iPASOLINK-Expert2013-3

Share Embed Donate


Short Description

Descripción: iPASOLINK-Expert2013-3...

Description

MSTP/RSTP SETTING

NEC Confidential

197

STP (IEEE 802.1D)/ RSTP (IEEE 802.1w)/ MSTP (IEEE802.1s) •

• • •

Layer2 based loop-free protection mechanism – Each device using STP/RSTP send BPDU frames, and root bridge, root port, designated port, backup port and alternate port are decided by BPDU frame. Widely used in the enterprise network Protection Switching Time; STP < 60sec / RSTP < 2~3 sec Topology is no limitation (Ring, Tree, etc…) Blocking

Failure Forwarding

Forwarding

Blocking à Forwarding

Forwarding

Forwarding

Forwarding

Forwarding

Root Bridge

Root Bridge Forwarding

• Some topology (instance) can be treated with same STP network • The VLANs are divided into some groups (instances), and blocking port is decided in the each group (instance). • MSTP is based on RSTP (IEEE 802.1w), and can used RSTP independently in each VLAN – Enables load balancing, over a large number of VLANs • The restructuring of each VLAN becomes possible. As a result, the time required to restructure can be shortened. NEC Confidential

Forwarding à Blocking

Forwarding

MSTI 2 VLAN: 201 - 300

Forwarding

Blocking For MSTI1

Double capacity Blocking For MSTI2 Root Bridge

MSTI 1 VLAN: 101 - 200

198

STP Parameter - Bridge ID & Path Cost Bridge ID (STP, RSTP) Bridge ID (8 Bytes) Bridge ID is main Parameter for Spanning Tree Algorithm, The Bridge with lowest Bridge ID is selected as “Root Bridge”

Bridge Priority

Bridge MAC Address

2bytes

6bytes

Default Bridge Priority = 32768 (IEEE 802.1d)

Path Cost is accumulated Cost between a Bridge to Root Bridge. Path Cost defined in IEEE802.1d Link Speed

Cost

10Gbps

2

1Gbps

4

100Mbps

19

10MBps

100

*Port Cost is manually configurable NEC Confidential

Root Bridge 100Base-Tx

1000Base-T

0+4=4

4+19 =23

0+19 =19

100Base-Tx 10Base-T 19+100 =119

199

STP IEEE 802.1D - Theory background (6) Root Bridge

Non Root Bridge

Bridge: A

Bridge: B

Bridge ID 32768

Bridge ID 32768

MAC Address 00-00-00-00-00-01

MAC Address 00-00-00-00-00-03

Forwarding Port 1

Spanning Tree Failure The blocked port has gone into Port 2 Forwarding

Forwarding RP

DP

Port 2

Port 1 as

DP

DP

Root port

Was Blocked Now forwarding

Forwarding Port 1 as

Summary of STP Port States 1. Blocking 2. Listening

BPDU

Root port Forwarding RP

Port 2

3. Learning 4. Forwarding

Non Root Bridge

5. Disabled

Bridge: C Bridge ID 32768 MAC Address 00-00-00-00-00-02

NEC Confidential

200

Difference between STP and RSTP STP

RSTP

STABLE TOPOLOGY

ONLY THE ROOT SEND BPDU AND OTHERS RELAY THEM.

ALL BRIDGES SEND BPDU EVERY HELLO (2SEC) AS A KEEP ALIVE MECHANISM.

PORT ROLES

ROOT (FORWARDING) DESIGNATED (FORWARDING) NON-DESIGNATED (BLOCKING)

ROOT (FORWARDING) DESIGNATED (FORWARDING) ALTERNATE (DISCARDING) BACKUP ( DISCARDING)

PORT STATES

DISABLED , BLOCKING, LISTENING, LEARNING ,FORWARDING

DISCARDING (DISABLED, BLOCKING, LISTENING) LEARNING, FORWARDING

TOPOLOGY CHANGES

USE TIMERS FOR CONVERGENCE INFORMED FROM THE ROOT. HELLO (2SEC) MAX AGE (20SEC) FORWARDING DELAY TIME (15SEC)

PROPOSAL AND AGREEMENT PROCESS FOR SYNCHRONIZATION (LESS THAN 1 SEC) HELLO, MAX AGE AND FORWARDING DELAY TIMERS USED ONLY FOR BACKWARD COMPATIBILITY WITH STP. ONLY RSTP PORT RECEIVING STP

TRANSITION

SLOW: (50SEC), BLOCKING (20SEC)=> LISTENING (15 SEC) => LEARNING (15SEC) => FORWARDING.

FASTER: NO LEARNING STATES. DOESN’T WAIT TO BE INFORMED BY OTHERS, INSTEAD, ACTIVELY LOOKS FOR POSSIBLE FAILURE BY A FEED BACK MECHANISM.

TOPOLOGY CHANGE

WHEN A BRIDGE DISCOVER A CHANGE IN THE NETWORK IT INFORM THE ROOT. THEN EVERY BRIDGE CAN GENERATE TOPOLOGY CHANGE AND ROOT INFORMS THE OTHER BRIDGES BY INFORM ITS NEIGHBORS WHEN IT IS AWARE OF SENDING BPDU AND INSTRUCT THE TOPOLOGY CHANGE AND IMMEDIATELY DELETE OLD DB OTHERS TO CLEAR THE DB ENTRIES AFTER THE FORWARDING DELAY

CHANGE ROOT

IF A BRIDGE (NON-ROOT) DOESN'T RECEIVE HELLO FOR 10X HELLO TIME, FROM THE ROOT, IT START CLAIMING THE ROOT ROLE BY GENERATING ITS OWN HELLO.

NEC Confidential

IF A BRIDGE DOESN’T RECEIVE 3X HELLOS FROM THE ROOT, IT START CLAIMING THE ROOT ROLE BY GENERATING ITS OWN HELLO

201

MSTP Setting M1 iPaso200-D M1 P1

MSTP Region: ABC iPaso200-E

Revision:0 M2 M2

M1

M2

iPaso400-F P1 iPaso400-B P2

P1

MSTP Region: NEC

IDU No. Bridge Priority (MSTI1) Bridge Priority (MSTI2) Instance No. (MSTI1) Instance No. (MSTI2)

1 4096 20480 1 2

2 8192 12288 1 2

3 8192 20480 1 2

In Normal condition mark the status of each modem Forwarding or Discarding MSTI1 MODEM1 MODEM 2

MSTI2 MODEM 1

MODEM 2

IDU 1 IDU 2 IDU 3 After Failure condition mark the status of each modem Forwarding or Discarding MSTI1 MODEM1 MODEM 2

MSTI2 MODEM 1

MODEM 2

IDU 1 IDU 2 IDU 3

NEC Confidential

202

MSTP Setting

Select RSTP/MSTP Setting from the ETH Function Setting Menu. Click the Modify STP Mode icon on the ETH Function Setting –RSTP/MSTP Setting display. In the STP Mode Setting window click the STP Mode dropdown list and select MSTP and click Ok. Click OK again on the Complete information window. RSTP/MSTP Setting display shows the current setting.

NEC Confidential

203

MSTP Setting Click the Modify STP Port icon on the RSTP/MSTP Setting display. And set the parameters for MSTP. Select each tab IST, MSTPI1 to MSTI4 as required and set the parameters.

NEC Confidential

204

MSTP Setting Enter the Region Name (32 Characters). This should be same on all members of the MSTP Region. Enter the Revision Number (0 - 65535). Of the configuration. All members of the MSTP region must have the same Revision No. The MSTP revision level is the revision number of the configuration. All switches in an MSTP region must have the same revision level configured BPDU Guard Timer Usage: to use this function, select the Used radio Button. This function prevent external BPDUs from changing the topology. If BPDU Guard Timer usage is selected as Use, then enter the Timer value in seconds ( 10 – 1000000). When unwanted BPDU is detected in the port, it will block the port for the timer period preventing the BPDU to pass.

M1 iPaso200-D M1

If BPDU Guard Timer usage is selected as Use, then enter the Timer value in seconds ( 10 – 1000000). When unwanted BPDU is detected in the port, it will block the port for the timer period preventing the BPDU to pass.

MSTP Region: ABC iPaso200-E

Revision:0 M2 M2

M1

M2

iPaso400-F P1 iPaso400-B P2

P1

MSTP Region: NEC

NEC Confidential

205

CIST Setting Every Region has a Common Internal Spanning Tree (CIST) that forms a single spanning tree instance including all the members in the region. CIST operates across the MSTP region and create a loop free topology across regions. In each region several MSTP Instances (up to 4) can be created with each instance catering for a group of VLANs. MSTP instance operates within the Region.

Select the tab IST to configure the CIST. Enable the ports that is makes the STP. If any port is an Edge port select Enable from the drop down list. For each of the ports selected: STP Port Path Cost: select Auto for automatically detect the path Cost or select Manual and enter the Path cost value STP Port Priority: select port priority value from the drop down list (default is 128) BPDU Guard: select from the drop down list enable to enable BPDU Guard function for the Port. Root Guard: select from the drop down list enable to enable Root Guard function for the Port. Click the Member VLAN and select the VLANs for each instance (IST, MSTI# ). NEC Confidential

206

MSTI Setting Configure the MSTP instances in the selected region by clicking on the MSTI# tabs. Select Enable radio button on the selected MSTI#. MSTI Regional Root Bridge Priority /ID will be automatically selected on the MAC address, Bridge Priority… Enter the Instance number for the selected MSTP Instance. Select the Bridge Priority (MSTI) from the drop down list. This selection can force the Bridge ID to be higher or lower to select as root Bridge for the selected instance. Click on the Member VLAN and select the VLANs for the selected MSTI from the VLAN List and the radio buttons. Select the port associated with MSTP in the region from the check boxes. Select the STP Port Path Cost and STP Port Priority from the respective drop down lists.

NEC Confidential

207

MSTP Setting

Selected Root Bridge Priority/ ID for CIST, CIST Regional, and each MSTI are shown. Forwarding and disable status of ports for each Instance is shown under status column.

NEC Confidential

208

Detail STP Parameter Setting

Item

Parameter

Description

STP Bridge Priority STP Bridge MAX Age

0 to 61440 6 to 40 s

Change default STP priority of the bridge Set the expiration of the Configuration BPDU stored, Bridge will. notice that a topology change has occurred after the Max Age time elapses and the BPDU is aged out

STP Bridge Hello Time STP Bridge Forward Delay

1s 2s 4 to 30 s

Set the period of sending Configuration BPDUs from Root Bridge. Set the delay when the port is going to change the state from Listening to Learning.

STP TX Hold Count

1 to 10

Set the number of BPDU which can be sent per second.

STP MAX Hop Count

1 to 40

See below

The MSTP maximum hop count value is the maximum number of hops in the region. The MSTI root bridge sends BPDUs with the hop count set to the maximum value. When a bridge receives this BPDU, it decrements the remaining hop count by one and propagates this hop count in the BPDUs it sends. When a bridge receives a BPDU with a hop count of zero, the bridge discards the BPDU NEC Confidential

209

Ether Ring Protection

NEC Confidential

210

G.8032 Ethernet Ring Protection Switching • Utilizing widely-deployed Ethernet (802.1,3) with OAM (802.1ag/Y.1731) • Loop-free protection mechanism • Protection Switching Time General Setting (detail) menu. Select the Bridge No. for the DHCP Server. Enter the IP Address range for the DHCP Server by entering the Start and End IP addresses. (Entered values should be within the selected Bridge No, network address range Enter the IP Address range for the Exception by entering the Start and End IP addresses Select for Security , Any radio button or Only Reserved radio button.

NEC Confidential

Enter the lease Time for the connection Select default Gateway, options are : Same as the Bridge Interface (selected bridge) Specify: specify the Gateway address below. Disabled: Disable the GW address To use DNS Sever Address: Select Used radio button and enter the Primary and Secondary DNS server Addresses To use Other Options select Used radio Button Enter the ID (range 0 – 255) Type: select from the drop down list Value:

308

DHCP server setting – Other Option lWhen use “Other Option”, other control information such as NTP Server Address, WINS Server Address, DCHP Server Address etc. can be stored in the 'options' field of the DHCP message. lDHCP Option is defined by RFC2132. lThe kind of control information is specified with option ID. lOption ID information also is defined by RFC2132.

For example l DHCP Option 54 can specify DHCP Server Address. Therefore, in the above case, DHCP Client can recognize DHCP Server Address. l You can confirm DHCP Server Address by using “ipconfig /all” at command prompt.

NEC Confidential

309

DHCP Server Setting

When a client receives an IP address, the client appears in the DHCP Client Table. If the client is not preregistered, Add is indicated at the end of the row for that client in the table. Click on the Add MAC Address icon to register the Client MAC addresses.

Enter the MAC Address to be registered and select the Distribution rule from the drop down list Select Auto : for the Server to Assign automatically from the IP Address range. Select Rejected : DHCP rejects request for IP address from this MACX address Select Fixed : Enter the IP Address to be assigned to the entered MAC address. NEC Confidential

310

DHCP SERVER / RELAY NMS

CLIENT:172.10.0.2. GW:172.10.0.1

Radio

Bridge1: 192.168.1.2 Bridge2 : 172.10.0.1

Radio

Bridge1: 192.168.1.4

Radio

Bridge1: 192.168.1.7

Bridge1: 192.168.1.6

GW:192.168.1.2.

Port1: Access (VLAN10)

GW:192.168.1.2.

GW:192.168.1.2.

GW:172.10.0.2.

DHCP Sever DHCP No.1 Bridge No.1 (192.168.1.2/24) IP Range (192.168.1.10 -192.168.1.15) Exceptions: none Security : any

Client-1

Client-2

Client-3

Client-4

Client-1 Client-2 Client-3

Client-1: unable to contact DHCP Server and will get request has timed out Client-2: will get the IP address 192.168.1.10 Client-3: will get the IP address 192.168.1.12 Fixed address Client-4: will get the IP address if the security setting is Any. If only Registered it will not be assigned an IP Address.

NEC Confidential

311

DHCP Server Setting

To Delete a registered MAC Address. Click the Delete MAC Address icon and select the check box of the MAC address to be deleted from the list and click OK

To release a client from the DHCP Client Table list, click the Forced Release IP Address icon and select the check box of the IP Address from the list. Released IP Address is free to be assigned to a different client.

Click on the Add indication in any of the listed MAC addresses that are not pre-registered to register them. Select the distribution method . If it is fixed then enter the IP address to be assigned. Click OK to register the selected MAC address.

NEC Confidential

312

Equipment Utility

NEC Confidential

313

Partial Equipment Config Download Use this function to download Program File, FPGA Data and Config Data from storage (Local PC or USB Memory) to update the NE.

1

From the Equipment Utility menu select Update (Storage-> NE ) Utility

2

Put the Equipment to Maintenance mode and select Config Data radio button. Click the Execute button

3 4

In the Update (storage-> NE) utility Config Data window click the select Config data type drop down list arrow. Select Partial Equipment Config

5

Browse to the location where the Equipment config file is located and select the config file. Click the Next button

6

Select the configuration items to upload by selecting from the check boxes. Click OK.

NEC Confidential

314

LOG CLEAR FUNCTION MAINTENACE MODE

1

Select Log Clear Function from the Equipment Utility Menu..

2

Select the Radio button of the Log Type to be cleared, Alarm Log, Status Log, Command Log or All Logs and click the Execute button

3

Click OK on the confirmation screen. When complete information window opens click OK. NEC Confidential

315

USB Memory Utility iPASOLINK System Configuration File Backup Procedure Configuration File Upload Procedure (IDU to USB) •Insert USB to Main Card •Wait until USB is detected (observe USB LED) flash •Protect SW ON (Up) •USB LED Blinks •Wait until USB LED Blinking stop •Protect SW OFF (Down) Remove USB from IDU

Configuration Upload Procedure (USB to IDU) IDU Power OFF •IDU Power OFF •Insert USB to Main card •Protect SW/ON (Up) •IDU Power ON •Maint LEDs on the Main Card starts to blink •About 2m 40sec after IDU Power ON USB LED Blinks (iPaso1000) •Main Card Maint LED Steady •After few seconds put Protect SW Down •IDU reboot start •Main card Maint LED stop The above process will take about 7minutes (Depends on configuration) •Active card Maint LEDs starts to blink

USB Memory utility allows to see the contents of the USB memory stick plugged in to the USB slot. It show the files inside folders named Config, IDU,FPGA and Inventory created in the USB stick

NEC Confidential

316

SOFTWARE KEY ALLOCATOR

NEC Confidential

317

Introduction •



What is Software Key Allocator (SKA) ? With SKA, You can reap the benefits of simplified software key upgrade and exchange software key for NEs. Customer Network (NMS) Key Features – Upgrade PNMSj SKA Client – Extraction & Storage Software Key – Relocation Allocator(SKA) PNMSj Client HUB

HUB Proxy, Firewall

Router ・・・

NEC

・・・ SKSS NEC Confidential

318

System configuration and specification for SKA 1. SKA Server – OS : Windows 2008 Server R2 – Machine Spec •CPU : Quad core 2.40GHz or higher •Memory : 8GB or above (More than 16GB recommended) •Disk Capacity : 160GB or more Customer Network(NMS) 1 PNMSj 2. SKA Client Software Key ・・・ Allocator(SKA) – OS : Windows 7 PNMSj Client •Internet Explorer 8 HUB

3. Port for Internet ->SKA server and client access to SKSS server in NEC office through Internet.

2 SKA Client

HUB Proxy, Firewall

3 NEC

SKSS NEC Confidential

319

Software Key Upgrade •

Issue “Upgrade Key” and download “Upgrade Key” to NEs. – Also after setup NEs in customer network, You can apply software key to NEs Flexibly.

Without SKA GLN / Local staff

SKSS

Issue “Upgrade Key”

NE

Customer Download “Upgrade Key”

NEC

Customer Network

With SKA Customer

SKSS Issue “Upgrade Key”

NEC

NEC Confidential

SKA

NE

Download “Upgrade Key”

Customer Network 320

Extraction & Storage、Relocation • •

You can extract current keys from NEs within DCN and store the key information. You can relocate a current key stored in the SKA to another NE within DCN.

Extraction

Relocation

User

User

SKA

NE

SKA NE Software Key Extraction

Pool Software Key

NEC Confidential

Software Key Relocation

Relocate Software Key

321

Support NMS & NE Type 1. Support NMS – All NMS Supported ->PNMSj, MS5000, and so on... – NMS is needed following conditions ・Create the NE list file with defined format. ・Store the inventory file which is created by NE, to specified directory, ・We recommend that SKA can access above 2files with FTP.

1 Customer Network (NMS) PNMSj

PNMSj Client HUB

2. Supported NE type – iPASOLINK Series ->iPASOLINK 100/100E/200/400/1000 – 5000iP Series (*Only Upgrade Function)

2 Customer Network (NE) Router ・・・

・・・

NEC Confidential

322

Environment for Demonstration

PNMSj

HUB

iPASO400 IDU [No.002]

iPASO400 IDU [No.001]

SKA

SKSS

SKA Client Screen shows the control of SKA client.

NEC Confidential

323

Demonstration *There are NEs which have no upgrade SW Key. • Register the NMS • •





– –

– – – – – – – –

Register the NMS information to SKA. You can confirm the NE List is updated.

Upgrade Software Key

Select a NE and Upgrade the Software Key You can confirm when Upgrade is finished in journal log.

Extract Software Key from NE.

Select the NE whose Software Key is upgraded and Extract it from SKA. You can confirm when Extract is finished in journal log.

Relocate Software Key

Select the another NE, and relocate the Software Key which is extracted. (It takes 20 seconds around.) You can confirm when Relocate is finished in journal log.

Manage the user account

NEC Confidential

Register the arbitrary user name Login with new account and check that it allows to see the screens without authority of executable .

324

Future Support (1/2) •

Function Based Software Key Relocation (Dec/2012)

Select “100Mbps!

NEC Confidential

325

Future Support(2/2) •

User Level Management (Dec/2012) – This function enables users to “Extract & Allocate” and “Upgrade” software keys. Current

Extract Upgrade & Allocate *Note *Note

Reference

Setting

Administrator User

New

N/A

N/A

Extract Upgrade & Allocate *Note *Note

N/A

Reference

Setting

Administrator User NEC Confidential

Selectable

Selectable

N/A 326

Procedure to introduce the SKA •





Get License for SKA. – Tell IP Address of SKA server machine – Get the License from SKSS system. Register the information of your SKA machine and Get the configuration files for SKA. – Tell IP Address and MAC address of SKA server machine. – Get the configuration files for SKA from SKSS. Install the configuration files to SKA. – Install the “SkssClientId.dat” and “SkssUri.dat” files to SKA Server.

NEC Confidential

327

ABBREVIATIONS-1 Adjacent Channel Alternate

CIR

Committed Information Rate

DMM

Delay Measurement Message

Polarization

CKT

Circuit

DMR

Delay Measurement Reply

ACCP

Adjacent Channel Co-Polarization

CLK

Clock

DO

Data-out

ACK

Acknowledgement

CMF

Channel Mismatch Failure

DSCP

Differentiated Services Code Point

AGC

Automatic Gain Control

CMI

Coded Mark Inversion

DUP

Duplexer

AIS

Alarm Indication Signal

CONV

Converter

DXC

Digital Cross Connect

ALM

Alarm

CORBA

Common Object Request Broker

E1

E-carrier level 1

ALS

Auto Laser Shutdown

Architecture

EBS

Express Burst Size

AMR

Adaptive Modulation Radio

CoS

Class of Service

EIR

Excess Information Rate

ANT, Ant.

Antenna

CPU

Central Processing Unit

EMC

Electro Magnetic Compatibility

Critical

ACAP

APS

Automatic Protection Switch

CR

EML

Element Management Layer

ATT

Attenuator

CRC

Cyclic Redundancy Check

EMS

Element Management System

ATPC

Automatic Transmitter Power Control

CS

Channel Separation

EOW

C Order Wire

AU

Administrative Unit

CTRL

Control

EPS

ETH-Protection Switch

near end Code Violation

AUX

Auxiliary

CV

EQL

Equalizer

Ave

Average

CW

Carrier Wave

ERP

ETH-Ring Protection Switch

BBE

Background Block Error

DA

Destination Address

ES

Errored Seconds

BER

Bit Error Rate

DADE

Differential Absolute Delay Equalizer

ETH-CC

ETH-Continuity Check function

BPF

Band Pass Filter

DB

Database

ETH-LB

ETH-Loopback function

BS

Base Station

DC

Direct Current

ETH-LBM

ETH-Loopback Message

BSC

Base Station Controller

DCN

Data Communication Network

ETH-LBR

ETH-Loopback Reply

BTS

Base Transceiver Station

DEG

Degraded

ETH-LB

ETH-Loopback function

Drop Eligible Indicator

CAPEX

Capital Expenditure

DEI

ETH-LT

ETH- Link Trace function

CBS

Committed Burst Size

DEM

Demodulator

ETH-LTM

ETH-Link Trace Message

CCDP

Co-Channel Dual Polarization

Des(Dest)

Destination

ETH-LTR

ETH-Link Trace Reply

CCM

Continuity Check Message

DI

Data-in

ETH-OAM

Ethernet Operations, Administration

Conference of European Postal &

DL

Download

Telecommunication Administration

DM

Delay Measurement

CEPT

NEC Confidential

and Maintenance

328

ABBREVIATIONS-2 ETH-OAM LB

ETH-OAM Loopback

ETH-OAM LT

ETH-OAM Link Trace

ETH-RDI

ETH-Remote Defect Indication function

ETSI

European Telecommunications Standards Institute

EXC

Electrical Cross Connect

E-to-E.

End-to-End

Fail

Failure

F/B

Front Back Ratio

FCS

Frame Check Sequence

FDB

Forwarding Database

FE

Fast Ethernet

FEC

Forward Error Correction

FEBBE

Far End Background Block Error

FEES

Far End Errored Seconds

FESES

Far End Severely Errored Seconds

FEUAS

Far End Unavailable Seconds

FPGA

Field Programmable Gate Array

F/W

Firmware

GbE, GBE

Gigabit Ethernet

3GPP

Third Generation Partnership Project

GUI

Graphical User Interface

H

Horizontal

HDB

High Density Bipolar

HK

House Keeping

HP

Higher order Path

HYB

Hybrid

H/W

Hardware

NEC Confidential

ID

Identification

IDU

Indoor Unit

IE

Internet Explorer

IEC

International Electro technical Commission

IEEE

Institute of Electrical and Electronics Engineers

I/F

Interface

IF

Intermediate Frequency

IHG

iPASOLINK High Grade

IN

Input

INTFC

Interface

I/O

Input/Output

IP

Internet Protocol

ITU

International Telecommunication Union

ITU-R

Radio Communication Sector of ITU

ITU-T

Telecommunication Sector of ITU

L2SW

Layer2-Switch

LAN

Local Area Network

LB

Loopback

LBM

Loopback Message

LCD

Loss of Cell Delineation

LCT

Local Craft Terminal

LDPC

Low Density Parity Check

LED

Light Emitting Diode

Lev.

Level

LLF

Link Loss Forwarding

LM

Loss Measurement

LMM

Loss Measurement Message

LNA

Low Noise Amplifier

LO

Local Oscillator

LOC

Loss of Continuity

LOF

Loss of Frame

LOM

Loss of Multiframe

LOP

Loss of Pointer

LO REF

Local Reference Signal Loss

LOS

Loss of Signal

LP

Lower order Path

LPM

Link Performance Monitor

LT

Link Trace

LTI

Loss of incoming Timing Input

LTM

Link Trace Message

MAC

Media Access Control

MAIN

Main

MAINT

Maintenance

MAX

Maximum

Mdev

Mean Deviation

MDCPU

MODEM CPU

MDI

Medium Dependent Interface

MDIX

Medium Dependent Interface Crossover

MD4

Message Digest Algorithm 4

MD5

Message Digest Algorithm 5

MEG

Maintenance Entity Group

MEM

Memory

MEP

MEG End Point

329

ABBREVIATIONS-3 MIN

Minimum

Octs

Octets

PMC

PASOLINK Management Card

MIP

Maintenance Intermediate Point

ODU

Out-Door Unit

PMON

Performance Monitor

MIX

Mixer

OFS

Out of Frame Second

PNMSj

MJ

Major

OMT

Ortho-Mode Transducer

MMC

Multi Media Card

OPEX

Operational expenditure

PPI

PDH PHY Interface

MME

Mobility Management Entity

OPP

Opposite

ppm

parts per million

PASOLINK Network Management System Java Version

MMG

Mismerge

OPR

Operation

PPP

Point-to-Point Protocol

MN

Minor

OPT

Optical

PPS

Path Protection Switch

MOD

Modulator

OSPF

Open Shortest Path First

PQ

Priority Queuing

MODEM

Modulator Demodulator

OSS

Operation Support System

PRM

Parameter

MON

Monitor

OUT

Output

PROT

Protection

MPX

Multiplexer

OW

Oder Wire

PS

Power Supply

MS

Multiplex Section

PA

Power Amplifier

PSC

Protection Switching Counts

MSC

Mobile Switching Center

PBR

Pressurizable Type B, flange profile

PSD

Protection Switching Duration

MSDU

MAC Service Data Unit

square Rectangular

PWR

Power

MSP

Multiplex Section Protection

PCP

Priority Code Point

QAM

Quadrature Amplitude Modulation

MTBF

Mean Time Between Failure

PDH

Plesiochronous Digital Hierarchy

QoS

Quality of Service

MTPC

Manual Transmitter Power Control

PDU

Protocol Data Unit

QPSK

Quadrature Phase Shift Keying

MUX

Multiplexing Equipment

PGM

Program

RCVR

Recover

N/A

Not Applicable

PHY

Physical

REF

Reference

NBI

Northbound Interface

PIR

Peak Information Rate

REM

Remote

NE

Network Element

PJE

Pointer Justification Event

RDI

Remote Defect Indication

NML

Network Management Layer

PJE-N

Pointer Justification Event Negative Stuff

RF

Radio Frequency

NMS

Network Management System

PJE-P

Pointer Justification Event Positive Stuff

RFS

Radio Frequency Systems

OAM

Operation Administration and

PKG

Package

RL

Relay

Maintenance

Pkts

Packets

RMON

Remote Network Monitoring

Occur

PLM

Payload Label Mismatch

RNC

Radio Network Controller

OCR

NEC Confidential

330

ABBREVIATIONS-4 RPL

Ring Protection Link

SUB

Substitute

UNEXP

Unexpected

RS

Regenerator Section

SW

Switch

Unicast DMR

Unicast Delay Measurement Reply

RS-232

Recommended Standard 232

S/W

Software

UNM

Unexpected MEP

RSL

Received Signal Level

SWG

Switch Group

UNP

Unexpected Period

RST

Regenerator Section Termination

SYNC

Synchronous

USB

Universal Serial Bus

RSTP

Rapid Spanning Tree Protocol

TCI

Tag Control Information

V

Vertical

RX

Receiver

TCN

Threshold Crossing Notification

V

Volt

SC

Service Channel

TDM

Time Division Multiplex

VC

Virtual Channel

SD

Space Diversity

TDMoP

TDM over Packet

VLAN

Virtual LAN

SDH

Synchronous Digital Hierarchy

TEMP

Temperature

VP

Virtual Path

SEG

Segment

TERM

Terminal

VPN

Virtual Private Network

SEP

Severely Errored Period

TF

Transmit Fail

VSWR

Voltage Standing Wave Ratio

SES

Severely Errored Seconds

TIM

Trace Identifier Mismatch

WDM

Wavelength Division Multiplexing

SFP

Small Form factor Pluggable

TLV

Type Length Value

Web

World Wide Web

SGMI

Security Gateway Management

TM

Through Mode

WG

Waveguide

Interface

TNC

Threaded Neil Councilman

WR

Warning

SMS

Synchronous Multiplexing System

ToS

Type of Service

WRR

Weighted Round Robin

SMU

Source Measure Unit

TPID

Tag Protocol Identifier

WS

Wayside

SNCP

Sub-network Connection Protection

TQC

Total Quality Control

XCTRL

XPIC Control

SNMP

Simple Network Management Protocol

TTL

Time To Live

X-DEM

XPIC Demodulator

XFP

SP

Strict Priority

TU

Tributary Unit

SPD

Speed

TX

Transmitter

SRC

Source MAC Address

UAE

UAS Event

XIF

XPIC IF

STAT

Status

UAS

Unavailable Seconds

XPD

Cross Polarization Discrimination Ratio

XPIC

STD

Standard

UL

Upload

STM

Synchronous Transport Module

UNEQ

Unequipped

STP

Spanning Tree Protocol

NEC Confidential

10(X) Gigabit Small Form Factor Pluggable

Cross Polarization Interference Canceller

XREF

XPIC Reference

331

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF