iPASOLINK-Expert2013-3
Short Description
Descripción: iPASOLINK-Expert2013-3...
Description
MSTP/RSTP SETTING
NEC Confidential
197
STP (IEEE 802.1D)/ RSTP (IEEE 802.1w)/ MSTP (IEEE802.1s) •
• • •
Layer2 based loop-free protection mechanism – Each device using STP/RSTP send BPDU frames, and root bridge, root port, designated port, backup port and alternate port are decided by BPDU frame. Widely used in the enterprise network Protection Switching Time; STP < 60sec / RSTP < 2~3 sec Topology is no limitation (Ring, Tree, etc…) Blocking
Failure Forwarding
Forwarding
Blocking à Forwarding
Forwarding
Forwarding
Forwarding
Forwarding
Root Bridge
Root Bridge Forwarding
• Some topology (instance) can be treated with same STP network • The VLANs are divided into some groups (instances), and blocking port is decided in the each group (instance). • MSTP is based on RSTP (IEEE 802.1w), and can used RSTP independently in each VLAN – Enables load balancing, over a large number of VLANs • The restructuring of each VLAN becomes possible. As a result, the time required to restructure can be shortened. NEC Confidential
Forwarding à Blocking
Forwarding
MSTI 2 VLAN: 201 - 300
Forwarding
Blocking For MSTI1
Double capacity Blocking For MSTI2 Root Bridge
MSTI 1 VLAN: 101 - 200
198
STP Parameter - Bridge ID & Path Cost Bridge ID (STP, RSTP) Bridge ID (8 Bytes) Bridge ID is main Parameter for Spanning Tree Algorithm, The Bridge with lowest Bridge ID is selected as “Root Bridge”
Bridge Priority
Bridge MAC Address
2bytes
6bytes
Default Bridge Priority = 32768 (IEEE 802.1d)
Path Cost is accumulated Cost between a Bridge to Root Bridge. Path Cost defined in IEEE802.1d Link Speed
Cost
10Gbps
2
1Gbps
4
100Mbps
19
10MBps
100
*Port Cost is manually configurable NEC Confidential
Root Bridge 100Base-Tx
1000Base-T
0+4=4
4+19 =23
0+19 =19
100Base-Tx 10Base-T 19+100 =119
199
STP IEEE 802.1D - Theory background (6) Root Bridge
Non Root Bridge
Bridge: A
Bridge: B
Bridge ID 32768
Bridge ID 32768
MAC Address 00-00-00-00-00-01
MAC Address 00-00-00-00-00-03
Forwarding Port 1
Spanning Tree Failure The blocked port has gone into Port 2 Forwarding
Forwarding RP
DP
Port 2
Port 1 as
DP
DP
Root port
Was Blocked Now forwarding
Forwarding Port 1 as
Summary of STP Port States 1. Blocking 2. Listening
BPDU
Root port Forwarding RP
Port 2
3. Learning 4. Forwarding
Non Root Bridge
5. Disabled
Bridge: C Bridge ID 32768 MAC Address 00-00-00-00-00-02
NEC Confidential
200
Difference between STP and RSTP STP
RSTP
STABLE TOPOLOGY
ONLY THE ROOT SEND BPDU AND OTHERS RELAY THEM.
ALL BRIDGES SEND BPDU EVERY HELLO (2SEC) AS A KEEP ALIVE MECHANISM.
PORT ROLES
ROOT (FORWARDING) DESIGNATED (FORWARDING) NON-DESIGNATED (BLOCKING)
ROOT (FORWARDING) DESIGNATED (FORWARDING) ALTERNATE (DISCARDING) BACKUP ( DISCARDING)
PORT STATES
DISABLED , BLOCKING, LISTENING, LEARNING ,FORWARDING
DISCARDING (DISABLED, BLOCKING, LISTENING) LEARNING, FORWARDING
TOPOLOGY CHANGES
USE TIMERS FOR CONVERGENCE INFORMED FROM THE ROOT. HELLO (2SEC) MAX AGE (20SEC) FORWARDING DELAY TIME (15SEC)
PROPOSAL AND AGREEMENT PROCESS FOR SYNCHRONIZATION (LESS THAN 1 SEC) HELLO, MAX AGE AND FORWARDING DELAY TIMERS USED ONLY FOR BACKWARD COMPATIBILITY WITH STP. ONLY RSTP PORT RECEIVING STP
TRANSITION
SLOW: (50SEC), BLOCKING (20SEC)=> LISTENING (15 SEC) => LEARNING (15SEC) => FORWARDING.
FASTER: NO LEARNING STATES. DOESN’T WAIT TO BE INFORMED BY OTHERS, INSTEAD, ACTIVELY LOOKS FOR POSSIBLE FAILURE BY A FEED BACK MECHANISM.
TOPOLOGY CHANGE
WHEN A BRIDGE DISCOVER A CHANGE IN THE NETWORK IT INFORM THE ROOT. THEN EVERY BRIDGE CAN GENERATE TOPOLOGY CHANGE AND ROOT INFORMS THE OTHER BRIDGES BY INFORM ITS NEIGHBORS WHEN IT IS AWARE OF SENDING BPDU AND INSTRUCT THE TOPOLOGY CHANGE AND IMMEDIATELY DELETE OLD DB OTHERS TO CLEAR THE DB ENTRIES AFTER THE FORWARDING DELAY
CHANGE ROOT
IF A BRIDGE (NON-ROOT) DOESN'T RECEIVE HELLO FOR 10X HELLO TIME, FROM THE ROOT, IT START CLAIMING THE ROOT ROLE BY GENERATING ITS OWN HELLO.
NEC Confidential
IF A BRIDGE DOESN’T RECEIVE 3X HELLOS FROM THE ROOT, IT START CLAIMING THE ROOT ROLE BY GENERATING ITS OWN HELLO
201
MSTP Setting M1 iPaso200-D M1 P1
MSTP Region: ABC iPaso200-E
Revision:0 M2 M2
M1
M2
iPaso400-F P1 iPaso400-B P2
P1
MSTP Region: NEC
IDU No. Bridge Priority (MSTI1) Bridge Priority (MSTI2) Instance No. (MSTI1) Instance No. (MSTI2)
1 4096 20480 1 2
2 8192 12288 1 2
3 8192 20480 1 2
In Normal condition mark the status of each modem Forwarding or Discarding MSTI1 MODEM1 MODEM 2
MSTI2 MODEM 1
MODEM 2
IDU 1 IDU 2 IDU 3 After Failure condition mark the status of each modem Forwarding or Discarding MSTI1 MODEM1 MODEM 2
MSTI2 MODEM 1
MODEM 2
IDU 1 IDU 2 IDU 3
NEC Confidential
202
MSTP Setting
Select RSTP/MSTP Setting from the ETH Function Setting Menu. Click the Modify STP Mode icon on the ETH Function Setting –RSTP/MSTP Setting display. In the STP Mode Setting window click the STP Mode dropdown list and select MSTP and click Ok. Click OK again on the Complete information window. RSTP/MSTP Setting display shows the current setting.
NEC Confidential
203
MSTP Setting Click the Modify STP Port icon on the RSTP/MSTP Setting display. And set the parameters for MSTP. Select each tab IST, MSTPI1 to MSTI4 as required and set the parameters.
NEC Confidential
204
MSTP Setting Enter the Region Name (32 Characters). This should be same on all members of the MSTP Region. Enter the Revision Number (0 - 65535). Of the configuration. All members of the MSTP region must have the same Revision No. The MSTP revision level is the revision number of the configuration. All switches in an MSTP region must have the same revision level configured BPDU Guard Timer Usage: to use this function, select the Used radio Button. This function prevent external BPDUs from changing the topology. If BPDU Guard Timer usage is selected as Use, then enter the Timer value in seconds ( 10 – 1000000). When unwanted BPDU is detected in the port, it will block the port for the timer period preventing the BPDU to pass.
M1 iPaso200-D M1
If BPDU Guard Timer usage is selected as Use, then enter the Timer value in seconds ( 10 – 1000000). When unwanted BPDU is detected in the port, it will block the port for the timer period preventing the BPDU to pass.
MSTP Region: ABC iPaso200-E
Revision:0 M2 M2
M1
M2
iPaso400-F P1 iPaso400-B P2
P1
MSTP Region: NEC
NEC Confidential
205
CIST Setting Every Region has a Common Internal Spanning Tree (CIST) that forms a single spanning tree instance including all the members in the region. CIST operates across the MSTP region and create a loop free topology across regions. In each region several MSTP Instances (up to 4) can be created with each instance catering for a group of VLANs. MSTP instance operates within the Region.
Select the tab IST to configure the CIST. Enable the ports that is makes the STP. If any port is an Edge port select Enable from the drop down list. For each of the ports selected: STP Port Path Cost: select Auto for automatically detect the path Cost or select Manual and enter the Path cost value STP Port Priority: select port priority value from the drop down list (default is 128) BPDU Guard: select from the drop down list enable to enable BPDU Guard function for the Port. Root Guard: select from the drop down list enable to enable Root Guard function for the Port. Click the Member VLAN and select the VLANs for each instance (IST, MSTI# ). NEC Confidential
206
MSTI Setting Configure the MSTP instances in the selected region by clicking on the MSTI# tabs. Select Enable radio button on the selected MSTI#. MSTI Regional Root Bridge Priority /ID will be automatically selected on the MAC address, Bridge Priority… Enter the Instance number for the selected MSTP Instance. Select the Bridge Priority (MSTI) from the drop down list. This selection can force the Bridge ID to be higher or lower to select as root Bridge for the selected instance. Click on the Member VLAN and select the VLANs for the selected MSTI from the VLAN List and the radio buttons. Select the port associated with MSTP in the region from the check boxes. Select the STP Port Path Cost and STP Port Priority from the respective drop down lists.
NEC Confidential
207
MSTP Setting
Selected Root Bridge Priority/ ID for CIST, CIST Regional, and each MSTI are shown. Forwarding and disable status of ports for each Instance is shown under status column.
NEC Confidential
208
Detail STP Parameter Setting
Item
Parameter
Description
STP Bridge Priority STP Bridge MAX Age
0 to 61440 6 to 40 s
Change default STP priority of the bridge Set the expiration of the Configuration BPDU stored, Bridge will. notice that a topology change has occurred after the Max Age time elapses and the BPDU is aged out
STP Bridge Hello Time STP Bridge Forward Delay
1s 2s 4 to 30 s
Set the period of sending Configuration BPDUs from Root Bridge. Set the delay when the port is going to change the state from Listening to Learning.
STP TX Hold Count
1 to 10
Set the number of BPDU which can be sent per second.
STP MAX Hop Count
1 to 40
See below
The MSTP maximum hop count value is the maximum number of hops in the region. The MSTI root bridge sends BPDUs with the hop count set to the maximum value. When a bridge receives this BPDU, it decrements the remaining hop count by one and propagates this hop count in the BPDUs it sends. When a bridge receives a BPDU with a hop count of zero, the bridge discards the BPDU NEC Confidential
209
Ether Ring Protection
NEC Confidential
210
G.8032 Ethernet Ring Protection Switching • Utilizing widely-deployed Ethernet (802.1,3) with OAM (802.1ag/Y.1731) • Loop-free protection mechanism • Protection Switching Time General Setting (detail) menu. Select the Bridge No. for the DHCP Server. Enter the IP Address range for the DHCP Server by entering the Start and End IP addresses. (Entered values should be within the selected Bridge No, network address range Enter the IP Address range for the Exception by entering the Start and End IP addresses Select for Security , Any radio button or Only Reserved radio button.
NEC Confidential
Enter the lease Time for the connection Select default Gateway, options are : Same as the Bridge Interface (selected bridge) Specify: specify the Gateway address below. Disabled: Disable the GW address To use DNS Sever Address: Select Used radio button and enter the Primary and Secondary DNS server Addresses To use Other Options select Used radio Button Enter the ID (range 0 – 255) Type: select from the drop down list Value:
308
DHCP server setting – Other Option lWhen use “Other Option”, other control information such as NTP Server Address, WINS Server Address, DCHP Server Address etc. can be stored in the 'options' field of the DHCP message. lDHCP Option is defined by RFC2132. lThe kind of control information is specified with option ID. lOption ID information also is defined by RFC2132.
For example l DHCP Option 54 can specify DHCP Server Address. Therefore, in the above case, DHCP Client can recognize DHCP Server Address. l You can confirm DHCP Server Address by using “ipconfig /all” at command prompt.
NEC Confidential
309
DHCP Server Setting
When a client receives an IP address, the client appears in the DHCP Client Table. If the client is not preregistered, Add is indicated at the end of the row for that client in the table. Click on the Add MAC Address icon to register the Client MAC addresses.
Enter the MAC Address to be registered and select the Distribution rule from the drop down list Select Auto : for the Server to Assign automatically from the IP Address range. Select Rejected : DHCP rejects request for IP address from this MACX address Select Fixed : Enter the IP Address to be assigned to the entered MAC address. NEC Confidential
310
DHCP SERVER / RELAY NMS
CLIENT:172.10.0.2. GW:172.10.0.1
Radio
Bridge1: 192.168.1.2 Bridge2 : 172.10.0.1
Radio
Bridge1: 192.168.1.4
Radio
Bridge1: 192.168.1.7
Bridge1: 192.168.1.6
GW:192.168.1.2.
Port1: Access (VLAN10)
GW:192.168.1.2.
GW:192.168.1.2.
GW:172.10.0.2.
DHCP Sever DHCP No.1 Bridge No.1 (192.168.1.2/24) IP Range (192.168.1.10 -192.168.1.15) Exceptions: none Security : any
Client-1
Client-2
Client-3
Client-4
Client-1 Client-2 Client-3
Client-1: unable to contact DHCP Server and will get request has timed out Client-2: will get the IP address 192.168.1.10 Client-3: will get the IP address 192.168.1.12 Fixed address Client-4: will get the IP address if the security setting is Any. If only Registered it will not be assigned an IP Address.
NEC Confidential
311
DHCP Server Setting
To Delete a registered MAC Address. Click the Delete MAC Address icon and select the check box of the MAC address to be deleted from the list and click OK
To release a client from the DHCP Client Table list, click the Forced Release IP Address icon and select the check box of the IP Address from the list. Released IP Address is free to be assigned to a different client.
Click on the Add indication in any of the listed MAC addresses that are not pre-registered to register them. Select the distribution method . If it is fixed then enter the IP address to be assigned. Click OK to register the selected MAC address.
NEC Confidential
312
Equipment Utility
NEC Confidential
313
Partial Equipment Config Download Use this function to download Program File, FPGA Data and Config Data from storage (Local PC or USB Memory) to update the NE.
1
From the Equipment Utility menu select Update (Storage-> NE ) Utility
2
Put the Equipment to Maintenance mode and select Config Data radio button. Click the Execute button
3 4
In the Update (storage-> NE) utility Config Data window click the select Config data type drop down list arrow. Select Partial Equipment Config
5
Browse to the location where the Equipment config file is located and select the config file. Click the Next button
6
Select the configuration items to upload by selecting from the check boxes. Click OK.
NEC Confidential
314
LOG CLEAR FUNCTION MAINTENACE MODE
1
Select Log Clear Function from the Equipment Utility Menu..
2
Select the Radio button of the Log Type to be cleared, Alarm Log, Status Log, Command Log or All Logs and click the Execute button
3
Click OK on the confirmation screen. When complete information window opens click OK. NEC Confidential
315
USB Memory Utility iPASOLINK System Configuration File Backup Procedure Configuration File Upload Procedure (IDU to USB) •Insert USB to Main Card •Wait until USB is detected (observe USB LED) flash •Protect SW ON (Up) •USB LED Blinks •Wait until USB LED Blinking stop •Protect SW OFF (Down) Remove USB from IDU
Configuration Upload Procedure (USB to IDU) IDU Power OFF •IDU Power OFF •Insert USB to Main card •Protect SW/ON (Up) •IDU Power ON •Maint LEDs on the Main Card starts to blink •About 2m 40sec after IDU Power ON USB LED Blinks (iPaso1000) •Main Card Maint LED Steady •After few seconds put Protect SW Down •IDU reboot start •Main card Maint LED stop The above process will take about 7minutes (Depends on configuration) •Active card Maint LEDs starts to blink
USB Memory utility allows to see the contents of the USB memory stick plugged in to the USB slot. It show the files inside folders named Config, IDU,FPGA and Inventory created in the USB stick
NEC Confidential
316
SOFTWARE KEY ALLOCATOR
NEC Confidential
317
Introduction •
•
What is Software Key Allocator (SKA) ? With SKA, You can reap the benefits of simplified software key upgrade and exchange software key for NEs. Customer Network (NMS) Key Features – Upgrade PNMSj SKA Client – Extraction & Storage Software Key – Relocation Allocator(SKA) PNMSj Client HUB
HUB Proxy, Firewall
Router ・・・
NEC
・・・ SKSS NEC Confidential
318
System configuration and specification for SKA 1. SKA Server – OS : Windows 2008 Server R2 – Machine Spec •CPU : Quad core 2.40GHz or higher •Memory : 8GB or above (More than 16GB recommended) •Disk Capacity : 160GB or more Customer Network(NMS) 1 PNMSj 2. SKA Client Software Key ・・・ Allocator(SKA) – OS : Windows 7 PNMSj Client •Internet Explorer 8 HUB
3. Port for Internet ->SKA server and client access to SKSS server in NEC office through Internet.
2 SKA Client
HUB Proxy, Firewall
3 NEC
SKSS NEC Confidential
319
Software Key Upgrade •
Issue “Upgrade Key” and download “Upgrade Key” to NEs. – Also after setup NEs in customer network, You can apply software key to NEs Flexibly.
Without SKA GLN / Local staff
SKSS
Issue “Upgrade Key”
NE
Customer Download “Upgrade Key”
NEC
Customer Network
With SKA Customer
SKSS Issue “Upgrade Key”
NEC
NEC Confidential
SKA
NE
Download “Upgrade Key”
Customer Network 320
Extraction & Storage、Relocation • •
You can extract current keys from NEs within DCN and store the key information. You can relocate a current key stored in the SKA to another NE within DCN.
Extraction
Relocation
User
User
SKA
NE
SKA NE Software Key Extraction
Pool Software Key
NEC Confidential
Software Key Relocation
Relocate Software Key
321
Support NMS & NE Type 1. Support NMS – All NMS Supported ->PNMSj, MS5000, and so on... – NMS is needed following conditions ・Create the NE list file with defined format. ・Store the inventory file which is created by NE, to specified directory, ・We recommend that SKA can access above 2files with FTP.
1 Customer Network (NMS) PNMSj
PNMSj Client HUB
2. Supported NE type – iPASOLINK Series ->iPASOLINK 100/100E/200/400/1000 – 5000iP Series (*Only Upgrade Function)
2 Customer Network (NE) Router ・・・
・・・
NEC Confidential
322
Environment for Demonstration
PNMSj
HUB
iPASO400 IDU [No.002]
iPASO400 IDU [No.001]
SKA
SKSS
SKA Client Screen shows the control of SKA client.
NEC Confidential
323
Demonstration *There are NEs which have no upgrade SW Key. • Register the NMS • •
•
•
– –
– – – – – – – –
Register the NMS information to SKA. You can confirm the NE List is updated.
Upgrade Software Key
Select a NE and Upgrade the Software Key You can confirm when Upgrade is finished in journal log.
Extract Software Key from NE.
Select the NE whose Software Key is upgraded and Extract it from SKA. You can confirm when Extract is finished in journal log.
Relocate Software Key
Select the another NE, and relocate the Software Key which is extracted. (It takes 20 seconds around.) You can confirm when Relocate is finished in journal log.
Manage the user account
NEC Confidential
Register the arbitrary user name Login with new account and check that it allows to see the screens without authority of executable .
324
Future Support (1/2) •
Function Based Software Key Relocation (Dec/2012)
Select “100Mbps!
NEC Confidential
325
Future Support(2/2) •
User Level Management (Dec/2012) – This function enables users to “Extract & Allocate” and “Upgrade” software keys. Current
Extract Upgrade & Allocate *Note *Note
Reference
Setting
Administrator User
New
N/A
N/A
Extract Upgrade & Allocate *Note *Note
N/A
Reference
Setting
Administrator User NEC Confidential
Selectable
Selectable
N/A 326
Procedure to introduce the SKA •
•
•
Get License for SKA. – Tell IP Address of SKA server machine – Get the License from SKSS system. Register the information of your SKA machine and Get the configuration files for SKA. – Tell IP Address and MAC address of SKA server machine. – Get the configuration files for SKA from SKSS. Install the configuration files to SKA. – Install the “SkssClientId.dat” and “SkssUri.dat” files to SKA Server.
NEC Confidential
327
ABBREVIATIONS-1 Adjacent Channel Alternate
CIR
Committed Information Rate
DMM
Delay Measurement Message
Polarization
CKT
Circuit
DMR
Delay Measurement Reply
ACCP
Adjacent Channel Co-Polarization
CLK
Clock
DO
Data-out
ACK
Acknowledgement
CMF
Channel Mismatch Failure
DSCP
Differentiated Services Code Point
AGC
Automatic Gain Control
CMI
Coded Mark Inversion
DUP
Duplexer
AIS
Alarm Indication Signal
CONV
Converter
DXC
Digital Cross Connect
ALM
Alarm
CORBA
Common Object Request Broker
E1
E-carrier level 1
ALS
Auto Laser Shutdown
Architecture
EBS
Express Burst Size
AMR
Adaptive Modulation Radio
CoS
Class of Service
EIR
Excess Information Rate
ANT, Ant.
Antenna
CPU
Central Processing Unit
EMC
Electro Magnetic Compatibility
Critical
ACAP
APS
Automatic Protection Switch
CR
EML
Element Management Layer
ATT
Attenuator
CRC
Cyclic Redundancy Check
EMS
Element Management System
ATPC
Automatic Transmitter Power Control
CS
Channel Separation
EOW
C Order Wire
AU
Administrative Unit
CTRL
Control
EPS
ETH-Protection Switch
near end Code Violation
AUX
Auxiliary
CV
EQL
Equalizer
Ave
Average
CW
Carrier Wave
ERP
ETH-Ring Protection Switch
BBE
Background Block Error
DA
Destination Address
ES
Errored Seconds
BER
Bit Error Rate
DADE
Differential Absolute Delay Equalizer
ETH-CC
ETH-Continuity Check function
BPF
Band Pass Filter
DB
Database
ETH-LB
ETH-Loopback function
BS
Base Station
DC
Direct Current
ETH-LBM
ETH-Loopback Message
BSC
Base Station Controller
DCN
Data Communication Network
ETH-LBR
ETH-Loopback Reply
BTS
Base Transceiver Station
DEG
Degraded
ETH-LB
ETH-Loopback function
Drop Eligible Indicator
CAPEX
Capital Expenditure
DEI
ETH-LT
ETH- Link Trace function
CBS
Committed Burst Size
DEM
Demodulator
ETH-LTM
ETH-Link Trace Message
CCDP
Co-Channel Dual Polarization
Des(Dest)
Destination
ETH-LTR
ETH-Link Trace Reply
CCM
Continuity Check Message
DI
Data-in
ETH-OAM
Ethernet Operations, Administration
Conference of European Postal &
DL
Download
Telecommunication Administration
DM
Delay Measurement
CEPT
NEC Confidential
and Maintenance
328
ABBREVIATIONS-2 ETH-OAM LB
ETH-OAM Loopback
ETH-OAM LT
ETH-OAM Link Trace
ETH-RDI
ETH-Remote Defect Indication function
ETSI
European Telecommunications Standards Institute
EXC
Electrical Cross Connect
E-to-E.
End-to-End
Fail
Failure
F/B
Front Back Ratio
FCS
Frame Check Sequence
FDB
Forwarding Database
FE
Fast Ethernet
FEC
Forward Error Correction
FEBBE
Far End Background Block Error
FEES
Far End Errored Seconds
FESES
Far End Severely Errored Seconds
FEUAS
Far End Unavailable Seconds
FPGA
Field Programmable Gate Array
F/W
Firmware
GbE, GBE
Gigabit Ethernet
3GPP
Third Generation Partnership Project
GUI
Graphical User Interface
H
Horizontal
HDB
High Density Bipolar
HK
House Keeping
HP
Higher order Path
HYB
Hybrid
H/W
Hardware
NEC Confidential
ID
Identification
IDU
Indoor Unit
IE
Internet Explorer
IEC
International Electro technical Commission
IEEE
Institute of Electrical and Electronics Engineers
I/F
Interface
IF
Intermediate Frequency
IHG
iPASOLINK High Grade
IN
Input
INTFC
Interface
I/O
Input/Output
IP
Internet Protocol
ITU
International Telecommunication Union
ITU-R
Radio Communication Sector of ITU
ITU-T
Telecommunication Sector of ITU
L2SW
Layer2-Switch
LAN
Local Area Network
LB
Loopback
LBM
Loopback Message
LCD
Loss of Cell Delineation
LCT
Local Craft Terminal
LDPC
Low Density Parity Check
LED
Light Emitting Diode
Lev.
Level
LLF
Link Loss Forwarding
LM
Loss Measurement
LMM
Loss Measurement Message
LNA
Low Noise Amplifier
LO
Local Oscillator
LOC
Loss of Continuity
LOF
Loss of Frame
LOM
Loss of Multiframe
LOP
Loss of Pointer
LO REF
Local Reference Signal Loss
LOS
Loss of Signal
LP
Lower order Path
LPM
Link Performance Monitor
LT
Link Trace
LTI
Loss of incoming Timing Input
LTM
Link Trace Message
MAC
Media Access Control
MAIN
Main
MAINT
Maintenance
MAX
Maximum
Mdev
Mean Deviation
MDCPU
MODEM CPU
MDI
Medium Dependent Interface
MDIX
Medium Dependent Interface Crossover
MD4
Message Digest Algorithm 4
MD5
Message Digest Algorithm 5
MEG
Maintenance Entity Group
MEM
Memory
MEP
MEG End Point
329
ABBREVIATIONS-3 MIN
Minimum
Octs
Octets
PMC
PASOLINK Management Card
MIP
Maintenance Intermediate Point
ODU
Out-Door Unit
PMON
Performance Monitor
MIX
Mixer
OFS
Out of Frame Second
PNMSj
MJ
Major
OMT
Ortho-Mode Transducer
MMC
Multi Media Card
OPEX
Operational expenditure
PPI
PDH PHY Interface
MME
Mobility Management Entity
OPP
Opposite
ppm
parts per million
PASOLINK Network Management System Java Version
MMG
Mismerge
OPR
Operation
PPP
Point-to-Point Protocol
MN
Minor
OPT
Optical
PPS
Path Protection Switch
MOD
Modulator
OSPF
Open Shortest Path First
PQ
Priority Queuing
MODEM
Modulator Demodulator
OSS
Operation Support System
PRM
Parameter
MON
Monitor
OUT
Output
PROT
Protection
MPX
Multiplexer
OW
Oder Wire
PS
Power Supply
MS
Multiplex Section
PA
Power Amplifier
PSC
Protection Switching Counts
MSC
Mobile Switching Center
PBR
Pressurizable Type B, flange profile
PSD
Protection Switching Duration
MSDU
MAC Service Data Unit
square Rectangular
PWR
Power
MSP
Multiplex Section Protection
PCP
Priority Code Point
QAM
Quadrature Amplitude Modulation
MTBF
Mean Time Between Failure
PDH
Plesiochronous Digital Hierarchy
QoS
Quality of Service
MTPC
Manual Transmitter Power Control
PDU
Protocol Data Unit
QPSK
Quadrature Phase Shift Keying
MUX
Multiplexing Equipment
PGM
Program
RCVR
Recover
N/A
Not Applicable
PHY
Physical
REF
Reference
NBI
Northbound Interface
PIR
Peak Information Rate
REM
Remote
NE
Network Element
PJE
Pointer Justification Event
RDI
Remote Defect Indication
NML
Network Management Layer
PJE-N
Pointer Justification Event Negative Stuff
RF
Radio Frequency
NMS
Network Management System
PJE-P
Pointer Justification Event Positive Stuff
RFS
Radio Frequency Systems
OAM
Operation Administration and
PKG
Package
RL
Relay
Maintenance
Pkts
Packets
RMON
Remote Network Monitoring
Occur
PLM
Payload Label Mismatch
RNC
Radio Network Controller
OCR
NEC Confidential
330
ABBREVIATIONS-4 RPL
Ring Protection Link
SUB
Substitute
UNEXP
Unexpected
RS
Regenerator Section
SW
Switch
Unicast DMR
Unicast Delay Measurement Reply
RS-232
Recommended Standard 232
S/W
Software
UNM
Unexpected MEP
RSL
Received Signal Level
SWG
Switch Group
UNP
Unexpected Period
RST
Regenerator Section Termination
SYNC
Synchronous
USB
Universal Serial Bus
RSTP
Rapid Spanning Tree Protocol
TCI
Tag Control Information
V
Vertical
RX
Receiver
TCN
Threshold Crossing Notification
V
Volt
SC
Service Channel
TDM
Time Division Multiplex
VC
Virtual Channel
SD
Space Diversity
TDMoP
TDM over Packet
VLAN
Virtual LAN
SDH
Synchronous Digital Hierarchy
TEMP
Temperature
VP
Virtual Path
SEG
Segment
TERM
Terminal
VPN
Virtual Private Network
SEP
Severely Errored Period
TF
Transmit Fail
VSWR
Voltage Standing Wave Ratio
SES
Severely Errored Seconds
TIM
Trace Identifier Mismatch
WDM
Wavelength Division Multiplexing
SFP
Small Form factor Pluggable
TLV
Type Length Value
Web
World Wide Web
SGMI
Security Gateway Management
TM
Through Mode
WG
Waveguide
Interface
TNC
Threaded Neil Councilman
WR
Warning
SMS
Synchronous Multiplexing System
ToS
Type of Service
WRR
Weighted Round Robin
SMU
Source Measure Unit
TPID
Tag Protocol Identifier
WS
Wayside
SNCP
Sub-network Connection Protection
TQC
Total Quality Control
XCTRL
XPIC Control
SNMP
Simple Network Management Protocol
TTL
Time To Live
X-DEM
XPIC Demodulator
XFP
SP
Strict Priority
TU
Tributary Unit
SPD
Speed
TX
Transmitter
SRC
Source MAC Address
UAE
UAS Event
XIF
XPIC IF
STAT
Status
UAS
Unavailable Seconds
XPD
Cross Polarization Discrimination Ratio
XPIC
STD
Standard
UL
Upload
STM
Synchronous Transport Module
UNEQ
Unequipped
STP
Spanning Tree Protocol
NEC Confidential
10(X) Gigabit Small Form Factor Pluggable
Cross Polarization Interference Canceller
XREF
XPIC Reference
331
View more...
Comments