76 Disable, 20-78 Enable, 20-77 Broadcast Service Type See: Service Type Broadcast Tele Vision See: Broadcast TV (BTV) Broadcast TV (BTV), 11-24 Also see: Service Type
Bridge ENE, 19-24
Get extremities, 19-34
Bridge EVC
Inventory, 19-64
Bridge Based Service, 21-40
Add Termination, 19-74
List, 19-27
Bridge Services, 21-41
Add Transport Link, 19-62
Remove from EVC, 19-63
Configure, 19-61
Construction workflow, 21-24 Create, 21-8
.................................................................................................................................................................................................................................... 1350 OMS IN-2 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Create Customer, 21-34 Create element, 21-26 Create ETP, 21-20 Create EVC, 21-37 Create Link, 21-29 Create path, 21-25
CES See: Circuit Emulation Services CES procedures, 25-53 Assign resources to Radio Domain, 25-62
Create Service, 21-35
Assign resources to T-MPLS Domain, 25-63
Delete, 21-14
CES attributes, 25-107
Details, 21-16 EVC management, 21-44
CES configuration, 25-127 CES creation, 25-122
IGMP Snooping management, 21-42
CES inventory, 25-126
IGMP Snooping state, 21-44 List, 21-6
CES Nodes See: CES NE
List ETP, 21-18
CES Routing display, 25-130
Modify, 21-11 Overview, 21-3 Service workflow, 21-33 BTV See: Broadcast TV (BTV) Bundling See: User Network Interface (UNI) B-VID See: PBB B-VID ............................................................. C CBS
See: Committed Burst Size (CBS) CC Continuity Check (CC) See: Operations, Administration, and Maintenance (OAM) CDN See: CORBA-based interface (CDN) CE See: Customer Edge (CE)
CES list, 25-106
CES termination attributes, 25-115 CES termination configuration, 25-131 CES termination list, 25-114 Deassign resources from Radio Domain, 25-62
Link Over Radio list, 25-90 Link Over Radio properties, 25-92 Link Over Radio property attributes, 25-93 Link Over Radio synchronization, 25-96 NE attributes, 25-65 NE inventory, 25-68 NE List, 25-64 NE properties, 25-66 NE property attributes, 25-67 PDH Port attributes, 25-79 PDH Port inventory, 25-84 PDH Port properties, 25-82 PDH Port property attributes, 25-83 PDH ports, 25-78 Protection Group inventory, 25-70 Radio Port attributes, 25-98 Radio Port inventory, 25-101
Deassign resources from T-MPLS Domain, 25-63
Radio Port list, 25-97
Domain creation, 25-61 Domain inventory, 25-60
Radio Port property attributes, 25-100
Domain List, 25-58
Stitch tunnels, 25-105
Domain properties, 25-59
Takeover for MEF8, 25-132
Edge Port attributes, 25-86
Takeover for SATOP, 25-134
Edge Port inventory, 25-89
Transport Link attributes, 25-72
Edge Port list, 25-85 Edge Port properties, 25-87 Edge Port property attributes, 25-88 Join tunnels, 25-104 Link Over Radio attributes, 25-91 Link Over Radio inventory, 25-94
Radio Port properties, 25-99
Transport Link extremity inventory, 25-76 Transport Link inventory, 25-75 Transport Link List, 25-71 Transport Link properties, 25-73 Transport Link properties attributes, 25-74
.................................................................................................................................................................................................................................... 1350 OMS IN-3 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
VLAN Paths attributes, 25-103 VLAN Paths list, 25-102 CE-VLAN, 11-12 CIR See: Committed Information Rate (CIR) Circuit Emulation Services AAR Network Operation, 25-50
Implementation, 25-36, 25-38, 25-38, 25-39, 25-40, 25-43, 25-43 inband management, 25-13
Reservation, 25-52, 25-52, 25-52
Interworking, 25-25, 25-25, 25-26, 25-26
Reservation of Link over T-MPLS, 25-14
join, 25-27
Resource assignment, 25-12
layering, 25-4
Resource assignment to T-MPLS domain, 25-14
Loopback management, 25-21, 25-21
Alarm management, 25-17, 25-18, 25-18, 25-18
Manual deimplementation, 25-36
Align, 25-51, 25-51, 25-51
Manual synchronization of PDH links, 25-25
Audit, 25-50, 25-50, 25-50 Bandwidth, 25-41 CAC tolerance, 25-11 Configuration, 25-42, 25-42, 25-43 Control word, 25-15 CoS, 25-29 CoS/PHB Profile compatibility, 25-29
MEF 8, 25-7 modulation mode, 25-11 Navigation, 25-55 network role on PDH port, 25-25 OAM and protections, 25-45, 25-46, 25-48 OAM and protections on PACKET radio, 25-17
creation, 25-33
OAM and protections on T-MPLS, 25-22
creation and allocation, 25-27
Overview, 25-4
deallocation, 25-32
PDH degrade thresholds (TSS-5C), 25-23
definitions, 25-4 deletion, 25-32 E1, 25-36
QoS management, 25-24
infrastructures, 25-5
Alarm correlation, 25-22, 25-23, 25-23, 25-23
allocation, 25-33, 25-35
Protection setup (Workaround), 25-9
Performance Monitoring, 25-19, 25-19, 25-19, 25-19
E1 signal, 25-34, 25-35
Port assignment, 25-12, 25-14, 25-14, 25-22
Encapsulation, 25-7, 25-7, 25-29
Port deassignment, 25-12, 25-14
External Interfaces, 25-7
Port segregation, 25-27
External Products, 25-6 Fault localization, 25-45
Protection Group, 25-20, 25-20, 25-20
IETF, 25-7
Protection schemes, 25-9 Protection setup, 25-9
Routing display, 25-30 SAToP, 25-7 scenarios, 25-4 security, 25-27 stitch, 25-27 Supported flow, 25-38 Switch synchronization, 25-21 synchronization between CES terminations, 25-8 synchronization of Transport Link, 25-13 Takeover, 25-52 Takeover description, 25-52 TDM traffic, 25-7 terminated, 25-33 timestamp frequency, 25-16 Traffic Flow, Ethernet To Radio, 25-39, 25-41 Traffic Flow, PDH To Ethernet, 25-38, 25-41 Traffic Flow, PDH To Radio, 25-38, 25-39, 25-40, 25-40 Traffic Flow, Radio To Ethernet, 25-38, 25-41 Traffic Flow, Radio To Radio, 25-38, 25-38, 25-41 Transport link assignment, 25-12 Transport link deassignment, 25-12
.................................................................................................................................................................................................................................... 1350 OMS IN-4 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
tunnel type management, 25-30
Allocation, 18-54
unterminated, 25-4
Commission, 18-58
Unterminated, 25-39
Configure, 19-61
CORBA-based interface (CDN), 11-42 See: Software interfaces Also see: Software interfaces
Create, 18-44
Core
Class of Service (CoS) CoS Preservation, 18-41 Color Profile
Deallocation, 18-55
c_AuditAlignRecovery, 4-3
Decommission, 18-59
c_DataManagement process, 4-3
Create, 18-135
Deimplement, 18-57
Delete, 18-139
Delete, 18-49
c_EquipmentTopology, 4-3
Details, 18-140
Delete Termination, 18-62
c_FaultManagement process, 4-3
List, 18-134
Details, 18-51
Modify, 18-136
Fault Localization, 18-68
Overview, 18-133
Get terminations, 18-60
Color Profile Management macro functions and default user profiles, 5-12 Command Log, 2-3 administration, 2-3 Committed Burst Size (CBS), 11-64 Committed Information Rate (CIR), 11-64 Compressed transmission, 11-30, 11-31 Configuration Access the System Configuration Window and Configure a 1350 OMS Application task, 3-3 Integrate the 1350 OMS PKT Master Workstation with the Client Workstation task, 3-9 Integrate the 1350 OMS PKT with Other NMSs task, 3-8 Configure the application, 11-43 Confirm the action, 11-40 Connection Less Networks See: Ethernet Transport Bridging (ETB) Connection Oriented EVC Add termination, 18-66
Implement, 18-56
c_Scheduler, 4-3 c_TopologyManagementprocess, 4-3
List, 18-42
CoS See: Class of Service (CoS)
Modify, 18-47
CoS Preservation, 18-44
Overview, 18-37
CPE See: Customer Premise Equipment
Properties, 18-63 Routing Display, 18-75
Start PM, 18-71
Cross Connection, 18-197, 15-63 See: T-MPLS Pseudo Wire See: T-MPLS tunnel Also see: LSP Tunnel
Stop PM, 18-72
Customer
Show PM, 18-74
Synchronize PM, 18-73 Constraint of Ethernet Segment, 18-213 of LSP Tunnel, 15-53, 15-56, 15-58, 15-60
Create, 18-11 Customer Edge (CE), 11-49 Also see: Network Topology Construction Delete, 18-14
of T-MPLS Pseudo Wire, 16-60, 16-62, 16-76, 16-78
Details, 18-15
of T-MPLS Tunnel, 16-109, 16-111
List, 18-9
Constructor, 11-71 Also see: System management Continuity Check (CC) See: Operations, Administration, and Maintenance (OAM)
inventory Services, 18-36
Modify, 18-12 Overview, 18-8 Single-Customer, 12-69 VLAN Mapping, 11-59 Also see: Ethernet Frame Hierarchy VLAN tunneling, 11-61 Also see: Ethernet Frame Hierarchy
.................................................................................................................................................................................................................................... 1350 OMS IN-5 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Customer management macro functions and default user profiles, 5-9
Configure OAM ETH DM Tool, 24-50
Deactivate DM Tool, 24-46
C-VLAN
List, 24-38
C-VLAN Preservation, 18-41, 18-44
Inventory, 24-48
Documentation related documents, lxxiii Domain Assign resource, 13-27 Create, 13-20
D Data Plane
create Topological View, 13-34
Databases PM Administration, 2-2 databases/dbbmml/data directory, 6-4 DB_SIZE parameter, 7-6 DEI bit, 20-81 Directories
Delete, 13-24 Details, 13-25 eOMS, 13-15 ETB Domain, 13-15 ETS Domain, 13-15 Indirect, 13-15 inventory of NE, 13-31
databases/dbbmml/data, 6-4
inventory of Transport Links, 13-32
ORACLE/databases/dbnml/ admin/bdump, 6-3
inventory of VT Queue Profiles, 13-33
ORACLE/databases/dbnml/ admin/create, 6-3
List, 13-17
ORACLE/databases/dbnml/ admin/logbook, 6-3 ORACLE/databases/network, 6-4 SMF/tools/log/data, 6-3 TAO/maintenance/trace, 6-4 DM (Packet) Delay Measurement See: DM Tool DM Tool, 24-33 Activate DM Tool, 24-46 Configure Maintenance End Points, 24-36
See: End-to-End E_Bridge
Description, 24-34
.............................................................
See: EVC
E E2E
Create ETH DM Tool, 24-42
Customer Premise Equipment (CPE), 11-48 Also see: Network Topology Construction
Customer VLAN, 11-59 Also see: Ethernet Frame Hierarchy
.............................................................
Modify, 13-22 Overview, 13-15 Domain management, 11-47 Also see: Network Topology Construction macro functions and default user profiles, 5-3 Domain Wide VID distribution See: PBB B-VID Duplex mode
E_Bridge process, 4-4 Edge Port See: Ethernet Edge Port EF See: Expedited Forwarding (EF) Egress (-ing), 11-35 Element Management Layer (EML), 11-5 ELP See: Ethernet Linear Protection (ELP) EML See: Element Management Layer EML Proxy, 11-43 EML-IM, 11-43 EMLStart.log, 6-2 Encapsulation Layer-2 See: T-MPLS Pseudo Wire See: T-MPLS tunnel Martini See: Martini encapsulation End-to-End, 18-76 Also see: End-to-End EVC Also see: End-to-End Service End-to-End EVC Create, 18-80 Create full EVC, 18-84 Create raw EVC, 18-86 Full E2E EVC, 18-76 Join, 18-89
full mode, 11-52
List, 18-78
half mode, 11-52
Modify full EVC, 18-87 Overview, 18-76 Prevented Actions, 18-77
.................................................................................................................................................................................................................................... 1350 OMS IN-6 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Raw E2E EVC, 18-76 End-to-End Service, 11-11 ENE See: External Network Element (ENE) ENE management macro functions and default user profiles, 5-4 EOT e_AuditAlignRecovery process, 4-4
ERP Instance See: Ethernet Ring Protocol (ERP) ETB See: Ethernet Transport Bridging (ETB) Ether Type Frame Classification, 18-6 Ethernet connectivity See: Functional domain Ethernet Edge Physical Port Configure, 18-172
e_DataManagement process, 4-4
Details, 18-175
e_Facility process, 4-4
List, 18-169
e_FaultManagement process, 4-4
List traffic parameters, 18-177
e_ProfileManagement process, 4-4 e_ServiceManagement process, 4-4 e_TrafficManagement process, 4-4 EotModifyTrace.log, 6-3 EPL See: Ethernet Private Line See: Ethernet Private Line (EPL) EPTL See: Ethernet Private Transparent Line Equipment Inner equipment, 11-48 Also see: Network Topology Construction Provider equipment, 11-48 Also see: Network Topology Construction view, 13-70 ERP See: Ethernet Ring Protection See: Ethernet Ring Protocol
VLAN Tag, 11-54 VLAN Tag Protocol Type, 11-54 Ethernet Linear Protection (ELP), 28-16 Add protection, 28-39 Alarms, 28-51 Audit, 28-52 Condition for protecting, 28-38 Condition for unprotecting, 28-38 Configure protection, 28-42 de-implementation, 28-49 Description, 28-34
macro functions and default user profiles, 5-10
Disabled operations, 28-50
Modify, 18-170
EVC specific Attributes, 28-36
Overview, 18-168 Show equipment, 18-180 Ethernet Edge Port
Force align, 28-53 Implementation, 28-48 Inventory, 28-33
Show External Termination Point, 18-183
Inventory of MA, 28-55
Show PM, 18-182
Inventory of Transport Link, 28-54
Ethernet Edge Port management, 11-51 Also see: Network Topology Construction Ethernet Frame Hierarchy Customer VLAN mapping, 11-54 Customer VLAN tunneling, 11-54 Overview, 11-54 Also see: Traffic Management Overview Provider VLAN mapping, 11-54
Linear, 28-38 Manual alignment, 28-47 OAM, 28-52 PM, 28-52 Properties, 28-43 Remove protection, 28-41 Reservation, 28-53 Routing Display, 28-56 Send APS command, 28-45 Take-Over, 28-53 Ethernet Macro functions
Provider VLAN tunneling, 11-54
Color Profile management, 5-12
VLAN management, 11-55
Customer management, 5-9
.................................................................................................................................................................................................................................... 1350 OMS IN-7 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Ethernet Edge Physical Port management, 5-10
Ethernet Ring Protection (ERP), 20-107
Ethernet Segment management, 5-11
Ethernet Ring Protocol (ERP)
Ethernet Traffic Classifier management, 5-10 Ethernet Traffic Descriptor management, 5-10 Ethernet Transport Segment management, 5-11 EVC management, 5-9 Provider Network management, 5-13 Service management, 5-9 Transport Link management, 5-12 VLAN Type management, 5-13 Ethernet Operations, Administration, and Maintenance (OAM), 24-1 See: Operations, Administration, and Maintenance (OAM) Ethernet Physical Port, 13-96 assign to Domain, 13-35 Assign to domain, 13-106 Configure, 13-99 deassign from Domain, 13-36 Details, 13-108 List, 13-96 Modify, 13-104 Navigation to equipment, 13-111 Ethernet physical port management macro functions and default user profiles, 5-5
Add/remove Node, 20-116 Add/remove ring in a bundle, 20-118 Add/remove Transport Link, 20-115 associate to OAM, 20-126 Create/delete, 20-110
Details, 18-240 Details of constraint, 18-219 Disassociate a Traffic Classifier, 18-211 Get extremities, 18-235 Get Route, 18-242 Implement, 18-229 List, 18-199 List constraint, 18-216
Create/delete bundle, 20-117
macro functions and default user profiles, 5-11
Create/delete ERP instance, 20-123
Modify, 18-205
Fault Localization, 20-134 Graphical view, 20-127 Implement/deimplement, 20-112, 20-125 Instance List, 20-121 List, 20-108 Modify Defined ERP instance, 20-129 Modify implemented ERP instance, 20-131 Navigation to AS, 20-134 Overview, 20-10 Switch Command, 20-113, 20-114 Ethernet Segment, 11-6
Modify constraint, 18-222 Overview, 18-197 Ethernet Service, 11-6, 11-15 All to One Bundling attribute See: User Network Interface (UNI) Bundling Service attribute See: User Network Interface (UNI) Create, 18-22 Delete, 18-32 Details, 18-33 List, 18-20 management, 11-53 Also see: Traffic Management
Add constraint, 18-213
Modify, 18-30
Allocate, 18-226
Overview, 18-17
Associate a Traffic Classifier, 18-209
Service Multiplexing attribute See: User Network Interface (UNI)
Configure, 18-233 connectivity view, 18-244 Create, 18-202
Ethernet Private Line (EPL), 11-8, 11-18
Deallocate, 18-227
Ethernet Private Transparent Line (EPTL), 11-17
Delete, 18-208
Deimplement, 18-231
Delete constraint, 18-218
Setup, 18-24 Ethernet Switch, 18-197 Ethernet Termination Point (ETP) Create, 21-20 Delete, 21-22 List, 21-18
.................................................................................................................................................................................................................................... 1350 OMS IN-8 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Ethernet Traffic Classifier management macro functions and default user profiles, 5-10 Ethernet Traffic Descriptor management macro functions and default user profiles, 5-10 Ethernet Transport Bridging (ETB), 19-4 Also see: Bridge Overview, 19-4 Ethernet Transport Link Bandwidth load, 18-196 Configure, 18-188
Ethernet Virtual Private Line (EVPL), 11-8, 11-16
Extended Ethernet Virtual Private Line (Extended EVPL), 11-20
ETP See: Ethernet Termination Point
Extended EVPL See: Extended Ethernet Virtual Private Line
ETS See: Ethernet Transport Service (ETS)
Extended EVPLAN See: Extended Ethernet Virtual Private LAN
ETS NNI Interface
External Network Element (ENE), 13-78, 11-48 Also see: Network Topology Construction
VLAN Push/Pop See: VLAN Management EVC See: Ethernet Virtual Connection (EVC) EVC Bandwidth
Create, 13-82 Delete, 13-87 Details, 13-88
Dynamic change, 19-112
List, 13-80
EVC Terminations, 19-116
Modify, 13-85
Implemented Object applicability, 19-113
Overview, 13-78
List, 18-186 Overview, 18-184
Object applicability, 19-112
Details, 18-193 Get extremities, 18-190
Ethernet Transport Segment macro functions and default user profiles, 5-11 Ethernet Transport Service (ETS), 11-6 Also see: Traffic Management Also see: Connection Oriented Ethernet Virtual Connection (EVC), 11-6 Also see: Bridge EVC Also see: End-to-End EVC Data Plane, 19-11 Fault Localization, 19-65, 19-70 Life cycle See: Spanning tree instance Start OAM, 24-28 Ethernet Virtual Private hub (EVP Hub), 11-8 Ethernet Virtual Private LAN (EVPLAN) See: LAN
Object status applicability, 19-113 EVC management, 11-53 Also see: Traffic Management macro functions and default user profiles, 5-9 EVP Hub See: Ethernet Private Line hub (EVP hub) EVPL See: Ethernet Virtual Private Line See: Ethernet Virtual Private Line (EVPL) EVPLAN See: Ethernet Virtual Private LAN Expedited Forwarding (EF), 11-66 Extended Ethernet Virtual Connection See: End-to-End EVC Extended Ethernet Virtual Private LAN (Extended EVPLAN), 11-21
External termination management macro functions and default user profiles, 5-5 External Termination Point Create, 13-92 Delete, 13-94 List, 13-90 ............................................................ F FAD
See: Functional Access Domain Failure management log file location, 6-5 log file suffixes, 6-5 Fault Localization, 11-69 List, 22-12 Navigation to equipment, 19-65 Navigation to manager, 19-70 Fault Management (FM), 22-12, 22-12 Also see: Fault Localization Alarm probable cause, 22-2
.................................................................................................................................................................................................................................... 1350 OMS IN-9 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Alarm synchronization, 22-15
Graphical User Interface (GUI), 11-39
Client Signal Fail, 22-16
Grooming feature, 11-31
from ISA E/FE/GE board, 22-3
GUI See: Graphical User Interface
from ISA ES1 board, 22-4 from ISA ES16 board, 22-6
.............................................................
from ISA ES4 board, 22-4 H Half mode
on SDH paths, 22-8
See: Duplex mode
Overview, 22-2
Hash key, 13-118
Flow control
High Speed Internet (HSI), 11-22
Asymmetric, 11-52 Symmetric, 11-52 FM See: Fault Management (FM) Frame delivery, 18-41, 18-44 Frame distribution See: Hash key
Instances, 2-1 Interworking Interface (IWI), 11-48 IP address See: TCP/IP address IP DSCP/TOS
Hub & Spoke Topology, 11-31 Also see: Network Topology Description
ISA BCE Ethernet Board
In Band
free pool, 11-71, 11-72
Address Configuration, 20-157
Full E2E EVC See: End-to-End EVC
LAG port creation, 20-165
Full meshed Topology, 11-33 Also see: Network Topology Description
Inner Provider, 11-48 Also see: Network Topology Construction
HSI See: High Speed Internet
............................................................. I
Inner equipment, 11-48 Also see: Network Topology Construction
Management, 20-156 NMS Start Supervision, 20-183 In band management, 28-3
Frame Classification, 18-6
Configuration, 13-146 ISA board MIB realignment for, 9-2 Realign an ISA Board MIB task, 9-4 IWI See: Interworking Interface ............................................................. J JacORB.log, 6-2
Full mode See: Duplex mode
Configuration requirements, 28-8
Join See: CES procedures
Functional Access Domain (FAD), 11-71
Manual resource reservation, 28-11
Jumbo Frames, 13-135
Functional domain
Overview, 28-3
Ethernet connectivity, 11-45
Pseudowire configuration, 28-9
Maintenance management, 11-46
Subnetwork topology, 28-4
Configure, 13-137 Overview, 13-135 .............................................................
MPLS management, 11-46 Network Topology Construction, 11-45 Overview, 11-45 T-MPLS management, 11-46 Traffic management, 11-45 Utilities, 11-46 ............................................................. G Glossary, lxxiii
Tunnel configuration, 28-9 In fiber management See: In band management
L Label Edge Router (LER), 11-10,
11-10 Label Switched Router (LSR), 11-10
inband management, 25-13 Also see: Circuit Emulation Services
LAC state, 13-40 See: Network Element (NE)
Ingress (-ing), 11-35
LAG See: Link Aggregation
Initiator, 11-71, 11-72 Inner ENE, 11-48 Also see: Network Topology Construction
LAG Link Over Cable, 14-62 Create from extremities, 14-63 Create from Links, 14-66
.................................................................................................................................................................................................................................... 1350 OMS IN-10 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Create VCG from extremities, 14-69 Create VCG from Links, 14-72 Delete, 14-77 Details, 14-80 Get extremities, 14-79 List, 14-62 Modify, 14-75 LAG Port Assign NAD, 13-125 Create, 13-118
deassign from Domain, 14-61
Get extremities, 14-90
Delete, 14-46
List, 14-89
Details, 14-50
Link over MPLS
Fault Localization, 14-59 Get extremities, 14-48 Join, 14-52 List, 14-41 Link over cable macro functions and default user profiles, 5-6 Link Over Cable
Details, 13-126
Modify, 14-44
Inventory of physical port, 13-128
Overview, 14-38
List, 13-116 Modify, 13-120 LAN See: Local Area Network Layer-2 Control Protocol Processing, 19-16 Encapsulation See: T-MPLS Pseudo Wire See: T-MPLS tunnel LER See: Label Edge Router Link Aggregation (LAG), 13-113, 13-113 Also see: LAG Port Group of Ports, 13-113 Overview, 13-113 Supporting NE, 13-114 Link Over Cable, 14-38 Assign NAD, 14-58 assign to Domain, 14-60
Split, 14-52 Upload, 13-74 Link over EVC AAR, 28-31 Activation, 28-29 Alarms, 28-25 Assign to Domain, 28-27 Bandwidth usage, 28-18 Creation, 28-22 Deactivation, 28-29 Deassign from Domain, 28-27 Deletion, 28-24 Description, 28-18 Inventory, 28-33 Involved objects, 28-18 Lock and unlock, 28-20 OAM, 28-26 Routing Display, 28-32 STP impacts, 28-30
Configure, 14-57
Transport Link configuration, 28-28
Configure Join, 14-54
Usage within an EVC, 28-30
Configure Split, 14-54 Create, 14-42
Link Over MPLS Details, 14-91
macro functions and default user profiles, 5-6 Link Over MPLS Overview, 14-88 Link Over Radio List, 14-93 Link over SDH macro functions and default user profiles, 5-5 Link Over TDM Assign NAD, 14-32 assign to Domain, 14-30 Configure, 14-25 Create, 14-21 deassign from Domain, 14-31 Delete, 14-24 Details, 14-34 Fault Localization, 14-36 Get extremities, 14-27 List, 14-17 remove inconsistent paths, 14-29 Upload, 13-59 Link Over T-MPLS Details, 14-97 Get extremities, 14-96 infrastructure, 14-99 List, 14-95 Overview, 14-94 Link Over WDM Details, 14-86 Get extremities, 14-84 List, 14-83 Overview, 14-82
.................................................................................................................................................................................................................................... 1350 OMS IN-11 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Linktrace See: Operations, Administration, and Maintenance (OAM) Local port, 11-47, 11-47 Also see: Ethernet physical port
trace management log file locations, 6-6
LSR See: Label Switched Router
trace management log file suffixes, 6-6
.............................................................
log out, 11-38
Loopback See: Operations, Administration, and Maintenance (OAM)
login, 11-38
LSP PHB profile
Logs
Create, 16-8
1354BM.log, 6-2
Delete, 16-11
allTracesModify.logg, 6-3
Details, 16-13
ascurusm.log, 6-3
List, 16-6
BmAdaptationModifyTrace.log, 6-3
Modify, 16-9
BmMplsModifyTrace.log, 6-3, 6-3 Command logs, 2-3 .data log file suffixes, 6-2 .dataflow log file suffixes, 6-2 *_dbi.log, 6-2 EMLStart.log, 6-2 EotModifyTrace.log, 6-3 failure management log file location, 6-5 failure management log file suffixes, 6-5 *Gui.log, 6-3 JacORB.log, 6-2 list of maintenance/log files, 6-2
Overview, 16-5 LSP Tunnel, 15-39 Add constraint, 15-56
MAC Bridge Configure edge switching port, 12-73 Configure internal switching port, 12-72 Configure switching port, 12-71 Configure UNI, IWI, or NNI switching ports, 12-72 Distributed MAC Bridge, 12-67
Bandwidth load, 15-74
Network Configuration, 12-77
Create, 15-43
Provisioning procedure, 12-70
Deallocate, 15-51
MAC Bridging, 11-8
Delete, 15-47
MAC flushing
Delete constraint, 15-58, 15-60
Creation, 16-158
Details, 15-70
Force, 16-164
Get extremities, 15-67
Interconnection Schemes, 16-162
Implement, 15-65 List, 15-18, 15-36, 15-41, 16-28 List constraint, 15-53
log file locations, 6-2 .log log file suffixes, 6-2
List of Transport Links, 15-79
NMLStart.log, 6-2
List of VC-LSP, 15-72
pmc2.log, 6-2
Modify, 15-45
PMCStart.log , 6-2
Overview, 15-40
Security logs, 2-3
Route, 15-77
System logs, 2-3
Maintenance Association (MA) See: Operations, Administration, and Maintenance (OAM)
Allocate, 15-48
List of cross connections, 15-63
smf.log, 6-2
M MA
LSP Tunnel management macro functions and default user profiles, 5-7
List, 16-160 MAC flushing protection Description, 16-157 MAC Flushing Protection, 16-156 Also see: T-MPLS Tunnel Redundancy Macro functions Domain management, 5-3 ENE management, 5-4 Ethernet physical port, 5-5 External termination management, 5-5 Link over cable, 5-6
.................................................................................................................................................................................................................................... 1350 OMS IN-12 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Link over MPLS, 5-6
EVPLAN, 11-27
Link over SDH, 5-5
Extended EVPL, 11-27
NE management, 5-4
Extended EVPLAN, 11-27
SDH termination management, 5-4
HSI, 11-27
Service node management, 5-3 TMPLS management, 5-3 Utilities management, 5-6 Maintenance Activation, 24-28 Maintenance Association (MA) See: Operations, Administration, and Maintenance (OAM) Maintenance management, 11-69, 11-46 Also see: Fault Localization Also see: Functional domain overview Alarms, 11-69 Inventory, 11-70 Overview, 11-69 Management Layers
Service Definition, 11-27 MIB categories of misalignment, 9-3 definition, 9-2 MIB parameter, 7-6 operating principals, 9-2 Realign an ISA Board MIB task, 9-4 realignment for a new ISA board, 9-2 MPLS LSP Tunnel management macros, 5-7 m_AuditAlignRecovery process, 4-3 m_DataManagement process, 4-3
Element Management Layer (EML), 11-5
m_FaultManagement process, 4-3
Network Management Layer (NML), 11-5
m_NetworkManagement process, 4-3
Physical Layer, 11-5
m_TrafficProfileManagement process, 4-3
Service Management Layer (SML), 11-5 Manager control, 13-90 Also see: External Termination Point Martini encapsulation, 11-33 MEF See: Metro Ethernet Forum Metro Ethernet Forum (MEF) Broadcast, 11-27 BTV, 11-27 EPL, 11-27 EPTL, 11-27
Traffic descriptor management macros, 5-7 Transport Link management macros, 5-7 VC LSP management macros, 5-8 MPLS layer T-MPLS comparison, 11-9 MPLS management, 11-46 Also see: Functional domain overview LSP Tunnel, 11-65, 11-66 MPLS Transport Link, 11-65
T-MPLS Transport Link, 11-65, 11-65 Traffic Descriptor, 11-65, 11-66 Transport Link, 11-65 VC-LSP, 11-65, 11-67 MS-GUI See: Multi-Service GUI Multi-Manager management, 11-44 Multi-Manager Management definition, 8-2 identifying Ethernet-defined entities, 8-3 operational guidelines, 8-3 scenarios, 8-2 Multiplexing attribute See: User Network Interface (UNI) Multipoint to Multipoint See: Service classification Multi-Service GUI (MS-GUI), 11-39 Multi-service node T-MPLS PseudoWire, 11-10 MW-INT functionality, 2-1 instances and, 2-1 Process Monitoring, 2-1 ............................................................ N NAD
See: Network Access Domain Create, 13-132 Delete, 13-134 List, 13-130 Modify, 13-133 Native Network, 11-35 NBI NbiManagement process, 4-4
EVPL, 11-27 .................................................................................................................................................................................................................................... 1350 OMS IN-13 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
NE See: Network Element (NE) NE management macro functions and default user profiles, 5-4 NEs those supported for this release, 1-4
Network Topology Construction, 11-45 Also see: Functional domain overview Auto-negotiation, 11-48 Customer Edge (CE), 11-49 Domain management, 11-47 ENE management, 11-48
Network Access Domain (NAD), 11-71, 11-72, 11-72, 13-130
Ethernet Edge Port management, 11-51
Network architecture, 11-7
Inner equipment, 11-48
Network Element (NE), 13-40, 11-47 Also see: discovery
NE management, 11-47
Add to Subnetwork, 13-46 assign to Domain, 13-29 available NE, 13-53 Boards, 11-48 create Topological View, 13-77
Overview, 11-47
............................................................. O OAM
See: Operations, Administration, and Maintenance (OAM) Operations, Administration, and Maintenance (OAM), 11-9 Configure Maintenance Association, 24-23 Configure OAM Domain, 24-13 Continuity Check (CC), 24-3 Create OAM Domain, 24-7
Provider equipment, 11-48
Deimplement Maintenance Association, 24-25
Subnetwork management, 11-47
Deimplement OAM Domain, 24-14
Transport Link management, 11-50
Disable Continuity Check, 24-24
Network Topology Description
create VT Queue Profile, 13-76
Full meshed Topology, 11-33
Enable Continuity Check, 24-24
deassign from Domain, 13-30
Hub & spoke Topology, 11-31
Inventory item of MA, 24-26
Define, 13-43
Overview, 11-30
Defined NE, 13-42
Point to Point Topology, 11-30
Inventory objects of MA, 24-27
Details, 13-52
Ring Topology, 11-35
inventory of VT Queue Profiles, 13-73
Network-to-Network Interface (NNI), 11-10, 11-48, 18-225
LAC state Acknowledge, 13-68
NML See: Network Management Layer
Management, 11-47 Also see: Network Topology Construction
NML Proxy, 11-43
Modify, 13-49
NML-IM, 11-43
Overview, 13-40
NMLStart.log, 6-2
Resources, 11-47 Also see: Network Topology Construction
NNI See: Network-to-Network Interface
Network Management Layer (NML), 11-5 Network topologies, 11-8 Also see: Service classification
north interface, 11-71 Also see: System management
Inventory of monitored objects, 24-16 Inventory of OAM Domain, 24-15 Linktrace, 24-3 Linktrace activation, 24-31 List Maintenance Association, 24-18 List OAM Domains, 24-8 Loopback, 11-69, 24-3 Loopback activation, 24-29 Maintenance Association, 24-17 Maintenance Association (MA), 24-3 Maintenance Domain (MD), 24-3 Model, 24-4
.................................................................................................................................................................................................................................... 1350 OMS IN-14 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Modify Maintenance Association, 24-22 Modify OAM Domain, 24-12 Monitored Objects, 24-6 Overviw, 24-3 Properties of MA, 24-20 Properties of OAM Domain, 24-10 Start on EVC, 24-28 Terminology, ITU vs IEEE, 24-3 Operator, 11-71 Also see: System management Oracle ORACLE/databases/dbnml/ admin/bdump directory, 6-3 ORACLE/databases/dbnml/ admin/create directory, 6-3 ORACLE/databases/dbnml/ admin/logbook file, 6-3 ORACLE/databases/network directory, 6-4 oracle_monitor_process, 4-3 ............................................................. P Packet concatenation, 11-31, 11-33
Packet Radio See: Circuit Emulation Services Parameters DB_SIZE parameter, 7-6 MIB parameter, 7-6 PRINTER parameter, 7-4 SYS_START_WAIT_VAL parameter, 7-5 SYSTEM_TUNING_VAL parameter, 7-5 TMP_ALM_PADDINGRATE parameter, 7-9 TMP_ALM_TEMPOASYNC parameter, 7-9
TMP_A:LM_ TEMPOPOLLING parameter, 7-9
TMP_WAIT_MPLS_ SYNCHRO_STARTUP parameter, 7-12
TMP_ALM_TEMPOTIMER parameter, 7-9
UI_LANGUAGE parameter, 7-4
TMP_ CDNDATABLOCKSIZE parameter, 7-9
PBB See: Provider Backbone Bridge (PBB)
TMP_EML_ TEMPOPOLLING parameter, 7-10
PBB B-VID
TMP_FORBIDDEN_ COMMENT_CHAR parameter, 7-10 TMP_FORBIDDEN_LABEL_ CHAR parameter, 7-10 TMP_LINK_OVER_SDH_ SYNCHRONIZATION_AT_ STARTUP parameter, 7-10
Allocate, 20-87 Create, 20-84 Deallocate, 20-88 Deimplement, 20-91 Delete, 20-86 Domain Wide distribution, 20-93 Implement, 20-89
TMP_LOG_BASED_ SYNCHRONIZATION_AT_ STARTUP parameter, 7-10
Inventory of ERP instances, 20-101
TMP_NE_UNDER_ _ MANAGEMENT parameter, 7-11
List ERP instances, 20-101
TMP_NML_ TEMPOPOLLING parameter, 7-11
Ring Association, 20-95
TMP_ REMOTENAMINGEMLFILE parameter, 7-11
Transport Link association, 20-102
TMP_SDH_TERM_ SYNCHRONIZATION_AT_ STARTUP parameter, 7-11 TMP_SE_ACCESSCTL parameter, 7-11 TMP_TRACELEVEL parameter, 7-12
List, 20-83
Management, 20-82 modify ERP, 20-99
Ring Dissociation, 20-97
Transport Link dissociation, 20-104 PBB EVC, 20-77, 20-78 Also see: Broadcast Domain Containment Also see: Broadcast Domain Containment Add Termination, 20-56
TMP_ TRACEMAXLINECOUNT parameter, 7-12
Add Termination on implemented EVC, 20-71
TMP_WAIT_EOT_ SYNCHRO_STARTUP parameter, 7-12
Bridge Flows, 20-74
Allocation, 20-65
Configure, 20-73 Create, 20-63, 20-144
.................................................................................................................................................................................................................................... 1350 OMS IN-15 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Deallocation, 20-67
Per Hop Behaviour (PHB), 19-18
deimplement, 20-70
profile See: LSP PHB profile See: T-MPLS Pseudo Wire
Fault Localization, 20-134 Fault Management, 20-133 Implement, 20-68
Performance Monitoring (PM), 11-69
List, 20-61
Selective collection, 11-69
Management, 20-60
ShowPM, 18-74, 18-182
Navigation to AS, 20-134
Start, 18-71
Remove Termination, 20-59
Stop, 18-72
Remove Termination on implemented EVC, 20-72
Synchronize, 18-73
PBB EVC Termination Automatic association to default VT, 20-79 Manual association to default VT, 20-80 PBB Workflow, 20-135 Add NE to a Domain, 20-138 Add Transport Link to a Domain, 20-139 B-VID configuration, 20-143 Create PBB Domain, 20-137 Domain overview, 20-135 ERP provisioning, 20-141 EVC Allocation and Implementation, 20-155
VPWS procedure, 12-62 per-STI See: Spanning Tree Instance PHB See: Per Hop Behaviour (PHB) Physical Layer, 11-5, 11-5 Physical Port Inventory from LAG port, 13-128 Upload, 13-54 PIR See: Peak Information Rate (PIR) PM See: Performance Monitoring (PM) PM Administration, 2-2
EVC traffic classification, 20-153
pmc2.log, 6-2
Overwiew, 20-135
PMCStart.log, 6-2
Traffic Descriptor Definition, 20-154
Point to Multipoint See: Service classification
Transport Link overwiew, 20-135
Point to Point See: Service classification
PBS See: Peak Burst Size (PBS) Peak Burst Size (PBS), 11-64 Peak Information Rate (PIR), 11-64
Topology, 11-30 Also see: Network Topology Description Policy Control, 11-64 Also see: Traffic Management PRINTER parameter, 7-4
Priority Id, 11-56 Also see: VLAN Management Process Monitoring, 2-1 Protection, 28-16 Also see: Ethernet Linear Protection (ELP) Provider Equipment, 11-48 Also see: Network Topology Construction Provider network, 12-67 VLAN mapping, 11-60 Also see: Ethernet Frame Hierarchy VLAN tunneling, 11-61 Also see: Ethernet Frame Hierarchy Provider Backbone Bridge (PBB), 20-5 Also see: PBB Overview, 20-5 Provider Bridging, 11-8 Provider Network Management macro functions and default user profiles, 5-13 Proxies Proxy_E_EML_NAME process, 4-4 Proxy_E_SNA_NAME process, 4-4 Proxy_N_NML_NAME process, 4-4 Proxy, 11-43 Pseudo Wire See: T-MPLS Pseudo Wire P-VLAN, 11-60 Also see: Provider VLAN ............................................................. Q Q3, 11-47, 11-48
QoS See: Quality of Service
.................................................................................................................................................................................................................................... 1350 OMS IN-16 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Q-tag, 11-56, 11-58 Also see: VLAN Management Quality of Service, 11-69 ............................................................. R Radio Ports
Upload, 13-75 Raw E2E EVC See: End-to-End EVC Remote port, 11-47, 11-47 Also see: TDM terminations Replacement See: Utilities Reroute operation, 16-109, 16-111 Reservation See: Utilities Reserved Spanning Tree Protocol, 12-69 Restore procedure, 23-33 Resynchronization See: Synchronization Ring Topology, 11-35 Also see: Network Topology Description Routed Multipoint See: Service classification Routing Display, 18-75
SEC User Authentication, 2-2 Service classification, 11-15 Any to Any, 11-15 Multipoint to Multipoint, 11-15 Point to Multipoint, 11-15 Point to Point, 11-15 Routed Multipoint, 11-15 Service Delimiting, 19-117 Operation and expected behavior, 19-117 Vlan Push/Pop on UNI/IWI, 19-117 Service management macro functions and default user profiles, 5-9 Service Management Layer (SML), 11-5 Service Node inventory of NE, 13-38 List, 13-39 Overview, 13-37 Service node management macro functions and default user profiles, 5-3 Service Type
RSTP See: Reserved Spanning Tree Protocol
BTV, 11-24
.............................................................
EPL, 11-18
S Safety information, lxix
EPTL, 11-17
SDH termination management macro functions and default user profiles, 5-4
Broadcast, 11-26
EVPL, 11-16 EVPLAN, 11-19 Extended EVPL, 11-20
SEC User Administration, 2-2
Extended EVPLAN, 11-21
SEC User Authentication, 2-2
HSI, 11-22
Section See: T-MPLS Section Security SEC User Administration, 2-2
Sessions SessionManagement process, 4-4
SLM (Packet) Loss Measurement See: SLM Tool SLM Tool, 24-33 Activate SLM Tool, 24-47 Configure Maintenance End Points, 24-36 Configure OAM ETH SLM Tool, 24-52 Create ETH SLM Tool, 24-44 Deactivate SLM Tool, 24-47 Description, 24-35 Inventory, 24-49 List, 24-40 SMF smf.log, 6-2 SMF/tools/log/data file directory, 6-3 SML See: Service Management Layer SNMP, 11-47, 11-48 Software interfaces, 11-42 Spanning Tree Instance (STI) active STI, 19-8 configuration, 19-121 Control plane, 19-9 Deimplementation, 19-124 EVC life cycle, 19-13 Implementation, 19-123 inventory, 19-119 List, 19-120 Overview, 19-8 per-STI, 19-8 Port configuration, 19-8 Static tree topology, 19-9 ST-link, 19-8 Tree topology, 19-8, 19-8
.................................................................................................................................................................................................................................... 1350 OMS IN-17 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Start AAR procedure See: Utilities STI See: Spanning Tree Instance Stitch See: CES procedures
............................................................. T Takeover
CES See: CES Procedures Description for TMPLS, 18-130
TMP_ALM_PADDINGRATE parameter, 7-9 TMP_ALM_TEMPOASYNC parameter, 7-9 TMP_ALM_TEMPOPOLLING parameter, 7-9
ST-link See: Spanning Tree Instance
Full EVC Overview, 18-121
TMP_ALM_TEMPOTIMER parameter, 7-9
Stop AAR procedure See: Utilities
Key features for T-MPLS, 18-130
TMP_CDNDATABLOCKSIZE parameter, 7-9
Subnetwork
Main procedure steps for T-MPLS, 18-130
TMP_EML_TEMPOPOLLING parameter, 7-10
Procedure for full EVC, 18-122
TMP_FORBIDDEN_ COMMENT_CHAR parameter, 7-10
Create, 13-8 Delete, 13-13 Details, 13-14 List, 13-7 Modify, 13-10 Overview, 13-5 Subnetwork management, 11-47 Also see: Network Topology Construction Synchronization, 12-60 synchronization CES Link Over Radio See: CES procedures SYS_START_WAIT_VAL parameter, 7-5 System management, 11-46 Also see: Functional domain overview
Procedure for TMPLS, 18-131 TAO/maintenance/trace file, 6-4 Tasks Access the System Configuration Window and Configure a 1350 OMS Application, 3-3 Integrate the 1350 OMS PKT Master Workstation with the Client Workstation, 3-9 Integrate the 1350 OMS PKT with Other NMSs, 3-8 Realign an ISA Board MIB task, 9-4 Run AlignDBSDHPathID Tool task, 10-3 View Application Release Information, 2-4
Access Control Data Base, 11-71
TCP/IP address, 11-38, 13-40
FAD, 11-71
TDM termination
free pool, 11-71, 11-72
Audit, 13-62
Initiator, 11-71, 11-72
Details, 13-67
NAD, 11-71, 11-72
List, 13-66
Overview, 11-71
Synchronize, 13-64
User Profile management, 11-71, 11-71
Upload, 13-57
SYSTEM_TUNING_VAL parameter, 7-5
Termination Point See: Ethernet Termination Point
TMP_FORBIDDEN_LABEL_ CHAR parameter, 7-10 TMP_LINK_OVER_SDH_ SYNCHRONIZATION_AT_ STARTUP parameter, 7-10 TMP_LOG_BASED_ SYNCHRONIZATION_AT_ STARTUPP parameter, 7-10 T-MPLS EVC Force MAC flushing, 16-164 List, 17-32 MAC flushing List, 16-160 T-MPLS layer MPLS comparison, 11-9 TMPLS management macro functions and default user profiles, 5-3 T-MPLS networking layers, 11-10 LSP Tunnel, 11-10 PseudoWire, 11-10 Section, 11-10 T-MPLS Pseudo Wire Add constraint, 16-60 Add/Remove PHB profile, 16-64 Allocate, 16-67
.................................................................................................................................................................................................................................... 1350 OMS IN-18 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Bandwidth load, 16-86
Dellocate, 16-120
Configure, 16-60, 16-62, 16-64
Details, 16-107
Create, 16-53
Get extremities, 16-132
Deallocate, 16-70
Get route, 16-137
Deimplement, 16-74
Implement, 16-122
Delete, 16-57
Inventory, 16-134
Delete constraint, 16-62
Inventory of Pseudo Wires, 16-138
Details, 16-58 Details of constraints, 16-78 Get extremities, 16-82 Get route, 16-87 Implement, 16-72 Layer-2 encapsulation, 16-66 List, 16-51 List constraints, 16-76 List cross connections, 16-80 List crossing Pseudo Wires, 16-88
Layer-2 encapsulation, 16-115 List, 16-99 List constraints, 16-126 List cross connections, 16-130 Modify, 16-104 Overview, 16-97 Remove PHB Profile, 16-113 T-MPLS Tunnel Redundancy, 16-165 Also see: MAC Flushing Protection
List sections, 16-84
Black Hole prevention, 16-167
Modify, 16-55
Create Dual-point-topointProtection, 16-175
Overview, 16-50 T-MPLS Section Details, 14-102
Create MAC Flushing Protection Schema, 16-177
TMP_NML_TEMPOPOLLING parameter, 7-11 TMP_ REMOTENAMINGEMLFILE parameter, 7-11 TMP_SDH_TERM_ SYNCHRONIZATION_AT_ STARTUP parameter, 7-11 TMP_SE_ACCESSCT parameter, 7-11 TMP_TRACELEVEL parameter, 7-12 TMP_ TRACEMAXLINECOUNT parameter, 7-12 TMP_WAIT_EOT_SYNCHRO_ STARTUP parameter, 7-12 TMP_WAIT_MPLS_ SYNCHRO_STARTUP parameter, 7-12 Tool See: Utilities Trace management log file location, 6-6 log file suffixes, 6-6 Traffic Classifier
Get extremities, 14-101
Create one-to-one-open protection, 16-173
Associate to an Ethernet Segment, 18-209
Inventory from tunnel, 16-134
Description, 16-166
Create, 18-160
List, 14-100
EVC setup, 16-178
Delete, 18-164
Overview, 14-99
Interconnection types, 16-167
T-MPLS LSP Tunnel, 11-10
Disassociate from an Ethernet Segment, 18-211
PW dual-point-to-point, 16-167
T-MPLS Tunnel
List, 18-158
Add constraint, 16-109
Redundancy creation types, 16-166
Modify, 18-162
Add PHB Profile, 16-113
Reference network, 16-166
Overview, 18-156
Allocate, 16-117
Reference scenarios, 16-168
Properties, 18-165
Bandwidth load, 16-136
Tunnel one-to-one-open, 16-166
Create, 16-101 Deimplement, 16-124 Delete, 16-106 Delete constraint, 16-111
TMP_NE_UNDER_ _MANAGEMENT parameter, 7-11
Traffic Descriptor Create, 18-146 Delete, 18-152 Details, 18-153 for MPLS, 15-5
.................................................................................................................................................................................................................................... 1350 OMS IN-19 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
List, 18-144
Transport Link for MPLS
Modify, 18-149
Bandwidth load, 15-33
Overview, 18-142
Define, 15-25
Traffic Descriptor for MPLS
Details, 15-31
Create, 15-8
Get extremities, 15-28
Delete, 15-15
Inventory, 15-36
Details, 15-16
List, 15-23
Inventory, 15-18
List from LSP Tunnel, 15-79
List, 15-6
Overview, 15-21
Modify, 15-12 Traffic descriptor management macro functions and default user profiles, 5-7 Traffic management, 11-45 See: Ethernet Transport Bridging (ETB) Also see: Functional domain overview EVC management, 11-53 Overview, 11-53 Policy Control, 11-64 VLAN management, 11-54 Also see: Ethernet Frame Hierarchy
Transport Link for T-MPLS Bandwidth load, 16-25 Define, 16-18 Details, 16-23 Get extremities, 16-20 Inventory, 16-28 List, 16-16 Overview, 16-14 Transport Link management Link Over Cable, 11-50 Link Over MPLS, 11-51 Link Over RPR, 11-51 Link Over TDM, 11-50
Traffic parameter See: Ethernet Edge Physical Port
Link Over T-MPLS, 11-51
Transparent transmission, 11-30, 11-31
macro functions and default user profiles, 5-7
Transport layer, 11-8 RPR ring, 11-11 SDH layer, 11-9 T-MPLS layer, 11-9 Transport Link, 18-184 Also see: Ethernet Transport Link Classification, 14-5 Concatenated VC, 14-11 List by domain, 14-104 Overview, 14-4
Link Over WDM, 11-51, 11-51
Transport Link Management macro functions and default user profiles, 5-12 Transport Link management, 11-50 Also see: Network Topology Construction TSS 5 See: In band management Tunnel Redundancy See: T-MPLS Tunnel Redundancy
............................................................. U UI_LANGUAGE parameter, 7-4
UNI See: User Network Interface (UNI) User Network Interface (UNI), 19-18 Also see: Bandwidth Profile All to One Bundling attribute, 11-12 Bundling Service attribute, 11-12 Service Multiplexing attribute, 11-13 User profiles (default) Color Profile management, 5-12 Customer management, 5-9 domain management, 5-3 ENE management, 5-4 Ethernet Edge Physical Port management, 5-10 Ethernet physical port, 5-5 Ethernet Segment management, 5-11 Ethernet Traffic Classifier management, 5-10 Ethernet Traffic Descriptor management, 5-10 Ethernet Transport Segment management, 5-11 EVC management, 5-9 External termination management, 5-5 Link over cable, 5-6 Link over MPLS, 5-6 Link over SDH, 5-5 LSP Tunnel management, 5-7 NE management, 5-4 Provider Network management, 5-13
.................................................................................................................................................................................................................................... 1350 OMS IN-20 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
SDH termination management, 5-4 Service management, 5-9 Service node management, 5-3 TMPLS management, 5-3 Traffic descriptor management, 5-7
............................................................. V VC LS management
macro functions and default user profiles, 5-8 VC-LSP, 15-81, 15-72 Also see: LSP Tunnel, List of VC-LSP
Transport Link management, 5-7, 5-12
Commission, 15-96
Utilities management, 5-6
Decommission, 15-98
VC LS management, 5-8
Deimplement, 15-94
VLAN Typemanagement, 5-13
Delete, 15-91
Users
Create, 15-85
Details, 15-102
VLAN configuration scenario, 12-75 VLAN Tag, 11-57 Also see: Ethernet Frame Hierarchy VLAN Tag Protocol Type, 11-62 Also see: Ethernet Frame Hierarchy Also see: VLAN Type Virtual Private Hub Service (VPHS), 11-8 Virtual Private Wire Service (VPWS), 12-62 PM management, 12-62
SEC User Administration, 2-2
Get extremities, 15-99
SEC User Authentication, 2-2
Implement, 15-92
Configure, 16-42
List, 15-18, 15-36, 15-83, 16-28
Create, 16-35
Utilities, 11-46 Also see: Functional domain overview AAR procedure, 23-3 Align Up, 23-15, 23-28
Modify, 15-89 Overview, 15-82
Alignment, 23-4, 23-26
Viewer, 11-71 Also see: System management
Audit, 23-3
Virtual Bridging, 11-8
audit on a NE, 23-20
Virtual concatenation, 11-31
Audit results, 23-8, 23-24
Virtual Local Area Network (VLAN)
Audit tool, 23-6 Force Alignment, 23-4 List of auditable NEs, 23-18 List of Audited NEs, 23-22 Overview, 23-3 Recovery, 23-5 Replacement, 23-30 Reservation, 23-4, 23-32 Start AAR procedure, 23-16 Stop AAR procedure, 23-17 Utilities management macro functions and default user profiles, 5-6
Virtual Transport
Deimplement, 16-46 Delete, 16-39 Details, 16-40 Get extremities, 16-48 Implement, 16-44 List, 16-33 Modify, 16-37 Overview, 16-31
Management, 11-54, 11-62 Also see: Ethernet Frame Hierarchy
VLAN See: Virtual Local Area Network
Mapping, 11-59 Also see: Ethernet Frame Hierarchy
Vlan and Priority based
Overview, 19-10
VLAN Id, 11-56 Also see: VLAN Management
pop, 11-57, 11-58 push, 11-57, 11-58 Push/Pop at ETS NNI Interface, 18-225
Frame Classification, 18-6 Also see: VLAN
VLAN Tag, 11-56 Also see: VLAN Management VLAN type
swap, 11-57, 11-58
Create, 18-248
Tunneling, 11-61 Also see: Ethernet Frame Hierarchy
Delete, 18-253 List, 18-247 Modify, 18-251
.................................................................................................................................................................................................................................... 1350 OMS IN-21 8DG42227DAAA 9.6 Issue 3 December 2012
Index ....................................................................................................................................................................................................................................
Overview, 18-246 VLAN Type Management macro functions and default user profiles, 5-13 VPHS, 11-33 See: Virtual Private Hub Service (VPHS) VPWS See: Virtual Private Wire Service VT association to fixed VT, 20-80 default VT, 20-79 VT Queue Profile create, 13-76 ............................................................. W Web Desktop, 11-38
Web Portal, 1-3, 2-2
.................................................................................................................................................................................................................................... 1350 OMS IN-22 8DG42227DAAA 9.6 Issue 3 December 2012