Tnms-m Surpass Hit 7020 3p2 Lct User Manual

Share Embed Donate


Short Description

Download Tnms-m Surpass Hit 7020 3p2 Lct User Manual...

Description

s

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT User Manual A42022-L5966-B 53-1-7619

User Manual

!

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Important Notice on Product Safety Elevated voltages are inevitably present at specific points in this electrical equipment. Some of the parts may also have elevated operating temperatures. Systems with forced ventilation have rotating items. Non-observance of these conditions and the safety instructions can result in personal injury or in property damage. The system complies with the standard EN 60950-1 / IEC 60950-1. All equipment connected has to comply with the applicable safety standards. Mount the systems in areas with restricted access only. Only trained and qualified personnel may install, operate, and maintain the systems.

The same text in German: Wichtiger Hinweis zur Produktsicherheit In elektrischen Anlagen stehen zwangsläufig bestimmte Teile der Geräte unter Spannung. Einige Teile können auch eine hohe Betriebstemperatur aufweisen. Anlagen mit Zwangsbelüftung haben drehende Teile. Eine Nichtbeachtung dieser Situation und der Warnungshinweise kann zu Körperverletzungen und Sachschäden führen. Das System entspricht den Anforderungen der EN 60950-1 / IEC 60950-1. Angeschlossene Geräte müssen die zutreffenden Sicherheitsbestimmungen erfüllen. Die Anlagen dürfen nur in Betriebsstätten mit beschränktem Zutritt aufgebaut werden. Die Anlagen dürfen nur durch geschultes und qualifiziertes Personal installiert, betrieben und gewartet werden.

Trademarks: All designations used in this document can be trademarks, the use of which by third parties for their own purposes could violate the rights of their owners.

Copyright (C) Siemens AG 2005 Issued by the Communications Group Hofmannstraße 51 D-81359 München Technical modifications possible. Technical specifications and features are binding only insofar as they are specifically and expressly agreed upon in a written contract.

2

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

Contents 1 1.1 1.2 1.3 1.3.1 1.3.2 1.3.3 1.4

Notes on This Documentation .................................................................................17 Customer Documentation........................................................................................17 Complementary Documents....................................................................................17 Symbols Used in the Customer Documentation .....................................................18 Symbol for Warnings ...............................................................................................18 Symbols for Notes ...................................................................................................18 Symbols for Menu Displays and Text Inputs...........................................................18 Notes on Licensed Software ...................................................................................18

2

Introduction..............................................................................................................19

3

Features ..................................................................................................................20

4

Hardware Configuration ..........................................................................................22

5

Software Configuration............................................................................................23

6 6.1 6.2 6.3

Installation ...............................................................................................................24 Route Configuration.................................................................................................24 Installing the LCT Software Package ......................................................................28 Uninstalling the LCT Software Package..................................................................33

7 7.1 7.2

Starting and Shutting down TNMS-M SURPASS hiT 7020 LCT ............................35 Starting TNMS-M SURPASS hiT 7020 LCT ...........................................................35 Shutting Down TNMS-M SURPASS hiT 7020 LCT ................................................37

8 8.1 8.1.1 8.1.2 8.1.3 8.2 8.2.1 8.2.2

Main Interface Features ..........................................................................................38 Main Window ...........................................................................................................38 Title Bar ...................................................................................................................38 Main Menu Bar ........................................................................................................38 Work Area................................................................................................................42 Submenus (with Right Mouse Button Click)............................................................42 MainBoard Card ......................................................................................................42 Ethernet Card ..........................................................................................................42

9 9.1 9.1.1 9.1.2 9.1.3 9.2 9.3 9.4

Security and User Management..............................................................................44 Security Management..............................................................................................44 User .........................................................................................................................44 Group.......................................................................................................................49 View.........................................................................................................................53 Change Password ...................................................................................................53 Lock Screen.............................................................................................................53 Lock Screen Configuration ......................................................................................54

10 10.1 10.2 10.3 10.4 10.5

NE Configuration and Management ........................................................................55 Chassis View ...........................................................................................................55 NE Property Configuration ......................................................................................55 Shutting down NE....................................................................................................57 NE Timing Setting....................................................................................................57 NE FTP Configuration .............................................................................................58

A42022-L5966-B 53-1-76193

3

User Manual

4

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

10.6 10.7 10.8 10.9 10.10

NE Trap Destination Configuration..........................................................................60 DCC Transparent Configuration..............................................................................60 Embedded E1 DCC Configuration ..........................................................................61 NE Software Management ......................................................................................62 NE MIB Management ..............................................................................................64

11 11.1 11.1.1 11.1.2 11.1.3 11.1.4 11.2 11.2.1 11.2.2 11.3 11.4 11.4.1 11.4.2 11.4.3 11.5 11.5.1 11.5.2 11.6 11.6.1 11.6.2 11.6.3

SDH Configuration and Management .....................................................................66 Card Configuration and Management .....................................................................66 Card Properties Configuration.................................................................................66 Synchronizing Card .................................................................................................67 Delete Card .............................................................................................................68 Cold Reboot Card....................................................................................................68 SDH Port Configuration and Management..............................................................68 Port Configuration....................................................................................................69 Port Status...............................................................................................................69 E1 Port Configuration and Management.................................................................70 Cross-Connect Management ..................................................................................71 Querying Current Cross-Connection .......................................................................71 Adding a New Cross-Connection ............................................................................72 Deleting a Connection .............................................................................................73 Terminal Point Configuration and Management......................................................73 Querying Current Terminal Point.............................................................................73 Terminal Point Mapping ..........................................................................................76 Synchronization Management.................................................................................79 Global Settings ........................................................................................................79 Configuring the System Clock .................................................................................80 Configuring the Reference ......................................................................................81

12 12.1 12.2 12.2.1 12.2.2 12.2.3 12.3 12.4 12.5 12.6 12.7 12.8 12.9 12.10

Ethernet Configuration and Management ...............................................................83 Bridge Configuration................................................................................................83 LAN Card Configuration and Management .............................................................84 LAN Port Properties.................................................................................................84 VLAN Rate Limiting .................................................................................................85 CoS Configuration ...................................................................................................86 WAN Port Configuration ..........................................................................................86 VLAN Management .................................................................................................88 Egress Priority Weight Configuration ......................................................................90 Static MAC Address Configuration..........................................................................92 ACL Configuration ...................................................................................................93 Group Broadcast Configuration...............................................................................94 RSTP Configuration.................................................................................................96 IGMP Snooping .......................................................................................................98

13 13.1 13.1.1 13.1.2 13.1.3 13.1.4

Protection Management ........................................................................................100 SNCP Management...............................................................................................100 Viewing and Modifying SNCP ...............................................................................100 Creating SNCP ......................................................................................................102 Deleting SNCP ......................................................................................................102 Switching SNCP ....................................................................................................103

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

13.2 13.3 13.3.1 13.3.2 13.3.3

MSP Management.................................................................................................103 MSSPRING Management .....................................................................................106 Creating MSSPRing ..............................................................................................107 Modifying MSSPRing.............................................................................................109 Deleting MSSPRing...............................................................................................112

14 14.1 14.2 14.3 14.4 14.4.1 14.4.2 14.4.3 14.5 14.5.1 14.5.2 14.5.3 14.5.4 14.5.5 14.5.6 14.5.7

DCN Management.................................................................................................113 DCC Management.................................................................................................113 OSI Configuration ..................................................................................................114 MGMT Port RIP Configuration ..............................................................................115 IP Route Configuration ..........................................................................................115 IP Interface ............................................................................................................115 IP Static Route.......................................................................................................116 IP Routing Table....................................................................................................119 OSPF.....................................................................................................................120 OSPF General .......................................................................................................120 OSPF Areas ..........................................................................................................122 OSPF Interfaces ....................................................................................................124 OSPF Interface Metrics .........................................................................................126 OSPF Neighbors ...................................................................................................127 OSPF LSDB ..........................................................................................................128 OSPF Ext LSDB ....................................................................................................129

15 15.1 15.1.1 15.1.2 15.2 15.2.1 15.2.2 15.3

Maintenance ..........................................................................................................131 PRBS Test Management.......................................................................................131 Query Current PRBS Status of Ports ....................................................................131 Set PRBS Testing..................................................................................................132 Loopback Test Management.................................................................................133 Querying Loopback Status ....................................................................................133 Setting Loopback Test...........................................................................................133 LED Test................................................................................................................134

16 16.1 16.1.1 16.1.1.1 16.1.1.2 16.1.1.3 16.1.1.4 16.1.2 16.2 16.2.1 16.2.1.1 16.2.1.2 16.2.2 16.2.3 16.2.4 16.2.5 16.3

Performance Monitoring Management ..................................................................135 Overview of Performance Monitoring ....................................................................135 SDH Performance Monitoring ...............................................................................135 PM in Regeneration Section (G.829) ....................................................................135 PM in Multiplex Section (G.829)............................................................................136 PM for HP/LP (High Order and Low Order Paths) (G.829) ...................................137 PM for Pointer Justification Counts at Administrative Unit (G.707).......................138 Data Performance Monitoring Parameters............................................................139 SDH Performance Monitoring Management .........................................................139 Filter Setting ..........................................................................................................140 TP Filter .................................................................................................................141 Parameter Filter.....................................................................................................142 Editing Monitored Parameter.................................................................................143 Alarm Threshold ....................................................................................................143 History SDH Performance .....................................................................................146 SDH Unavailable Periods......................................................................................147 Ethernet Performance Monitoring Management ...................................................148

A42022-L5966-B 53-1-76195

5

User Manual

6

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

16.3.1 16.3.2 16.3.3 16.3.4 16.3.5 16.4 16.4.1 16.4.2 16.4.3

Filter Setting ..........................................................................................................149 Editing Monitored Parameter.................................................................................150 Ethernet PM Thresholds........................................................................................150 History Ethernet Performance ...............................................................................153 5-Second Ethernet Performance...........................................................................154 E1 Bit Slip Performance ........................................................................................156 Filter Setting ..........................................................................................................156 Editing Monitored Parameter.................................................................................158 History E1 Bit Slip Performance ............................................................................159

17 17.1 17.2 17.2.1 17.2.2 17.2.3 17.2.4 17.2.5 17.2.6 17.2.7 17.2.8 17.3 17.4 17.4.1 17.4.2 17.5 17.5.1 17.5.2 17.6 17.6.1 17.6.1.1 17.6.1.2 17.6.2 17.6.3 17.7 17.7.1 17.7.2 17.7.3 17.7.4 17.7.5 17.8

Alarm and Event Management..............................................................................160 Overview of Alarms ...............................................................................................160 NE Alarms .............................................................................................................160 Current Alarms ......................................................................................................160 Viewing Active Alarms ...........................................................................................161 Reviewing the current alarms................................................................................162 Alarm Search.........................................................................................................163 Viewing Alarm Detail .............................................................................................164 Acknowledging Current Alarms .............................................................................165 Clearing Alarms .....................................................................................................166 History Alarms .......................................................................................................166 LED Indicators .......................................................................................................169 Exporting Alarms ...................................................................................................170 Exporting Active Alarms to a File ..........................................................................170 Printing Active Alarms ...........................................................................................172 Configuring Fault Management .............................................................................174 Audio Alarm Configuration ....................................................................................174 Alarm Type List Management ...............................................................................175 Alarm Configuration for Single NE ........................................................................176 Alarm Inhibit Configuration ....................................................................................176 Alarm Inhibit Configuration for Single NE..............................................................176 Alarm Inhibit Configuration for Specific Port .........................................................177 Alarm Out Configuration........................................................................................178 MDI/MDO Configuration ........................................................................................178 Displaying the Node Event Log .............................................................................179 Interpreting the Node Event Log ...........................................................................180 Management Events..............................................................................................180 Hardware Events ...................................................................................................181 Software Events ....................................................................................................181 Event Search .........................................................................................................182 Bit Slip Event Configuration...................................................................................183

18 18.1

Resource and Database Management .................................................................184 NE Usage Statistics...............................................................................................184

19 19.1 19.2 19.3

How To …..............................................................................................................185 Creating a TU12 Cross-Connection between E1 and STM-1 ...............................185 Configuring Layer 2 100Mbps Ethernet Service ...................................................188 Monitoring Current Performance of STM-1 Port ...................................................196

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

19.4 19.5 19.6

Creating MSSPRing Protection for STM-4 Ring ...................................................200 Creating Multiplex-Section Protection between Two NEs.....................................203 Creating SNCP Between Two NEs Using Two Ports of MainBoard .....................205

20

Abbreviations.........................................................................................................209

21

Index......................................................................................................................211

A42022-L5966-B 53-1-76197

7

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Illustrations

8

Fig. 2.1

TNMS-M Series Products.................................................................................. 19

Fig. 6.1

Open Hyper Terminal ........................................................................................ 24

Fig. 6.2

Hyper Terminal--Connection Description .......................................................... 25

Fig. 6.3

Hyper Terminal--Connect To............................................................................. 25

Fig. 6.4

Hyper Terminal--COM1 Properties ................................................................... 26

Fig. 6.5

CLI Window--Welcome to Login........................................................................ 26

Fig. 6.6

Main Menu......................................................................................................... 27

Fig. 6.7

IP Address Configuration .................................................................................. 27

Fig. 6.8

Add Static Route Information ............................................................................ 28

Fig. 6.9

TNMS-M SURPASS hiT 7020 LCT Welcome Screen ....................................... 29

Fig. 6.10

License Agreement ........................................................................................... 29

Fig. 6.11

Select Destination Location .............................................................................. 30

Fig. 6.12

Select Start Menu Folder .................................................................................. 31

Fig. 6.13

Select Additional Tasks..................................................................................... 31

Fig. 6.14

Ready to Install ................................................................................................. 31

Fig. 6.15

Installing ............................................................................................................ 32

Fig. 6.16

Exit Setup.......................................................................................................... 32

Fig. 6.17

Completing Setup.............................................................................................. 33

Fig. 6.18

Uninstall the Software from the Start Menu ...................................................... 33

Fig. 6.19

Dialog Box of Confirming the Uninstall Process................................................ 33

Fig. 6.20

Uninstall Status ................................................................................................. 34

Fig. 6.21

Completing the Uninstall Process ..................................................................... 34

Fig. 7.1

Desktop Icon...................................................................................................... 35

Fig. 7.2

Start LCT from Start Menu ................................................................................ 35

Fig. 7.3

Input NE IP Address.......................................................................................... 36

Fig. 7.4

LCT Login Window ............................................................................................ 36

Fig. 7.5

LCT Main Window ............................................................................................. 37

Fig. 8.1

Main Window..................................................................................................... 38

Fig. 9.1

Security Menu ................................................................................................... 44

Fig. 9.2

User Account Management............................................................................... 44

Fig. 9.3

Create New User............................................................................................... 45

Fig. 9.4

New User Added View ...................................................................................... 46

Fig. 9.5

Select Groups.................................................................................................... 46

Fig. 9.6

User Profile........................................................................................................ 47

Fig. 9.7

Setting User Profile ........................................................................................... 47

Fig. 9.8

Permitted Operations for User .......................................................................... 48

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

Fig. 9.9

Operation Logs for User .................................................................................... 49

Fig. 9.10

Change Passwords ........................................................................................... 49

Fig. 9.11

Create New Group ............................................................................................ 50

Fig. 9.12

New Group Added View.................................................................................... 50

Fig. 9.13

Select Users...................................................................................................... 51

Fig. 9.14

Permitted operations for Group......................................................................... 51

Fig. 9.15

Assign Group Permissions................................................................................ 52

Fig. 9.16

Change Password............................................................................................. 53

Fig. 9.17

Lock Screen ...................................................................................................... 53

Fig. 9.18

LockScreen Config............................................................................................ 54

Fig. 10.1

Chassis View..................................................................................................... 55

Fig. 10.2

NE Properties.................................................................................................... 56

Fig. 10.3

Shutdown NE..................................................................................................... 57

Fig. 10.4

Shutdown Information ....................................................................................... 57

Fig. 10.5

NE Time Settings .............................................................................................. 58

Fig. 10.6

FTP Setting ....................................................................................................... 59

Fig. 10.7

FTP Root........................................................................................................... 59

Fig. 10.8

NE Trap Destination.......................................................................................... 60

Fig. 10.9

Confirmation...................................................................................................... 60

Fig. 10.10

DCC Transparency Configuration..................................................................... 61

Fig. 10.11

Embedded E1 DCC Configuration.................................................................... 61

Fig. 10.12

NE Software Management................................................................................ 62

Fig. 10.13

FTP Setting ....................................................................................................... 62

Fig. 10.14

NE Software Switch Result Windows ............................................................... 63

Fig. 10.15

MIB Management.............................................................................................. 64

Fig. 10.16

FTP Setting ....................................................................................................... 64

Fig. 11.1

Card Properties ................................................................................................. 66

Fig. 11.2

Synchronize Card.............................................................................................. 67

Fig. 11.3

SDH Port Properties.......................................................................................... 68

Fig. 11.4

E1 Port Properties............................................................................................. 70

Fig. 11.5

Cross-Connect Management ............................................................................ 71

Fig. 11.6

Create Cross-Connect ...................................................................................... 72

Fig. 11.7

Confirming for Deleting the Selected Cross-Connections ................................ 73

Fig. 11.8

TP Configuration (View 1 - As Presented) ........................................................ 74

Fig. 11.9

TP Configuration (View 2 - Engaged) ............................................................... 75

Fig. 11.10

TP Multiplexing Structure Query....................................................................... 76

Fig. 11.11

TP Multiplexing Structure, View 1..................................................................... 76

Fig. 11.12

TP Multiplexing Structure, View 2..................................................................... 77

A42022-L5966-B 53-1-76199

9

User Manual

10

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT Fig. 11.13

Modify Mapping................................................................................................. 77

Fig. 11.14

Synchronization Management, Timing Source of NE....................................... 79

Fig. 11.15

Global Settings.................................................................................................. 80

Fig. 11.16

System Clock, Switching Timing Sources ........................................................ 80

Fig. 11.17

Timing Source Reference Properties................................................................ 81

Fig. 12.1

Bridge Properties .............................................................................................. 83

Fig. 12.2

LAN Port Configuration ..................................................................................... 84

Fig. 12.3

Rate Limit Config............................................................................................... 85

Fig. 12.4

WAN Port Configuration.................................................................................... 86

Fig. 12.5

Bandwidth Configuration ................................................................................... 87

Fig. 12.6

VLAN Management........................................................................................... 88

Fig. 12.7

Modify VLAN Based on VLAN .......................................................................... 89

Fig. 12.8

Modify VLAN Based on Ports ........................................................................... 90

Fig. 12.9

Egress Priority Weight Config ........................................................................... 91

Fig. 12.10

Output Priority Algorithm Configuration ............................................................ 91

Fig. 12.11

Modify Priority Weight ....................................................................................... 92

Fig. 12.12

Static MAC Address Configuration ................................................................... 92

Fig. 12.13

Add MAC Address ............................................................................................ 93

Fig. 12.14

ACL Config........................................................................................................ 94

Fig. 12.15

Add ACL............................................................................................................ 94

Fig. 12.16

Group Broadcast Configuration ........................................................................ 95

Fig. 12.17

Add MAC Address ............................................................................................ 96

Fig. 12.18

RSTP Properties Configuration ........................................................................ 97

Fig. 12.19

Port RSTP Configuration .................................................................................. 97

Fig. 12.20

IGMP Snooping – IP Multicast Group............................................................... 98

Fig. 12.21

IGMP Snooping – Mac Multicast Group ........................................................... 98

Fig. 12.22

IGMP Snooping – Vlan Multicast Router .......................................................... 99

Fig. 13.1

SNCP Management ........................................................................................ 100

Fig. 13.2

SNCP Properties............................................................................................. 101

Fig. 13.3

Create SNCP .................................................................................................. 102

Fig. 13.4

Delete SNCP................................................................................................... 103

Fig. 13.5

SNCP Switch................................................................................................... 103

Fig. 13.6

MSP Management .......................................................................................... 104

Fig. 13.7

MSP Property.................................................................................................. 105

Fig. 13.8

External Commands........................................................................................ 105

Fig. 13.9

Create Linear Multiplex Section Protection Group.......................................... 106

Fig. 13.10

MSSPRing Management ................................................................................ 107

Fig. 13.11

Set Ring Property............................................................................................ 107

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

Fig. 13.12

Warning Window............................................................................................. 108

Fig. 13.13

Create Ring..................................................................................................... 108

Fig. 13.14

Select Link Port............................................................................................... 108

Fig. 13.15

Confirm to add protection................................................................................ 109

Fig. 13.16

MSSPRING List .............................................................................................. 109

Fig. 13.17

MSSPRing Property........................................................................................ 110

Fig. 13.18

Command of MS SPRing................................................................................ 111

Fig. 13.19

Advanced Configuration.................................................................................. 112

Fig. 13.20

Delete MSSPRing ........................................................................................... 112

Fig. 14.1

Port DCC Management................................................................................... 113

Fig. 14.2

OSI Configuration............................................................................................ 114

Fig. 14.3

MGMT Port RIP Configuration ........................................................................ 115

Fig. 14.4

IP Interface...................................................................................................... 116

Fig. 14.5

IP Static Route ................................................................................................ 117

Fig. 14.6

Add IP Static Route......................................................................................... 118

Fig. 14.7

Edit IP Static Route ......................................................................................... 118

Fig. 14.8

IP Routing Table ............................................................................................. 119

Fig. 14.9

OSPF Submenu .............................................................................................. 120

Fig. 14.10

OSPF General ................................................................................................ 121

Fig. 14.11

OSPF Area...................................................................................................... 122

Fig. 14.12

Add OSPF Area .............................................................................................. 123

Fig. 14.13

Edit OSPF Area .............................................................................................. 124

Fig. 14.14

OSPF Interface ............................................................................................... 125

Fig. 14.15

OSPF Interface Metric .................................................................................... 126

Fig. 14.16

OSPF Neighbor............................................................................................... 127

Fig. 14.17

OSPF Link State Database............................................................................. 128

Fig. 14.18

OSPF External Link State Database .............................................................. 129

Fig. 15.1

PRBS Test Management ................................................................................ 131

Fig. 15.2

PRBS Setting .................................................................................................. 132

Fig. 15.3

Loopback Test Management .......................................................................... 133

Fig. 15.4

Loopback Test Configure ................................................................................ 134

Fig. 15.5

LED Test ......................................................................................................... 134

Fig. 16.1

SDH Current Performance .............................................................................. 140

Fig. 16.2

Monitor Point Filter .......................................................................................... 141

Fig. 16.3

Select Terminal Point....................................................................................... 142

Fig. 16.4

Edit Properties of Performance Monitor .......................................................... 143

Fig. 16.5

Alarm Threshold.............................................................................................. 144

Fig. 16.6

SDH History Performance............................................................................... 146

A42022-L5966-B 53-1-761911

11

User Manual

12

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT Fig. 16.7

SDH Unavailable Periods................................................................................ 147

Fig. 16.8

Select Terminal Point ...................................................................................... 147

Fig. 16.9

Ethernet Current Performance ........................................................................ 148

Fig. 16.10

Monitor Point Filter .......................................................................................... 149

Fig. 16.11

Select Port....................................................................................................... 149

Fig. 16.12

Edit Properties of Monitored Parameter.......................................................... 150

Fig. 16.13

1 Second Ethernet Thresholds........................................................................ 151

Fig. 16.14

Monitor Point Filter .......................................................................................... 151

Fig. 16.15

Select Ports ..................................................................................................... 152

Fig. 16.16

Selected Ports................................................................................................. 152

Fig. 16.17

Edit Properties of Performance Monitor.......................................................... 153

Fig. 16.18

Ethernet History Performance ........................................................................ 154

Fig. 16.19

5 Second Ethernet Performance .................................................................... 155

Fig. 16.20

Select Port ...................................................................................................... 155

Fig. 16.21

Current E1 Bit-Slip Performance .................................................................... 156

Fig. 16.22

Monitor Point Filter.......................................................................................... 157

Fig. 16.23

Select Port ...................................................................................................... 157

Fig. 16.24

Selected Ports................................................................................................. 158

Fig. 16.25

Edit Properties of Performance Monitor.......................................................... 158

Fig. 16.26

History E1 Bit Slip Performance ..................................................................... 159

Fig. 17.1

Open Active Alarms from Main Menu ............................................................. 161

Fig. 17.2

Open Active Alarms from Right-click Menu..................................................... 161

Fig. 17.3

Alarm Count by Severity.................................................................................. 162

Fig. 17.4

Active Alarms .................................................................................................. 162

Fig. 17.5

Alarm Search................................................................................................... 163

Fig. 17.6

Alarm Source Config ....................................................................................... 164

Fig. 17.7

Alarm Detail..................................................................................................... 165

Fig. 17.8

Acknowledge Alarm ........................................................................................ 165

Fig. 17.9

Acknowledge Comments ................................................................................ 166

Fig. 17.10

Clear Alarm ..................................................................................................... 166

Fig. 17.11

Open History Alarms from Main Menu............................................................ 167

Fig. 17.12

Open History Alarms from Right-click Menu................................................... 167

Fig. 17.13

History Alarms................................................................................................. 167

Fig. 17.14

Alarm Search .................................................................................................. 168

Fig. 17.15

Alarm Source Config....................................................................................... 169

Fig. 17.16

Report Alarm................................................................................................... 170

Fig. 17.17

Report Window................................................................................................ 171

Fig. 17.18

Print Preview ................................................................................................... 171

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

Fig. 17.19

Save File ......................................................................................................... 172

Fig. 17.20

Print Window ................................................................................................... 172

Fig. 17.21

Report Alarm Preview ..................................................................................... 173

Fig. 17.22

Print Setup ...................................................................................................... 173

Fig. 17.23

Open Alarm Audio Configure from Main Menu............................................... 174

Fig. 17.24

Audio Alarm Config ......................................................................................... 174

Fig. 17.25

Open Alarm Type List Management from Main Menu..................................... 175

Fig. 17.26

Alarm Type List Management......................................................................... 175

Fig. 17.27

Modify Property of Alarm ................................................................................ 176

Fig. 17.28

Alarm Inhibit Configuration – for NE ............................................................... 177

Fig. 17.29

Alarm Inhibit Configuration – for port .............................................................. 177

Fig. 17.30

Alarm Out Configuration ................................................................................. 178

Fig. 17.31

MDI/MDO Configuration.................................................................................. 179

Fig. 17.32

Events ............................................................................................................. 180

Fig. 17.33

Event Search .................................................................................................. 182

Fig. 17.34

Event Search Result ....................................................................................... 183

Fig. 17.35

Bit Slip Event Configuration ............................................................................ 183

Fig. 18.1

NE SDH Resource Usage Statistics ............................................................... 184

Fig. 19.1

Cross Connections Management Menu.......................................................... 185

Fig. 19.2

Cross Connections Management.................................................................... 185

Fig. 19.3

Create Cross Connections.............................................................................. 186

Fig. 19.4

Create Cross Connections.............................................................................. 187

Fig. 19.5

Bridge Configuration Menu ............................................................................. 188

Fig. 19.6

Bridges Properties........................................................................................... 188

Fig. 19.7

LAN Port Configuration ................................................................................... 189

Fig. 19.8

WAN Port Config............................................................................................. 190

Fig. 19.9

Bandwidth Configuration ................................................................................. 191

Fig. 19.10

VLAN Management......................................................................................... 192

Fig. 19.11

VLAN Config ................................................................................................... 193

Fig. 19.12

Query VLAN Information................................................................................. 194

Fig. 19.13

Create Cross-Connect .................................................................................... 195

Fig. 19.14

Cross-Connect Management.......................................................................... 195

Fig. 19.15

Current SDH Performance Menu.................................................................... 196

Fig. 19.16

SDH Current Performance.............................................................................. 196

Fig. 19.17

Monitor Point Filter.......................................................................................... 197

Fig. 19.18

Select Terminal Point...................................................................................... 198

Fig. 19.19

Monitor Point Filter.......................................................................................... 198

Fig. 19.20

SDH Current Performance.............................................................................. 199

A42022-L5966-B 53-1-761913

13

User Manual

14

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT Fig. 19.21

MSSPRing Management ................................................................................ 200

Fig. 19.22

Set Ring Property............................................................................................ 200

Fig. 19.23

Warning Window............................................................................................. 201

Fig. 19.24

Create Ring..................................................................................................... 201

Fig. 19.25

Select Link Port............................................................................................... 202

Fig. 19.26

Confirm to add protection................................................................................ 202

Fig. 19.27

MSSPRING List .............................................................................................. 202

Fig. 19.28

Point-to-point System...................................................................................... 203

Fig. 19.29

MSP Management .......................................................................................... 203

Fig. 19.30

Create Linear Multiplex Section Protection Group ......................................... 204

Fig. 19.31

MSP Management .......................................................................................... 204

Fig. 19.32

SNCP Example ............................................................................................... 205

Fig. 19.33

SNCP Management ........................................................................................ 206

Fig. 19.34

Create and Config SNCP................................................................................ 207

Fig. 19.35

SNCP Protection in NE A................................................................................ 207

Fig. 19.36

SNCP Switch .................................................................................................. 208

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

Tables Tab. 3.1

Feature List ....................................................................................................... 21

Tab. 4.1

Minimum Hardware Requirements of TNMS-M SURPASS hiT 7020 LCT ....... 22

Tab. 8.1

Main Menu Structure......................................................................................... 42

Tab. 10.1

NE Properties ................................................................................................... 56

Tab. 10.2

NE Software Management Window Field Description..................................... 62

Tab. 11.1

Card Properties Window Field Description....................................................... 67

Tab. 11.2

Port Configuration............................................................................................. 69

Tab. 11.3

Port Status ........................................................................................................ 70

Tab. 11.4

TP Management Parameters ........................................................................... 75

Tab. 11.5

Tributary (Trib#) to KLM to Timeslot (TS#) Numbers Mapping ....................... 78

Tab. 13.1

SNCP Properties ............................................................................................ 101

Tab. 15.1

PRBS Test Pattern......................................................................................... 132

Tab. 16.1

Regenerator Section SES threshold xx% (for BIP-8) .................................... 136

Tab. 16.2

Defects Resulting in a Near-end Severely Errored Second .......................... 136

Tab. 16.3

Defects resulting in a Far-end Severely Errored Second .............................. 136

Tab. 16.4

Multiplex Section SES threshold xx% (For BIP-1)......................................... 137

Tab. 16.5

Defects Resulting in a Near-end Severely Errored Second .......................... 137

Tab. 16.6

Defects Resulting in a Far-end Severely Errored Second............................. 138

Tab. 16.7

Path Overhead Section SES Threshold xx% (For BIP-2, BIP-8) .................. 138

Tab. 16.8

PM Management Functions........................................................................... 140

Tab. 16.9

Default Value and Value Range for a Fixed 15-minute Period...................... 145

Tab. 16.10

Default value and Value Range for a Fixed 24-hour Period.......................... 145

Tab. 16.11

Maximum Records number of History Performance ..................................... 146

Tab. 16.12

Primary Ethernet PM Function ....................................................................... 148

Tab. 17.1

Active Alarms information ............................................................................... 163

Tab. 17.2

LED Status...................................................................................................... 170

Tab. 17.3

Management Events....................................................................................... 181

Tab. 17.4

Hardware Events ............................................................................................ 181

Tab. 17.5

Software Events.............................................................................................. 181

A42022-L5966-B 53-1-761915

15

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

1 Notes on This Documentation 1.1

Customer Documentation The Customer Documentation of the SURPASS hiT 7020 comprises the following descriptions and manuals: •

i

Technical Manual The Technical Manual gives an overview of the application, performance features, interfaces, and functions of the SURPASS hiT 7020. It also contains the most important technical data.

The Technical Manual does not contain any instructions to operate the product. •

Installation and Test Manual The Installation and Test Manual ITMN contains instructions on mounting, connecting, and commissioning the SURPASS hiT 7020, as well as connecting and commissioning the LCT operating terminals.



Troubleshooting Manual The Troubleshooting Manual provides information about the supported alarm list and troubleshooting procedures for the SURPASS hiT 7020.



TNMS-M SURPASS hiT 7020 LCT User Manual The LCT User Manual provides information about the LCT (features, configuration, installation, etc.) and how to operate, monitor, and maintain the SURPASS hiT 7020 using the Element Manager software (Application Software) running on the LCT.

i

Besides the LCT User Manual, the Online Help of the TNMS-M SURPASS hiT software is of high importance for the user.

1.2

Complementary Documents In addition to the SURPASS hiT 7020 customer documentation listed in Chapter 1.1, there is further documentation: •

SURPASS hiT 7020 Release Note This document identifies the specific version of the SURPASS hiT 7020 and provides information on HW, SW, LCT components and the limitations of the release as well as important notes concerning the customer documentation.

A42022-L5966-B 53-1-761917

17

User Manual

1.3 1.3.1

! 1.3.2

i

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Symbols Used in the Customer Documentation Symbol for Warnings This symbol identifies notes which, if ignored, can result in personal injury or in permanent damage to the equipment.

Symbols for Notes Information which extends beyond the immediate context.

Cross reference to other chapters in this manual or reference to other manuals. Help

1.3.3

Reference to the online help system of the Element Manager software.

Symbols for Menu Displays and Text Inputs Menu options from pop-up menus or inputs from the user (texts, commands) are displayed consecutively in their hierarchical sequence in pointed brackets: etc.

1.4

Notes on Licensed Software This documentation refers to software products which were taken over from other companies as licenses. Should problems arise, the user should contact Siemens AG as the licensee and not the relevant licenser.

18

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

2 Introduction TNMS-M series products are network management system which are used to manage and maintain MSTP network elements built by SURPASS hiT series products.

The TNMS-M series network management system products include TNMS-M LCT and TNMS-M. (See Fig. 2.1)

Other Vendor’s OSS CORBA/TMF814

NCI

TNMS-M

TNMS-M LCT

SNMP

SNMP

SURPASS NETWORK ELEMENTs (hiT 7060HC, 7060, 7030, 7020…)

Fig. 2.1

TNMS-M Series Products

TNMS-M LCT (Local Craft Terminal) provides an NE level TNMS-M based management function and GUI. One TNMS-M LCT application can only connect and manage one NE at one time. The interface between TNMS-M LCT and NE is SNMP based. Different types of network elements correspond to different types of LCT, which are mainly used for on-site management and maintenances.

TNMS-M SURPASS hiT 7020 LCT is an element management system for a single NE, which is designed to provide comprehensive fault, configuration, performance management functions for the SURPASS hiT 7020 product line.

A42022-L5966-B 53-1-761919

19

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

3 Features TNMS-M SURPASS hiT 7020 LCT features are listed in Tab. 3.1.

Feature Java-Based User Interface

Consistency and Data Synchronization

Network Element Control

Description • • • • • • • •

Configuration Management

• • • • •

Protection and Redundancy

20

• • • • • • • • • • • • • • •

Java-based user interface to connect NEs A Chassis View showing the front faceplate of the equipment Color-coded LEDs to indicate NE status Uploads data from the actual NE to update the management information for the NE in the LCT Ensures all status information and data in the LCT are consistent with the actual NE Enables NE software updates and download from the LCT Redundant images of the embedded software are stored in an NE, one active and one backup which can be switched and activated by the LCT NE warm reboot and cold reboot can be controlled by the LCT View/synchronize/delete/modify Circuit-pack attributes View/synchronize/modify port attributes TP configuration and management, including viewing/synchronizing/modifying TP attributes and TP multiplexing structure configuration SDH Cross-Connect configuration and management Timing configuration and management, including selecting the timing reference for system clock, modifying/viewing timing reference of the NE’s system clock, and configuring the timing reference for the station clock Virtual concatenation configuration and management LCAS configuration Ethernet VLAN configuration Ethernet Class of Service configuration Rapid spanning trees management Rate limiting configuration for the Ethernet port Broadcast storm control Multicast management IP route configuration OSPF parameter configuration OSI-light parameter configuration Supports MSP protection management Supports SNCP/I protection management Supports Ethernet RSTP protection management Supports MS-SPRing(STM-4) protection management

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

Feature Performance Management

Maintenance

Fault Management

Description • • • • • • • • •

Event Management Tab. 3.1 Feature List

A42022-L5966-B 53-1-761921

• •

Supports monitored performance TPs and parameters selection. Supports current performance management Supports history performance management Loopback Configuration for testing LED test PRBS Test Maintenance AIS/RDI Insertion Test Management Collects, displays, and manages SURPASS hiT 7020 fault messages (including NE, card, port and TP related messages) Supports color coded alarms to indicate alarm severity level Supports active alarm synchronization Supports NE related event management

21

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

4 Hardware Configuration The TNMS-M SURPASS hiT 7020 LCT software can run on the following operating system: • Microsoft Windows based operating system The minimum hardware requirements of TNMS-M SURPASS hiT 7020 LCT are listed in Tab. 4.1. Configuration

22

• • • • •

1.6 GHz Pentium-4 Processor 512M RAM 1 × 20GB Hard Disk TP Ethernet 10/100BASE-T Networking Port Graphic Card with 1024 × 768 resolution (75Hz refresh for Desktop; 60-Hz refresh for Notebook) • Color Monitor (17’’ for Desktop; 14’’ TFT for Notebook) Minimum Hardware Requirements of TNMS-M SURPASS hiT 7020 LCT

Windows-Based Computer

Tab. 4.1

Hardware Requirement

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

5 Software Configuration The following operating system and software package are required to install and run the TNMS-M SURPASS hiT 7020 LCT. •

Microsoft Windows based operating system −Windows 2000 Professional operating system, or −Windows XP Professional operating system



The TNMS-M SURPASS hiT 7020 LCT software

A42022-L5966-B 53-1-761923

23

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

6 Installation 6.1

Route Configuration TNMS-M SURPASS hiT 7020 LCT manages NEs based on TCP/IP addresses. Therefore, the user must set a static route to enable the LCT system to find the NE. Before setting the route, ensure that the console port and the MGMT port of the user’s computer are connected with the peer ports of SURPASS hiT 7020.

i

TNMS-M SURPASS hiT 7020 LCT only supports NE management through the MGMT port.

1. Click ÆÆÆÆ to open the window. (See Fig. 6.1)

Fig. 6.1

24

Open Hyper Terminal

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

2. In the window, enter the user name in the field and click .

Fig. 6.2

Hyper Terminal--Connection Description

3. In the window, choose (or the computer’s connected console port) in the drop-down menu and click .

Fig. 6.3

A42022-L5966-B 53-1-761925

Hyper Terminal--Connect To

25

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT 4.

In the window, click and click .

Fig. 6.4

Hyper Terminal--COM1 Properties

5. Input a few and the CLI interface window will appear as follows. (See Fig. 6.5) Input the user name and the password, and then press . The user name is and the password is left blank.

Fig. 6.5

26

CLI Window--Welcome to Login

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT 6.

The Main Menu will appear. (See Fig. 6.6)

Fig. 6.6

7.

User Manual

Main Menu

IP Address Configuration

Press from the Main Menu to configure the node IP address, the management port IP address, the management port subnet mask, and the default gateway for the management port. The user can select options 1 to 4 to configure the special IP addresses based on his/her needs.

Fig. 6.7

IP Address Configuration

Click →→→ to open the window, and then use the command to enter the static route information. For example, enter the command to add the static route information into the user’s computer. This means the added route’s IP address is

A42022-L5966-B 53-1-761927

27

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT 192.168.16.243, the mask is 255.255.255.255, and the gateway is 192.168.12.243. (See Fig. 6.8)

i

Note: The user can use the command to get more information about the command.

Fig. 6.8

6.2

Add Static Route Information

Installing the LCT Software Package After selecting the SURPASS hiT serial products, Siemens post sales engineers and technical support technicians will help to complete selecting and installing hardware and software based on requirements. A TNMS-M SURPASS hiT 7020 LCT installation CD will be provided. Install the LCT software package from the provided CD using the program’s wizard mode on any qualified operating system.

An example of how to install the LCT software package is given below:

28

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

1. Double-click the TNMS_M_SURPASS_hiT 7020_R32Lxxx_setup.exe icon (note that the xxx is the load number of the LCT installation software.) A welcome screen will appear. (See Fig. 6.9) Click to continue.

Fig. 6.9

TNMS-M SURPASS hiT 7020 LCT Welcome Screen

2. In the window, choose , and click to continue.

Fig. 6.10

A42022-L5966-B 53-1-761929

License Agreement

29

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT 3.

i

Accept the default destination location, and click to continue. (See Fig. 6.11)

Note: The TNMS-M SURPASS hiT 7020 LCT software will be installed by default in the %SystemDrive%\Siemens\hiT 7020 folder. (%SystemDrive% specifies the drive letter of the hard disk drive containing the Windows operating system.) For example: If Windows is installed in Drive C, the software will be installed in the C:\Siemens\hiT 7020 folder. Note: two continuous blanks can’t exist in install folder name, otherwise, some function of system will run abnormally.

Fig. 6.11

Select Destination Location

4. Accept the default Start Menu folder location, and click to continue. (See Fig. 6.12)

30

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT Fig. 6.12

User Manual

Select Start Menu Folder

5. In the window, there are two options: 1) and 2) . The default option is 1), but both options may be selected. Click after selecting.

Fig. 6.13

Select Additional Tasks

6. After reviewing installation choices, click to proceed or to go back and make changes.

Fig. 6.14

A42022-L5966-B 53-1-761931

Ready to Install

31

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT 7.

Next the software will be installed. (See Fig. 6.15)

Fig. 6.15

Installing

8. If at any of the 7 steps above you wish to stop the installation process, click and the window will appear. (See Fig. 6.16) Click to exit setup. Click to continue the installation process.

Fig. 6.16

Exit Setup

9. To finish the installation, click . It is recommended that do not select the option .

32

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 6.17

6.3

User Manual

Completing Setup

Uninstalling the LCT Software Package 1. Click , select , select , and click .

Fig. 6.18

2.

Uninstall the Software from the Start Menu

Select to remove TNMS-M SURPASS hiT 7020 R3.1 LCT. (See Fig. 6.19)

Fig. 6.19

A42022-L5966-B 53-1-761933

Dialog Box of Confirming the Uninstall Process

33

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

3.

If is selected, an window will appear. (Fig. 6.20)

Fig. 6.20

Uninstall Status

4. After the uninstalling is complete, a confirmation window box will appear. Click to finish the uninstall process. Some items could not be removed automatically, but can be removed manually from the installation folder (%SystemDrive%\Siemens\hiT 7020 by default).

Fig. 6.21

34

Completing the Uninstall Process

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

7 Starting and Shutting down TNMS-M SURPASS hiT 7020 LCT 7.1

Starting TNMS-M SURPASS hiT 7020 LCT After the TNMS-M SURPASS hiT 7020 LCT software is installed, there are two methods to start the TNMS-M SURPASS hiT 7020 LCT: Option 1: If the option is selected during the installation process, a icon will appear on Desktop. (See Fig. 7.1) Double-click the icon to start the LCT program.

Fig. 7.1

Desktop Icon

Option 2: Select ÆÆ, and click the icon to start the LCT program. (See Fig. 7.2)

Fig. 7.2

A42022-L5966-B 53-1-761935

Start LCT from Start Menu

35

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT Then the LCT program will start. (See Fig. 7.3) The use needs to input the NE IP address which can be communicated with.

Fig. 7.3

Input NE IP Address

After a few seconds, the LCT login window will appear. (See Fig. 7.4) Input LCT’s Login Name, Password and NE’s IP Address. Then click .

Fig. 7.4

LCT Login Window

For example, the user can login TNMS-M SURPASS hiT 7020 LCT using account: Login Name: root Password: public The password can be changed in the LCT program.

i

Note: I.

36

The LCT program cannot connect to the NE which has been managed by the TNMS server launched on the same host.

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

II. There is no READ/WRITE access control policy implemented between TNMS-M and the LCT program.

After successfully connecting to the NE, the LCT main window will appear. (See Fig. 7.5)

Fig. 7.5

7.2

LCT Main Window

Shutting Down TNMS-M SURPASS hiT 7020 LCT There are two methods to shut down TNMS-M SURPASS hiT 7020 LCT: Option 1: Click the at top right of the TNMS-M SURPASS hiT 7020 LCT main window. Option 2: Click →. A confirmation window will appear. Click to confirm the shutdown request.

A42022-L5966-B 53-1-761937

37

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

8 Main Interface Features 8.1

Main Window The main window (See Fig. 8.1) consists of the following elements: •

Title Bar



Main Menu Bar



Work Area

Title Bar

Main Menu Bar

Work Area

Fig. 8.1

8.1.1

Main Window

Title Bar The title bar is located at the top of the main window (See Fig. 8.1) The title bar contains: A special window symbol to the far left. The type designation of the network element.

8.1.2

Main Menu Bar The main menu bar is located at the top of the main window, below the title bar (See Fig. 8.1). It contains the main menu options.

38

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

i

User Manual

The drop-down menu items will be changed when different object (for example: an NE, a card, or a port) is selected in chassis view.

Before the TNMS-M SURPASS hiT 7020 LCT is connected to the NE, the main menu bar only shows three drop-down menus: , , and . System Connect Exit

Working with the software Allow the TNMS-M SURPASS hiT 7060 LCT to connect with NE Close the main window of the NE application software, thus ending the session

Security Account Management Change Password Lock Screen Lock Screen Config

Working with the software Manage user accounts Change current password of LCT Lock the screen Configure Lock Screen settings

Help Help About

Working with the software Launch the Online Help Show the information about TNMS-M SURPASS hiT 7060 LCT

i

After the TNMS-M SURPASS hiT 7020 LCT is connected to the NE, the main menu bar shows ten drop-down menus: , , , , , , , , and .

System Disconnect Alarm Audio Configure Exit

Working with the software Disconnect LCT from NE Manage all audio alarm, including melody type and play times Close the main window of the NE application software, thus ending the session

Configuration NE Property Configuration Card Property Configuration

Working with the NE configuration View and modify the properties of NE

Warm Reboot NE Cold Reboot NE Shutdown NE Synchronize NE SDH Port Property Configuration E1 Port Property Configuration TP Configuration TP Multiplexing Structure

A42022-L5966-B 53-1-761939

View and modify the properties of Card Note: Only when a card in chassis is highlighted, would this menu item be displayed Restart NE under the LCT system Restart NE and will cause traffic loss Close NE safely Synchronize NE View and modify the properties of SDH Port Note: Only when an SDH port in chassis is highlighted, would this menu item be displayed View and modify the properties of E1 Port Note: Only when an E1 port in chassis is highlighted, would this menu item be displayed View and modify all TP Properties View and modify the construction of TPs

39

User Manual

Cross-Connect Management Synchronization Management NE Time Setting SNCP Management MSP Management MSSPRing Management NE FTP Configuration NE Trap Destination Configure NE Software Management NE MIB management AIS/RDI Inhibit Configuration Alarm Out Configuration MDI/MDO Configuration DCC Transparent Configuration Embedded E1 DCC Configuration NE Resource Usage Statistics Refresh Chassis Change NE IP

Manage all cross- connections in the NE

Synchronize Card

Synchronize a selected card Note: Only when a card in chassis is highlighted, would this menu item be displayed Manage DCN Manage DCC Status Configure OSI Enable or disable RIP

DCN Management DCC Management OSI Configuration MGMT Port RIP Configuration IP Route Configuration OSPF Ethernet

Bridge Configuration LAN Ports Property Configuration WAN Ports Property Configuration VLAN Management Egress Priority Weight Config Static MAC Address Configuration ACL Configuration

40

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Set and manage the timing references Set time zone and the time of NE Create and manage SNCP Create and manage MSP Create and manage MS-SPRing Set FTP server address Show and manage all IP addresses of PCs on which LCTs are running, current managed NE will send trap to all those LCT Update, backup, and switch NE software Manage NE database Set system alarm Set system alarm Set MDI/MDO Configure DCC Transparent Configure DCC channels View the cards and ports in Mainboard and their usages; Data card is not listed Display the latest state of NEs Change NE IP address

Configure IP Route Manage OSPF Managing Ethernet settings Note: Only when an Ethernet card in chassis is highlighted, would this drop-down menu be displayed Configure bridge properties View and modify the properties of LAN Port View and modify the properties of LAN Port Configure VLAN configurations Configure Priority Algorithm of a Ethernet card Configure Static MAC Address of a Ethernet card View and modify the Access Control List of a Ethernet card

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Group Broadcast Configuration RSTP Configuration IGMP Snooping Fault Active Alarms History Alarms Events

Alarm Type List Management Alarm Inhibit Configuration Bit Slip Event Configuration

User Manual

View and modify the group broadcast settings of a Ethernet card View and modify the RSTP properties of a Ethernet card View current Internet group multicast settings Managing Alarm Display current alarms occur on NE/Card/Port according to managed object selected currently Display history alarms occur on NE/Card/Port Display all events about the operation Note: only when neither a card nor a port in chassis is highlighted, would this menu item be displayed Manage alarm type Configure the Alarm Inhibit Configuration for specific port Enable or disable bit slip event

Performance Current SDH Performance History SDH Performance SDH Unavailable Periods Current Ethernet Statistics Ethernet PM Thresholds History Ethernet Statistics 5 Second Ethernet PM Current E1 Bit Slip Performance History E1 Bit Slip Performance

View the status of NE View and manage current SDH performance

Maintenance PRBS Test Maintenance Loopback Test Management LED Test

Working with the maintenance test Perform PRBS test Perform Loop-back test

Windows SURPASS hiT 7020 Chassis View Minimize All Maximize All

Select the view for the open windows List of all the currently-open windows; the selected window (in the foreground) is indicated by the tick Minimizes all opened windows Maximizes all windows

Security Account Management Change Password

Working with the software Manage user accounts Change current password of LCT

A42022-L5966-B 53-1-761941

View and manage history SDH performance View and manage SDH unavailable periods View and manage current Ethernet performance Set Ethernet performance thresholds View and manage history Ethernet performance View and manage 5 second Ethernet performance View and manage current E1 Bit Slip performance View and manage history E1 Bit Slip performance

Perform LED test

41

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Lock Screen Lock Screen Config Help Help About Tab. 8.1

Lock the screen Configure Lock Screen settings Online help( in English) conforming to MS Windows Display the help topics in the form of the and folders Show the information about TNMS-M SURPASS hiT 7020 LCT Main Menu Structure

Note: To select the whole NE, keep pressing the “Ctrl” key and click the NE Chassis view.

8.1.3

Work Area This space in the main window (See Fig. 8.1) shows all the windows which have just been opened. All windows within the work area can be opened or closed without ending the application software ending (a function of Windows). In the Alarm Count area, all current alarms are collected and the numbers are listed by severity and category.

8.2

Submenus (with Right Mouse Button Click) The menu sequence which is described here depends on the selected card.

8.2.1

MainBoard Card After selecting the STM card or the CC card, click the right mouse button.

Card Property Configuration

Opens the Card Properties window

Synchronize Card

Opens the Synchronize window

Cross-Connect Management

Opens the Cross Connection Management window

Synchronization Management

Opens the Timing Source Management window

Active Alarms

Opens the Active Alarm window

History Alarms

Opens the History Alarm window

NE Property Configuration

Opens the NE Properties window

Refresh Chassis

Refresh the chassis view

Synchronize NE

Synchronize NE

Change NE IP

Opens the Configure NE IP window

8.2.2

Ethernet Card After selecting the Ethernet card, click right button.

Card Property Configuration

Opens the Card Properties window

Synchronize Card

Opens the Synchronize window

42

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Bridge Configuration

Opens the Bridge Properties window

LAN Ports Property Configuration

Opens the LAN Port Properties window

WAN Ports Property Configuration

Opens the WAN Port Config window

VLAN Management

Opens the VLAN Management window

Egress Priority Weight Config

Configure Egress Priority Weight

Static MAC Address Configuration

Opens the Static MAC Address Config window

ACL Configuration

Opens the ACL Config window

Group Broadcast Configuration

Opens the Group Broadcast Config window

RSTP Configuration

Opens RSTP Property Configuration window

IGMP Snooping

Opens the IGMP Snooping window

Active Alarms

Opens the Active Alarms window

History Alarms

Opens the History Alarms window

Cold Reboot Card

Restart Card

NE Property Configuration

View and modify the properties of NE

A42022-L5966-B 53-1-761943

User Manual

43

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

9 Security and User Management The menu provides an entrance to manage the security of the system. (See Fig. 9.1)

Fig. 9.1

9.1

Security Menu

Security Management User Account Management helps to control the security of the system. Correct setup can get rid of many unexpected system errors and keep the systems running safely. To open User Account Management: Select → from the main menu. The window will appear. (See Fig. 9.2)

Fig. 9.2

9.1.1

User Account Management

User To add a user account, select Æ. An Adding User window will pop up. (See Fig. 9.3)

44

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 9.3

User Manual

Create New User

Fill in the , and blanks for a new user. Select groups that this new user belongs to

Check the expiry time. Then click to add this user. The new user name will appear beneath the Account tree. Click to give up all operations.

Here, the user named is created. In the left panel, select the corresponding user. The properties of this user will appear in the right panel (See Fig. 9.4)

Select corresponding tab to view and modify , , and .

A42022-L5966-B 53-1-761945

45

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 9.4

New User Added View

tab: All the groups that this user belongs to are listed in this tab. (See Fig. 9.4) Here, user core_administrator belongs to the group: Administration.

Click to add or remove this user from a group. (See Fig. 9.5)

Fig. 9.5

Select Groups

Select the group in the left and click “>>” to add the user to this group. Select the group in the right and click “” to add a user to this group. Select the user in the right and click “ button, to add it to the panel. Click to confirm the action and continue adding other MAC Addresses. Click to confirm the action and close the window. Click to quit the window. All the unsaved modifications will be lost. Click to launch the online help.

12.9

RSTP Configuration Select the corresponding Ethernet card, right-click, and select . A new window, , will appear. (See Fig. 12.18)

96

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 12.18

User Manual

RSTP Properties Configuration

In the window, modify the Max Age, Switch Priority, Forward Delay, and Hello Time options. Click to check the real-time port RSTP properties. Click to set modifications in the window. Click to confirm changes and quit the window. Click to quit the window without saving any modifications. Click to print the information of RSTP Properties. Click to launch the online help.

Double-click a row to view the port RSTP properties. (See Fig. 12.19)

Fig. 12.19

Port RSTP Configuration

In the window, modify Port Priority, Path Cost, and Disable or Enable Port.

A42022-L5966-B 53-1-761997

97

User Manual

12.10

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

IGMP Snooping Select the corresponding Ethernet card, right-click, and select . A new window, , will appear. (See Fig. 12.20)

Fig. 12.20

IGMP Snooping – IP Multicast Group

In the tab, click , and the current IP Multicast Group settings will be listed. Click the (See Fig. 12.21) or the (See Fig. 12.22) tab and then click , the corresponding group multicast settings will be listed.

Fig. 12.21

98

IGMP Snooping – Mac Multicast Group

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 12.22

A42022-L5966-B 53-1-761999

User Manual

IGMP Snooping – Vlan Multicast Router

99

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

13 Protection Management SURPASS hiT 7020 supports SNCP MSP and MSPRing management.

13.1

SNCP Management To open the window, select → from the main menu. A new window will appear. (See Fig. 13.1)

Fig. 13.1

13.1.1

SNCP Management

Viewing and Modifying SNCP The section in the window allows setting the conditions of querying to searching SNCP database. The querying conditions include , , , , and . Type in the Label of the SNCP to be searched; for the other parameters (Capacity, Card, Direction, and Port), use the drop-down menus provided to set parameters. Click to start searching the database. The results will be displayed as shown in the table below. The SNCPs and their properties will be displayed in the table. Double-click an SNCP or select one SNCP then click to view and modify it. (See Fig. 13.2)

100

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 13.2

User Manual

SNCP Properties

The SNCP Properties supported are listed in Tab. 13.1. Items Description Capacity The transmission capacity. It cannot be modified in the View/Modify window Direction The transmission direction. It cannot be modified in the View/Modify window. Restore Mode The restore mode of this protection plan which includes Revertive and No Revertive. Wait To Restore Time The time interval waited for restore. This number must be between 60 and 720. Label A label chosen by the user to help the user remember SNCPs conveniently Hold off Time The time to hold off. This time must be between 0 and 100. Tab. 13.1 SNCP Properties

denotes the SNCP source/destination TP. – Select the current working TP, including its working card, port, and TP. This cannot be modified in the View/Modify window. – Select the protection TP, including its protecting card, port, and TP. This cannot be modified in View/Modify window. Click to submit the modifications.

A42022-L5966-B 53-1-7619101

101

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT Click to quit window. All the unsaved modifications will be lost. Click to launch the online help.

13.1.2

Creating SNCP In the SNCP Management window (See Fig. 13.1 ) click to create a new SNCP. (See Fig. 13.3)

Fig. 13.3

13.1.3

Create SNCP

Deleting SNCP In the window click to delete the selected SNCP. (See Fig. 13.4)

102

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 13.4

13.1.4

User Manual

Delete SNCP

Switching SNCP Click in the window to switch SNCP. The window will appear (See Fig. 13.5)

Fig. 13.5

SNCP Switch

Select a command in : Clear, LockOut, Force Switch to Protection, Force Switch to Working, Manual Switch to Protection, and Manual Switch to Working. Click to check the latest information. Click to start switch. Click to quit the window. All unsaved modifications will be lost.

13.2

MSP Management To open the window:

A42022-L5966-B 53-1-7619103

103

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

From the main menu, select →. A new window will appear. (See Fig. 13.6)

Fig. 13.6

MSP Management

Input conditions in the text boxes, including: and . Select options in the drop-down menus, including: , , and . Click to query the MS protection. Click to query the MS protection. Click to check the result. (See Fig. 13.7) Click to quit the window. All the unsaved modifications will be lost. Click to launch the online help.

104

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 13.7

User Manual

MSP Property

The window includes the following properties: , , , , , , , , , and .

In the window, select one MSP, and click to start the operation. The window will appear. (See Fig. 13.8)

Fig. 13.8

External Commands

The section includes: , , , , , and .

A42022-L5966-B 53-1-7619105

105

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT In the drop-down menu, select one command and click to operate this command. This window will not be closed. Click to check the latest information. Click to operate this command and quit the window. Click to quit the window. All the unsaved modifications will be lost. Click to launch the online help.

In the window, click to create a new protection. A window will appear. (See Fig. 13.9)

Fig. 13.9

Create Linear Multiplex Section Protection Group

Input and in the corresponding fields and select the options in the drop-down menus. Click to create MS Protection and close this window. Click to quit the window. All the unsaved modifications will be lost. Click to launch the online help.

In the window, Click to delete the selected protection. Click to print the information of the selected protection. Click to launch the online help.

13.3

MSSPRING Management LCT provides the function of creating and viewing MSSPRing information. Select Æ from the main menu. The window will appear. (See Fig. 13.10)

106

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 13.10

User Manual

MSSPRing Management

The information of rings will be listed in the table. The parameters include: , , , , and . Click to print the information of the MSSPRing. Click to quit the window. Click to launch the online help.

13.3.1

Creating MSSPRing Before creating a new MSSPRING, the user must know the ring topology and link information about the NE. Follow the steps below to create a new ring with MSSRPing Protection: 1. In the < MSSPRing Management> window, click . The window will appear. (See Fig. 13.11)

Fig. 13.11

Set Ring Property

Input a number as and arbitrary string as . Click to set the NEs in the ring.

i

Note: The maximum number of the ring is 16, and the Ring ID should be a number between 1 and 5000. If the information is incorrect or some items are not inputted, a warning window will appear. Fig. 13.12 is an example.

A42022-L5966-B 53-1-7619107

107

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 13.12

Warning Window

A new window will appear. A number of NEs will appear on the window, the total number of which equals the number that the user input in the previous window. (See Fig. 13.13)

Fig. 13.13

Create Ring

Click the icon of each NE, and input the corresponding IP address in the pop-up dialog. The IP address will appear below the icon of the NE. Click each of the links to set up the Link Port properties in the pop-up dialog. (See Fig. 13.14) Select board and port from the drop-down menu of the panel, input and in the panel, and click OK to confirm. The color of the corresponding link will turn green.

Fig. 13.14

108

Select Link Port

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

When all the NEs and links are configured, click in the window, and a confirmation dialog will pop up. Click to confirm to add protection to the ring. (See Fig. 13.15)

Fig. 13.15

Confirm to add protection

Then the MSSPRING is created, and it will be listed in window. (See Fig. 13.16)

Fig. 13.16

13.3.2

MSSPRING List

Modifying MSSPRing Select one MSSPRing in the table, and then click to view and modify its properties. (See Fig. 13.17)

A42022-L5966-B 53-1-7619109

109

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 13.17

MSSPRing Property

In the tab, click and select in the pop-up dialog to delete protection from the MSSPRing. All the other buttons and tabs will be grayed out, and this button will become . Click the button to re-add protection onto the MSSPRing. Click and select in the pop-up dialog to change the MSSPRing Enable status to “Enable”. Then the button will become . Click the button to change the MSSPRing Enable status to “Disable”. Click and select in the pop-up dialog to suspend the MSSPRing. Then the button will become . Click the button to un-suspend the MSSPRing. Click to get latest information.

Click to change configuration of this MSSPRing. The steps are similar to creating a MSSPRing. When an MSSPRing is enabled, the and buttons are available. Click to enter window. (See Fig. 13.18)

110

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 13.18

User Manual

Command of MS SPRing

In this window, the last switch information can be retrieved. Click to get latest information. Select in the drop-down menu and click to perform new command. The available commands have: : This command performs the ring switch for the normal traffic from the working channels to the protection channels for the span between the node at which the command is initiated and the adjacent node to which the command is destined. This switch occurs if the protection channels are not in an SD condition and are not satisfying an equal or higher priority bridge request (including failure of the protection channels). : This command performs the ring switch for normal traffic from the working channels to the protection channels for the span between the node at which the command is initiated and the adjacent node to which the command is destined. This switch occurs regardless of the state of the protection channels, unless the protection channels are satisfying a higher priority bridge request. : This command prevents the ring wraps anywhere for any protection activity and prevents using ring switches anywhere in the ring. If any ring switches exist in the ring, this command causes the switches to drop. If there is a span switch for this span, it is dropped. Thus, all ring switching is prevented (and pre-empted), and span switching is prevented only on the locked-out span. : This command clears the externally initiated command and WTR at the node to which the command was addressed. The NE-to-NE signaling following removal of the externally initiated commands is performed using the NR code.

The latest launched command is listed in field. The execution result of the latest command is shown in the field. There are two types of command execution results: — launched command succeed — launched command failed for some reason

A42022-L5966-B 53-1-7619111

111

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT Click to quit the window. Click to launch the online help. Click the button in window. The window will appear. (See Fig. 13.19)

Fig. 13.19

Advanced Configuration

Click to suspend the MSSPRing. Click to un-suspend the MSSPRing.

13.3.3

Deleting MSSPRing In the window, select one ring to be deleted, click to delete the selected MSSPRing. (See Fig. 13.20)

Fig. 13.20

112

Delete MSSPRing

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

14 DCN Management 14.1

DCC Management In Port DCC Management window, user can query current the DCC status of every STM port. To open Port DCC Management window, select •• from the main menu. The window will appear. (See Fig. 14.1)

Fig. 14.1

Port DCC Management

In the list, every row corresponds one STM port with following properties: : Specify corresponding card name and slot. : No-loopback, RS or MS. : Port type. In hiT7020, only STM1 is supported. : The number of corresponding port. : Specify current DCC mode. Click this unit to change value as MS or OFF. : Specify current applied DCC protocol. Click this unit to change value as HDLC, OSI or PPP . : Specify current link status.

Click to view the latest information.

A42022-L5966-B 53-1-7619113

113

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT Click to make the modification in use. Click to make the modification in use and close the window. Click to close the window. Click to print all information in this window. Click to launch the online help.

14.2

OSI Configuration In the chassis view select one SDH port. From the main menu, select →. The window will appear. (See Fig. 14.2)

Fig. 14.2

OSI Configuration

Select or in the drop-down menu according current NE’s position. Select or in the drop-down. Input the corresponding values in other fields. The meanings of those parameters are listed below. : retransmissions timer. The unit is millisecond. : maximum time allowed without frames being exchanged. The unit is second. : maximum number of frame repetition. : maximum number outstanding I-frames. Window size in AITS mode. : timer interval. The unit is second. : time to live for a CLNP PDU. : the local NSAP address

114

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

: the destination NSAP address : the source IP address : the destination IP address : the maximum long of frame.

Click to check the real-time OSI properties. Click to accept modifications in the window. Click to confirm changes and quit the window. Click to quit the window without saving any modifications. Click to launch the online help.

14.3

MGMT Port RIP Configuration In the chassis view select one SDH port. From the main menu, select →→. The window will appear. (See Fig. 14.3)

Fig. 14.3

MGMT Port RIP Configuration

Click to check the current settings. Select or , and click and to confirm the modifications and close the window. Click to launch the online help.

14.4 14.4.1

IP Route Configuration IP Interface Select ÆÆ and the window will appear. (See Fig. 14.4) The IP Interface parameters about the NE will be list in the table. Meantime, every parameter is list below.

A42022-L5966-B 53-1-7619115

115

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 14.4

IP Interface

All parameters and their meaning are list as below: : A unique number (greater than zero) that identifies each interface for SNMP identification of that interface. : a brief description of the IP Interface : the type of the IP Interface : the maximum long of frame : the speed of the IP Interface : the physical address of the IP Interface : the IP interface’s administrative status. The value formed on the interface, and the interface will be advertised as an internal route to some area. : the IP interface’s operation status. Click to check the latest information. Click to close this window. Click to launch the online help.

14.4.2

IP Static Route Select ÆÆ and the window will appear. (See Fig. 14.5) The IP static routes parameters about the NE will be list in the table. Meantime, every parameter is list below.

116

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 14.5

User Manual

IP Static Route

All parameters and their meaning are list as below: : the destination IP address : IP mask of the IP static routes : the protocol of the IP static routes : A unique number (greater than zero) that identifies each interface for SNMP identification of that interface. : the NextHop of the IP static routes : the administrative status of the IP static routes. The value formed on the interface, and the interface will be advertised as an internal route to some area. : the operation status of the IP static routes. : the metric type of the IP static routes : the cost of the IP static routes

Click to check the latest information.

Choose an IP static route in the table, and click to edit the selected IP static route.

Click to add a new IP static route. (See Fig. 14.6)

A42022-L5966-B 53-1-7619117

117

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 14.6

Add IP Static Route

Click to confirm the modifications. Click to close the window without saving the modifications.

Choose an IP static route in the table, and click to edit the selected IP static route. (See Fig. 14.7)

Fig. 14.7

Edit IP Static Route

Click to confirm the modifications. Click to close the window without saving the modifications.

118

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

In the window: Click to close this window. Click to launch the online help.

14.4.3

IP Routing Table Select ÆÆ and the window will appear. (See Fig. 14.8) The IP routing table parameters about the NE will be list in the . Meantime, every parameter is list below.

Fig. 14.8

IP Routing Table

All parameters and their meaning are list as below: : the destination IP routing table : IP mask of the IP routing table : the protocol of the IP routing table : A unique number (greater than zero) that identifies each interface for SNMP identification of that interface. : the NextHop of the IP routing table : the type of the IP routing table : the age of the link state advertisement in seconds. : the metrics of the IP routing table Click to check the latest information. Click to close this window. Click to launch the online help.

A42022-L5966-B 53-1-7619119

119

User Manual

14.5

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

OSPF The OSPF submenu provides an entrance to manage and query parameters about OSPF. (See Fig. 14.9)

i

Note: Before configuring the parameters about OSPF, the “PPP” protocol for that DCC port must be selected firstly.

Fig. 14.9

14.5.1

OSPF Submenu

OSPF General Select ÆÆ from the main menu. The window will appear. (See Fig. 14.10) In this window the user can find some basic OSPF information about the NE. The OSPF general parameters about the NE will be list in the field. All parameters are list in the field respectively.

120

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 14.10

User Manual

OSPF General

All parameters and their meaning are list as below: : A 32-bit integer uniquely identifying the router in the Autonomous System. : The administrative status of OSPF in the router. The value denotes that the OSPF Process is active on at least one interface; disables it on all interfaces. : The current version number of the OSPF protocol is 2. : A flag to note whether this router is an area border router. : A flag to note whether this router is configured as an Autonomous System border router. : The number of external link-state advertisements in the linkstate database. : The 32-bit unsigned sum of the LS checksums of the external link-state advertisements contained in the link-state database. This sum can be used to determine if there has been a change in a router's link state database, and to compare the link-state database of two routers. : the router's support for type-of-service routing. : The number of new link-state advertisements that have been originated. This number is incremented each time the router originates a new LSA. : the number of link-state advertisements received determined to be new instantiations. This number does not include newer instantiations of self-originated link-state advertisements. : The maximum number of non-default AS-external-LSAs entries that can be stored in the link-state database. If the value is -1, then there is no limit. : A Bit Mask indicating whether the router is forwarding IP multicast (Class D) datagram based on the algorithms defined in the Multicast Extensions to OSPF. Bit 0, if set, indicates that the router can forward IP multicast datagram in the router's directly attached areas (called intra-area multicast routing). Bit 1, if set, indicates that the router can forward IP multicast datagram between OSPF areas (called inter-area multicast routing). Bit 2,

A42022-L5966-B 53-1-7619121

121

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT if set, indicates that the router can forward IP multicast datagram between Autonomous Systems (called inter-AS multicast routing). : The number of seconds that, after entering OverflowState, a router will attempt to leave OverflowState. This allows the router to again originate non-default AS-external-LSAs. When set to 0, the router will not leave OverflowState until restarted. It will not be supported. : The router's support for demand routing Click to check the latest data. Click to change , , , and < Ext LSDB Limit>. Click to close this window. Click to launch the online help.

14.5.2

OSPF Areas The OSPF Areas data contains information regarding the various areas. The interfaces and virtual links are configured as part of these areas. Select →→ and the window will appear. (See Fig. 14.11) The OSPF Areas parameters about the NE will be list in the table. Meantime, the parameters are listed below.

Fig. 14.11

OSPF Area

All parameters and their meaning are list as below: : A 32-bit integer uniquely identifying an area. Area ID 0.0.0.0 is used for the OSPF backbone. : The authentication type specified for an area. Additional authentication types may be assigned locally on a per Area basis. : The area's support for importing AS external link-state advertisements. The available values have importExternal (1), importNoExternal (2), and importNssa (3).

122

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

: The number of times that the intra-area route table has been calculated using this area's link-state database. : the total number of area border routers reachable within this area. This is initially zero, and is calculated in each SPF Pass. : the total number of Autonomous System border routers reachable within this area. This is initially zero, and is calculated in each SPF Pass. : The total number of link-state advertisements in this area’s link-state database, excluding AS External LSA's. : The 32-bit unsigned sum of the link-state advertisements’ LS checksums contained in this area's link-state database. This sum excludes external (LS type 5) link-state advertisements. The sum can be used to determine if there has been a change in a router's link state database, and to compare the link state database of two routers. : controls the import of summary LSAs into stub areas. It has no effect on other areas. If it is , the router will neither originate nor propagate summary LSAs into the stub area. It will rely entirely on its default route. If it is , the router will both summarize and propagate summary LSAs. Click to create a new OSPF area on this NE. Input and select value of , and in the drop-down menus. Other parameters’ value is set automatically. (See Fig. 14.12)

Fig. 14.12

Add OSPF Area

Click to add this OSPF area. Click to give up adding this area. In the window, click to configure the OSPF areas on the NE provided that there are one or more OSPF Area records in current window. (See Fig. 14.13)

A42022-L5966-B 53-1-7619123

123

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 14.13

Edit OSPF Area

Click to confirm the changes to this OSPF area. Click to give up editing this area.

In the window: Click to check the latest information. Click to delete the selected area. Click to close this window. Click to launch the online help.

14.5.3

OSPF Interfaces The window augments the ipAddrTable with OSPF specific information and describes the interfaces from the viewpoint of OSPF. Select ÆÆ from the main menu and the window will appear. (See Fig. 14.14) The OSPF Interface parameters about the NE will be list in the field. Meantime, every parameter is list below.

124

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 14.14

User Manual

OSPF Interface

All parameters and their meaning are list as below: : The IP address of this OSPF interface. : for the purpose of easing the instancing of addressed and addressless interfaces; this variable takes the value 0 on interfaces with IP Addresses, and the corresponding value of ifIndex for interfaces having no IP Address. : interface name for reference (slot/port) : A 32-bit integer uniquely identifying the area to which the interface connects. Area ID 0.0.0.0 is used for the OSPF backbone. : The OSPF interface type. The available value has , , , , and . Broadcast LANs, such as Ethernet and IEEE 802.5, take the value , X.25 and similar technologies take the value , and links that are definitively point to point take the value . : the OSPF interface’s administrative status. The value formed on the interface, and the interface will be advertised as an internal route to some area. The value denotes that the interface is external to OSPF. : The priority of this interface. Used in multi-access networks : The estimated number of seconds it takes to transmit a link state update packet over this interface. : The number of seconds between link-state advertisement retransmissions, for adjacencies belonging to this interface. : The length of time, in seconds, between the Hello packets that the router sends on the interface. : The number of seconds that a router’s Hello packets have not been seen before its neighbors declare the router down. : The larger time interval, in seconds, between the Hello packets sent to an inactive nonbroadcast multi- access neighbor. : the OSPF Interface State.

A42022-L5966-B 53-1-7619125

125

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT : the IP Address of the Designated Router : the IP Address of the Backup Designated Router. : The number of times this OSPF interface has changed its state or an error has occurred. : displays the status of the entry. Setting it to has the effect of rendering it inoperative. : The Authentication Key : The way multicasts should forwarded on this interface : Indicates whether Demand OSPF procedures (hello suppression to FULL neighbors and setting the DoNotAge flag on prorogated LSAs) should be performed on this interface. : The authentication type specified for an interface. Click to check the latest information. Click to change the attributes. Click to close this window. Click to launch the online help.

14.5.4

OSPF Interface Metrics OSPF Interface Metrics describes the metrics to be advertised for a specified interface at the various types of service. Select ÆÆ from the main menu. The window will appear. (See Fig. 14.15) The OSPF Interface Metric parameters about the NE will be list in the table. Meantime, every parameter is list below too.

Fig. 14.15

OSPF Interface Metric

All parameters and their meaning are list as below: : The IP address of this OSPF interface.

126

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

: For the purpose of easing the instancing of addressed and addressless interfaces; this variable takes the value 0 on interfaces with IP Addresses, and the value of ifIndex for interfaces having no IP Address. : The type of service metric being referenced. : the metric of using this type of service on this interface. The default value of the TOS 0 Metric is 108. Click to change . Click to confirm this change. Click to give up change.

In the window: Click to check the latest information. Click to close this window. Click to launch the online help.

14.5.5

OSPF Neighbors The OSPF Neighbors describes all neighbors in the locality of the subject router. Select ÆÆ and window will pop up. (See Fig. 14.16) The OSPF neighbors of the NE will be list in the table. Meantime, every parameter is list below too.

Fig. 14.16

OSPF Neighbor

All parameters and their meaning are list as below: < IP Address >: The IP address this neighbor is using in its IP Source Address. : On an interface having an IP Address, the value is zero. On addressless interfaces, the value is the corresponding value of if Index in the Internet Standard MIB.

A42022-L5966-B 53-1-7619127

127

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT : A 32-bit integer (represented as a type IP Address) uniquely identifying the neighboring router in the Autonomous System. : A Bit Mask corresponding to the neighbor's options field. The available value has 0, 1, 2, and 3. Bit 0 indicates that the system will operate on Type of Service metrics other than TOS 0. Bit 1 indicates that the associated area accepts and operates on external information; Bit 2 indicates that the system is capable of routing IP Multicast datagram; i.e., that it implements the Multicast Extensions to OSPF. Bit 3 indicates that the associated area is an NSSA. : The priority of this neighbor in the designated router election algorithm. The value 0 signifies that the neighbor is not eligible to become the designated router on this particular network. : The State of the relationship with this Neighbor. : The number of times this neighbor relationship has changed state or an error has occurred. : The current length of the retransmission queue. : displays the status of the entry. : Indicates whether Hellos are being suppressed to the neighbor. Click to view the latest neighbor information. Click to close this window. Click to launch the online help.

14.5.6

OSPF LSDB The Link State Database (LSDB) contains the Link State Advertisements from throughout the areas that the device is attached to. Select ÆÆ and the window will appear. (See Fig. 14.17) The OSPF link state data of the NE will be list in the table. Meantime, every parameter is list below too.

Fig. 14.17

128

OSPF Link State Database

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

All parameters and their meaning are list as below: : The 32 bit identifier of the Area from which the LSA was received. : The type of the link state advertisement. Each link state type has a separate advertisement format." : An LS Type Specific field containing either a Router ID or an IP Address; it identifies the piece of the routing domain that is being described by the advertisement. : The 32 bit number that uniquely identifies the originating router in the Autonomous System. : A signed 32-bit integer. It is used to detect old and duplicate link state advertisements. The space of sequence numbers is linearly ordered. The larger the sequence number the more recent the advertisement. : The age of the link state advertisement in seconds. : The checksum of the complete contents of the advertisement, excepting the age field. : The entire Link State Advertisement, including its header. Click to view the latest data. Click to print the information of the OSPF link state data. Click to close this window. Click to launch the online help.

14.5.7

OSPF Ext LSDB OSPF External Link State Database contains only External Link State Advertisements. The purpose is to allow external LSAs to be displayed once for the router rather than once in each non-stub area. Select ÆÆ from the main menu and the window will appear. (See Fig. 14.18) The OSPF external link state data of the NE will be list in the table. Meantime, every parameter is list below too.

Fig. 14.18

A42022-L5966-B 53-1-7619129

OSPF External Link State Database

129

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

All parameters and their meaning are list as below: : The type of the link state advertisement. Each link state type has a separate advertisement format." : An LS Type Specific field containing either a Router ID or an IP Address; it identifies the piece of the routing domain that is being described by the advertisement. : The 32 bit number that uniquely identifies the originating router in the Autonomous System. : A signed 32-bit integer. It is used to detect old and duplicate link state advertisements. The space of sequence numbers is linearly ordered. The larger the sequence number the more recent the advertisement. : The age of the link state advertisement in seconds. : The checksum of the complete contents of the advertisement, excepting the age field. : The entire Link State Advertisement, including its header. Click to view the latest data. Click to print the information of the OSPF external link state data. Click to close this window. Click to launch the online help.

130

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

15 Maintenance 15.1

PRBS Test Management PRBS (pseudo-random binary sequence) is used to measure the bit-error performance of digital systems by the direct comparison of a received pseudo-random test pattern with a locally generated test pattern identical to the transmitted test pattern. From the main menu, select → to launch the PRBS Test Management. (See Fig. 15.1)

Fig. 15.1

15.1.1

PRBS Test Management

Query Current PRBS Status of Ports To view current PRBS setting of ports, select corresponding , and in the drop-down menu, and the ports satisfying those conditions will be listed in the table. Click to query latest data. (See Fig. 15.1)

: The test patterns complied with the definition in ITU-T Recommendation O.151. (See Tab. 15.1)

A42022-L5966-B 53-1-7619131

131

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Bit rates (kbit/s) 1544

Recommendations corresponding to multiplex system

Recommendations corresponding to digital line section/line system

Bit rate tolerance

G.911, G.951, G.955

± 50 · 10–6

G.733

Test Pattern 215 – 1, 220 – 1

2048

G.732

G.921, G.952, G.956

± 50 · 10–6

215 – 1

34368

G.751

G.921, G.954, G.956

± 20 · 10–6

223 – 1

44736

G.752

G.914, G.953, G.955

± 20 · 10–6

139264

G.751

G.921, G.954, G.956

± 15 · 10–6

Tab. 15.1

215 – 1, 220 – 1 223 – 1

PRBS Test Pattern

: Status shows whether PRBS test is successful or has failed. : Shows how many errors in the payload; bit-error ratios in the range 10–3 to 10–8 should be measured.

15.1.2

Set PRBS Testing Select the corresponding NE and card in drop-down menu to specify which port to be operated PRBS testing on. All ports of this card will be listed in the table. For the desired port, either double click or highlight and click the button to open the PRBS Test Configure window. (See Fig. 15.2)

Fig. 15.2

PRBS Setting

Change port in the drop-down menu and set PRBS test status with or in the field. Click to confirm setting. Click to view latest status of this port.

132

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

15.2

User Manual

Loopback Test Management From the main menu, select Æ to launch the window. (See Fig. 15.3)

Fig. 15.3

15.2.1

Loopback Test Management

Querying Loopback Status To view the loopback status of a port, select the corresponding , , and to be viewed in the drop-down menus. Click and all ports that satisfy the conditions will be listed in the table.

15.2.2

Setting Loopback Test Select the corresponding , , and in drop-down menus to specify which ports to operate loopback test on. All ports that satisfy the conditions will be listed in the table. For the desired port, either double-click or highlight and click to open the window (See Fig. 15.4).

A42022-L5966-B 53-1-7619133

133

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 15.4

Loopback Test Configure

Choose : either or . Click to start the test. The line will show the current status. Click to end the test. Click to quit the window. Click to launch the online help.

15.3

LED Test LED test is used to check if the LEDs of an NE are working correctly. From the main menu, select → to launch the window. (See Fig. 15.5)

Fig. 15.5

LED Test

Click . If the LEDs of this NE work correctly, the LEDs will flash for a few moments then go to their normal state.

134

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

16 Performance Monitoring Management 16.1 16.1.1 16.1.1.1

Overview of Performance Monitoring SDH Performance Monitoring PM in Regeneration Section (G.829) Definitions Block: for STM-N (N=1, 4, 16, 64), the N× BIP-8 contained in the B1 bytes pertains to N blocks. Thus, the signal structure of an RS in an STM-N comprises N blocks within a frame. Errored Block (EB): A block in which one or more bits are in error. Errored Second (ES): A one second period with one or more errored blocks or at least one defect. Severely Errored Second (SES): A one-second period which contains →=X% errored blocks or at least one defect. SES is a subset of ES. Constant Severely Errored Second (CSES): Period with consecutive SES. Background Block Error (BBE): An errored block not occurring as part of an SES. Unavailable Second (UAS): Ten consecutive SES seconds will cause the UAS to increase. Ten consecutive error free seconds will stop the UAS from increasing. Out of Frame Second (OFS): A one-second period with one or more wrong frames. UnAvailable Period (UAP): Timestamps indicating the beginning and end of an Unavailable Period. A period of unavailable time begins at the onset of ten consecutive SES events. These ten seconds are considered to be part of unavailable time. A new period of available time begins at the onset of 10 consecutive non-SES events. UAP is independent from 15m or 24h UAS. Even if the UAS was manually reset, UAP should retain its value.

i

Note: There is no mechanism for collecting far-end performance data for the RS layer.

Anomalies An error on the whole block is indicated by the EDC (Error Detection Code).

Defects LOS: Loss of signal LOF: Loss of frame RS TIM: Trace identify mismatch in SDH Regeneration Section

Estimation of the performance events ES: one anomaly or one defect in a second

A42022-L5966-B 53-1-7619135

135

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT SES: ≥’Y’ EBs with one anomaly or one defect a second, Y = blocks per second *xx% BBE: anomalies but not in SES Rate EBs xx% (EBs) Tab. 16.1

16.1.1.2

STM-0 800 10%

STM-1 2,400 30%

STM-4 2,400 30%

STM-16 2,400 30%

Regenerator Section SES threshold xx% (for BIP-8)

PM in Multiplex Section (G.829) Definitions MS: The N× 24 BIP-1s contained in the B2 bytes of an SDH MS in an STM-N (N=1, 4, 16, 64) pertains to N× 24 in different blocks. Thus, the signal structure of a generic MS comprises N× 24 blocks within a frame. MS Far End: The count contained in the M1 bytes (M1 and M0 bytes for STM-64) of an SDH MS in an STM-N (N=1, 4, 16, 64) pertains to one block (total of N × 24 different received blocks). Thus, the signal structure of a generic MS (far end) comprises 1 block within a frame. Errored Block (EB), Errored Second (ES), Severely Errored Second (SES), Constant Severely Errored Second (CSES), Background block error (BBE), Unavailable second (UAS), UnAvailable Period (UAP): refer to the definition for RS.

Anomalies An Errored Block happens as indicated by an EDC.

Defects Near end defects of Trail termination

Applicable Path

MS AIS

Multiplex Sections

Tab. 16.2

Near end defects of Path termination

Applicable Path

MS RDI

Multiplex Sections

Tab. 16.3

i

Defects Resulting in a Near-end Severely Errored Second

Defects resulting in a Far-end Severely Errored Second

Note: MS AIS means Alarm Indication Signal in Multiplex Sections. MS RDI means Remote Defect Indictor in Multiplex Sections.

Estimation of the performance events ES: one anomaly or one defect in a second. SES: ≥’Y’ EBs with one anomaly or one defect a second, Y= (number of blocks per second × xx%). BBE: anomalies but not in SES.

136

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Rate EBs Xx% (EBs) Tab. 16.4

16.1.1.3

User Manual

STM-0 9,600 15%

STM-1 28,800 15%

STM-4 192,000 25%

STM-16 921,600 30%

STM-64 3,686,400 30%

Multiplex Section SES threshold xx% (For BIP-1)

PM for HP/LP (High Order and Low Order Paths) (G.829) Definitions HP: The BIP-8 contained in the B3 byte of an SDH HP pertains to one block. Thus, the signal structure of a generic HP comprises 1 block within a frame. LP VC3s are the same. HP Far End: The count contained in the G1 byte of an SDH HP pertains to one block. Thus, the signal structure of a generic HP (far end) comprises 1 block within a frame. LP VC3s are the same. LP: The BIP-2 contained in the V1 byte of an SDH LP pertains to one block. Thus, the signal structure of a generic LP comprises 1 block within a multi-frame. LP Far End: The FEBE bit contained in the V1 byte of an SDH LP pertains to one block. Thus, the signal structure of a generic LP (far end) comprises 1 block within a multi-frame. Errored block (EB), Errored Second (ES), Severely Errored Second (SES), Constant Severely Errored Second (CSES), Background block error (BBE), Unavailable second (UAS), UnAvailable Period (UAP): refer to the definition for RS.

Anomalies An EB happens as indicated by an EDC.

Defects Near end defects of Trail termination LP UNEQ (Note 2) LP TIM TU LOP TU AIS HP LOM (Note 1) HP PLM HP UNEQ (Note 2) HP TIM AU LOP AU AIS Tab. 16.5

i

Applicable Path Lower Order Path

Higher Order Path

Defects Resulting in a Near-end Severely Errored Second

Note 1: This defect is not related to VC-3. Note 2: Paths not actually completed, e.g. during path set-up, will contain the unequipped VC-n signal.

A42022-L5966-B 53-1-7619137

137

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Near end defects of Path termination LP RDI HP RDI Tab. 16.6

Applicable Path Lower Order Path Higher Order Path

Defects Resulting in a Far-end Severely Errored Second

Definitions and notes: LP UNEQ: Lower order Path is UNEQuipped. LP TIML: Trace identifies mismatch in Lower order Path. TU LOP: Tributary Unit Loss Of Pointer. TU AIS: Tributary Unit Alarm Indictor Signal. HP LOM: Higher order Path Loss Of Multiframe. HP PLM: Higher order Path PayLoad Mismatch. HP UNEQ: Higher order Path UNEQuipped. HP TIM: Higher order Path Trace Identify Mismatch. AU LOP: Administrative Unit Loss Of Pointer. AU AIS: Administrative Unit Alarm Indicator Signal. LP RDI: Lower order Path Remote Defect Indication. HP RDI: Higher order Path Remote Defect Indication.

Estimation of the performance events ES: one anomaly or one defect. SES: ≥’Y’ EBs with one anomaly or one defect in a second, Y=blocks per second × xx%. Rate EBs xx% (EBs) Tab. 16.7

16.1.1.4

VC-11/12/2 600 30%

VC-3 2,400 30%

VC-4/4c/16c/64c 2,400 30%

Path Overhead Section SES Threshold xx% (For BIP-2, BIP-8)

PM for Pointer Justification Counts at Administrative Unit (G.707) The AU pointer is contained in H1, H2 and H3 bytes, which are associated with, but not part of, the SDH Multiplexing Section Overhead. The N bits (bits 1-4) of the pointer carry the New Data Flag which allows an arbitrary change of the pointer value if that change is due to a change in the payload. The last ten bits (bits 7-16) of the H1 and H2 bytes carry the pointer value that designates the location of the byte where the VC-n begins. The H3 is the pointer action byte. The AU pointer provides a method of allowing flexible and dynamic alignment of the VC within the AU frame. During normal operation, the NDF is disabled and set to "0110", and the pointer locates the start of the VC-n within the AU-n frame. If there is a frequency offset between the frame rate of the AUG and that of the VC-n, the pointer value will be incremented or decremented by one as needed, accompanied by a corresponding positive or negative justification byte or bytes. This operation is indicated by inverting five I-bits or D-bits of the pointer. The positive

138

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

justification bytes appear immediately after the last H3 byte in the AU-n frame and the negative justification bytes appear in the H3 bytes in the AU-n frame. If there is a change in the payload, NDF is enabled by inversion of the N-bits to "1001". The new location of the VC-n begins at the first occurrence of the offset indicated by the new pointer. For AU-4 concatenation, the AU-n pointer is set to Concatenation Indication, "1001" in bits 1-4 and ten "1"s in bits 7-16. Currently PPJC and NPJC can be monitored only at AU-4. Definitions: PPJC - Positive Pointer Justification Count. NPJC - Negative Pointer Justification Count. Defects: LOP - Loss of Pointer.

16.1.2

Data Performance Monitoring Parameters The following parameters can be monitored in LCT:

16.2



Received Unicast Packets



Received Multicast Packets



Received Broadcast Packets



Received Oversize Packets



Received Undersize Packets



Received Frames in CRC Error



Total Received Bad Packets



Total Received Bad Bytes



Total Received Good Packets



Total Received Good Bytes



Sent Unicast Packets



Sent Multicast Packets



Sent Broadcast Packets



Total Sent Good Packets



Total Sent Good Bytes

SDH Performance Monitoring Management From the main menu, select → to open the window. (See Fig. 16.1)

A42022-L5966-B 53-1-7619139

139

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 16.1

SDH Current Performance

TNMS-M SURPASS hiT 7020 LCT provides the following primary PM management functions (see Tab. 16.8): Functions Refresh Filter

Description Refresh the information. Used to filter and display the points to be examined. This function is only for the display selection since there are too many points to be displayed clearly. Note: Point is defined as a specific TP, an example a point could be defined as Node 182.16.1.1, Line Card 1, Port 3, or MS-TTP. Edit PM parameters for each TP can be edited. Note: If a point is only edited and not filtered, this point will not be displayed. For proper operation, be sure the edited point is filtered first. Thresholds Only ES, BBE, SES, and UAS have this parameter. If the current value of the parameter crosses the value of the threshold, an alarm will be launched. Reset Reset parameters for a selected TP in the table Reset All Reset all parameters for every TP in the table Print Print or save the PM values. Help Launch the online help Tab. 16.8 PM Management Functions

16.2.1

Filter Setting In the window, click to open the window, which is used to filter TPs and/or parameters. (See Fig. 16.2)

140

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 16.2

16.2.1.1

User Manual

Monitor Point Filter

TP Filter The TP Filter is used to select TPs that will be displayed in the window. In the section, select an existing point and click to remove the selected TPs. Click to add a new TP. (See Fig. 16.3)

A42022-L5966-B 53-1-7619141

141

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 16.3

Select Terminal Point

Select the point to be monitored by choosing the corresponding , , , and . This is used to narrow the scope of TPs when searching for specified TPs. In the drop-down menu, the value range is: RS, MS, VC4, VC12 and AU4. VC3-TTP and VC12-TTP will be added at the later release. Select the TPs to be monitored and click . The selected points will be listed in the window.

16.2.1.2

Parameter Filter The Parameter Filter is used to decide the type of parameters that will be displayed in the window. The Parameter Filter is divided to four sections in the window: , , , and . The section indicates the performance monitoring granularity. The section indicates the PM location. The section allows the choice of the following parameters to be monitored: , , , , , , , , and . The section allows configuration of the performance monitoring and the reports to be provided. There are three options to choose among: , , and . In the frame, if a checkbox is not selected, all the parameters related to this checkbox will not be displayed. Note: if the user doesn’t know the actual monitor status of TP, select all the three monitor types.

142

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

16.2.2

User Manual

Editing Monitored Parameter Select →. Then click in window. The window is used to edit port, TP, and PM parameters. (See Fig. 16.4)

Fig. 16.4

Edit Properties of Performance Monitor

There are five sections in this window: , , , , and . The function of the section is the same as that in the window. The section indicates the performance monitoring granularity. The section indicates the PM location. The section allows the choice of the following parameters to be monitored: , , , , , , , and . The section allows configuration of the performance monitoring and the reports to be provided. There are three options to choose among: , , and . Only one option can be selected.

16.2.3

Alarm Threshold Select →. Then select a row and click in the window. The window to configure alarm threshold will appear. (See Fig. 16.5)

A42022-L5966-B 53-1-7619143

143

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 16.5

Alarm Threshold

This window is divided to five parts: , , , , and . The function of the , , , and sections are the same as those in the window. (See Fig. 16.4) The section allows configuration of Alarm Threshold. If the current value of the parameter crosses the value of the threshold, an alarm will be launched; if the checkbox is not selected, the alarm threshold is disabled. The value range and default value of 15-minutes and day are listed in the following two tables. (See Tab. 16.9 and Tab. 16.10) Note: alarm threshold in pm is not allowed to set when TP’s monitor status is no-monitor.

144

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

TCA RS ES RS SES RS BBE MS ES MS SES MS BBE MS ES (Far End) MS SES (Far End) MS BBE (Far End) VC4-TTP ES VC4-TTP SES VC4-TTP BBE VC4-TTP ES (Far End) VC4-TTP SES (Far End) VC4-TTP BBE (Far End) VC12-TTP ES VC12-TTP SES VC12-TTP BBE VC12-TTP ES (Far End) VC12-TTP SES (Far End) VC12-TTP BBE (Far End) Tab. 16.9

A42022-L5966-B 53-1-7619145

Default Value 114 10 10 114 10 10 114 10 10 180 15 10 180 15 10 120 15 10 120 15 10

Allowed Range 1-900 1-900 1-65535 1-900 1-900 1-65535 1-900 1-900 1-65535 1-900 1-900 1-65535 1-900 1-900 1-65535 1-900 1-900 1-65535 1-900 1-900 1-65535

Default Value and Value Range for a Fixed 15-minute Period

TCA RS ES RS SES RS BBE MS ES MS SES MS BBE MS ES (Far End) MS SES (Far End) MS BBE (Far End) VC4-TTP ES VC4-TTP SES VC4-TTP BBE VC4-TTP ES (Far End) VC4-TTP SES (Far End) VC4-TTP BBE (Far End) VC12-TTP ES VC12-TTP SES VC12-TTP BBE VC12-TTP ES (Far End) VC12-TTP SES (Far End) VC12-TTP BBE (Far End) Tab. 16.10

User Manual

Default Value 10,944 960 960 10,944 960 960 10,944 960 960 17,280 1440 960 17,280 1440 960 11520 1440 240 11520 1440 240

Allowed Range 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535 1~65535

Default value and Value Range for a Fixed 24-hour Period

145

User Manual

16.2.4

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

History SDH Performance From the main menu, select Æ. The SDH History Performance is used to display the history value of one parameter of a TP. (See Fig. 16.6)

Fig. 16.6

SDH History Performance

The function of is the same as that of the window. (Refer to Chapter 16.2.1)

The maximum records number of history performance in the LCT program is listed in the following table: Parameter UAP Other parameters Other parameters Tab. 16.11

Granularity 15-Minutes or 24-hours 15-Minutes 24-hours

Maximum Records number 6 32 1

Maximum Records number of History Performance

For example, at most 6 history UAPs for each TPs can be recorded in the LCT program. For other parameters, at most previous 8-hours for 15-Minutes performance or previous 1-Day for 24-hours performance can be recorded in the LCT program.

Click to print the PM report. Click to launch the online help.

146

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

16.2.5

User Manual

SDH Unavailable Periods To configure SDH unavailable periods, select Æ from the main menu. The window will appear. (See Fig. 16.7 )

Fig. 16.7

SDH Unavailable Periods

Click to change selected TP in the field, the window will appear. (See Fig. 16.8)

Fig. 16.8

A42022-L5966-B 53-1-7619147

Select Terminal Point

147

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Select TP filter from the drop-down menus, select terminal point from the table, click to go back to the window. Select or in the field. Click to query the latest information. Click to print the SDH Unavailable information. Click to close the window. Click to launch the online help.

16.3

Ethernet Performance Monitoring Management In TNMS-M SURPASS hiT 7020 LCT, the following primary Ethernet PM functions are provided. (See Tab. 16.12) Functions Description Filter

Edit

Reset Reset All Report Tab. 16.12

Used to filter and display the points to be examined. This function is only for the display selection since there are too many points to be displayed clearly. Note: Point is defined as a specific LAN or WAN port. For example a Point could be described as Node 182.16.1.1, UDC 1, and LAN port1. Ethernet PM parameters for each LAN or WAN port can be edited Note: If a point is only edited and not filtered, this point will not be displayed. For proper operation, be sure the edited point is filtered first. Reset parameters for a selected TP in the table Reset all parameters for every TP in the table Print or save the Ethernet PM values. Primary Ethernet PM Function

From the main menu, select → to open the window. (See Fig. 16.9)

Fig. 16.9

148

Ethernet Current Performance

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

16.3.1

User Manual

Filter Setting The window is launched by clicking in the window. (See Fig. 16.10)

Fig. 16.10

Monitor Point Filter

This filter function is the same as the SDH Performance filter function. Click to select the port. (See Fig. 16.11)

Fig. 16.11

Select Port

Choose a suitable filter parameter from this screen to filter ports: or and the user’s choice of 15 kinds of Data PM Parameters.

A42022-L5966-B 53-1-7619149

149

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT Note: if the user doesn’t know the actual monitor status of the port, select all the three monitor types.

16.3.2

Editing Monitored Parameter The window can be launched by clicking in window. (See Fig. 16.12)

Fig. 16.12

Edit Properties of Monitored Parameter

There are three frames in this window: , , and . is used to choose the LAN or WAN ports which to be monitored. allows the choice of a suitable filter parameter: or . allows choice of port monitor state. There are three options to choose among: , , and .

16.3.3

Ethernet PM Thresholds From the main menu, select → to open the window. (See Fig. 16.13)

150

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 16.13

User Manual

1 Second Ethernet Thresholds

Click to set ports whose threshold to be monitored. (See Fig. 16.14)

Fig. 16.14

Monitor Point Filter

Click to filter port and add them to list. (See Fig. 16.15)

A42022-L5966-B 53-1-7619151

151

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 16.15

Select Ports

After selecting the corresponding attributes and click , the available ports will be listed. Select ports needed and click . This action adds those ports in the list. (See Fig. 16.16)

Fig. 16.16

Selected Ports

Click to see those ports’ corresponding thresholds status and values.

152

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

In the window, to modify a port’s thresholds, double-click the corresponding line in the table, or select the line and click . This will enter the window. (See Fig. 16.17)

Fig. 16.17

Edit Properties of Performance Monitor

New monitored ports can be added and those ports’ thresholds scheme and the number of values set can be established. Two thresholds categories are available: and . The default value for each is 10%. Input any values needed or click to resume the default value. Click to confirm the settings. Click to quit the window. Click to launch the online help.

16.3.4

History Ethernet Performance From the main menu, select Æ. The window will appear. (See Fig. 16.18)

A42022-L5966-B 53-1-7619153

153

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 16.18

Ethernet History Performance

The function of is the same as that of the window. (Refer to Chapter 16.3.1) The maximum records number of Ethernet history performance is the same as that of SDH history performance. (Refer to Chapter 16.2.4) Click to print the PM report. Click to launch the online help.

16.3.5

5-Second Ethernet Performance From the main menu, select Æ to open the window. (See Fig. 16.13)

154

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 16.19

User Manual

5 Second Ethernet Performance

Click to select ports whose performance to be monitored. (See Fig. 16.14)

Fig. 16.20

Select Port

In the panel, select the card and port type in the and drop-down menus. Click the button, and the available ports will be listed in the table. Choose the ports to be enabled in the table, and then click to add them to the panel.

A42022-L5966-B 53-1-7619155

155

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT To remove ports from the panel, highlight the ports to be removed, and click the button. Click the button, and the following parameters of Ethernet 5s performance can be viewed in the Ethernet 5s PM Data in Last 5 Minutes table: , , , , , , , , , , , , , , , , and . Click to quit the window. Click to launch the online help.

16.4

E1 Bit Slip Performance From the main menu, select → to open the window.

Fig. 16.21

16.4.1

Current E1 Bit-Slip Performance

Filter Setting Click to launch the window. (See Fig. 16.22)

156

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 16.22

User Manual

Monitor Point Filter

This filter function is the same as the SDH Performance filter function. The section is used to choose the E1 ports which need to be monitored. Click to filter ports and add them to the list. (See Fig. 16.23)

Fig. 16.23

Select Port

After selecting the corresponding attributes and click , the available ports will be listed. Select ports needed and click . This action adds these ports in the table. (See Fig. 16.24)

A42022-L5966-B 53-1-7619157

157

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 16.24

Selected Ports

The section allows and to be chosen. Click to see those ports’ corresponding thresholds status and values. Note: if the user doesn’t know the actual monitor status of TP, select all the three monitor types.

16.4.2

Editing Monitored Parameter In the window, select the corresponding port and click . This will enter the window.

Fig. 16.25

158

Edit Properties of Performance Monitor

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

16.4.3

User Manual

History E1 Bit Slip Performance From the main menu, select Æ. The window will appear. (See Fig. 16.26)

Fig. 16.26

History E1 Bit Slip Performance

The function of is the same as that of the window. (Refer to Chapter 16.4.1.) The maximum records number of E1 Bit Slip history performance is the same as that of SDH history performance. (Refer to Chapter 16.2.4) Click to refresh the information. Click to print the information of the selected Ethernet history performance. Click to launch the online help.

A42022-L5966-B 53-1-7619159

159

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

17 Alarm and Event Management 17.1

Overview of Alarms There are five alarm severity level values defined: Critical, Major, Minor, Warning, and Cleared. •

Critical—Service-interrupting alarms.



Major—Service-affecting alarms.



Minor—Non-Service-affecting alarms that could potentially become service-affecting. The user needs to inspect the system faults and provide fixes in order to prevent the alarm from deteriorating to Major.



Warning—Non-Service-affecting. Information is presented to the user for the purpose of maintenance.



Cleared—the alarm severity level is Cleared.

There are five types of failures in the system:

17.2 17.2.1



Transmission Failure—Failures related to transmission status, such as LOS, LOF, LOP, and LOM.



Quality of Service Failure—Failure related to system performance, such as response time too long, threshold crossing, and performance degradation.



Equipment Failure—Failures related to hardware equipment.



Processing Error Failure—Failures related to software or the fault processing, such as memory overflow, version incompatibility, software errors, program illegal interruption, NE configuration errors an inaccessible NE, AIS, TIM, REI, RDI, PLM, and UNEQ.



Environmental Failure—Failures related to environment changes, such as unacceptable temperature and humidity, ventilation or cooling system faults, excessive vibration, and door open or closed.

NE Alarms Current Alarms The Current Alarms tab displays all active alarms, and is updated when a new alarm occurs. This window displays the most current alarms. Alarms are listed in the order from the oldest to the newest and the oldest one is listed at the bottom of the list. Each entry is highlighted with the color associated with its severity. This color coding allows the user to perform a quick visual inspection when all alarms are displayed. When an alarm clears, the date and time when it was cleared is added to the list, and the color is changed to green and is removed to active cleared alarm window. Using TNMS-M SURPASS hiT 7020 LCT the user can:

160



Change the alarm list to display different severities or multiple severities



View the alarm occurs on different managed objects



Sort the alarm list by field

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

17.2.2



Clear the alarm list



Refresh the alarm list



View current alarm events from the chassis view

User Manual

Viewing Active Alarms The alarm windows launched from different entrances will show alarms occur on different managed objects. To view the active alarms: Choose an object (a card or a port), and select → from the main menu. (See Fig. 17.1) The alarm window will only show alarms occur on currently selected managed object. If neither a card nor a port is selected, the alarm window would show all alarms on current NE.

Fig. 17.1

Open Active Alarms from Main Menu

Right-click an object (a card or a port), and select in the pop-up menu. (See Fig. 17.2) The alarm window will only show alarms occur on currently selected managed object.

Fig. 17.2

Open Active Alarms from Right-click Menu

To refresh only the alarms of interest, click on the appropriate icons on the area in the main window. (See Fig. 17.3) The alarm window launched here would show all alarms on current NE with the specific severity and category.

A42022-L5966-B 53-1-7619161

161

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 17.3

Alarm Count by Severity

The window will appear. (See Fig. 17.4)

Fig. 17.4

Active Alarms

Note: alarms are shown in several pages and one page can display at most 2000 alarms.

17.2.3

Reviewing the current alarms The information contained in the Active Alarms table is as follows: Field or Button

Description

Severity

The severity level of the alarm

Category

The related category of the specific alarm, including: Process Error QoS Transmission Equipment Environment

162

Source

The managed object that generates the reported alarm

Alarm Message

The name of the alarm

Raise Time

The time the alarm was raised

Acknowledged By

The user who acknowledged this alarm

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

Field or Button

Description

Acknowledged Time

The time the alarm was acknowledged.

Clear Time

The clear time of the alarm

Clear Status

The status of the alarm, including: Not cleared Cleared Cleared manually

Tab. 17.1

Cleared Synchronized Active Alarms information

Note: 1) Raise time depends on NE time and acknowledged time depends on client time. 2) Cleared, cleared manually and cleared synchronized have different clear time. 3) Alarms are shown in several pages and one page can display at most 2000 alarms.

17.2.4

Alarm Search Click the button in the window, and the window will appear. (See Fig. 17.14)

Fig. 17.5

Alarm Search

− This can be set as , , , , or . − This can be set as , , , , , or . − This can be set as all kinds of alarm message needed.

A42022-L5966-B 53-1-7619163

163

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT − This can be set as , , , , or .

Click the Source>> button, the window will appear. (See Fig. 17.15)

Fig. 17.6

Alarm Source Config

Type NE Label, and select options from the drop-down menus of , , , , and . Click and to confirm the changes and close the window.

In the window: Click to confirm the modifications and the active alarms search result will appear in the window. Click to quit this window without saving any modifications. Click to launch the online help.

17.2.5

Viewing Alarm Detail To know more information about one alarm, select this alarm and double-click it or highlight and click . Then the window will appear. (See Fig. 17.7) The corresponding description about this alarm will appear in this window.

164

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 17.7

17.2.6

User Manual

Alarm Detail

Acknowledging Current Alarms All alarms have a status of either acknowledged or not acknowledged. Once an alarm is acknowledged and cleared, it will not display in the Active Alarm window and becomes a historical alarm. If an active alarm is acknowledged but not cleared, it remains in the Active Alarms window. To acknowledge an alarm: In the Active Alarms window (See Fig. 17.4), choose the row containing the alarm to be acknowledged. Right-click the chosen alarm, and select . (See Fig. 17.8)

Fig. 17.8

Acknowledge Alarm

After acknowledging alarms, the user executing the acknowledgement operation and the acknowledgement time will be recorded. The window will appear. (See Fig. 17.9)

A42022-L5966-B 53-1-7619165

165

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 17.9

Acknowledge Comments

Type comments in the blank box and click to close the window.

17.2.7

Clearing Alarms To clear the alarm manually in the window (See Fig. 17.10), right-click the corresponding alarm, and select . As a result, the alarm disappears from current alarm window and is recorded to active cleared alarm window with the color becoming green. The clear status should be cleared manually.

Fig. 17.10

Clear Alarm

Note: alarms are shown in several pages and one page can display at most 2000 alarms.

17.2.8

History Alarms To view the history alarms: Choose an object (a card or a port), and select → from the main menu. (See Fig. 17.11) The alarm window will only show alarms have occurred on currently selected managed object. If neither a card nor a port is selected, the alarm window would show all alarms on current NE.

166

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 17.11

User Manual

Open History Alarms from Main Menu

Right-click an object (a card or a port), and select in the pop-up menu. (See Fig. 17.12)The alarm window will only show alarms have occurred on currently selected managed object.

Fig. 17.12

Open History Alarms from Right-click Menu

The window will appear. (See Fig. 17.13)

Fig. 17.13

A42022-L5966-B 53-1-7619167

History Alarms

167

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Click to check the latest history alarms. To know more information about one history alarm, select this alarm and double-click it or highlight and click .

Click the button and the window will appear. (See Fig. 17.14)

Fig. 17.14

Alarm Search

− This can be set as , , , , or . − This can be set as , , , , , or . − This can be set as all kinds of alarm message needed. − This can be set as , , , , or .

Click the Source>> button, the window will appear. (See Fig. 17.15)

168

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 17.15

User Manual

Alarm Source Config

Type NE Label, and select options from the drop-down menus of , , , , and . Click and to confirm the changes and close the window.

In the window: Click to confirm the modifications and the active alarms search result will appear in the window. Click to quit this window without saving any modifications. Click to launch the online help.

17.3

LED Indicators A SURPASS hiT 7020 NE has four LED status indicators that show the operational status of the system. •

PWR (Power)



CR (Critical Alarm)



MJ (Major Alarm)



MN (Minor Alarm)

These LEDs correspond to the LED status indicators displayed in the Chassis View. The following table describes four LED status indicators.

A42022-L5966-B 53-1-7619169

169

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

LED name Power

LED Color Green

LED Status On Off

Critical

Red

On Blinking Off

Major

Orange

Minor

Yellow

On Off On Off

Tab. 17.2

17.4 17.4.1

Description Power is available to the system. It indicates the presence of the internal power supply after the power conversion. Power is not available due to a broken power converter or external power cable or connector. The system is either in a booting up stage or in system failure state. One or more critical or major alarms are present (for example, service affecting—LOS). No critical or major transmission alarms are present, and the system is in service. There are one or more major alarms present. No Major alarms. There are one or more minor alarms present (non-service affecting). No Minor alarms. Note: Warning and indeterminate alarms do not turn on the LED.

LED Status

Exporting Alarms Exporting Active Alarms to a File Before printing or saving alarms to a file, make sure that corresponding alarm ranges have been searched. All the alarms listed in the window will be exported or printed. To export the active alarm list: In the window, click . (See Fig. 17.16)

Fig. 17.16

170

Report Alarm

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

The report window will appear. (See Fig. 17.17)

Fig. 17.17

Report Window

Select the type. Select or . Select the output file type in the drop-down menu. Note: Don’t select here. Click .

The window will appear. (See Fig. 17.18)

Fig. 17.18

Print Preview

Click , the window will appear. (See Fig. 17.19)

A42022-L5966-B 53-1-7619171

171

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 17.19

Save File

Input the file name in the field, and then click . The selected Active Alarms are now successively exported to file.

17.4.2

Printing Active Alarms To print the active alarm list: In the window, click . The Print window will appear. (See Fig. 17.20)

Fig. 17.20

Print Window

Select the type. Select or . Select in the drop-down menu. Click .

The window will appear. (See Fig. 17.21)

172

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 17.21

User Manual

Report Alarm Preview

Click . The print setup window will appear. (See Fig. 17.22)

Fig. 17.22

Print Setup

Select and set up the printer if necessary, and then click . Alarms are now successively printed.

A42022-L5966-B 53-1-7619173

173

User Manual

17.5 17.5.1

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Configuring Fault Management Audio Alarm Configuration To configure the Audio Alarm Configuration: Select Æ< Alarm Audio Configure> from the main menu. (See Fig. 17.23)

Fig. 17.23

Open Alarm Audio Configure from Main Menu

The window will appear. (See Fig. 17.24)

Fig. 17.24

Audio Alarm Config

Select whether Audio Alarm is enabled or disable. Set the specific audio file used to correspond with the varying alarms. Input alarm audio play times in the blank field. Click to confirm the configurations. Click to confirm the configurations and close the window. Click to quit this window. All the unsaved modifications will be lost. Click to launch the online help.

174

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

17.5.2

User Manual

Alarm Type List Management Using Alarm Type List Management, alarms can be viewed and configured. From the main menu, select Æ. (see Fig. 17.25 )

Fig. 17.25

Open Alarm Type List Management from Main Menu

The window will be shown. (Fig. 17.26)

Fig. 17.26

Alarm Type List Management

Click to view current alarm types. To modify the and , highlight this row and right-click the corresponding field. (See Fig. 17.27)

A42022-L5966-B 53-1-7619175

175

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 17.27

Modify Property of Alarm

Click to confirm the changes. Click to confirm the changes and quit the window. Click to quit this window without saving any modifications. Click to print the result. Click to launch the online help. Note: if the user modifies the “user defined severity”, the corresponding value in NE’s MIB will be changed too.

17.6 17.6.1 17.6.1.1

Alarm Configuration for Single NE Alarm Inhibit Configuration Alarm Inhibit Configuration for Single NE From the main menu, select →. The window will appear (See Fig. 17.28). The alarm inhibit configuration of the NE can be changed in the window.

176

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 17.28

User Manual

Alarm Inhibit Configuration – for NE

Selecting Node Alarm Inhibit will stop reporting all node alarms. Selecting AIS Alarm Inhibit will stop reporting AIS alarms. Selecting RDI Alarm Inhibit will stop reporting RDI alarms Click to view the latest setting. Click to confirm the setting. Click to confirm the changes and quit the window. Click to quit the window without saving any modifications. Click to launch the online help.

17.6.1.2

Alarm Inhibit Configuration for Specific Port From the main menu, select →. The window will appear. (See Fig. 17.29)

Fig. 17.29

Click

Alarm Inhibit Configuration – for port

to expand all the branches, or

A42022-L5966-B 53-1-7619177

to collapse all the branches.

177

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT Check or uncheck the checkbox to the left of a port to enable or disable the Alarm Inhibit property of the port. Click to confirm the settings. Click to get the latest setting. Click to confirm and finish all the modifications. Click to quit this modification without any changes. Click to launch the online help.

17.6.2

Alarm Out Configuration From the main menu, select →. The window will appear. (See Fig. 17.30)

Fig. 17.30

Alarm Out Configuration

Select and to cutoff alarm out permanently. Click to view the latest setting. Click to confirm the setting. Click to confirm the changes and quit the window. Click to quit the window without saving any modifications. Click to launch the online help.

17.6.3

MDI/MDO Configuration From the main menu, select Æ. The window will appear. (See Fig. 17.31)

178

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 17.31

User Manual

MDI/MDO Configuration

In the field, set MDI0’s status with or in drop-down menus. In the field, select MDO1 and change corresponding status from the drop-down menus. In the field of Alarm List, select corresponding alarm and click the => button or the or button to add the slots used by those ports to WAN port. To decrease the number of slots used by this port, select corresponding slots in the right side and click the window will pop up. (See Fig. 19.10)

A42022-L5966-B 53-1-7619191

191

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 19.10

VLAN Management

Click , and then VLAN Config menu will pop up. (see Fig. 19.11)

192

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 19.11

User Manual

VLAN Config

There are two ways to modify VLAN: Based on VLAN and Based on Ports. If the user wants to configure multiple ports with the same VLAN ID, the Based on VLAN mode is recommended. If the user wants to configure a port with multiple VLAN IDs, the Based on Ports mode is recommended. Here the Based on VLAN mode is chosen for an example. Select the configured WAN port from the list on the left side, click the ==> button to move it to the list. Input the VLAN ID configured for selected port in the field. The value range of VLAN ID is from 0 to 4095, which is divided with eight subsections in every 512 IDs and only one section is effective at the same time, which means if a VLAN ID belonged to one of the above 8 ranges, other VLAN IDs belonged to other ranges can not be configured again. But among the range, 0, 1001-1024,4095 are reserved by system and not used by customer. Enter the VLAN name in the field for the sake of remembrance. Click to confirm the changes. Click to close the window.

i

Note: To query the VLAN ID of all the ports of data unit, click in the window. (See Fig. 19.12). The detail information will appear.

A42022-L5966-B 53-1-7619193

193

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 19.12

Query VLAN Information

Step 5: Create Cross Connection After all setting about Ethernet, a cross connection between SDH port and Ethernet port should be created. To open the window, select → from the main menu, or select the cross-connect and synchronize unit board in the Chassis View, right-click it, then select in the pop-up menu. Click , and then the window will appear. Select the property of the cross connection to be created in this drop-down menu: is ; is ; source card is #1; source port is P01(S1); destination card is #2; destination port is vP01(S1). Select 46 slots in left and 46 slots of WAN port configured in step1.

194

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 19.13

User Manual

Create Cross-Connect

Click to create those Cross Connections. Click to close this window. Those Cross Connections will be listed in the window. (See Fig. 19.14) The layer2 Ethernet service is configured successfully. Click to close window.

Fig. 19.14

A42022-L5966-B 53-1-7619195

Cross-Connect Management

195

User Manual

19.3

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Monitoring Current Performance of STM-1 Port Step 1: Select → from the main menu to open the window. (See Fig. 19.16)

Fig. 19.15

Current SDH Performance Menu

Fig. 19.16

SDH Current Performance

Step 2: Click to open the window.

196

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 19.17

User Manual

Monitor Point Filter

Step 3: Click in the section and the window will appear. (See Fig. 19.18)

Step 4: Select #1 in the drop-down menu, in the drop-down menu, and in the drop-down menu. And then click ; all selected TPs will be listed. To monitor only one TP type, select the corresponding type in this item. Choose TPs to be monitored and click to complete TP selection.

A42022-L5966-B 53-1-7619197

197

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 19.18

Select Terminal Point

Step 5: Select parameters to be monitored, and click . The current performance of Port01 of Main Board will be listed.

Fig. 19.19

198

Monitor Point Filter

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 19.20

User Manual

SDH Current Performance

Click to monitor the latest performance of this port.

A42022-L5966-B 53-1-7619199

199

User Manual

19.4

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Creating MSSPRing Protection for STM-4 Ring LCT provides the function of creating and viewing MSSPRing information. Before creating a new MSSPRING, the user must know the ring topology and link information about the NE.

i

Note: The MSSPRing function could only be supported in STM-4 configuration for hiT 7020.

Follow the steps below to create a new ring with MSSRPing Protection:

Step 1: Select Æ from the main menu. The window will appear. (See Fig. 19.21)

Fig. 19.21

MSSPRing Management

Step 2: In the < MSSPRing Management> window, click . The window will appear. (See Fig. 19.22)

Fig. 19.22

200

Set Ring Property

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

Input a number as and arbitrary string as . Click to set the NEs in the ring.

i

Note: The maximum number of the ring is 16, and the Ring ID should be a number between 1 and 5000. If the information is incorrect or some items are not inputted, a warning window will appear. (See Fig. 19.23)

Fig. 19.23

Warning Window

Step 3:A window will appear. A number of NEs will appear on the window, the total number of which equals the number that the user input in the previous window. (See Fig. 19.24)

Fig. 19.24

Create Ring

Click the icon of each NE, and input the corresponding IP address in the pop-up dialog. The IP address will appear below the icon of the NE. Click each of the links to set up the Link Port properties in the pop-up dialog. (See Fig. 19.25) Select board and port from the drop-down menu of the panel, input and in the panel, and click OK to confirm. The color of the corresponding link will turn green.

A42022-L5966-B 53-1-7619201

201

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 19.25

Select Link Port

When all the NEs and links are configured, click in the window, and a confirmation dialog will pop up. Click to confirm to add protection to the ring. (See Fig. 19.26)

Fig. 19.26

Confirm to add protection

Then the MSSPRING is created, and it will be listed in window. (See Fig. 19.27)

Fig. 19.27

202

MSSPRING List

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

19.5

User Manual

Creating Multiplex-Section Protection between Two NEs In linear Multiplex Section Protection (MSP), there are two physical paths between two multiplexes. Working section and protection section between multiplexes is connected using different optical interfaces. SUAPASS hiT 7020 admits MSP protection mode in signal speed of STM-4 and STM-1.

NE-A

Fig. 19.28

NE-B

Point-to-point System

Fig. 19.28 illustrates a point-to-point system between NE-A and NE-B. The working signal is transmitted through a pair of STM-4 ports while the protection signal is transmitted through another pair of STM-4 ports. To implement transmission protection, first the protection groups should be established in the NE to realize connection between the working path and the protection path. Step1: Select → from the main menu, The window will appear. (See Fig. 19.29)

Fig. 19.29

MSP Management

Step2: Click , the window will appear (See Fig. 19.30). Fill out the section. provides a name for the protection group (for example ); The can be

A42022-L5966-B 53-1-7619203

203

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT selected as or ; The can be selected as or with the time between 60-720 seconds; Select #1 and P01 in the Working Multiplex Section. The System will fill out the Protection Multiplex Section with #1 and Port with P02 automatically.

Fig. 19.30

Create Linear Multiplex Section Protection Group

Step3: Click to finish creating MSP, and created protection groups will appear in the window, double-click this protection group to see the detail information.

Fig. 19.31

204

MSP Management

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

19.6

User Manual

Creating SNCP Between Two NEs Using Two Ports of MainBoard Sub-Network Connection Protection (SNCP) provides protection for a single VC-N circuit on the level of channel. In the transmission end, service is connected to two directions to send signals simultaneously. In the receiving end, NE selects best signal to receive. There are two channels used to transmit singles. One is working channel and another is protection channel. When the working channel is failed, system will switch to the protection SNCP channel to receive services. For example, SNCP protection group is composed of four NE in Fig. 19.32. The channel through NE A, D and C is main path for VC-12 working channel, and the channel through NE A, B, and C is protection channel for this service.

Fig. 19.32

SNCP Example

To implement SNCP in the ring, follow the steps below to configure each NE: Create bi-directional VC-12 level cross connection between a certain E1 unit port and a certain TU12 of LC2 port of NE A. Create bi-directional VC-12 level cross connection between the TU12 of LC1 port and the TU12 of LC2 port of NE D. Create bi-directional cross connection on the level of VC-12 between a certain E1 unit port and the certain TU12 of LC1 port of NE C.

The following example is provided to create SNCP protection group using TNMS-M SURPASS hiT 7020 LCT:

Step1:Select → from the main menu, The window will appear. (See Fig. 19.33)

A42022-L5966-B 53-1-7619205

205

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 19.33

SNCP Management

Step2: Click , then the window will appear. Click the drop-down menu of the lattice of capacity, select VC-12; Select bi-directional in service direction; Set No Revertive in Restore Mode; Set working card in the part of working TP to #1; set working port to P01 and TU12 (#01,#02). In fact, working TP is the slot of the cross connection line port of working channel in NE A. Set the value of protection TP to #1, working port to P02 and TU12 (#01,#01).

206

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

Fig. 19.34

User Manual

Create and Config SNCP

Step3: Click , the SNCP is created successfully. For NE A, the original bi-direction cross connection has the function of channel protection. NE A sends single to the line ports of LC1 and LC2 simultaneously and selects better single of LC1 and LC2 to receive. (See Fig. 19.35)

Fig. 19.35

SNCP Protection in NE A

Step4: Setup NE-D Cross-Connect configuration, NE-D CC config is almost same as step 2, just select the corresponding TU12 of LC1 port and the TU12 of LC2 port of NE D; the number of TU12 of NE-D should same to that of NE-A.

Step5:Setup NE-C Cross-Connect.

i

Note: The way to create channel protection of NE-C is almost same as that in NE-A, the difference is the working TP and protection TP is opposite to those of NE-A.

After creation of SNCP protection group, click in window (See Fig. 19.33) to view the existed SNCP protection group. Select the corresponding protection group, and click . The window will appear (See Fig.

A42022-L5966-B 53-1-7619207

207

User Manual

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT 19.36). In this window the condition of the current protection group is known. Meantime, operation of protection switch of SNCP protection group is done manually by clicking .

Fig. 19.36

SNCP Switch

: This command clears all commands that have been started and the recovery time of the operated NE : Protection switching will be closed, and the working channel will take on the service. Even if there is malfunction, switching will not happen. : The user switches services to protection channel by force even if there is fault on this channel. If the force switch requirement is not cleared, automatic switching will not happen. : The user will switch service to working channel by force even if there is fault on this channel. If the force switch requirement is not cleared, automatic switching will not happen. : The user switches services to protection channel manually on the condition that there is no fault on this channel. Automatic switching is still in effect. : The user switches services to working channel manually on the condition that there is no fault on this channel. Automatic switching is still in effect.

208

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

20 Abbreviations ACL

Access Control List

AIS

Alarm Indication Signal

ATM

Asynchronous Transfer Mode

AU

Administration Unit

BBE

Background Block Error

CC

Cross-Connect

CLI

Command Line Interface

CoS

Class of Service

CSES

Continuous Severely Errored Second

DCC

Data Communication Channel

DEG

Degraded

EM

Element Management

EOW

Ethernet over WDM

EQP

Equipped

ES

Errored Second

EXC

Excessive error

FC

Fault Count

FE

Fast Ethernet

FOP

Failure of Protocol

GE

Gigabit Ethernet

GFP

General Framing Procedure

HP

High Path

IGMP

Internet Group Management Protocol

IOP

Input Optical Power

LAN

Local Area Network

LB

Laser Bias

LCAS

Link Capacity Adjustment Scheme

LCD

Loss of Cell Delineation

LOC

Loss Of Continuity

LOM

Loss of Multiframe

LOP

Loss of Pointer

LOS

Loss of Signal

LP

Low Path

A42022-L5966-B 53-1-7619209

209

User Manual

210

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

LT

Laser Temperature

MS

Multiplex Section

MS-SPRing

Multiplex Section Shared Protection Ring

MSP

Multiplex Section Protection

MSTP

Multi-Service Transport Platform

NE

Network Element

NPJC

Negative Pointer Justification Count

OCD

Out of Cell Delineation

OFS

Out of Frame Second

OOP

Output Optical Power

PDH

Plesiochronous Digital Hierarchy

PJCN

Pointer Change Negative

PLM

Payload Mismatch

PPI

PDH Physical Interface

PPJC

Positive Pointer Justification Count

QoS

Quality of Service

RDI

Remote Defect Indication

RPR

Resilient Packet Ring

RS

Regenerator Section

SDH

Synchronous Digital Hierarchy

SECB

Severely Error Cell Block

SES

Severely Errored Second

SNMP

Simple Network Management Protocol

SPI

SDH Physical Interface

TCA

Threshold Crossing Alert

TDM

Time Division Multiplexing

TIM

Trace Identification Mismatch

TLS

Transparent LAN Service

TP

Termination Point

TU

Tributary Unit

UAS

Un-Available Second

VC

Virtual Concatenation

VPN

Virtual Private Network

A42022-L5966-B 53-1-7619

Instructions TNMS-M SURPASS hiT 7020 3.2 LCT

User Manual

21 Index MSSPRING, 106, 200

A ACL Configuration, 93 Alarm Acknowledging Current Alarms, 165 Alarm and Event Management, 160

C Chassis View, 55 Cross-Connect, 71 CrossConnect Management, 71

D Delete Card, 68 Domain Control, 53, 54

E Ethernet Configuration and Management, 83 Ethernet Performance Monitoring, 148

F FTP Settings, 58

G Global Settings, 79

H hardware requirement, 22

I Install LCT, 28 IP Route, 115

L LAN Card Configuration, 84 LCT Installation, 24 LED test, 134 Loopback Test, 133

M Main Menu Bar, 38 Main Window, 38 MIB Management, 64 MSP Management, 103

A42022-L5966-B 53-1-7619211

N NE Alarms, 160 NE Software Management, 62 NE Timing Setting, 57 NE Usage Statistics, 184 Node Event Log, 179

O OSI Configuration, 114 OSPF, 120

P Performance Monitoring, 135 PRBS Test, 131

R Route Configuration, 24 RSTP Configuration, 96

S SDH Configuration and Management, 66 SDH Performance Monitoring, 139 Security Management, 44 Set Loopback Test, 133 Shut Down LCT, 37 Shutdown NE, 57 SNCP Management, 100 Software Configuration, 23 Submenus, 42 Synchronization Management, 79

T Title Bar, 38

U Uninstall the LCT, 33

V VLAN Management, 88

W WAN Port Configuration, 86

211

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF