204
All rights reserved. Passing on and copying of this document, use and communication of its contents not permitted without written authorization from Alcatel. ED 1AA 00014 0004 (9007) A4 – ALICE 04.10 Y 1 03 957.130.882 TQZZA RELEASED / 3AL 61260 AAAA TQZZA 4 4 QUESTA PAGINA NON VA INSERITA NEL MANUALE THIS PAGE MUST NOT BE INCLUDED IN THE HANDBOOK COD.MANUALE HDBK P/N: 957.130.882 U Ed.03 3AL 61260 AAAA Ed.03 1300NM 1354RM Rel.5.2B ADMINISTRATION GUIDE ORIGINALE INTERLEAF: FILE ARCHIVIAZIONE: cod ANV (PD1-PD2) No PAGINE TOTALI PER ARCHIVIAZIONE: 204 DIMENSIONE BINDER SORGENTE (du –ks): 4.949 kBytes INFORMAZIONI PER IL CENTRO STAMPA - ASSEMBLY INSTRUCTIONS STAMPARE FRONTE/RETRO RECTO-VERSO PRINTING COMPOSIZIONE ED ASSIEMAGGIO DEL MANUALE: HANDBOOK COMPOSITION AND ASSEMBLY: No pagine (facciate) numerate numbered (facciate) No pages da from a to TARGHETTE - LABELS 957.130.882 U Ed.03 frontespizio front 2 957.130.882 U Ed.03 3AL 61260 AAAA Ed.03 manuale manual 198 1/198 198/198 TOTALE PAGINE A4 (FACCIATE) TOTAL A4 PAGES: 200 TOTALE FOGLI A4 TOTAL A4 SHEETS: 100 WARNING FOR A-UNITS OTHER THAN A-ITALY Labels are done according to A-Italy binder format. Source file ALICE 6.10

1354rm

Embed Size (px)

DESCRIPTION

1354rm alcatel

Citation preview

Page 1: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

Y 1

03

957.130.882 TQZZA

RELEASED

/3AL 61260 AAAA TQZZA

4

4

QUESTA PAGINA NON VA INSERITA NEL MANUALETHIS PAGE MUST NOT BE INCLUDED IN THE HANDBOOK

COD.MANUALE HDBK P/N: 957.130.882 U Ed.03 3AL 61260 AAAA Ed.031300NM1354RM Rel.5.2B ADMINISTRATION GUIDE

ORIGINALE INTERLEAF: FILE ARCHIVIAZIONE: cod ANV (PD1-PD2)

– No PAGINE TOTALI PER ARCHIVIAZIONE: 204– DIMENSIONE BINDER SORGENTE (du –ks): 4.949 kBytes

INFORMAZIONI PER IL CENTRO STAMPA - ASSEMBLY INSTRUCTIONS

– STAMPARE FRONTE/RETRO RECTO-VERSO PRINTING

– COMPOSIZIONE ED ASSIEMAGGIO DEL MANUALE:HANDBOOK COMPOSITION AND ASSEMBLY:

No pagine(facciate)

numeratenumbered(facciate)

No pages da from a to

TARGHETTE - LABELS

957.130.882 U Ed.03frontespiziofront

2957.130.882 U Ed.033AL 61260 AAAA Ed.03 manuale

manual198 1/198 198/198

TOTALE PAGINE A4 (FACCIATE) TOTAL A4 PAGES: 200

TOTALE FOGLI A4 TOTAL A4 SHEETS: 100

WARNING FOR A-UNITS OTHER THAN A-ITALY

• Labels are done according to A-Italy binder format.• Source file ALICE 6.10

Page 2: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

Y 2

03

957.130.882 TQZZA

RELEASED

/3AL 61260 AAAA TQZZA

4

4

ALCATEL OPTICS GROUPSite

Originators

VIMERCATE

:

Domain

1354RM REL.5.2B

Division

Rubric

ADMINISTRATION GUIDE

TypeDistribution Codes Internal External

::::

TND 1354RM REL.5.2B ADMINISTRATION GUIDE

:

M.VARISCO

Approvals

NameApp.

App.Name

M.RAGNI

INFORMAZIONI EDITORIALI

– ORIGINALE SU FILE: ALICE 6.10• sistemazione ’figlist’

957.130.882 U3AL 61260 AAAAEd.031300NM1354RM Rel.5.2B

Regional Network Manager for SDH and Optical NetworksADMINISTRATION GUIDE

Page 3: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

Y 3

03

957.130.882 TQZZA

RELEASED

/3AL 61260 AAAA TQZZA

4

4

1300NM1354RM Rel.5.2B

Regional Network Manager for SDH and Optical Networks

ADMINISTRATION GUIDE

957.130.882 U Ed.03 3AL 61260 AAAA Ed.03

VOL.1/1

1300NM1354RM Rel.5.2B

Regional Network Manager for SDH and Optical Networks

ADMINISTRATION GUIDE

957.130.882 U Ed.03 3AL 61260 AAAA Ed.03

VOL.1/1

1300NM1354RM Rel.5.2B

Regional Network Manager for SDH and Optical Networks

957.130.882 U Ed.03 3AL 61260 AAAA Ed.03 ADMINISTRATION GUIDE VOL.1/1

1300NM 1354RM Rel.5.2BRegional Network Manager for SDH and Optical Networks

957.130.882 U Ed.03 3AL 61260 AAAA Ed.03 ADMINISTRATION GUIDE VOL.1/1

1300NM

1354RM Rel.5.2BRegional Network Manager for SDH and Optical Networks

957.130.882 U Ed.03 3AL 61260 AAAA Ed.03 ADMINISTRATION GUIDE VOL.1/1

Page 4: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

Y 4

03

957.130.882 TQZZA

RELEASED

/3AL 61260 AAAA TQZZA

4

4

FINE DEL DOCUMENTO INTERNO – END OF INTERNAL DOCUMENT

Page 5: 1354rm

957.130.882 U Ed.03 3AL 61260 AAAA Ed.03

Administration Guide

Alcatel 1300NMNetwork Management

1354RM Rel.5.2BRegional Network Manager for SDH and Optical Networks

Page 6: 1354rm

957.130.882 U Ed.03 3AL 61260 AAAA Ed.03

Page 7: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

1

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

1354RM REL.5.2B ADMINISTRATION GUIDE

TABLE OF CONTENTS

LIST OF FIGURES AND TABLES 6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

HISTORY 7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

REFERENCED DOCUMENTS 7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1 INTRODUCTION 9. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 General information 9. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Handbook applicability 9. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Product-release handbooks 10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.3.1 Handbooks related to the specific software application 10. . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3.2 Handbooks related to the product’s hardware 11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4 Purpose of the Document 11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.5 Intended audience 11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.6 Required skill 11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7 Conventions 12. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2 HARDWARE AND SOFTWARE REQUIREMENTS 13. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 Hardware Requirements 14. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.1.1 IM configuration 14. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.2 US configuration 15. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.2 Software Requirements 16. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.1 IM configuration 16. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.2 US configuration 18. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3 INSTALLATION 19. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1 Installation and Customization of Complete delivery Packages 20. . . . . . . . . . . . . . . . . . . .

3.1.1 SMF installation 21. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.2 Re–configure SMF installation 21. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.3 1354RM Installation Environment Variable Definition 22. . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.2 Installation of Patches 25. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.1 RM DB resizing after installation patch 25. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.3 Multi–IM Configuration 26. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

4 HP–OV DM CUSTOMIZATION 27. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.1 PMD Configuration 27. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

ED DATE CHANGE NOTE APPRAISAL AUTHORITY ORIGINATOR

01 000414 M. Ragni ITAVE M. Varisco ITAVE

02 000721 SC00072405 M. Ragni ITAVE M. Varisco ITAVE

00120603 SC00120501 M. Ragni ITAVE M. Varisco ITAVE

1354RM R5.2.xSystem AdministratorReference Guide

Page 8: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

2

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

4.2 Installation on Distributed Platform 28. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2.1 Remote Event Sieve configuration 28. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

4.3 Object Registration 28. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

5 IPC RESOURCES CONFIGURATION 29. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

6 USERS MANAGEMENT 31. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1 1354RM Operators Managing 31. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2 User Profiles 32. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

6.2.1 HP–OVw Users Profile for NetView application 32. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.2 CDE Customization 33. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.3 Unix Shell Profile (.profile) 33. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

6.3 Network Access Domain Management 34. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.1 Adding an RM Operator 35. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.2 Defining a new RM Initiator 36. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.3 Access Rules description 37. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.4 Delivered set of Initiators 48. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.5 Default mapping between User Profiles and Initiators 48. . . . . . . . . . . . . . . . . . . . . . . . . . . .

7 PROCESS MONITOR & CONTROL 49. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.1 Maintenance Commands 49. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2 Integration of IM Agent in 1354RM PMC 50. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

8 DATABASE MANAGEMENT 53. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.1 Database Creation 53. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2 Database disk usage 54. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.3 Database extension 60. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.4 Backup and Restore 61. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.5 DB realignment via “redo log” 63. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.6 Identifier Defragmentation Procedure 64. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

8.6.1 Procedure steps 64. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.6.2 idDefrag procedure – structure of log file 65. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

8.7 DB configuration for huge networks 66. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.8 Managing indexes 66. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

9 SYSTEM MANAGEMENT FEATURES (SMF) 67. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.1 EMLs Data Definition for SMFs 67. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

9.1.1 Description of ”smf_conf” file parameters 68. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.1.2 Network’s configuration file generation 69. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

9.2 1354RM Scheduled Operations 70. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.3 Multi–Screen Installation 70. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

10 1354RM BEHAVIOR 71. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.1 EMLs management 71. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

10.1.1 Procedures to define EMLs managing Q3 NEs 71. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.1.2 Procedures to create EMLs managing QB3* NEs 71. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.1.3 Procedures to delete EMLs managing QB3* NEs 71. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

10.2 Path / HO–Trail allocation algorithm failures 72. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.3 Distributed Network Maps (DNM) application customization 74. . . . . . . . . . . . . . . . . . . . .

10.3.1 Environment Variables 74. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.3.2 Registration Files 74. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.3.3 Resources Files 74. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

10.4 Trace management 75. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.4.1 User Interface applications 75. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.4.2 Information Manager Applications 75. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 9: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

3

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

10.5 Consistency Download problem with transmux ports 76. . . . . . . . . . . . . . . . . . . . . . . . . . . 10.5.1 RM with 2Mb ports and WX with a single port 77. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.5.2 RM with a single port and WX with 2Mb ports 78. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

11 1354RM CUSTOMIZATION 79. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.1 Environment variables changes 79. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2 Users Services 80. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

11.2.1 Counters refresh rate on agent response 80. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2.2 Browser 80. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

11.3 EML–NML Alignment Process 80. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.4 Inventory Processes 81. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.5 Map Management 81. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.6 Path/HO–Trail Management 82. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

11.6.1 Path/Trail allocation algorithm 82. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.6.2 Reuse already allocated resources in Broadcast paths. 82. . . . . . . . . . . . . . . . . . . . . . . . . 11.6.3 Using Virtual Nodes during Path Allocation Phase 83. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.6.4 Configurable switch in Drop&Continue 83. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.6.5 Changing timeout for Cross Connection management actions 83. . . . . . . . . . . . . . . . . . . . 11.6.6 Configuring consistency flow control 84. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

11.7 Alarm management 84. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.7.1 Flooding protection mechanism 84. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.7.2 Alarm clearing hysteresis period 84. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

11.8 Nap uploading timer 85. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.9 SNCP switch timer 85. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.10 Printer Commands 85. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.11 Unused Virtual PDH ports garbage collection 86. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.12 Setting Linked Get Replies Maximum Number 86. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.13 NetView Symbol’s Labels 87. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.14 Performance Monitoring Customization 88. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

11.14.1 PM Data Collection Customization 88. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.14.2 PM Data Archive Customization 90. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.14.3 PM Scheduled Report 91. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.14.4 PM Automatic Start/Stop Measures 91. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

11.15 How to change the default ASAP 92. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.16 Procedure to set Swedish language 92. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

12 QNN INTERFACE MANAGEMENT 93. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.1 Enabling / Disabling Qnn Agent Management 93. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.2 RM user definition for Qnn Zoom–In 93. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

12.2.1 RM users definition script 93. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.3 RM Zoom–In from NN using RM USM 94. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.4 Limitation of Network Construction lead by Qnn Agent 95. . . . . . . . . . . . . . . . . . . . . . . . . . 12.5 Limitation of Qnn path provisioning lead by RM 96. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.6 Assigning Network Resources to 1354NN 96. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

13 EML SIMULATION 97. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.1 Simulated EML data generation and EML registration 97. . . . . . . . . . . . . . . . . . . . . . . . . . .

13.1.1 Available Simulated data files 98. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.1.2 Simulated data file syntax 99. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

13.2 Real Network Simulation 100. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

14 HOW TO CHANGE THE USERLABEL OF NES 101. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.1 NEs with SEN–IM interface 101. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.2 NEs with TSD–IM interface 101. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.3 Aligning the userLabel of PMNEs and PMTPs 102. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 10: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

4

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

14.4 Moving ET from Generic to Meshed 102. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

15 MIGRATION PROCEDURE 103. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.1 1354RM R2.4 (NR3.1) to 1354RM R5.2.x Migration Procedure 104. . . . . . . . . . . . . . . . . . . . . 15.2 Virtual EML registration on Communication Infrastructure (CI) 108. . . . . . . . . . . . . . . . . . .

15.2.1 Prerequisites 108. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.2.2 Procedure steps 108. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

15.3 Migration Procedure of NEs 109. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.3.1 NE migration between QB3* and QB3 interface 110. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.3.2 neGroup modification 115. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

15.4 OVW Map Conversion from 1354RM R2.4 to 1354RM R5.2.x 117. . . . . . . . . . . . . . . . . . . . . . 15.4.1 Recover Maps after migration when changing ntwDomld 117. . . . . . . . . . . . . . . . . . . . . . . .

15.5 Virtual EML registration on Communication Infrastructure (CI) 118. . . . . . . . . . . . . . . . . . . 15.5.1 Prerequisites 118. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.5.2 Procedure steps 118. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

16 UPDATE OF MSSPRING INFOS (MS–SPRING TAKEOVER) 119. . . . . . . . . . . . . . . . . . . . . . . . . . . 16.1 Prerequisites 119. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.2 Procedure steps 120. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.3 Format of nodedata file 121. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.4 Loading of a prebuilt nodedata file 121. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

APPENDIX A INTEGRATION OF 1354RM WITH A1330AS 123. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.1 Installing A1330 AS 123. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.2 Deinstalling A1330 AS 123. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A.3 A1330 AS customization 124. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

A.3.1 Swedish language 124. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

APPENDIX B INTEGRATION OF 1354RM WITH GENERIC OS–OS INTERFACE 125. . . . . . . . . . . . B.1 Generic OS–OS Interface Subsysystem 125. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B.2 Generic OS–OS Interface Installation 125. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B.3 Generic OS–OS Interface deinstallation 126. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

APPENDIX C INTEGRATION OF 1354RM WITH SEC SECURIYT SUBSYSTEM 127. . . . . . . . . . . . . C.1 SEC Architecture on 1354RM System 127. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.2 Installing SEC Subsystem 128. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.3 Deinstalling SEC 129. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.4 SEC Administration 130. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C.5 Alarm Access Configuration 131. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

APPENDIX D COMMAND FILE SPECIFICATION 135. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1 Command Description 136. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

D.1.1 Syntax Description 137. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.2 Setting time reference. 138. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.3 Setting network 138. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.4 Path commands 139. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.5 Trail commands 145. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.6 Port User Label 149. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.7 CHOWN commands 149. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.8 PM commands 150. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.9 aSAP commands 155. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.10 restRule commands 156. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.11 Comments 158. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.12 Sleep command 158. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.13 Setting timeout 158. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 11: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

5

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.14 Exit command 158. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.15 Connection command 159. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.16 Topology Commands 161. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.17 Upload and Remove NAP 165. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.1.18 Configure et, physical connection. 165. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

D.2 tool description 166. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.2.1 Handling errors 166. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

D.3 Examples 167. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.1 Example on paths 168. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.2 Example on paths protected with Drop & Continue 170. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.3 Example on broadcast path 173. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.4 Example on broadcast paths (2nd) 175. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.5 Example on trails 182. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.6 Example of path that uses HO trails 186. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.7 Example on measures 188. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.8 Example on aSAProfile 190. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.9 Example on restoration rule 191. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.10 Example on implement, deimplement connection 192. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.11 Example on create, remove, implement and deimplement topology. 193. . . . . . . . . . . . . . . D.3.12 Example on upload and remove nap. 197. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D.3.13 Example configure physical connection and et. 198. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 12: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

6

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

LIST OF FIGURES AND TABLES

FIGURESFigure 1. Example of directories allocation with at least two physical disks 23. . . . . . . . . . . . . . . . . . . . Figure 2. Distribution of files in two application disks 61. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 3. Supported topology 95. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 4. Not supported topology 95. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 5. Reference Network 167. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

TABLESTable 1. Handbooks related to the specific software application 10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Table 2. NR 5.0B Related Handbooks 10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Table 3. Documentation on CD–ROM 10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Table 4. Access Rules Description 40. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Table 5. NAD / FAD 45. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 13: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

7

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

HISTORYAs internal document 3AL 61217 ACAA TCZZA

01 on March 1st, 2000 – Ed.1Creation – 1354RM R5.2.0 – First delivery

02 on April 27th, 2000 – Ed.21354RM R5.2.0 – Integration with SEC, migration ET from generic to meshed, new user “qnnpmop” forQNN and installation kit and patch procedures modified.

03 on June 1st, 2000 – Ed.31354RM R5.2.1 – EML simulation, enable of SEC with AS, Map Management features and migrationprocedure.

04 on August 24th, 2000 – Ed.41354RM R5.2.1 – Set of Swedish language and new batch commands.

05 on September 19th, 2000 – Ed.51354RM R5.2.1 – Limitation of Qnn path provisioning and new codes of error in path allocation.

ED DATE CORRESPONDING TO 3AL 61217 ACAA TCZZA ED.

01 000414 01

02 000721 03

03 001206 05

REFERENCED DOCUMENTS(For Alcatel internal use only)

[1] HP OpenView Distributed Management Agent Platform Administrator’s ReferenceHP Part No. J1064–90016

[2] O. Frelot – ”ALMAP – Reference Platforms”Ed. 8; August 31st, 1999; 3BP 21610 0002 DTZZA

[3] G. Chaminade – ”ALMAP – Reference Platforms Consistency Control”Ed.3 April 30th, 1998 ; NMU/C/97/0037

[4] A. Borsotti – ”A1300 NM3.1 – Equipping Option List”Ed.1–It.1 July 20th, 1998 ; 3AL 71002 ABAA BHZZA

Page 14: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

8

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Page 15: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

9

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

1 INTRODUCTION

1.1 General information

WARNING

ALCATEL makes no warranty of any kind with regards to this manual, and specifically disclaims theimplied warranties of merchantability and fitness for a particular purpose. ALCATEL will not be liablefor errors contained herein or for damages, whether direct, indirect, consequential, incidental, orspecial, in connection with the furnishing, performance, or use of this material.

NOTICE

The product specification and/or performance levels contained in this document are for informationpurposes only and are subject to change without notice. They do not represent any obligation on thepart of ALCATEL.

COPYRIGHT NOTIFICATION

The technical information of this manual is the property of ALCATEL and must not be copied,reproduced or disclosed to a third party without written consent.

1.2 Handbook applicability

This handbook applies to the following product-releases:

PRODUCT ANV P/N Factory P/N

1354RM 3AL 61101 AAAA 521.200.800

PRODUCT RELEASE VERSION (*) ANV P/N Factory P/N

1354RM 5.2B ––– 3AL 61169 ADAA 521.560.420

N.B. NOTES FOR HANDBOOKS RELEVANT TO SOFTWARE APPLICATIONSHandbooks relevant to software applications (typically the Operator’s Handbooks) are notmodified unless the new software ”version” distributed to Customers implies man–machineinterface changes or in case of slight modifications not affecting the understanding of theexplained procedures.Moreover, should the screen prints included in the handbook contain the product-release’s”version” marking, they are not replaced in the handbooks related to a subsequent version, ifthe screen contents are unchanged.

Page 16: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

10

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

1.3 Product-release handbooks

The list of handbooks given here below is valid on the issue date of this Handbook andcan be changed without any obligation for ALCATEL to update it in this Handbook.

Some of the handbooks listed here below may not be available on the issue date of thisHandbook.

The standard Customer Documentation in the English language for the equipment whoseproduct-release-version is stated in para.1.2 on page 9 consists of the following handbooks:

1.3.1 Handbooks related to the specific software application

Table 1. Handbooks related to the specific software application

REF HANDBOOK ANV Part No.FACTORYPart No.

THISHANDBOOK

[1]1354RM Rel.5.2BInstallation Guide

3AL 61261 AAAA 957.130.892 W

[2]1354RM Rel.5.2BOperator’s Handbook

3AL 61259 AAAA 957.130.872 H

[3]1354RM Rel.5.2BAdministration Guide

3AL 61260 AAAA 957.130.882 U

Table 2. NR 5.0B Related Handbooks

REF HANDBOOK ANV Part No.FACTORYPart No.

THISHANDBOOK

or note

[4]1330AS Rel.5.1Operator’s Handbook

3AL 71109 AAAA 957.130.722 A

Table 3. Documentation on CD–ROM

REF ANV Part No. FACTORY Part No. NOTE

[5]3AL 61262 AAAA 417.100.028

Envisaged after the release of allHandbooks

[5]

Contains, in electronic format, the following handbooks: REF.[2] to [4]

Page 17: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

11

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

1.3.2 Handbooks related to the product’s hardware

Refer to WS supplier handbooks.

In particular refer to such handbooks to obtain the following information (where applicable):

– COMPLIANCE WITH EUROPEAN NORMS– SAFETY RULES

• General rules• Harmful optical signals• Risk of explosion• Moving mechanical parts• Heat–radiating Mechanical Parts

– ELECTROMAGNETIC COMPATIBILITY– ELECTROSTATIC DISCHARGERS (ESD)– EQUIPMENT LABELS

1.4 Purpose of the Document

Purpose of this document is to provide a simple guideline for:

– hardware and software requirements,– installation and customization,– activation,– system administrator guide.

of Alcatel Telecom TND 1354RM R5.2.x product.

Refer to:• 1353SH R5.2• 1353WX R1.7.1• 1330AS R5.0.0 & R5.1.0

Installation Guide for additional information related to the inter–working and installation on HP workstation.

1.5 Intended audience

This document is intended to be used by the 1354RM System Administrator in order to install and configurethe product.

1.6 Required skill

A good knowledge of HP–UX 10.20, Oracle 7.x Database Management System and HP–OV DM platformis considered a mandatory prerequisite.

Page 18: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

12

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

1.7 Conventions

In this document the installation procedure and maintenance operations are described with all the shellcommands needed by this procedure. Either Korn Shell (ksh) or Bourne Shell (sh) are supposed to beused by the operator.

N.B. Normally are described commands that can be used with a Korn Shell. If you are using a BourneShell you have to pay attention to the symbol definition command. In Korn Shell you can definea symbol in the following way:

export symbol_name=<symbol_value>on the contrary, if you use Bourne shell, you have to split the command in the followings:

symbol_name=<symbol_value>export symbol_name

The shell commands to be used are described using the following conventions:

– Bold means that the string must be typed as it is described in the manual;

– <Angle bracket> represent command parameter that must be specified by the operator;

– shell commands needed to be executed as ”root” user are prompted with ”#”;all the other commands are prompted with ”$”, these commands can be performed by the snml useror other administrator user (the only that have Unix access).

N.B. To execute command as ”root” user, it is recommended to change the username using thecommand:

su root

instead of ”su – root”, because with the recommended command all the RM environmentvariables are kept.

Page 19: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

13

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

2 HARDWARE AND SOFTWARE REQUIREMENTS

1354RM product supports distributed configuration. It is possible to install Information Manager (IM)configuration and User Service (US) configuration on different physical hosts. IM configuration is acomplete one and supports DB, agents and user interface; US configuration supports only user interfaceproviding network access to IM hosts via CMISE and SQL–Net interface.

Page 20: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

14

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

2.1 Hardware Requirements

2.1.1 IM configuration

– For hosts to be adopted please refer to Equipping Option list [4].

– At least 128 Mb RAM size are required; 256 Mb RAM are recommended.

– At least two physical disks are required in order to provide good backup and restore facilities :

1 ) the first disk contains the directories used to save backup, reference base, redo log andmirrored database information.

2 ) the second disk contains the 1354RM product,

N.B. the bdf HP–UX command, specifying the directory as a parameter, can be used toverify in which filesystem a directory is stored.

Required disk space is the following :

• Data Disk. 1354RM installation tree size depends on number of NEs and paths that must bemanaged:– small: ~ 1 Gb– medium: ~ 1.5 Gb– large: ~ 1.9 GbIf the RM help is installed the previous Disk size shall be increased of 200 Mb.

• Backup and Mirror Disk. Backup and Mirror data size depends on number of NEs and paths thatmust be managed by 1354RM. The following sizes are referred to snapshot backup area,reference base for incremental backup and archive area for Oracle redo log files (in this sortingcriteria):– small: 50 Mb + 300 Mb + 300 Mb = 650 Mb– medium: 50 Mb + 500 Mb + 300 Mb = 850 Mb– large: 50 Mb + 1100 Mb + 300 Mb = 1450 MbPlease note that the previously specified snapshot backup area size do not take into accountthe disk space required by SH backup and it depends on the number of SH managed by the1354RM.

N.B. In order to guarantee Oracle data consistency, Data Disk (1354RM installation) must belocal to the workstation on which 1354RM system will run, and can not be stored in afilesystem reached via NFS.

The following data have to be also taken into account to evaluate a correct 1354RM disk occupation:

• Installation kit g–zipped tar file (if no mass storage device is used): ~ 200 Mb• Swap File on Disk: ~ 512 Mb

N.B. The previous disk occupation data do not take into account the table space created in the1354RM Oracle DB by other subsystems (e.g. 1330 AS – Alarm Surveillance).

Page 21: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

15

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

2.1.2 US configuration

– For hosts to be adopted please refer to Equipping Option list [4].

– At least 128 Mb RAM size are required; 256 Mb RAM are recommended.

– Required Disk size:1354RM installation subtree size is ~ 450 Mb.

The following data have to be also taken into account to evaluate a correct 1354RM disk occupation:

• Installation kit g–zipped tar file (if no mass storage device is used): ~ 200 Mb• Swap File on Disk: ~ 512 Mb

Page 22: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

16

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

2.2 Software Requirements

2.2.1 IM configuration

1354RM IM have to be installed on Almap HP4 platform updated with the HP4.2 patch level plus thePHSS_15076 HP patch (for further details, please, refers to Almap Reference Platforms document [2]).

Anyway, at least, the following configuration should be used (note that the OSF–Motif 1.2 must be installedwithin HP–UX 10.20 ):

– Bundle(s):B3560CBEng C.05.25 English C SoftBench S700 10.x B3691AA_APZ B.10.20.89 HP GlancePlus/UX for s700 10.20 B3782EA B.10.20 HP–UX Media Kit (Reference Only. See Description) DMPlatDKHP10man B.05.01 DM TMN Manager Developer’s Kit man pages DMPlatDKHPUX10x B.05.01 DM TMN Manager Developer’s Kit DMPlatEngHP10man B.05.01 DM TMN Manager Platform Man Pages DMPlatEngHPUX10x B.05.01 DM TMN Manager Platform HPUXEngCR700 B.10.20 English HP–UX CDE Runtime Environment J2160A_APZ C.07.00 OSI Trnspt and Srvcs for 9000/700 J2655AA_APZ B.10.20.02 100VG–AnyLAN/9000 EISAOVLicenseSvrHP10 B.05.01.00 OpenView License Server for HPUX10.x SoftBenchRef C.05.25 SoftBench 5.0 (Reference Only. See Description)XSW700CR1020 B.10.20.36 Extension Software Patch Bundle XSW700GR1020 B.10.20.36 Extension Software Patch Bundle

– Product(s) not contained in a Bundle:OTS–LITE9000 C.07.00 OSI Trnspt and Svcs 9000 PHCO_13661 B.10.00.00.AA POSIX shell cumulative patch PHCO_13698 B.10.00.00.AA ksh(1) cumulative patch PHNE_10077 B.10.00.00.AA patch for EISA 100VG–AnyLAN productPHNE_8830 B.10.00.00.AA OTS C.07.00 cumulative mega patchPHSS_15076 B.10.00.00.AA OV NNM5.0x Consolidated Patch 6–16–98

– Oracle 7. The following modules are used:• ORACLE7 Server (RDBMS) 7.2.3.0.0• SQL*Plus 3.2.3.0.0• SQL*Net V2 2.2.3.0.0• TCP/IP Protocol Adapter V2 2.2.3.0.0• PL/SQL V2 2.2.3.0.0

Page 23: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

17

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

– The following system kernel parameters have to be set, at least, with these values:

• maxusers = 64• maxuprc = 200• ncallout = 548• nproc = 532• shmmni = 200• shmseg = 120• msgmap = 258• msgseg = 7168• msgtql = 256

• shmmax = 512 * 1024 * 1024 (these values are recommended by ORACLE installation)• semmni = 50• semume = 25• semmns = 200• semmnu = 200

– In order to improve performances, it is suggested to remove the following HP–OV DM processes(using the following commands):

• $OV_BIN/ovdelobj $OV_LRF/netmon.lrf• $OV_BIN/ovdelobj $OV_LRF/ovtopmd.lrf• $OV_BIN/ovdelobj $OV_LRF/ovtrapd.lrf• $OV_BIN/ovdelobj $OV_LRF/ovactiond.lrf• $OV_BIN/ovdelobj $OV_LRF/snmpCollect.lrf

Page 24: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

18

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

2.2.2 US configuration

1354RM US have to be installed on Almap HP4 platform updated with the HP4.2 patch level plus thePHSS_15076 HP patch (for further details, please, refers to Almap Reference Platforms document [2]).

Anyway, at least, the following configuration should be used (note that the OSF–Motif 1.2 must be installedwithin HP–UX 10.20 ):

– Bundle(s):B3560CBEng C.05.25 English C SoftBench S700 10.x B3691AA_APZ B.10.20.89 HP GlancePlus/UX for s700 10.20 B3782EA B.10.20 HP–UX Media Kit (Reference Only. See Description) DMPlatDKHP10man B.05.01 DM TMN Manager Developer’s Kit man pages DMPlatDKHPUX10x B.05.01 DM TMN Manager Developer’s Kit DMPlatEngHP10man B.05.01 DM TMN Manager Platform Man Pages DMPlatEngHPUX10x B.05.01 DM TMN Manager Platform HPUXEngCR700 B.10.20 English HP–UX CDE Runtime Environment J2160A_APZ C.07.00 OSI Trnspt and Srvcs for 9000/700 J2655AA_APZ B.10.20.02 100VG–AnyLAN/9000 EISAOVLicenseSvrHP10 B.05.01.00 OpenView License Server for HPUX10.x SoftBenchRef C.05.25 SoftBench 5.0 (Reference Only. See Description)XSW700CR1020 B.10.20.36 Extension Software Patch Bundle XSW700GR1020 B.10.20.36 Extension Software Patch Bundle

– Product(s) not contained in a Bundle:OTS–LITE9000 C.07.00 OSI Trnspt and Svcs 9000 PHCO_13661 B.10.00.00.AA POSIX shell cumulative patch PHCO_13698 B.10.00.00.AA ksh(1) cumulative patch PHNE_10077 B.10.00.00.AA patch for EISA 100VG–AnyLAN productPHNE_8830 B.10.00.00.AA OTS C.07.00 cumulative mega patchPHSS_15076 B.10.00.00.AA OV NNM5.0x Consolidated Patch 6–16–98

– The following system kernel parameters have to be set, at least, with these values:

• maxusers = 64• maxuprc = 200• shmmni = 200• shmseg = 120• msgmap = 258• msgseg = 7168• msgtql = 256

– In order to improve performances, it is suggested to remove the following HP–OV DM processes(using the following commands):

• $OV_BIN/ovdelobj $OV_LRF/netmon.lrf• $OV_BIN/ovdelobj $OV_LRF/ovtopmd.lrf• $OV_BIN/ovdelobj $OV_LRF/ovtrapd.lrf• $OV_BIN/ovdelobj $OV_LRF/ovactiond.lrf• $OV_BIN/ovdelobj $OV_LRF/snmpCollect.lrf

Page 25: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

19

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

3 INSTALLATION

WARNING The following is the Installation procedure that have to be used only internallyby Alcatel Units during Integration phase. Customers and Alcatel Installationpost DR4 must follow the Installation Procedure described in document NR3Installation Guide.

In the following paragraph, the shell commands needed to perform installation, customization andactivation of 1354RM are given.

Page 26: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

20

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

3.1 Installation and Customization of Complete delivery Packages

In the following you can find the procedure to install a complete 1354RM delivery.

a ) If there is an old version installed, shutdown the 1354RM system, the 1354RM Oracle instance andall user service manager instances (ovw, browser and mngAgent).

Since the 1354RM installation performs a reset of OVw–DB (even if the Old Mib option ischosen) no maps will be present at the end of installation. It’s mandatory to save the maps to bekept using DNM application.

b ) Exit from normal user CDE space and log–in again as ”root” user in CDE login form.

c ) The user ”snml” with the default shell equal to /bin/ksh is created automatically; snml user must bepart of ”dba” group; ”dba” is the same group of the user ”oracle”. This ”snml” user will be the 1354RMsystem administrator.

# sam ....

N.B. Please, do not use as ”snml” user home directory the same directory that will be used asinstallation directory of 1354RM product (see d ))

d ) Create (if it does not exist) an empty directory for 1354RM installation tree root :

# mkdir <your–snml–inst–root>

e ) Change current directory to the SNML installation root and extract ”restore_gz” file from 1354RMinstallation tar kit (1354RM installation tar kit is relative to the current directory).

N.B. Please, do not use the command ”cd /usr/snml” since it will generate someinconsistencies during the ”etc/restore_gz” procedure.

# cd <your–snml–inst–root>

# gunzip –d –c <1354RM...your–media–device or tar file> | tar xvf – ./etc/restore

N.B. Please, note that ”1354RM...” is the standard prefix of each RM complete delivery orpatches.

f ) Execute restore_gz script running the following command:

# etc/restore <1354RM...your–media–device or tar file>

N.B. The installation procedure creates a link ”/usr/snml” that is linked to 1354RM installationroot directory.

g ) A graphical window with all the needed environment variables (etc/env_snml file) is presented to theuser. The variables, if possible, are initialized with the values assigned to them by the operator inprevious release. The user can change, if needed, their values and save them in the new”etc/env_snml” file clicking on ”Apply” button (please refer to 3.1.3 for variables description).

Page 27: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

21

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

h ) Execute customize script pressing the ”Customize” button, a window will be opened containing thetraces of the Customize execution. If some errors occur during ”customize” execution, it signals tothe operator the log file where he can find information on the occurred error. The customize procedurewill produce a trace file called etc/customize.trc containing all the messages printed out by the”customize” script.

i ) At the end of the previous step, it is necessary to verify the contents of the ”im_host_conf” file, sinceit is is generated by the ”customize” procedure (please refers to the paragraph 4.2.1)

j ) If the network to be managed is very big and managed using many EMLs, some system and DBparameters should be changed, as suggested in the procedure described in the paragraph 8.7.

k ) To activate all the CDE configuration changes it is recommended to exit from the current CDE session

and log in again to use 1354RM product.

3.1.1 SMF installation

Log–in as “root” user and launch the swinstall procedure:$ swinstall –s <package full path name> SMF

3.1.2 Re–configure SMF installation

After a 1354RM new installation the SMF icon is no longer present on the vertical palette of the desktop.

Execute the following command:$ swconfig –x reconfigure=true SMF

Page 28: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

22

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

3.1.3 1354RM Installation Environment Variable Definition

In the following you can find an explanation of the meaning of variables contained in the file”${SNML_HOME}/etc/env_snml”, that have to be initialized for a correct 1354RM installation.

N.B. In order to verify in which filesystem a directory is stored the bdf <dir_name> HP–UX commandcan be used.

3.1.3.1 Application Variables

SNML_HOME Root directory of 1354RM product installation tree. The directory must existbefore installation.The directory must have ”snml” as owner and ”dba” as group and its group writeaccess enabled (i.e. –rwxrwxr–x)

HOST_TYPE It specifies if the host is an Information Manager (IM), with a complete 1354RMinstallation, or an User Service (US), where the User Interface Application onlyis installed. In the former installation type the database is created and agentscan be started, in the second type can be started User Interface Applicationonly, that are connected with a remote database.

N.B. In a multi–workstation installation only one can be defined asInformation Manager. In the following chapter this workstation will bereferred as the IM host.

MIB Meaningful for IM configuration only.This variable specifies if the old 1354RM database must be saved or not. Itsvalues can be ”NEW” (create new DB), ”OLD” (save the current DB or recoverit from an old installation directory) or ”REC” (recover DB from backup).NEW : using this option the customize procedure will create

a new empty DB.OLD : using this option the customize will copy the old DB

in the new directory (if the new installation isperformed on a new installation tree) or keep the oldDB (if the installation is performed on the oldinstallation tree).

REC : this option should be used after a disk failure thatcauses the re–installation of 1354RM application.The customize procedure will not create a new DB inorder to save the mirrored DB information to permitthe recover of DB from an incremental backup.

SNML_MIRROR Meaningful for IM configuration only.This variable specifies the directory that contains the database mirrored dataand Oracle Archive Log data.

N.B. It is mandatory that ”$SNML_MIRROR” and ”/backup/snml”directories are completely disjointed. It is important that the”mirror” directory is placed in an independent tree regards the”/backup/snml” directory, otherwise some operations will fail (e.g.during restore the redolog file will be overwritten).

N.B. In order to support properly 1354RM backup and restore features,this mirror directory and the ”/backup/snml” directory must be createdon a different physical disk than the one where 1354RM producthas to be installed.

Page 29: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

23

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Configuration with two disks

SNML_HOMESNML_MIRROR/backup/snml

DIRECTORIES ALLOCATION

Figure 1. Example of directories allocation with at least two physical disks

NTWDOMAIN Meaningful for IM configuration only.This variable specifies the identifier of the network domain handled by the1354RM (by default the variable value is 1).

IM_SERVER Meaningful for US configuration only.This variable specifies the host–name of the IM workstation.

REMOTE_SERVER Meaningful for IM configuration only.This variable has to be set to allow the transfer of all 1354RM backup to a remoteserver. This server must be a 1354RM–IM workstation. These two 1354RMsystem must to have identical value of the variables that specifies the Oracleroot directory (ORACLE_HOME) and the RM–DB Mirror directory(SNML–MIRROR); moreover the directory /tmp must to have enough space totake up the g–zipped backup transfer.

AC_INFO_FLAG Meaningful for IM configuration only.This variable specifies if the old AC_INFO directory must be saved or not. Itsvalue can be “YES” (recover the old directory) or “NO” (create new directory).

CNM_FLAG If this variable is set to “YES” two CNM (Customer Network Management)operators will be defined [see paragraph 6.3.3.4] in the system.

3.1.3.2 Oracle DB Variables

In the following the environment variables that have to be defined to allows the installation procedure toconfigure in the proper way the Oracle database are listed.

ORACLE_HOME This variable specifies the Oracle root directory.

DB_SIZE Meaningful for IM configuration only.It indicates the 1354RM Oracle database size. Possible values are small,medium (default) and large.

Page 30: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

24

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

3.1.3.3 HP–OV Variables

The following environment variables are used to configure properly HP–OV during the 1354RM installationprocedure.

AGENT_REGISTRATION Meaningful for IM configuration only.It specifies if the agent LRF file static registration must be performed during the1354RM installation phase. Its values can be ”yes” (perform the staticregistration – default) or ”no” (do not perform the static registration).

3.1.3.4 Operating System Variables

PRINTER This variable specifies the default system printer.

To enable the printer functionality in the RM help the Iview*printerConfig resource must be defined in$XAPPLRESDIR/$LANG/Iview file. This resources is a semicolon separated list of comma separatedtuples giving printer network names.

a ) Login as snml user and execute:$ vi $XAPPLRESDIR/$LANG/Iview and press [Enter]

b ) type /printerConfig: press [Enter]c ) insert a line (not commented) related to your printer (for example):

Iview*printerConfig: hplj75, LaserJet75;to configure more than one printer, divided the description lines with |;

d ) save and quit the file pressing [Esc] and typing :x! and [Enter].

TAPE_SERVER Meaningful for IM configuration only.This variable specifies the host to which the tape is connected. Its default valueis ”none” and it means no tape driver is installed and, when the backup isperformed, data are saved on disk only.If the tape server is local to the IM workstation, the host name of IM workstationhas to be indicated.If the tape server host is different from the IM one, on the tape server host the”snml” user must be defined and in its home directory a .rhosts file has to existwith an entry composed as the following:

<IM host name> snml

X_CONSOLE Meaningful for IM configuration only.This variable specifies the name of the workstation that will be used as consolein a plant where a server has been adopted.

Page 31: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

25

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

3.2 Installation of Patches

In the following you can find the procedure to install a 1354RM patch. A patch can be installed only if therelated delivery has been already installed.

a ) Shutdown the 1354RM system all user service manager instances (ovw, browser and mngAgent).

Since the 1354RM patch installation performs a reset of OVw–DB, no maps will be present atthe end of installation. It’s mandatory to save the maps to be kept using DNM application.

b ) Exit from normal user CDE space and log–in again as ”root” user in CDE login form.

c ) Change current directory to the SNML installation root and extract “install_patch” file from 1354RMpatch package.

# cd <your–snml–inst–root>

# gunzip –d –c <1354RM...your tar file g–zipped> | tar xf – ./etc/install_patch

d ) Execute the install patch script running the following commands:

# ./etc/install_patch <1354RM...full path name tar file g–zipped>

N.B. In case of more patches you must execute the install_patch script one time only at the end(after the gunzip of all patches).

The procedure stops the control/system/database (IM only) and starts the “install_patch” on anindependent window, during this operation the files that have been corrected and that have beenincluded in the patch package will overwrite the old ”bugged” ones.

e ) To activate all the CDE configuration changes it is recommended to exit from the current CDE session

and log in again to use 1354RM product.

3.2.1 RM DB resizing after installation patch

If you want to change the storage parameters of the Oracle database after the installation of a patch,please execute the following steps:

a ) execute a backup of the RM database and the AS database (only if you want to save the AS data)b ) execute the step of the chapter [8.1]c ) execute the following command

# mv /backup/snml/Ntwk/tablespaces.dat /tmp/tablespaces.dat

d ) execute the restore.

Page 32: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

26

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

3.3 Multi–IM Configuration

At the end of 1354RM installation in the file ”/usr/snml/conf/<hostname>/ntwDomains” is described thedefault Network Domain (with the Identifier specified in env_snml file) that will be used by RM userinterface. The information will have the following format:

• loc <n> on RM–IM workstation

• far <n> <hostname> on RM–US workstation

where <n> is the Network Domain Identifier and <hostname> is the name of the host where therelevant RM–IM is running.

N.B. In a ntwDomains file a ”loc” line can only exist.

In order to enable the RM User Interface to connect to different Network Domain the user shall insertmanually in the ntwDomains file a file with the ”far” format and execute the following commands:

# /usr/snml/etc/install_patch

and if AS is installed:

# /usr/snml/etc/us_config_A1330

The /etc/hosts file must contain the new added RM–IM workstation address and theAGENT_REGISTRATION environment variable, in /usr/snml/etc/env_snml file, must be set to ”yes”.

When the Multi–IM configuration is enabled, opening an empty map in NetView will present a dialog boxto the user in order to associate a Network Domain to the map (info taken into account when normaloperation are executed), on the other side opening the Browser application a Multi–RM icon is presentedas root object and, with the ”Main related item” operation, the user can view all the defined NetworkDomains.

To have got access to the whole network domain, in a multi–master network configuration (i.e. 3 IM WSsand 1 USM WS), it is necessary to do the following steps:

1 ) Add ”user1” on USM and IM_1 (assuming you are working on USM ws);2 ) Add the USM ws console on all IM WSs by ”Add console” function (working on each IM);3 ) Add the ”user1” on IM_2 and IM_3 by ”Add Operator” function (working on each IM).

Page 33: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

27

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

4 HP–OV DM CUSTOMIZATION

4.1 PMD Configuration

Meaningful for IM configuration only.

The adopted stack for the communication between RM–US and RM–IM processes (RM F interface) is theRFC 1006 (OTS light). With RM delivery is distributed a file pmd.lrf (in the directory ”/usr/snml/lrf/OV”)where HP–OV CI configuration parameters are set by 1354RM. These parameters specify the size ofstack’s or the time–out in seconds to wait for response to confirmed operations. This file is automaticallyregistered in place of the default pmd.lrf file by the customize and customize_patch procedures. If thesystem administrator wants to change these values, he has to execute the following procedure with rootuser privileges:

• stop the 1354RM system.• deregister old pmd registration file

# $OV_BIN/ovdelobj /usr/snml/lrf/OV/pmd.lrf• change values in /usr/snml/lrf/OV/pmd.lrf• register new pmd registration file

# $OV_BIN/ovaddobj /usr/snml/lrf/OV/pmd.lrf• stop and restart HP–OV to make actual the new PMD configuration values

# $OV_BIN/ovstop# $OV_BIN/ovstart

Values specified in pmd.lrf files are:

• –SACSE;O1200, –SCMIP;O1200;I5000;Q5000, –SXMPV7;O1200;I5000;Q5000

The previous options change for CMIP and XMPV7 stack:O : the time–out value (in seconds) for confirmed requests;Q : the unsent operations queue size;I : the ”active” confirmed operations queue size.

Page 34: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

28

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

4.2 Installation on Distributed Platform

4.2.1 Remote Event Sieve configuration

Meaningful for IM configuration only.

This configuration is based on a configuration file (”/usr/snml/conf/im_host_conf”), where host names ofworkstation are described giving also their product supported (EML, AS or RM). This file is automaticallyused by applications to create Remote Event Sieve in order to enable sending events only on workstationsreally involved in the event handling.The file is update in automatic way by the RM and AS installation procedures. When a new EML’sworkstation is installed the following procedure has to be executed to update the configuration file:

$ /usr/snml/etc/update_nml_sieve

N.B. WX host name must be removed manually from im_host_conf file, since no Event ForwardingDiscriminator shall be created on WX.

N.B. In order to allow the interworking between ”HP–UX 10.10 / HP–OV 4.2” workstations and”HP–UX 9.5 / HP–OV 4.01” ones, the user have to modify manually the ”im_host_conf” fileadding after the name of HP–UX 9.5 workstations the tag ”DM40” (please, note that asseparator between host–names and tag must be used one or more spaces, the <TAB>character is not managed).Please note that each time the user executes a customize, customize_patch, install_A1330 anddeinstall_A1330 procedures the ”im_host_conf” file is automatically rebuilt, so the DM40 tagsare lost.

4.3 Object Registration

Meaningful for IM configuration only.

In the directory $NXNL_PRD/lrf are present the local registration files, used by the installation procedureto register the objects managed by agent process. A ”lrf” file exists for each agent and has the same agentname with the ”.lrf” tag.

In directory /usr/snml/etc are present two procedures: addobj and delobj. These procedures have to beexecuted with root user privileges and register (addobj) and deregister (delobj) all the 1354RM localregistration files.

Page 35: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

29

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

5 IPC RESOURCES CONFIGURATION

Meaningful for IM configuration only.

Agent processes of 1354RM product use some IPC resources that are specified by the following symbolsdefined in $NXNL_PRD/.nxnlenv (in brackets default values are specified):

1 ) Queues : Five queues are used and their identification numbers are specified byTOPMNGQUE (62), TRSMNGQUE (63), ALRMGRQUE (64), PMCONSISTQUE (65) andQNNERQUE (90) symbols.

2 ) Semaphores : A semaphore is used and its identification number is specified by ALRMGRSEM(64) symbol.

Page 36: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

30

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Page 37: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

31

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

6 USERS MANAGEMENT

6.1 1354RM Operators Managing

In the 1354RM customized CDE environment, a 1354RM subpanel is defined in the CDE panel from whichis possible to start 1354RM application (see 6.2.2).To handle 1354RM operators data on US or IM node the system administrator must:

a ) select in 1354RM subpanel the SMF Button,b ) select the Operator Admin application, by means of this functionality the System Administrator can:

1 ) Add a new operator;2 ) Remove an operator;3 ) Change an operator password;4 ) NAD Management;5 ) List all the defined operator;6 ) List successful login;7 ) List unsuccessful login;8 ) List the currently logged in operator.

This procedure handle the users on all the workstation belonging to the 1354RM distributed architecture.

Page 38: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

32

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

6.2 User Profiles

Five user profiles are defined: OS Administrator, Administrator, Constructor, Path Builder & Look OnlyUsers. This profiles specify the operations that an operator can execute. In order to define the correct FADsfive environments have been defined specifying five versions for:

• HP–OVw Registration files.• CDE initialization files.• X Application Resources directory.• Browser Toolbar configuration files.• Unix user profile file (.profile).

6.2.1 HP–OVw Users Profile for NetView application

In the SNML delivery five HP–OVw user profiles are defined to support the NetView application.These profiles are defined by a set of registration files that are stored in the following directories:

/usr/snml/conf/users/OSadmin/OVwRegDir for OS administrator user

/usr/snml/conf/users/admin/OVwRegDir for Administrator user

/usr/snml/conf/users/Constructor/OVwRegDir for Constructor user

/usr/snml/conf/users/PathBuilder/OVwRegDir for Path Builder user

/usr/snml/conf/users/LookOnly/OVwRegDir for Look Only user

The registration files for OS administrator, administrator and constructor enable the user to perform allNetView operations (Network Construction, Save Map in DNM database, Create Virtual Entity, etc.).

The registration files for Path Builder enable the user to perform a limited subset of the NetView operations,that is to synchronize map with existing data, to get distributed map from DNM database, starting eventlogger or browser application.

The Look Only user registration files enable the user to perform get operations only.

In order to support NAD functionality in NetView application some constraints to its synchronizationprocess should be defined. The constraints are specified by means of a synchronization level that is givenas an input parameter to the NetView application. It is specified in the file nxnlOus of the relevant user inthe command line (by default all the profiles have no constraints defined):

Command –Initial –Restart –Shared ”$NXNL_PRD/bin/nxnlOus –syncroLevel 0”

The system administrator can specify, if it is necessary, the synchronization level for a whole users profilemodifying the syncroLevel option value in the command line.

The synchronization levels that can be specified are:• 0 : no restrictions applied;• 1 : constraints applied to network level; (not meaningful for the current delivery)• 2 : constraints applied to subnetwork level;• 3 : constraints applied to elementary topology level only; (nodes inside sbn are showed)• 4 : constraints applied to node level; (nodes contained in ET and sbn)

The NetView synchronization process will align the characteristics of all the object already present in themap and it will add in the map new discovered topological object contained in the constraints levelpreviously specified.

Page 39: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

33

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

6.2.2 CDE Customization

Five CDE customization files are defined:

/usr/snml/conf/users/OSadmin/dt/C/dtwmrc for OS administrator user

/usr/snml/conf/users/admin/dt/C/dtwmrc for administrator user

/usr/snml/conf/users/Constructor/dt/C/dtwmrc for Constructor user

/usr/snml/conf/users/PathBuilder/dt/C/dtwmrc for Path Builder user

/usr/snml/conf/users/LookOnly/dt/C/dtwmrc for Look Only user

From the vertical subpanel these users can start the TMN–OSs, System Management Features, AlarmList, Browser and NetView (ovw) applications. It is also available a customized pop–up menu (associatedto the right mouse button) that contains functions to start the same applications.

From the horizontal panel the OS administrator & administrator can get the UNIX access, open a FileManager, start the Mailer and functions to print terminal hardcopy.

From the horizontal panel the Constructor & Look Only users can start the Mailer and functions to printterminal hardcopy.

From the horizontal panel the Path Builder user can open a File Manager, start the Mailer and functionsto print terminal hardcopy.

The print terminal hardcopy functions use the standard PRINTER variable (that can be defined for all usersin .nxnlenv file) to determine the printer device to use, that must be able to print ASCII text and Hardcopypostscript.

6.2.3 Unix Shell Profile (.profile)

Meaningful for IM configuration only

Five ’.profile’ template files are defined in the 1354RM installation that are used by the ”OperatorAdmin”procedure to customize the ’.profile’ for 1354RM users. These files are:

/usr/snml/conf/users/OSadmin/profile for OS administrators user

/usr/snml/conf/users/admin/profile for Administrators user

/usr/snml/conf/users/Constructor/profile for Constructor user

/usr/snml/conf/users/PathBuilder/profile for Path Builder user

/usr/snml/conf/users/LookOnly/profile for Look Only user

Page 40: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

34

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

6.3 Network Access Domain Management

The combination between a UNIX user and the workstation on which he is logged–in is identified in RMby the initiators concept (see also X.741).

RM allows to define and modify the rights of each initiator to execute the functionality foreseen by his UserProfile (see 6.2) on group of network objects like group of paths, NAP’s etc.

This definition implies that a UNIX operator can have different rights depending on theworkstation used.

A command allowed by the User Profile can be denied by the Access Rules either completely oronly on specific objects. The User’s FAD is identified by the combination of the User’s Profile(see 6.2) and the access rule associated to his initiator (see 6.3.3.1).

The Access Rules are taken into account only by the Network Managemnent functions. SMFsdepends only by User’s Profile.

UNIX USER List of WS

RM INITIATOR

The Access Rules used to check the rigth of a given Initiator on Network Resources (e.g. paths, NAP’s,topologies...) are based on an attribute related to each single resource.

This attribute is called NAD. NAD may assume only single values (not set of values !).

The currently defined Access Rules allow to define initiators beloging to the following categories :

• administrators able to work on all the resources independently from their NAD

Page 41: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

35

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

• non VPN initiators able to see all the resources and to operate only on resources not relatedto VPN operators. In this category is possible to define Network Constructor and / or PathBuilder Initiators.

• VPN initiators able to operate on and to visualize only assigned resources (with possibleexceptions on free resources – see 6.3.3.1). These initiators can normaly perform only pathconfiguration operations.

• Look only initiators able only to see Network Resources and not to operate on them

6.3.1 Adding an RM Operator

A new operator can be added using SMF applications. The following functions of the OperatorAdministration facility shall be used: <Add Operator> & <Network Access Domain>.

Using the Add Operator function it is possible to define a new UNIX user on a specific workstation. In theAdd operator function is mandatory to select the User Profile (i.e. the set of Menus displayed for that useron the User Interface) and the related Initiator (see 6.3.5).

For example a Unix user related to the Path Builder user profile can be mapped with the default Non VPNInitiator.

If two UNIX users are mapped to the same Initiator they will share the same NetworkResources and capabilities.

If the created user shall be related to a not existing Initiator, it is mandatory to edit, manually a file (see6.3.2).

Once the initiator is created (if necessary), it has to be mapped to the user by means of the NetworkAccess Domain SMF function. The list of users is presented with their currently defined Initiators.Selecting the user it is possible to change its initiator using the pop–up menu. In the pop–up menuall the defined initators are listed.

The Access Rules are described in paragraph 6.3.3.1 & 6.3.3.2.

Page 42: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

36

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

6.3.2 Defining a new RM Initiator

The initiator information are defined in the file:/usr/snml/ac_info/initiators.ac.<n> where <n> is the network domain of the current RM.

Each Initiator is identified by a line in the initiator file.

An Initiator is specified by :

– an integer identifier (it must be unique in the file);

The Initiator Identifier must be given according to the following rules:

– Non VPN Initiators must have Identifier less than 300

– VPN Initiators must have Identifier greater than 300

– The identifier 0 (zero) is reserved (it is used to identify free resources).

– The Identifier 301 is reserved for 1354NN (when present)

– a Name (it must be unique in the file);

The Initiator Name is added to the possible values of the NAD attribute. The NAD attributeis used to “mark” Network Resources (using the change NAD command) and to evaluateAccess Rules.

– a comma separated list of access rules. These rules can be:• embedded rules;• customer rules (they are a redefinition of the embedded rules in terms of scheduling).

An example of the file follows:

#RM initiator : InitiatorName : Rules 50 : Path Administrator : AC_R_PADMIN 55 : PathWatcher : AC_R_PATHRO

In the example, the Initiator 50 is called ”Path Administrator” and is mapped to the rule AC_R_PADMIN.This access rule allows all the operations on paths (see 6.3.3.1).

In the Rules field more than one rule can be specified.

The rules are evaluated sequentially and in case of duplication or inconsistency only the first istaken into account.

Page 43: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

37

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

6.3.3 Access Rules description

List of Rules

RM INITIATOR

Customer Rules

Embedded Rules

– Id– Name

6.3.3.1 Embedded Access Rules

The rules define the access of an initiator to the network resources.

The possible Access Rules belong to a predefined set. The mapping of Initiator and rules is not completelyfree but some logical limitations exist.

The available rules are (more datails are present in 6.3.3.3) :

– AC_R_SNML: RM Administrator.

It’s able to perform all the operations without any limit.

It must be assigned very carefully because an Initiator with this capability can modifyoperations performed by 1354NN.

It is not usefull to compose this rule with any other one.

N.B. This rule is mapped by default on the RM Administrator “snml”. It ismandatory do not change the snml initiator.

– AC_R_PADMIN: Path Administrator.

It can manage paths and releated resources (NAPs and LCs) not explicitely assigned toVPN domains.This rule can be composed with AC_R_TOPMAN and/or AC_R_PAYMAN in order toachieve the needed level of functionality.

the AC_R_PADMIN rule cannot be used for VPN Initiator.

Page 44: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

38

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

– AC_R_PATHALL: Path Allocator.

It can allocate/deallocate paths and manage the resources (NAPs and LCs) not explicitelyassigned to VPN domains.This rule can be composed with AC_R_TOPMAN and/or AC_R_PAYMAN in order toachieve the needed level of functionality.

the AC_R_PATHALL rule cannot be used for VPN Initiator.

– AC_R_PATHRO: Path Watcher.

It can only get paths and NAPs.

the AC_R_PATHRO rule cannot be used for VPN Initiator.

– AC_R_TOPMAN: Topology Manager.

It can operate on topologies in order to modify the network.This rule can be composed with AC_R_PADMIN and/or AC_R_PAYMAN in order toachieve the needed level of functionality.

the AC_R_TOPMAN rule cannot be used for VPN Initiator.

– AC_R_PAYMAN: Payload Manager.

It can operate on payload configuration.This rule can be composed with AC_R_PADMIN and/or AC_R_TOPMAN in order toachieve the needed level of functionality.

the AC_R_PAYMAN rule cannot be used for VPN Initiator.

– RVPN: Restricted Virtual Private Network Operator.

It’s able to create, view, modify paths only using resources (NAPs & LCs) assigned to hisNAD.

It can be assigned only to VPN Initiator.

– VPN: Virtual Private Network Operator.

As RVPN except that the routing can be done also on free LCs (Security Label=0).

This Rule is used also for 1354NN activities.

It can be used only for VPN Initiators

– EVPN: Enhanced Virtual Private Network Operator.

As VPN except that also free NAPs can be used for path setup.

It can be used only for VPN Initiators

No check is performed to avoid the assignment of a VPN rule to non VPN Initiators andviceversa.

– AC_R_NN: NN Operator.

As VPN except that you can assign free objects too (path,trail,lc and NAP).

Page 45: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

39

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

6.3.3.2 Customer Access Rules

A customer Rule is a redefinition of an embedded access rule only in terms of Daily and WeeklyScheduling.

The customized rules must be defined editing the /usr/snml/ac_info/scheduling.ac.<n> file (where <n>is the Network Domain Id of the current RM): for each new rule a new line shall be added that containsthe corrispondent embedded rule and the time scheduling.

The information included in the file is :

– Name of the Customer Rule

– Daily Scheduling: it’s the validity start & end time of the Rule. Starting and Ending Time has theformat hh.mm–hh.mm (hh = hour, mm = minute) and shall be expressed in UTC (Greenwich Time).An empty value enables the rule in the whole day.

– Weekly Scheduling: it contains the days of the week for which the daily scheduling applies. Possiblevalues are in the range from 0 (Sunday) to 6 (Saturday). An empty value enables the rule in all thedays.

– Embedded Rule: it is the name of the embedded rule referred in term of functionalities

An example of the file follows:

#Customer Rule : Daily Scheduling : Weekly Scheduling : Embedded RuleAC_R_NEWPADMIN : 08.00–19.00 : 1 , 2 , 3, 4 , 5 : AC_R_PADMIN

Customer rules can be inserted in the Initiator definition file (see 6.3.2).

6.3.3.3 Default mapping between Access Rules and Object Class

Legend for ownership :

– O : Owned objects (Security label equal Initiator Id)

– OF : Owned or free objects (Security Label equal Initiator Id or 0 )

– N : Not VPN objects (Security label <=300)

– A : All objects

– Gray : Disabled by default rules

Page 46: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

40

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Table 4. Access Rules Description

C Operation RULE NotesLASS

RVPN

VPN

EVPN

PTH–ADM

PTH–ALL

PTH–R/O

TOP

PAYLOAD

SNML

NN–OP

P allocate, deallocate, O O O N N A OATH

implement, deimple-ment, commission,decommission, add/remove protection.....

O O O N A O

get O O O A A A A O

Add / remove leg O O O N A O For the add leg, the checkis performed also on theNAP (see Use in Path)

Create A A A A A A A The initiator ID is taken asNAD of the created object.In the redolog, the pathcreation is followed by achange of NAD in order tobe able to replicate the fi-nal result in term of NAD.The check to allow or not apath creation is made onthe path and on the speci-fied NAPs; the path iscreated if the NAPs can berelated to the path (seeNAP class)

Change Owner O O O N N A OF

It is the action to changethe NAD. The operation isregistered in the redolog

Delete O O O N N A O The check is done on thepath and NOT on the usedNAPs (unset of the pathPtrattribute)

Page 47: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

41

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Table 4. Access Rules Description

NA

remove nap O O OF

A O

Pget O O O

FA A A A O

change owner O O O N N A OF

The operation is register

Use in path (create apath or add leg)

O O OF

N N A O The command is not pres-ent at the user interfacebut is embedded in createpath and add leg. It is de-fined as set on pathPtr at-tribute

LC

Change owner O O O N N A OF

The command is regis-tered in the redolog.As a consequence of thisoperation the LC is alsomoved from the originalRouting Link bundle to theappropriate one. A newrouting links is created ifneeded.

Use in path O OF

OF

N N A OF

The command is not pres-ent at the user interfacebut is embedded in path ortrail allocation. It is definedas set on the belongTrailIdattribute.

The allocation algorithmduring the search onlyuses the Routing Linksmatching the condition forLC’s

Delete N N A The command is not pres-ent at the user interfacebut is embedded in thepayload configuration ofphysical connections andHO–Trails.

get A A A A A A A A A

Configure Payload A A Only for HO–Trails

Page 48: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

42

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Table 4. Access Rules Description

TR

Change owner O O O N N A OF

The command is regis-tered in the redolog

AI Configure Payload A AIL Create A A It is the creation of the HO–

Trail

Remove A A It is the action to removethe HO–Trail; as a conse-quence a payload de–con-fig. is started.

TRA

Set Qnn Info A A A A

AIL

Get A A A A A A A A A

TOPO

Create A A It is the operation to acti-vate topologies, Nodes,physical Connection (ac-tion)

L./P

Implement A A It includes the configura-tion at HOP

H De–implement A ACO Upload NAPs A A A ANN Remove A A

Start Network Activ. A A

Configure Payload A A

Get A A A A A A A A A A

MS–SP

Operate on protectionblocks

A A Operation are : modify theWTR, force, manu-al,...synchronize

RING

Get A A A A A A A A A A

Page 49: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

43

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Table 4. Access Rules Description

CTP/

Change defaults forUPA propagation

A A

/TTP

Get A A A A A A A A A A

PDH

Configurate PDH port A A It is the action to modify theconfiguration of a trans-mux board

–PORT

Loop Back A A A A It is the action to loopbacka PDH port for testing. Theaction can also be startedon a NAP but only as anextension at US level.

Get A A A A A A A A A A

EML

Configuration Down-load

A A It is the action to enable /disable the configuationdownload from RM to NEs.The check is performedalso for operation startedon single NEs

Start Audit A A It is the action to start Au-diting differences betweenNE and EML view. Thecheck is performed also onoperations started onsingle NEs.

Get A A A A A A A A A A

OTH

Get A A A A A A A A A A Eventually restricted byFAD at the user Interface

HERS

Operations A Restricted by FAD imple-mented at the user inter-face

RVPN

VPN

EVPN

PTH–ADM

PTH–ALL

PTH–R/O

TOP

PAYLOAD

SNML

NN–OP

Page 50: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

44

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

6.3.3.4 Embedded Rules for PM

New rules have been added to manage Performance Monitoring activities. They are described in thefollowing paragraphs.

– AC_R_PMSNML: Performance Monitoring SNML

PMSNML is the rule allowing full capability of managing PM domain objects. This rule allows to operateon all the PM Domain data regardless from the ownership (NAD) of PM data, paths and trails

– AC_R_PMVPN: Performance Monitoring Virtual Private Operator

PMVPN is, in the PM domain, the equivalent of the VPN rule in the path management domain. This ruleallows to operate / visualize PM data, put under monitoring path or trail only related to a given NAD.

N.B. If an operator is the owner of a measure then he is the owner of the pmTp and the pmTransportof the measure.

– AC_R_PMADMIN: Performance Monitoring Administrator

PMADMIN is, in the PM domain, the equivalent of the PADMIN rule in the path domain. This rule allowsto fully operate on PM domain related to “non VPN” measures, PM transport etc. and visualize allthe PM data even if belonging to VPN domains.

Non VPN domain is the set of all RM objects with nad<300.

– AC_R_PM–RO: Performance Monitoring Read Only

PMREAD is the read only rule on PM domain. This rule allows to visualize all the PM relatedinformation regardless to the ownership.

– AC_R_PMVPN–RO: Performance Monitoring Read Only VPN

PMREAD is the read only rule on a given NAD. This rule allows to visualize the PM related informationrelated to a given NAD.

6.3.3.5 Default mapping between Access Rules for PM and Object Class

Legend for ownership :

– O : Owned objects (Security label equal Initiator Id)

– OF : Owned or free objects (Security Label equal Initiator Id or 0 )

– N : Not VPN objects (Security label <=300)

– A : All objects

– Gray :Disabled by default rules

Page 51: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

45

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Table 5. NAD / FAD

C Operation RULE NotesLASS

PMVPN–RO

PMVPN

PMADMIN

PM–RO

PMSNML

ME

Create A A A This is the first step to start a mea-sure session.

AS Delete O N ASU Set O N ARE Get O O A A A

Activate, Stop and Consis-tency

O N A

Correlate Transport to Mea-sure

O N A This action correlates a Measure toa Path or Trail.The check is performed on thePath/Trail too.

Correlate Tp to Measure O N A The check is performed on the Tp(nap, cap, ctp) too.

Correlate Report to Measure O N A The check is performed on the re-port (Counter Report or TCR) too.

CO

Create A A A

UNT

Delete O N A

ER

Set O N A

RE

Get O O A A A

PORT

Correlate Report to Measure O N See the note about this action in theMeasure class context.

Page 52: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

46

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Table 5. NAD / FAD

T Create A A ACA Delete O N A

Pr

Set O N A

of

Get O O A A A

ile

Correlate pmTp To TCA O N A The check is performed on thepmTp too.

T Create A A ACR Delete O N AR

Set O N A

Get O O A A A

Correlate Report to Measure O N A See the note about this action in theMeasure class context.

PM T

Create A A A This command is not present at theuser interface. It is a consequenceof the Correlation of a Path/Trail toa Measure.

RA Delete O N ANS Get O O A A A

PM T

Create O N A This command is not present at theuser interface. It is a consequenceof the Correlation of a Tp to a Mea-sure

PDelete O N A

Get O O A A A

Correlate pmTp To TCA O N A See the note about this action in theTCA class context.

PATH

Correlate Transport to Mea-sure

O N A

NAP

Correlate Tp to Measure O N A

Page 53: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

47

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Table 5. NAD / FAD

TRAIL

Correlate Transport to Mea-sure

O N A

CTP/TTP

Correlate Tp to Measure OF N A

Page 54: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

48

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

6.3.4 Delivered set of Initiators

A set of Initiators is provided with 1354RM delivery. They represent the most typical operator profiles forthe network management.

Initiator Name Rules Description

Free Pool No Rules Used to define composite rules.Not mapped to any user.

RM Administrator SNML All operations allowed.

Advanced Operator PAYLOADPTH–ADM

Network Constructor TOPPTH–ADMPAYLOAD

Path Watcher PTH–R/O User profile for read–only op-erations on path trail.

Path Administrator PTH–ADM Operator for working on path.

Path Allocator PTH–ALL Path create and allocate/deallo-cate allowed.

1354 NN VPN Qnn Agent.

R–VPN Operator RVPN It is the restricted Virtual PrivateOperator.

VPN Operator VPN It is the Virtual Private Operator.

E–VPN Operators EVPN It is the enhanced Virtual Pri-vate Operator.

Payload Manager PAYLOAD

cnm_pathbuilder VPN

PMVPN

cnm_lookonly PMVPN–R/O

6.3.5 Default mapping between User Profiles and Initiators

User Profile related to an operator has impacts on User Interface by hiding or showing some action menus(see 6.2).

The correspondence between User Profiles and Default Initiators is described in the following table.

User Interface Profile Default Initiators

OS Administrator RM Administrator

Administrator Network Constructor + System Features

Constructor Network Constructor

Path builder Path Administrator or E–VPN or VPN or R–VPN

Path allocator Path Allocator

Look Only Path watcher on whole RM

cnm_pb cnm_pathbuilder

cnm_lo cnm_lookonly

Page 55: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

49

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

7 PROCESS MONITOR & CONTROL

7.1 Maintenance Commands

Meaningful for IM configuration only

1354RM Agents and Oracle database can be handled using mngAgent utility. It can be used in a graphicor not graphic mode. Not graphic mode is useful if you want to use it in a shell command (e.g. systemstartup file).

Graphic Mode: Run by snml user the following commands:$ DISPLAY=<your_node_name>:0.0$ export DISPLAY$ mngAgent

Start Oracle database before starting 1354RM system.

Not Graphic Mode: Run by snml user the following commands:

a ) Start or stop database instance:$ mngAgent [ startup | shutdown ] databaseThe 1354RM system must be stopped in order to shutdown database instance.

b ) Start or stop 1354RM system:$ mngAgent [ startup | shutdown ] systemThe 1354RM system can be started only if database instance is already active.

N.B. The startup operation starts only the agents belonging to the currently set run level.

c ) Start or stop any 1354RM agent:$ mngAgent [ startup | shutdown ] <agent_name>Agents can be started only if database instance is already active and if the agent itself belong to thecurrent run–level.

d ) Enable or disable 1354RM control function:$ mngAgent [ startup | shutdown ] control

e ) Check 1354RM system status:$ mngAgent checkThe command set the Unix system variable ’?’ with the status code of 1354RM system (0 = Run,1 = Wrong, 2 = Off)

f ) Set the current run level:$ mngAgent set_run_lev <run_level_number>The command change the current run level to the one specified, stopping running processes notbelonging to the selected run level and starting stopped processes belonging to the selected runlevel.

g ) Get the current run level:$ mngAgent get_run_levThe command set the Unix system variable ’?’ with the currently set run level.

Page 56: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

50

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

7.2 Integration of IM Agent in 1354RM PMC

Meaningful for IM configuration only

Other Alcatel network applications can enable 1354RM PMC to start and to control their own Agents. Todo this a file named mng_agent_conf must be placed on the installation home directories of the involvedapplications in which they have to specify the characteristics of their agents. In particular in this file mustbe specified the agent parameters, if the process has ”child processes” (and if it has, their names), whereis placed the Agent trace file, etc..When a mng_agent_conf is modified or a new one is delivered, in order to notify to PMC the modificationsthe script procedure:

# /usr/snml/etc/update_network

have to be executed (as ’root’ user) to regenerate the PMC configuration file (see also 9.1).For each process the following parameters have to be defined:

• agent_name : name of controlled agent• agent_type : it specifies the agent handling type. It can be set either as ”general” (for process

managed as normal Unix processes ) or ”hpov” (for process managed by means of ovstart andovstop HP–OV function).

• agent_image : (this entry is meaningful only for agent with agent_type = ”general”)absolute path name of the executable agent image. It is also possible to indicate script file thatstarts executable image inside if it uses ”exec” Unix command.

• agent_params : (this entry is meaningful only for agent with agent_type = ”general”)agent parameters used by executable image, or script, in the startup phase. In the parametersdescription spaces are replaced by commas.

• agent_child (n lines) : child processes name, number of its instances that are controlled by PMCand max memory size for each instance (this has the same meaning of the agent_max_size)parameter. A new line exists for each agent child processes.

• agent_start_wait : (this entry is meaningful only for agent with agent_type = ”general”)time–out (number of seconds) to wait before PMC can check the correct agent initialization afterits startup.

• agent_shut_wait : (this entry is meaningful only for agent with agent_type = ”general”)time–out (number of seconds) to wait before PMC can check the correct agent termination afterits shutdown.

• agent_mon_interval : number of seconds between two consecutive polling operation on theagent.

• agent_max_size : maximum memory size (in Kb) that can be reached by the agent. If this valueis reached and the monitor function is enabled an automatic agent shutdown and restart isexecuted, if it is reached but the monitor function is disabled, the agent is displayed with theWRONG status.

• agent_trace_location : directory or file containing the trace information associated to theprocess.

• agent_trace_default : it specifies the default trace file to be visualized, between the onesdisplayed to the operator. Typically this multiple trace files selection is between agent trace fileand its child processes trace files.

• agent_run_level : it specifies all run levels to which controlled agent belongs to.• agent_ps_info : name of controlled agent to use searching it into a ”ps –ef” list. This option has

to be specified only if this name is different from the one indicated• agent_actions_name : Ordering number and actions name for controlled Agent.• agent_actions_command : Ordering number and command for controlled Agent. In the

command description spaces must be replaced by commas.

Page 57: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

51

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

N.B. The relation between Action and command to be executed is done by means of the orderingnumber.Inside Action command scripts the following environment variables can be used:

• $AGENT_PID to indicate the actual agent process PID;• $AGENT_NAME to specify the agent name.• $AGENT_CHILD_PIDS to specify the complete PID list of the agent children.

Page 58: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

52

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Page 59: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

53

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

8 DATABASE MANAGEMENT

8.1 Database Creation

Meaningful for IM configuration only

In order to create a new database the following procedure shall be executed:

$ $DB_ROOT/etc/create_db

After the database re–creation you can perform a restore of network configuration, alarms and PM datafrom a backup (if any).

Page 60: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

54

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

8.2 Database disk usage

It is advisable to run periodically the script db_report, to check the use of disk space made by Oracle.

The script must be run as snml administrator by running from a shell the command:

$ db_report

The script sends a mail containing the report to the snml administrator. The same report is also saved infile /tmp/mailfile.out. Here follows an excerpt of such a report:

From snml Wed Apr 1 10:23:41 MET 1998

To: snml

FILESYSTEM PARTITIONING on tlvhfs

==============================================

Filesystem kbytes used avail %used Mounted on

/dev/dsk/c0t6d0 1851289 935444 730716 56% /

/dev/dsk/c0t5d0 2049173 1451593 392662 79% /tmp_mnt/dktmn_21

MEMORY STATUS OF ORACLE INSTANCE dbsnml started from tlvhfs

==============================================

FREE EXTENTS IN ALL TABLESPACES

LEGENDA

bytes: size of the file in bytes

used: size of the allocated extents in bytes

free: size of the free extents in bytes

file_name tablespace_name bytes used free %free

–––––––––––––––– ––––––––––––––– –––––––––– –––––––––– –––––––––– ––––––––––

data01.dbf DATA 73400320 49414144 23986176 32.6785714

index01.dbf INDEX_T 41943040 5183488 36759552 87.6416016

index02.dbf INDEX_T 41943040 1114112 40828928 97.34375

rbs01.dbf RBS 8388608 7948288 440320 5.24902344

system01.dbf SYSTEM 15728640 8220672 7507968 47.734375

temp01.dbf TEMP 10485760 2048 10483712 99.9804688

STORAGE ALLOCATED FOR ALL TABLE SEGMENTS

LEGENDA

size: allocated extents in bytes

owner table_segment size extents

–––––––––– ––––––––––––––––––––––––– –––––––––– ––––––––––

SNML AG 532480 1

SNML CAP 266240 1

...

SNML TRANS 1054720 1

Page 61: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

55

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ALLOCATED EXTENTS TO ALL TABLES

tables_tot_size (bytes)

–––––––––––––––––––––––

27447296

STORAGE ALLOCATED FOR INDEX SEGMENTS STORED WITH DATA

LEGENDA

size: allocated extents in bytes

owner index_segment size extents

–––––––––– ––––––––––––––––––––––––– –––––––––– ––––––––––

SNML COUNT_INDEX 15308800 1

SNML PMLDST_INDEX 266240 1

...

SNML UNIQUE_TRAIL_USERLABEL 266240 1

ALLOCATED EXTENTS TO INDEXES STORED WITH DATA

indexes_total_1 (bytes)

–––––––––––––––––––––––

21964800

STORAGE ALLOCATED FOR INDEX SEGMENTS STORED SEPARATELY

LEGENDA

size: allocated extents in bytes

owner index_segment size extents

–––––––––– ––––––––––––––––––––––––– –––––––––– ––––––––––

SNML CAP_IDX1_INDEX 1054720 1

SNML CTP_IDX2_INDEX 1054720 1

...

SNML PK_TRANPK_TRANCONNID 51200 1

ALLOCATED EXTENTS TO INDEXES STORED SEPARATELY

indexes_total_2 (bytes)

–––––––––––––––––––––––

6293504

STATISTICS FOR SCHEMA OBJECTS/1

LEGENDA

num_rows: number of rows in the table

avg_row_len: average length of a row in bytes

blocks: blocks with data allocated to the table

empty_blocks: blocks allocated that contain no data

avg_space: average free space (bytes) in an allocated block

(block size = 2048K)

table num_rows avg_row_len blocks empty_blocks avg_space

––––––––––––––– –––––––––– ––––––––––– –––––––––– –––––––––––– ––––––––––

AG 0 0 0 259 0

CAP 52 56 2 127 442

...

TRANS 843 14 10 504 632

Page 62: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

56

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

STATISTICS FOR SCHEMA OBJECTS/2

LEGENDA

index: name of the index

values: number of leaf rows (possibly not distinct)

size: sum of the lengths of the all leaf rows (bytes)

values–: number of deleted leaf rows

size–: sum of the lenghts of deleted leaf rows (bytes)

blocks: number of allocated blocks

(block size = 2048K)

index values size values– size– blocks

––––––––––––––––––––––––– –––––––––– –––––––––– –––––––––– –––––––––– ––––––––––

CAP_IDX1_INDEX 52 1271 0 0 515

COUNT_INDEX 366968 7115386 0 0 7475

...

UNIQUE_TRAIL_USERLABEL 205 5571 0 0 130

It is also advisable to run periodically the script db_memory, to check the use of RAM memory made byOracle.

The script must be run as snml administrator by running from a shell the command:

$ db_memory

The script sends a mail containing the report to the snml administrator. The same report is also saved infile /tmp/db_memory.out. Here follows an excerpt of such a report:

From snmlr50 Fri Nov 6 14:50:40 MET 1998

To: snml

Analysis of database memory bound to Oracle instance dbhhk started from tlvhhk

1 SYSTEM GLOBAL AREA

Total System Global Area 12785888 bytes

Fixed Size 47936 bytes

Variable Size 10157472 bytes

Database Buffers 2252800 bytes

Redo Buffers 327680 bytes

1.1 SHARED POOL AREA

1.1.1 LIBRARY CACHE (SHARED SQL + PL/SQL AREAS)

LEGENDA

Shared SQL area: shared pool memory in use by SQL statements

Executions: number of SQL statements accessed for execution

Cache misses: library cache misses while executing

%Reparses: percent of statement reparses over executions

Note: %Reparses should be less than 1% for optimum performance

1960385 Shared SQL area (bytes)

Executions Cache misses %Reparses

–––––––––– –––––––––––– ––––––––––

698191 7678 1.09968648

Page 63: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

57

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

1.1.2 DICTIONARY CACHE ACTIVITY

LEGENDA

dictionary cache: size in bytes of the dictionary cache

Dictionary Gets: number of requests for information

Dictionary Get Misses: requests resulting in cache misses

%Get misses: percent of misses over requests

Note: %Get misses should be less than 10–15% for optimum performance

dictionary cache 352576 bytes

Dictionary Gets Dictionary Get Misses %Get misses

––––––––––––––– ––––––––––––––––––––– –––––––––––

3099531 51926 1.67527004

1.2 BUFFER CACHE AREA

LEGENDA

db block gets + consistent gets: total number of requests for data

physical reads: requests of data resulting in access to data files on disk

Hit ratio: percent of data found in buffer over data requests

Note: Hit ratio should be greater than 60–70% for optimum performance

db block gets 273088

consistent gets 3116137

physical reads 227425

93.28% Hit ratio

1.3 REDO LOG AREA

LEGENDA

Latch: token a user process must obtain to allocate data into a redo log buffer

WTW Gets: willing–to–wait requests successful the first time

WTW Misses: willing–to–wait requests unsuccessful the first time

IMM Gets: successful immediate requests for a latch

IMM Misses: unsuccessful immediate requests for a latch

Note: the ratios Misses/Gets (WTW or IMM) should not exceed 1%

Latch WTW Gets WTW Misses IMM Gets IMM Misses

–––––––––––––––––––– –––––––––– –––––––––– –––––––––– ––––––––––

redo allocation 535426 11 0 0

redo copy 0 0 0 0

0% WTW ratio for redo allocation latch

0% WTW ratio for redo copy latch

0% IMM ratio for redo allocation latch

0% IMM ratio for redo copy latch

Page 64: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

58

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

2 USER AND SYSTEM SESSIONS

SESSIONS CURRENTLY OPEN

user schema osuser PID machine program

–––––––– –––––––– –––––––– –––––––– –––––––– ––––––––––––––––––––––––––––––

SYS oracle72 9418 tlvhhk oracle@tlvhhk (PMON)

SYS oracle72 9419 tlvhhk oracle@tlvhhk (DBWR)

SYS oracle72 9420 tlvhhk oracle@tlvhhk (LGWR)

SYS oracle72 9421 tlvhhk oracle@tlvhhk (SMON)

SYS oracle72 9422 tlvhhk oracle@tlvhhk (RECO)

SNML5 SNML5 snmlr50 6292 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6974 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 7201 tlvhiu ? @tlvhiu (TNS interface)

SNML5 SNML5 snmlr50 6440 tlvhhk ? @tlvhhk (TNS interface)

SYSTEM SYSTEM snmlr50 7526 tlvhhk sqlplus@tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6928 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6449 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6282 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6443 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6446 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6397 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6439 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6441 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6243 tlvhhk sqlplus@tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6605 tlvhhk ? @tlvhhk (TNS interface)

SNML5 SNML5 snmlr50 6613 tlvhhk ? @tlvhhk (TNS interface)

2.1 PROGRAM GLOBAL AREA

(stacks for servers and background processes)

Tot stacks for all sessions

––––––––––––––––––––––––––––––––––––––––––––––

2589040 bytes

Max stacks for all sessions

––––––––––––––––––––––––––––––––––––––––––––––

2589040 bytes

2.2 USER SESSIONS AREA INTO SGA

LEGENDA

Total user memory: memory currently allocated to all user sessions

Max user mem: max memory allocated (not at the same time!) to all sessions

Total user memory

––––––––––––––––––––––––––––––––––––––––––––––

351284 bytes

Max user memory

––––––––––––––––––––––––––––––––––––––––––––––

696004 bytes

Page 65: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

59

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

3 CONTENTION FOR RESOURCES

ROLLBACK SEGMENTS

Note: hits should be more than 95%

NAME GETS WAITS hits

–––––––––––––––––––––––––––––– –––––––––– –––––––––– ––––––––––

SYSTEM 4101 0 100

LARGE_RBS 7832 0 100

R01 7824 0 100

R02 7932 0 100

R03 7794 0 100

R04 7780 0 100

The administrator must check that for each tablespace there is at least a data file with over than 30% freespace. If not so, the administrator must consider for that tablespace the database extension proceduredescribed in the next paraghraph.

The administrator must also check that for each table or index segment, the associated number of extentsdoesn’t exceed 10 otherwise he must consider the full backup and restore procedure described inparagraph [8.4].

Page 66: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

60

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

8.3 Database extension

Oracle uses pre–allocated and not extendible tablespaces, so it could happen some RM functions failsand in trace files could be found messages as the following:

Message: ORA–01653: unable to extend table SNML. TP by 512 in tablespace DATA

N.B. TP is the name of table where the error arises, messages with different table namecan be found.

To solve this problem the tablespace must be extended using the following procedure (it’s no necessaryto shutdown RM system and databases):

$ export ORACLE_SID=dbsnml

$ $ORACLE_HOME/bin/sqlplus system/manager

SQL> select * from dba_data_files;

FILE_NAME ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– FILE_ID TABLESPACE_NAME BYTES BLOCKS STATUS –––––––––– –––––––––––––––––––––––––––––– –––––––––– –––––––––– ––––––––– /usr/snml/databases/dbsnml/data/system01.dbf 1 SYSTEM 15728640 7680 AVAILABLE /usr/snml/databases/dbsnml/data/rbs01.dbf 2 RBS 15728640 7680 AVAILABLE /usr/snml/databases/dbsnml/data/temp01.dbf 3 TEMP 10485760 5120 AVAILABLE

FILE_NAME ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– FILE_ID TABLESPACE_NAME BYTES BLOCKS STATUS –––––––––– –––––––––––––––––––––––––––––– –––––––––– –––––––––– ––––––––– /usr/snml/databases/dbsnml/data/data01.dbf 4 DATA 31457280 15360 AVAILABLE /usr/snml/databases/dbsnml/data/index01.dbf 5 INDEX_T 10485760 5120 AVAILABLE

SQL> alter tablespace data add datafile ’/usr/snml/databases/dbsnml/data/data02.dbf’ size 30 M;

SQL> quit;

Finally it is necessary to enable the write right for the group of the new file (the command shall be executeas root Unix user):

# chmod g+w /usr/snml/databases/dbsnml/data/data02.dbf

N.B. In the previous sqlplus session a new datafile for the tablespace data is created(/usr/snml/databases/dbsnml/data/data02.dbf). It is recommended to create new datafilewith the same size of the previous ones.

It is strongly reccomended to execute a backup and a restore on the RM database.

Page 67: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

61

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

8.4 Backup and Restore

The backup/restore functions permit to save/restore the following data types:

– Network configuration data (and HPOV maps saved into DNM repository);– Alarm data;– PM data;– OS data: Operating System configuration data (i.e. /etc/hosts) – Third party software (HPOV ORS

DB) – Application configuration data (i.e. us_nodes, im_host_conf);– Operator data.

N.B. The previous data types could be saved all together or in separate way selecting the relevantdata on user interface.

The first three subsystems backup/restore procedure are based on the Oracle import/export features, soonly table data are saved and not the table structure. This imply to recreate the Oracle DB (see 8.1) beforerestoring them.

The Figure 2. illustrates the information distributed in the two disks.

EXTERNAL DISK

APPLICATION / OP. SYS.

INTERNAL DISK

BACKUP / MIRROR

Operating System

Base Software

Application SW ( RM )

Oracle DBredologs & control

/backup

archives files( /mirror/arch )

reference base( /mirror/db_ref_base )

redologs & control

( /mirror/mirror )

Figure 2. Distribution of files in two application disks

Page 68: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

62

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Prior to execute the backup / restore feature for NR2 EMLs (SH and WX) it is necessary toexecute the following manual workaround procedure:

a ) For each installed EML the relevant NR3 directory should be created:$ mkdir –p /backup/1353<sys>_<nn>

where <sys> is SH or WX according to the managed EML and <nn> is the logicalnumber of the EML (EML Domain Id). The EML name (1353<sys>_<nn>) couldbe found in the file /usr/snml/conf/conf_network.

b ) Create the link to the NR2 directories structure:$ ln –s /backup/<sys> /backup/1353<sys>_<nn>/Ntwk

c ) Run Restore Procedure and ignore the warning message.

During the backup the RM system is switched in read only run level, so it’s guaranteed the saved dataintegrity.

The network backup function is available both as a periodical action and on user request via user interface.

The files originated by a backup are stored onto a disk (other than the one in which resides the Oracledatabase) and optionally on a tape (see Figure 2. ).

Different backups are stored on an unique tape.

The suggested frequency is once per day.

Page 69: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

63

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

8.5 DB realignment via “redo log”

After a RM network data restore, the DB can be realigned up to the failure using the RM “redo log” file.In this file all the configuration operations (but network topology modification) are traced.

a ) To realign the DB, copy the redo log file in the user’s home directory (i.e. /users/snml) creating a newfile with ”.rmCmd” extension and empty the current redo log file, using the following commands :

– $ cp $NLredolog <user_home_dir>/<filename>.rmCmd– $ >$NLredolog

b ) Perform the “Upload NAPs” operation. The uploaded NAP are not traced in the redo log file, but pathoperations executed by the rmBatchUtil procedure refer them by means of their userlabel. This is thereason why the “Upload NAPs” can be executed manually after the restore.

c ) Set to ”False” the global configuration of the ETs involved in payload configuration operations.Payload configuration is re–built by creating and configuring / re–configuring HO–trails. HO–Trailsin a ring can only be created if the global configuration is set to ”False”.

d ) Start the batch procedure opening the CDE file manager from the CDE panel and selecting frompop–up menu of the saved file the ”Execute–batch” command. Please note that the output of thebatch procedure will be redirected to a file (which name is <filename>.rmCmd.log) in order to be ableto analyze the results at the end of the execution.

During the execution, the performed operations print on the terminal their results. The results ofthe batch execution may depend from external conditions (time–outs, concurrences...) so, mayhappen that a small number of operations in a large batch file can fail when repeated. This canbe recovered taking into account that the output file of rmBatchUtil reports either the commandsand the results. Failed commands may be saved in an other file and executed later. Payattention in case of failure on allocation, add protection or remove protection, that also previousconstraints definition must be rerun together with the failed commands.

e ) Set to ”True” the global configuration of the ETs at point c ). The correct values for the configurationof the ET will be automatically re–calculated.

Please note that the previous procedure should be used in case of global Network data restore(RM plus all the EMLs). In case of partial RM restore the results of the execution of redo log file,could be unpredictable.

Page 70: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

64

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

8.6 Identifier Defragmentation Procedure

In the following it’s described the procedure needed to defrag the primary keys identifiers of RM databasetables.After the procedure execution, the primary key column value of every table will be in the range 1..n, wheren equals the number of rows of the table. All foreign keys will be updated accordingly.Note: only sensitive tables (TP and TRANPK among the others) will be updated.

8.6.1 Procedure steps

f ) Perform a system full backup.

g ) Stop 1354RM system if necessary (but not the database, which has to be on) using Process Controlfacility.

h ) login as ”snml” user.

i ) Change your current directory to the ”conversion” directory:

cd $DB_ROOT/admin/conv

j ) Add a new datafile to the tablespace ”INDEX_T”. This is necessary since a large index (named ”NEWOLD_TEMP_INDEX”) will be created on atemporary table (named ”NEWOLD_TEMP”) to boost performance.The size of this datafile has to be proportional to RM database dimension. A size of 10MB is normallyenough; increase this size if you find any error regarding ”NEWOLD_TEMP_INDEX”.

Please refer to par. 8.3 to see how to add a new datafile; of course, exchange ’tablespace index_t’for ’tablespace data’, use ’index<nn>.dbf’ (<nn> = a number of your choice, which makes the filename distinct from existing files) instead of ’data02.dbf’, and specify an appropiate size.

k ) Create the rollback segment ”large_rbs”.This is necessary since the operations on database take a lot of rollback segment space,far more than normal database operation.To create ”large_rbs”, perform:

$ORACLE_HOME/bin/sqlplus system/manager @create_large_rbs.sql

l ) Perform the ids defragmentation procedure:

./idDefrag

First of all, the procedure displays some warnings and informations.Check all, expecially this one:

the database to be managed (environment variable $NXNL_DATABASE)

Then, the procedure asks the operator for confirmation (message ”Do you want to continue ?”).If the variable $NXNL_DATABASE is correctly set, the operator must enter ”y”, otherwise the operatorcan enter ”n” (feel free to press <Ctrl–C> if you like) , (re)set the uncorrect environment variable, andrestarts ”./idDefrag”. No operation on database is performed until you enter ”y”.

If any errors occur the procedure stops. Check the logfile idDefrag.log (which is created in the current directory) to diagnose the error.

Page 71: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

65

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

N.B. If any error occurs during execution of ”./idDefrag” (after your ”y” confirmation) thedatabase is left in an unconsistent state.After fixing the problem, you have to perform a RM database full restore and thenrepeat this whole sequence of operations (i.e. starting from point b)). *** It’s not enough to restart the shell script ”./idDefrag” ***. The same situation arises if ”./idDefrag” is interrupted (after your ”y” confirmation),whatever the reason (included user <ctrl–c> request).

Every time the procedure is executed, the previous log file is automatically saved as idDefrag.log.old.

m ) Drop ”large_rbs” rollback segment.To drop, perform:

$ORACLE_HOME/sqlplus system/manager @drop_large_rbs.sql

n ) Remove the datafile previously added to ”INDEX_T” tablespace.This operation is normally not necessary since the dimension of the datafile is always only a fractionof the database itself. In addition, you are incouraged not to perform it since it needs some criticaldatabase operations. Only if you are an Oracle expert, check ”Oracle Server: Administrator’s Guide”,chapter 7, ”Managing the Size and Files of the Database”.

o ) Perform a ”Network Discovery” operation on NN system, for the Network(s) managed by the RMwhose database you have modified.This is necessary to align NN database with the modified RM one.Alternatively, you may shut down and restart the whole NN system, since NN system automaticallyrealign itself with RM at restart.

8.6.2 idDefrag procedure – structure of log file

(Check file idDefrag.log.example if available in $DB_ROOT/admin/conv)Since the procedure is written in PL/SQL, the log file is mainly the copy of sqlplus display output.The main steps are:

a ) disabling of all FOREIGN KEY constraints.

b ) For every primary key of every table (e.g. tpId of TP table):– creation of new–old id mapping table (NEWOLD_TEMP). This mapping is printed on log.– transformation (update) of primary key and of all referencing foreign keys.– dropping of NEWOLD_TEMP.

c ) enabling of all FOREIGN KEY constraints.

d ) resetting of all SEQUENCEs to the 1 + max value of primary key column.E.g., if the column tpId has max (tpid) = 200, TP_SEQUENCE will be set to 201.

N.B. Only a subset of all primary keys (that is, the ones which may overflow above 2,000,000,000) aredefragmented by this procedure. Currently (19 December 1997) they are:– TP.tpId– TRANPK.tranconnId– PMTROP.pmTranOpId– PMREOP.pmReportOpidOther primary keys will be added if necessary.

Page 72: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

66

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

8.7 DB configuration for huge networks

The Configurable Parameter shmmax must be set to 100000000 (100 Mb).

The Oracle start–up parameter shared_pool_size must be set to 64 M. The procedure is as follows:

a ) shutdown the system and the database;b ) cd $DB_ROOT/admin/pfilec ) su oracled ) vi init1.orae ) change the value of shared_pool_size to 64000000 (64 Mb).f ) restart the database and the system.

Every time that the customize procedure has been done this procedure must be re–executed.

8.8 Managing indexes

Some problems of performances can arise when a lot of network objects are updated and/or a lot of alarmsare received and cleared. In fact, in this case the structures of indexes inside the RM database are brokeninto fragments; unfortunately ORACLE is not able to manage this situation automatically.

As work–around, indexes have to be dropped and created again. The SQL script/usr/snml/databases/utility/manageIndexes.sql

is done to do that. It is possible to run it by executing the following command (by snml):$manageIndexes

It is suggested to execute this script periodically after the backup.

Page 73: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

67

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

9 SYSTEM MANAGEMENT FEATURES (SMF)

9.1 EMLs Data Definition for SMFs

Meaningful for IM configuration only

In order to handle management features commands a file named smf_conf must be placed on theinstallation home directory of 1354RM and 1353SH both on RM and SH workstations. In smf_conf fileeach product must specify its own characteristics and features procedures.

Each specified procedure should respect the following requirements:

a ) it should be an absolute path name of a file executable and readable by each user;b ) if not differently specified (see paragraph 9.1.1), the procedure returns:

– a code = 0 in case of success;– a code � 0 in all other cases;

c ) it should provide, on standard error, information describing the occurred errors;d ) commands and parameters (if any) should be separated by coma character (”,”) instead of blank;e ) not supported commands have to be inserted giving as parameter the string ”none”;f ) labels which require necessarily a command expression, are marked by the word mandatory;g ) it should be able to trap the SIGTERM signal for aborting request;h ) it should be able to log the executed operation.

Page 74: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

68

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

9.1.1 Description of ”smf_conf” file parameters

In the following the needed smf_conf labels and related commands are described:

SYSTEM parameters– sys_name : <name> mandatory.

it is the product system name that is used by the system features; ex. 1354NN, 1354RM,1353SH1, ..., 1353SHn. It must be unique among systems which are part of the same TMNnetwork.

– sys_check_comm : <check–proc–name> mandatory.this is the procedure that determines the system state, used to visualize the right icon inside theOSs _network window of the VUE ToolBox. Procedure return code value identifies:– 0: system running (all agents are running);– 1: system not running and not stopped;– 2: system stopped (all agents are stopped);– otherwise: system state is undefined.

– sys_start_comm : <start–proc–name> mandatory.this is the procedure that starts the system.

– sys_stop_comm : <stop–proc–name> mandatory.this is the procedure that stops the system.

– sys_log_comm : <log–proc–name> mandatory.this is the procedure that starts on current display graphic (TCL/TK) log view utility.

– sys_check_control : <check–processes–autostart–proc–name> mandatory.this procedure allows to check the processes autostart status: the procedure returns 0(autostart ON), or 1 (autostart OFF).

– sys_start_control : <put–ON–autostart–proc–name> mandatory.this procedure puts ON the processes autostart status.

– sys_stop_control : <put–OFF–autostart–proc–name> mandatory.this procedure puts OFF the processes autostart status.

– sys_print_control : <print–proc–name>.this is a customized procedure to execute print actions requested by an operator using SMFapplication functions. If the command is given, it is the same for all the functions which providethe possibility to print.

SUBSYSTEM parameters– subsys_name : <name> mandatory.

It is the subsystem name (e.g. 1354RM, 1354NN, node name of 1353SH workstation ...). It mustbe unique among subsystems which are part of the same TMN network.

– subsys_check_comm : <check–proc–name> mandatory.this is the procedure that determines the subsystem state, used to visualize the right icon insidethe OSs_network –> WS windows of the VUE ToolBox. Procedure return code value identifies:– 0: subsystem running (all agents are running)– 1: subsystem not running and not stopped– 2: subsystem stopped (all agents are stopped)– otherwise: system statue is undefined.

– subsys_start_comm : <start–proc–name> mandatory.this is the procedure that starts the subsystem.

– subsys_stop_comm : <stop–proc–name> mandatory.this is the procedure that stops the subsystem.

Page 75: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

69

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

SUBSYSTEM backup/restore

Five different backup/restore data types are supported:network configuration data (identified by Ntwk acronym)performance monitoring data (identified by PM acronym)operator data (identified by Op acronym)alarm data (identified by Al acronym)TMN OS configuration data (identified by OS acronym)

For each data type subsystem backup, rollback and restore procedure are identified according to thefollowing:

– subsys_bck_<data type> : <backup–proc–name>it is the procedure that executes backup saving data in a predefined directory/backup/<subsystem name>/<data type> on workstation from which the procedure is started.

– subsys_tbck_<data type> : <time>estimated time, in seconds, to complete this backup .

– subsys_rbck_<data type> : <rollback–proc–name>it is the procedure that executes rollback of backup actions; it is automatically executed in caseof failure of one subsystem backup command.

– subsys_res_<data type> : <restore–proc–name>it is the procedure that executes restore from data stored in the directory /backup/<subsystemname>/<data type> on workstation from which the procedure is started.

– subsys_tres_<data type> : <time>estimated time, in seconds, to complete this restore.

For the 1353SH, subsys_tbck_<data type> and subsys_tres_<data type> times will be initializedafter the initial backup at the end of the first installation. The backup time measurement will be usedto have a restore time estimation.

– end_subsys

9.1.2 Network’s configuration file generation

Once a new installation of managed subsystem (EML or A1330) has been completed (and due to this anew smf_conf file is available), the users has to execute the following command (as ’root’ user):

# /usr/snml/etc/update_network

to generate new system management features configuration according to the smf_conf file description.The same script must be used even to generate new configuration file for PMC application (see also 7.2).The ”update_network” procedure must be executed both from IM and US hosts in the given order.

Page 76: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

70

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

9.2 1354RM Scheduled Operations

Using the ”Periodic Action” function defined inside the SMF application in 1354RM subpanel, is possibleto book specific action to be executed periodically.

1 ) select in 1354RM subpanel the SMF Button,2 ) select the Periodic Action application.

The scheduling operation are:

1 ) Network Backup: it allows to start periodically the backup function in order to save the networkconfiguration data.

2 ) Save and Clean Log&Trace files: it enables a periodical cleaning of the agent’s trace files toavoid that they can grow until they fill the file system. The current trace file is saved into a backup(”.bak”) copy and than it is emptied. It is recommended to enable this periodic function.In the file $NXNL_PRD/conf/traceFileSize.par must be specified the maximum size (disk blocksnumber) that the trace file can reach (default MAXTRACESIZE=1000 disk blocks).

3 ) Clean DB archives: it enables a periodical cleaning of the oracle archived redo log files. It wouldbe mandatory to enable this function if the Incremental DB archive backup is not used.

4 ) Incremental DB Archive Backup: it allows to specify the execution frequency of the incrementalbackup.

5 ) Save and Clean Events Log: it enables a periodical archive of the Events Log.6 ) Archive System Messages: it defines the frequency of the check on the size of the Archive

System Message files. If the current size is greater than 3000 lines the current files is saved ina backup copy and a new empty one is created. The function mantains a pool of the last 10archived files.

N.B. During the installation phase the Save and Clean Log&Trace files and the Clean DBarchives (this one only when the installation is done with the parameter MIB differentby ”REC”) functions are enabled with a frequency of 15 minutes.

For all these functionalities the following operations are available:

1 ) Show scheduled time : it displays, if it is defined, the current booking time of the relatedoperation.

2 ) Set scheduled time : it allows to the administrator to insert, or to change, the scheduling timeof the related operation.

3 ) Cancel scheduled time : it removes the previous inserted booking time for the related operation.

9.3 Multi–Screen Installation

In order to permit to System Management Features to work properly in 1354RM with distributedarchitecture (IM–US workstations or X–terminals) a tools is available to declare all nodes. The tool iscontained in the SMF application in 1354RM subpanel and it is named Console Administration. This utilitycan be used to add, remove, lock or unlock a specific node and list all the 1354RM nodes. It can be usedfrom any node of 1354RM distributed architecture.

N.B. No automatic discovery of existing workstations or X–terminal is performed, but the applicationwill display only data inserted manually buy 1354RM administrators.

Page 77: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

71

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

10 1354RM BEHAVIOR

10.1 EMLs management

10.1.1 Procedures to define EMLs managing Q3 NEs

Meaningful for IM configuration only

EMLs that are managed by 1354RM can be created/deleted on–line in RM database using the followingcommands:

– # /usr/snml/bin/AddEML <EML_id>

– # /usr/snml/bin/RemEML <EML_id>

These procedures register/deregister the EMLs into HP/OV and add/remove the management records tothe PMC.

10.1.2 Procedures to create EMLs managing QB3* NEs

Meaningful for IM configuration only

EMLs that are managed by 1354RM can be created in RM database using the following command:

– $ usr/snml/bin/nlCreateInDb –eml [ –id <EML_id> ] –f

N.B. Identifier parameter will be requested explicitly by the procedure if it is not indicated. The EMLidentifier must not be reserved by 1354RM (see next paragraph). The creation of a “virtual“ EMLdoesn’t require the –f option.

EMLs are created with ”dummy” userlabel with the format ”EML_<id>”, that will be replaced by the realEMLs userlabel during the EML–NML alignment process (see 11.3).

Using the –h option, as indicated below, the command prints on the screen its syntax:

– $ nlCreateInDb –h

N.B. The emlDomain 0 is reserved by RM, that use it as a ”virtual” EML.

10.1.3 Procedures to delete EMLs managing QB3* NEs

Meaningful for IM configuration only

EMLs which have been accidently created in the RM database and are not needed can be removed withthe following command:

– $ usr/snml/bin/nlCreateInDb –del –fdn ntwDomId=1/emlDomId=13 –f

You can find the fdn for the eml you want to delete by going into the network view, upload available EMLsand select the EML which should be deleted. After that execute View–>Object Attributes–>Long Report.For the selection Name attribute you find the string you have to give as fdn parameter.

Page 78: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

72

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

10.2 Path / HO–Trail allocation algorithm failures

When a path allocation is asked from the User Interface, a first consistency analysis is performed and theresult is reported to the user. If the allocation activity does not succeed, the path ”working state” attributeis set to ”Failed to Allocate” and using the event logger (from the event log file) the error code (and therelated message) can be retrieved.

The possible error codes are :

a ) Not enough resources in the network; this covers many cases:

1 ) there are no more free link connections in a physical connection;2 ) a physical connection has been configured with different payload;3 ) a connection inside an NE is not possible due to an NE constraint;4 ) a connection inside an NE is not possible due to an NE limitation (e.g. HO drop–insert or bridge

& switch connections in 1661SMC):5 ) a physical connection has been impacted by an alarm and the path has been defined with

notAlarmedResourcesOnly attribute;

Suggestion for analyzing the problem:• if the allocation of unprotected path/trail fails, check if one or more of the previously described

cases occur;• if nothing is discovered after this check, put constraints on the path/trail, in order to force the

desired route;

b ) Not found east and west CTPs with same payload position in protected connections (NEconstraint);

In a protected path/trail, the routing algorithm has found both main and spare routes, but there areno main and spare idle CTPs in a protected connections with the same payload position and this isnot compliant with some NEs (all ADMs);

Suggestion for analyzing the problem:• unprotect the path/trail and allocate in order to have more information on the main route, then

put constraints on the path/trail, in order to force a route different from the minimum cost one;

c ) Unable to manage overlap between main and spare (NE constraint);

In a protected path/trail, the routing algorithm has found both main and spare routes, with at least1 common routing link, but after has discovered that it is not possible neither to use 2 different linkconnections in the common routing links, nor to create 2 protected connections at the boundary ofthese common routing links;

Suggestion for analyzing the problem:• unprotect the path/trail and allocate in order to have more information on the main route, then

put constraints on the path/trail, in order to force another route

d ) The spare route completely overlaps the main route (only path/trail allocation);

The routing algorithm has found only 1 possible route (main) between origin and destination; thereasons why the spare route has not been found can be that one or more of conditions describedin a ) occur;

Suggestion for analyzing the problem:• unprotect the path/trail and allocate in order to have more information on the main route, then

check if one or more of conditions described in a ) occur;

Page 79: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

73

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

e ) Protecting this route wouldn’t improve the protection level (only path/trail add protection);

The routing algorithm has not found the spare route between origin and destination; the reasons canbe that one or more of conditions described in a ) occur;

f ) Not enough resources in the network – only a subset of sink NAPs is reachable;

In a broadcast path, the routing algorithm has found the route for some legs but not for all; the reasonswhy the routes for the other legs have not been found can be one or more of conditions describedin a ) occur;

g ) A link connection specified in path constraint is not acceptable;

A constraint on the path/trail has been inserted, specifying to use a link connection that is alreadyused in another path/trail or configured or in a wrong state;

Suggestion for analyzing the problem:• remove or change the constraint, or check the state of the link connection;

h ) Incompatible constraints;

More constraints on the path/trail have been inserted, but some of them are incompatible.

Suggestion for analyzing the problem:• check the constraint and remove the incompatibility;

i ) Incompatible CTPs;

It happens during an HO trail allocation defined starting from two CTPs if the user adds a constrainton a link connection not compatible with one of two CTPs.

Suggestion for analyzing the problem:• check and remove the constraint;

j ) Specific RM error. Possible values are:• Error connecting to data base;• Error reading data from data base;• Not enough space in RAM;• ....

Suggestion for analyzing the problem:• restart the trsMngAgent using process control.

Page 80: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

74

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

10.3 Distributed Network Maps (DNM) application customization

10.3.1 Environment Variables

The following three environment variables are defined to identify the directory where the DNM Managersave or get the map image:

NXNL_MAPDBHOST : it specifies the host where the MAP DB area is placed.NXNL_MAPDBUSER : it specifies the owner username of the MAP DB area.NXNL_MAPDBAREA : it specifies the path name of the MAP DB area.

This environment variables are initialized in the ”/usr/snml/.nxnlenv” file.

10.3.2 Registration Files

In the registration file mngmapOus (see 6.2.1) are defined the text strings used to build the DNM pulldownmenu. The Administrator can modify them in order to obtain a more friendly menu.

10.3.3 Resources Files

In the 1354RM delivery the resource files directory is named ”/usr/snml/xapplresdir” that containslanguage–dependant directories (default language is ”C”). In this directory is present the DNM resourcefile that is called mngmap, in which three variables are defined to permit to the Administrator to customizethe Mail Message sent when a map image is saved to users that can use it.

mailMsg : it contains the mail text that is sent to enabled usersmailCommand : it specifies the Unix Mail command used to send the mail message. The

variable that follow the ”–s” option is the Subject of the message.mailAllUser : it is initialized with the default username list that represents all the system

users. It is used to send a mail message when an operation is performedon a map image visible by all users.

To improve the customization flexibility of the mail message text, can be used four environment variablesthat are initialized with the proper values each time :

map_action : it is initialized with the action performed on the map image.map_name : it is initialized with the name of the map image involved in the operation.map_comment : it is initialized with the memo text related to the involved map image.map_subject : it is initialized with a string indicating the mail subject consistent with the

performed operation.

Page 81: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

75

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

10.4 Trace management

This feature is not supported to the customer: it has been introduced for debug purpose only.

The trace levels and trace group numbers that must be indicated to analyze SNML applications are listedin the ”README.trace” file, presents in the $NXNL_PRD/bin directory.

10.4.1 User Interface applications

To enable the trace utility for User Interface applications, the user has to define two environment variablesin a normal Unix window, and then start manually the User Interface application. The two environmentvariables are :

• NXNL_XON_G = Number of Trace Group• NXNL_XON = Trace Level

10.4.2 Information Manager Applications

The trace utility can be enabled for Information Manager Agent Processes at run time, performing thefollowing steps:

1 ) Insertion of trace level and, eventually, trace group in the file:$NXNL_PRD/trcLevel/<agent_name>.trc

In this file the involved trace levels must be inserted in the first row, in the second (optional) thetrace group number.

2 ) Signal to the process to get the new trace level using:kill –17 <process_PID>

or using the appropriate pull–down menu action of PMC.

3 ) The trace outputs are on a file named <agent_name>.trc placed in the directory$NXNL_PRD/trace/<agent_name>.trcDir/

N.B. Trace for children agents (i.e. pathImp) are placed in the directory of the parentprocess (in this case trsMngAgent).

Page 82: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

76

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

10.5 Consistency Download problem with transmux ports

Hereafter are listed two alignment procedure between 1354RM and 1353WX to recover from transmuxports configuration misalignment that can be produced after either a 1353WX or 1354RM restore (e.g.restoring on WX a backup where a port is configured at 64 x 2Mb, but on RM it is configured as a single140Mb port).

Page 83: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

77

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

10.5.1 RM with 2Mb ports and WX with a single port

In the following procedure is listed the workaround in the case that RM has 64 (16) x 2Mb ports and theWX has a single 140Mb (34Mb) port:

1 ) perform a restore of the network (if WX MIB is corrupted, delete the WX persistency, if not andit seems that RM and WX have the same content, keep the WX persistency);

2 ) perform the synchronization of the WX EML domain (synchronize the physical ports);

3 ) check the synchronization of the EML:

a ) if the synchronization result of the EML is “misaligned” means that WX and RM havedifferent physical ports configuration, so it is necessary to check if in WX MIB themisaligned ports have some connections (this case cannot be handeled by RM):

1 ) start the Consistency Procedure (either global or on connections only). At the endRM should have deleted all not foreseen connections (also the ones supported by140Mb or 34 Mb not aligned ports);

2 ) start (again) the Consistency Procedure (either global or on ports only). At the endRM should have de–assigned all the not aligned ports. It is so possible to jump to nextpoint without deleting the WX persistency;

3 ) then the synchronisation of the EML will be misaligned (and the operator can be surethat WX has no connection on that unkown port from RM);

4 ) find the just created 140Mb port (it should be in the “observed” Assignment State);

5 ) perform the “Configure PDH port” action on such 140Mb port, so on WX side:– the 64 * 2Mb ports are created (NML–observed, with same FDNs as RM ones);– the 140Mb port is deleted;

b ) if the synchronization of the EML is aligned (WX and RM has any different physical ports),the normal Consistency Procedure can be performed by the operator (see next bullet 4);

4 ) set Configure Disable on the WX node;

5 ) switch to the Consistency run level using PMC;

6 ) perform a global Consistency Download (all should be successful);

7 ) switch to the Full functionality run level using PMC;

8 ) make on the WX node a “Configure StartAudit” (it checks that WX content and 1641SX contentare aligned);

9 ) check of the StartAudit value:if the StartAudit becomes aligned (green), set Configure Enable on the WX node;if the StartAudit becomes misaligned (yellow), check each configure mismatch alarm anddecide if you can interrupt traffic or not. If you may not interrupt traffic, modify the RM tillall connections are aligned.

After this set Configure Enable on the WX node.

Page 84: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

78

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

10.5.2 RM with a single port and WX with 2Mb ports

This is a special case, because RM has the 140Mb (34Mb) port which is assigned and the WX not. The1641SX has a structured 140Mb (34Mb) port and it could have also connections on it. The RM cannotremove the NAP related to this 140Mb (34Mb) port because WX has not this NAP and RM cannot managea cross–connection on a TTP which is only seen by the WX. To align this situation it shoul be mademanually by RM:

1 ) perform a restore of the network;

2 ) perform the synchronization of the EML domain (synchronize the physical ports);

3 ) if the synchronization result of the EML is “misaligned”, recognize which 140Mb (34Mb) portsare misaligned. It means that WX and RM have different physical ports configuration, so it isnecessary to check if in WX MIB the misaligned ports have some connections (this case cannotbe handeled by RM). In this case delete WX persistency, start WX again (on AU) and performa synchronisation of the EML;

4 ) then the synchronisation of the EML will be aligned;

5 ) set Configure Disable on the WX node;

6 ) switch to the Consistency run level using PMC;

7 ) perform a Consistency Download global (all should be successful);

8 ) switch to the Full functionality run level using PMC;

9 ) make on the WX node a “Configure StartAudit” (it checks that WX content and 1641SX contentare aligned);

10 ) check of the StartAudit value:if the StartAudit becomes aligned (green), set Configure Enable on the WX node;if the StartAudit becomes misaligned (yellow), check each configure mismatch alarm anddecide if you can interrupt traffic or not. If you may not interrupt traffic, modify the RM tillall connections are aligned (this means in this case structure the transmux port andimplement the lost path).

After this set Configure Enable on the WX node.

Page 85: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

79

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11 1354RM CUSTOMIZATION

11.1 Environment variables changes

In the following paragraphs are described some customizations possible in RM. Hereafter is describedthe standard way to change and to take effect them, and it should be applied if some variables arechanged. For non–standard variables the change procedure is described directly in the relevantparagraph.

In the following paragraphs for the standard managed variables the following data are listed:

• ”Relevant Process” (”Father Process”, if necessary)• Variable Name (with default value)

The relevant process is the one to be restarted to activate the variable value. If it is followed by anothername in brackets, it means that it is a child process and its father shall be restarted to activate the variablevalue.

”Standard” way of changing variables is:

a ) Edit the file ”/usr/snml/.nxnlenv”; all the variables are described as :<Variable_Name> = <Variable_Value>

b ) Change the variable value and save the files;

c ) After this you need to shutdown and start–up the ”Relevant Agent” (or its father).

Page 86: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

80

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.2 Users Services

11.2.1 Counters refresh rate on agent response

Meaningful for US configuration only.

– Relevant Process: browser– Variable Name: NXNL_COUNTERTIME (unset)

This variable defines the rate on which the browser has to refresh its item counters when the operator hasperformed a get or an inventory and the agents are sending the related replies. The possible values are:

– unset : the refresh is done every response;– 0 : the refresh is done at the end only;– n : the refresh is done every n replies.

11.2.2 Browser

Meaningful for US configuration only.

– Relevant Process: browser– Variable Name: NXNL_MAX_NUM_ITEMS (unset)

NXNL_MAX_NUM_ITEMS_INWIN (unset)NXNL_MAX_WINS (unset)

These three variables are related to the maximum number of objects displayable in the browser(NXNL_MAX_NUM_ITEMS), the maximum number of objects displayable into a single window of browser(NXNL_MAX_NUM_ITEMS_INWIN) and the maximum number of windows opened at the same time(NXNL_MAX_WINS). When these thresholds are exceeded a warning box is displayed.

N.B. If the environment variables are not set (or set with value 0) no checks are done about numberof objects displayed in the browser.

11.3 EML–NML Alignment Process

Meaningful for IM configuration only.

– Relevant Process: emlObjAgent– Variable Name: NLhbp (180)

This variable enables the polling mechanism toward EMLs. Its value indicates the time–out (in secondsbetween two different polling activity.

N.B. If the environment variable is not set (or set with value 0) the EML data alignment polling activityis disabled.

Page 87: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

81

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.4 Inventory Processes

Meaningful for IM configuration only.

– Relevant Process: topBrwAgent– Variable Name: NXNL_INVPROCESS (1,2,100,2)

This variable configures the number of processes dedicated to inventory actions (e.g. path list, physicalconnection structure, ...) and must be set in nxnlenv_make file before to start the customize_patchprocedure.

By default the “heavy” inventory starts on instance NXNL_NTWBRRDA=1 or 2 (in random way) and the“light” inventory starts on instance NXNL_NTWBRRDA=100 or 101 (in random way) and there are twoprocesses dedicated to “heavy” inventory and two processes dedicated to “light” one.

E.g. NXNL_INVPROCESS=1,4,100,4 means that the “heavy” inventory can start on object instance$NXNL_NTWBRRDA=1 or 2 or 3 or 4 (random) and the “light” inventory can start on$NXNL_NTWBRRDA=100 or 101 or 102 or 103.,

It’s clear that by default four lrf files are created in lrf directory; in the example eight lrf files are created inlrf directory.

11.5 Map Management

– Variable Name: NXNL_MAPNAMERULE (unset)

The users having the Look Only ot he Path Builder profiles have now the capability to perform the highlightof a path on the Map. This is possible also if they do not have the right to write on a map, because atemporary map is atomatically created (and deleted) by the system.

To enable this feature you must set the variable, before executing the customize_patch procedure,specifying the naming rule (if exist, otherwise this feature can not work) used to identify the default map,e.g. NXNL_MAPNAMERULE = *_PTTNAME then execute the customize_patch and the command by”snml” user: echo enable > /usr/snml/conf/CopyMap.

Page 88: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

82

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.6 Path/HO–Trail Management

11.6.1 Path/Trail allocation algorithm

Meaningful for IM configuration only.

– Relevant Process: pathAll (trsMngAgent)– Variable Name: K2 (2)

K34 (1)K140 (1)

N.B. K2, K34 & K140 variables can assume integer values only.

During the allocation phase, the cost of a given routing link is dynamically evaluated with the followingformula :

Cost = C ( 1 + K / F )

Where :

C : cost of the routing link without taking into account any usage factorF : number of free link–connections in the routing linkK : Parameter allowing the tuning of the sensibility of the cost to the loading of the

routing link

The three variables are taken into account by the allocation of different path types: K2 (2Mbits paths), K34(34Mbits & 45Mbits paths), K140 (140Mbits paths).

11.6.2 Reuse already allocated resources in Broadcast paths.

Meaningful for IM configuration only.

– Relevant Process: pathAll (trsMngAgent)– Variable Name: SAME_RES_TYPE (20)

DIFF_RES_TYPE (40)

By means of these variables is reduced the cost of routing link already allocated by the relevant broadcastpath, in order to force the allocation algorithm to reuse as much as possible the resources. The costcalculated in the previous paragraph is multiplied by SAME_RES_TYPE/100 (default 20%) if the pathalready use the routing link in the same route type as the allocating one (both main or both spare),otherwise it is multiplied by DIFF_RES_TYPE/100 (default 40%).

Page 89: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

83

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.6.3 Using Virtual Nodes during Path Allocation Phase

Meaningful for IM configuration only.

– Relevant Process: pathAll (trsMngAgent)– Variable Name: DISABLEVIRTUALCTPTOCTP (not defined by default)

By means of this variable it is possible to enable or disable the crossing of Virtual Nodes during the PathAllocation phase. If the environment variable DISABLEVIRTUALCTPTOCTP is defined and has a valuedifferent by 0 the Virtual Nodes are taken into account during the Implementation phase only if the pathterminates on them (no pass–trough can be defined on virtual nodes). If the variable is not defined ordefined with value equal to 0 all virtual nodes are taken into account as normal nodes during the allocationphase.

N.B. When there is interworking RM–NN it is necessary setting (see 12.4 paragraph):export DISABLEVIRTUALCTPTOCTP=1

11.6.4 Configurable switch in Drop&Continue

Meaningful for IM configuration only.

– Relevant Process: pathAll (trsMngAgent)– Variable Name: DROPCONTSWITCHCONF (0)

By means of this variable it is possible to set the nominal position of the switches in Drop&Continueconnections in a spare route of the path or trail.

If the variable is set to 0 (or not defined) the main side of the switches is turned to the main route of thepath, if it is set to 1 the main side of the switches is turned to the spare route of the path.

11.6.5 Changing timeout for Cross Connection management actions

Meaningful for IM configuration only.

– Relevant Process: pathImp (trsMngAgent)– Variable Name: NLtimeoutBase (300)

NLtimeoutReq (30)

By means of this variable it is possible to change the timeout for cross connection management actions(create, delete, update squelching and so on), with the exception of HO CTP–HO CAP creation/deletionwhich are handled differently and by a different process.

The timeout for every request is set via this formula:timeout = NLtimeoutBase + n * NLtimeoutReq

where n is the number of requests sent to NEs but not answered yet.

N.B. Normally NLtimeoutReq is zero so the timeout is fixed and equal to NLtimeoutBase.

Page 90: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

84

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.6.6 Configuring consistency flow control

Meaningful for IM configuration only.

– Relevant Process: consChkAge– Variable Name: IMP_FLOWCONTROL_MAX_OUTSTANDING (15)

By means of this variable you can set the maximum number of create/delete/update_squelchingmessages concurrently sent to NEs during consistency download. If the number of sent messages equalsthe threshold specified by this variable, the consistency process will wait until a message is answeredbefore sending another one.

N.B. This simple mechanism of flow control overcomes internal message queues overflow in OSes(like WX) which don’t use HO OpenView CI built–in flow control feature.

11.7 Alarm management

11.7.1 Flooding protection mechanism

Meaningful for IM configuration only.

– Relevant Process: emlAlrMng– Variable Name: HP_TOthreshold (60)

HP_almthreshold (150)LP_TOthreshold (60)LP_almthreshold (100)

These variables are related to high priority (HP_TOthreshold, HP_almthreshold) and low priority(LP_TOthreshold, LP_almthreshold) alarms, they are used to implement a flooding protectionmechanism.

When RM receives more than HP_almthreshold high priority alarms in HP_TOthreshold time (sec) it stopsto analyze them (no propagation is done) and emits a “High Priority Alarm Flooding” alarm for the relevantEML. It doesn’t analyze alarms until a HP_TOthreshold period terminates with an alarm rate lower thanHP_almthreshold. The same mechanism is implemented for low priority alarms with the “Low PriorityAlarm Flooding” issuing.

The alarm synchronization isn’t automatically performed but it’s up to the operator to require it.

11.7.2 Alarm clearing hysteresis period

Meaningful for IM configuration only.

– Relevant Process: pathAlrMng (emlAlrMng)– Variable Name: NLdeltatime (5)

This variable set a hysteresis period on clear–emission time of an alarm. It means that when an alarm iscleared the RM process wait NLdeltatime seconds before starting the propagation phase, if the samealarm raise up again (same object with same probable cause) in this period the RM doesn’t propagateneither the clear nor the new raise of the alarm, leaving the previous alarms as they are.

Page 91: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

85

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.8 Nap uploading timer

Meaningful for IM configuration only.

– Relevant Process: objImpCnf (topMngAgent_csa)– Variable Name: NLnaptim (1200)

This variable defines the default time–out value (in seconds) for the NAP upload of a single node. If a nodecontains a large number of PDH ports (e.g. more than 300) it is suggested to set a bigger time–out value.

11.9 SNCP switch timer

Meaningful for IM configuration only.

– Relevant Process: pathImp (trsMngAgent)tsdFepCfg

– Variable Name: NL_TIMER_WATCHSW (600)NL_TIMER_MNGSW (60)

The NL_TIMER_WATCHSW variable defines the watching period lenght (in seconds) of switch state, thewatching period begin from synchronize switch command. During this period all switch events aremanaged.

The NL_TIMER_MNGSW variable defines the time–out value (in seconds) for the execution of a manageSNCP command. The value of this variable has to be minor than the NL_TIMER_WATCHSW.

11.10 Printer Commands

– Variable Name: NXNL_PRINT (”/usr/snml/bin/tops –L | lp”)

The RM printer functions (started from report windows or by CDE desktop pop–up menu) use theenvironment variables NXNL_PRINT to execute the printing command.If the variable is set to null the printer functions use the lp Unix command, otherwise they execute thecommand described in the variable.Using the default command the print–outs have landscape orientation and each row contains up to 180characters.

When this variable is changed, to take it effective it is required to exit from CDE workspace and then loginagain.

N.B. This commands is used only for ASCII print–out, not for Hardcopy pop–up menu commands.

Page 92: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

86

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.11 Unused Virtual PDH ports garbage collection

Meaningful for IM configuration only.

– Relevant Process: trsMngAgent– Variable Name: NLCheckVirtual (not defined by default)

PDH ports and related NAPs, defined in a virtual NE, and not involved in any path, can be removed at thetrsMngAgent startup. This feature can be enabled or disabled by means of this environment variable. Ifthe variable is defined the check is performed, if it is not defined the check is skipped.

11.12 Setting Linked Get Replies Maximum Number

Meaningful for IM configuration only.

– Relevant Process: topMngAgent_g (nlMon_g)

In the 1354RM product, it does not exist the possibility to stop a get operation that produces a big amountof linked replies (e.g. not filtered full scope get operation). In any case is provided the possibility to definea maximum number of linked get reply that can be produced by a single operation.The maximum number must be defined as a parameter to the topMngAgent_g process specifying it inthe configuration file $NXNL_PRD/conf/conf_nlMon_g.The syntax is:

• /usr/snml/bin/topMngAgent_g, –suffix, <xxx>, –answer, <n_ans>

The parameter <n_ans> indicates the maximum number of linked replies allowed (default 1000). If it isindicated the number 0 no limit is set. If during a get operation the reply limit is reached a warning messageis displayed to the operator.

N.B. The string described in this paragraph as <xxx> is the suffix of the agent’s instances and mustnot be changed.

Page 93: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

87

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.13 NetView Symbol’s Labels

The fonts used in the Netview applications are specified in the file:

– /usr/snml/conf/users/admin/xapplresdir/C/OVw

and they are defined by means of the symbols :

*size30Font: –*–helvetica–medium–r–*–140–**size20Font: –*–helvetica–medium–r–*–120–**size10Font: –*–helvetica–medium–r–*–100–**smallFont: –*–helvetica–medium–r–*–80–*

They are automatically referenced by HP–OVw depending on the number of symbols to be displayed ina submap.If the symbol labels are too small the System Administrator could change the size of this fonts (i.e. the smallfont could be changed from ”–*–helvetica–medium–r–*–80–*” into ”–*–helvetica–medium–r–*–120–*”and then restart NetView application (close all the HP–OVw windows and start again the application).In the following an alternative font set with respect to the delivered one is listed:

*size30Font: –*–helvetica–medium–r–*–140–**size20Font: –*–helvetica–medium–r–*–120–**size10Font: –*–helvetica–medium–r–*–120–**smallFont: –*–helvetica–medium–r–*–120–*

Page 94: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

88

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.14 Performance Monitoring Customization

11.14.1 PM Data Collection Customization

11.14.1.1 EML’s configuration file

Meaningful for IM configuration only.

– Relevant Process: pmCollMng (pmMng)

It is on User responsibility to specify in a configuration file ”eml_PM_nodes” the host machines where theEML–IM applications communicating to RM the PM Data are.The file ”eml_PM_nodes” is present in the ”/usr/snml/conf” directory and must be manually filled by theoperator.

In the file a row has to be specified for each managed EML. Each row has the following syntax:<EML_ID> <host1> <host2> <remote_user> <home dir remote user> <dir 15M> <dir 24H>

where:

<EML_ID>: it is the EML identifier .<host1>: it is the logical host name where EML–IM application runs .<host2>: for WX, it is the second logical host name where the files could be present.

For SH it must be set to ”none”.<remote_user>: it is the remote user used by RM during the remote connection to get files.<home dir remote user>: it is the home directory of the remote user<dir 15M>: it is the name of the sub–directory where EML provides files for 15 minutes

granularity.<dir 24H>: it is the name of the sub–directory where EML provides files for 24 hours

granularity.

Example for SH:200 dogbert none rmpm /usr/1335sh/rmplug/data/pm pm15Dir pm24Dir

11.14.1.2 SENIM data file collection time–out

Meaningful for IM configuration only.

– Relevant Process: pmCollMng (pmMng)

To customize the time–out between two different file collection operations the following options can beinserted in the process starting command in the file /usr/snml/bin/pmCollMng :

– timeout15m <n>: it allows to customize the time–out value representing the collection frequency ofthe 15 minutes transfer files from the EMLs to RM. The value <n> must be expressed in minutes andit must be included between 15 (i.e. a quarter) and 225 (i.e. 3 hours and 45 minutes). If the optionis not specified the default value is 15 minutes;

– timeoutday <n>: it allows to customize the time–out value representing the collection frequency ofthe 24 hours transfer files from the EMLs to RM. The collection activity has anyway a built–in time–outof 4 hours after midnight to collect data file relevant for the last elapsed day. The value <n> must beexpressed in minutes and it must be included between 1440 (i.e. one day) and 8640 (i.e. six days).If the option is not specified the default value is 1440 (i.e. one day);

Page 95: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

89

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.14.1.3 TSD data file collection time–out

Meaningful for IM configuration only.

– Relevant Process: tsdFepColl.exe

T–FEP/COLL acts on a periodic basis: the collection frequency could be provisioned from a user by meansof a configuration file COLL_CFG . In COLL_CFG file the user can specify:

– the granularity (e.g. G 24, 24 hours granularity)

– a granularity list indicating the day partition and the collection frequency (e.g. 12 60, a copy fromEML is done every 60 minutes for the period starting from the previous period end till 12 A.M)

The configuration file COLL_CFG should be present in the directory specified by the enviornmentvariable PM_DATA_WORK; at the moment a COLL_CFG.make file is present as templete. It’s in chargeof the user to provide the COLL_CFG file.

When the file COLL_CFG is not present a default value is adopted from the tsdFepColl agent:

– G 24: freqency one hour

– G 15: frequency 15 minutes

11.14.1.4 SENIM Maximum number of data collection processes

Meaningful for IM configuration only.

– Relevant Process: lpmCollMng

To define the maximum number of parallel collection activity that can be executed the following option canbe inserted in the process starting command in the file /usr/snml/bin/pmCollMng

– maxscript <n>: the value <n> represents the maximum number of scripts that can be execute inparallel to collect the PM transfer files from the EMLs. If it is not specified the default value is 3.

11.14.1.5 TSD Maximum number of data collection processes

Meaningful for IM configuration only.

– Relevant Process: tsdFepColl.exe

To define the maximum number of parallel collection activity that can be executed the following variablecould be used NLcollMaxScript. If it is not specified the default value is 3

Page 96: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

90

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.14.2 PM Data Archive Customization

11.14.2.1 Create ORACLE User for Archive purpose

To allow the PM data archive function a new ORACLE user environment is required. The followingprocedure shall be executed after the RM installation:

a ) Create the ORACLE user (rmpmarch/rmpmarch) and relevant tablespace:$ /usr/snml/bin/pmInitRMPArchive.com

b ) Create required tables and views (dropping the old ones if any):$ /usr/snml/bin/pmCreateRMPArchive.com

c ) Initialize the ”PM Book Period” table in RM User DB (snml/snml) in order to customize the starting& ending time of Archive activity that will be taken into account by the next user archive request (itmust not be executed in case of DB import):

$ /usr/snml/bin/pmInitRMP.com

N.B. The starting date is by default the beginning of the current month and the ending date iscalculated using the variables described in 11.14.2.2 paragraph.

11.14.2.2 PM Data Archive Period Granularity

Meaningful for IM configuration only.

– Variable Name: DETAILEDARCHIVEPERIODDURATION (7)NORMALARCHIVEPERIODDURATION (1)

These variables are related to the archive activity of PM data of 15 min(DETAILEDARCHIVEPERIODDURATION) and 24h (NORMALARCHIVEPERIODDURATION). The firstone indicates the number of days (by default a week) that has to be elapsed before enable the archiveactivity on 15 min. The latter variable indicates the number of months (by default a month) that has to beelapsed before enable the archive activity on 24 min.

After that this period is elapsed the archive activity is enabled to archive data relevant to the elapsedperiod. Once the archive activity is executed a new period shall be elapsed to enable again the archiveactivity.

N.B. When the archive request is issued by the operator, if more than one archive periods areelapsed (difference between current time and end archive period is bigger that the durationindicated by these variables), all data relevant for these elapsed archive periods will be archivedin one shot.

When these variables are changed, to take them effective, it is required to exit from CDE workspace andthen login again.

Page 97: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

91

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.14.2.3 Delete prevention of Archived PM Data in the RM DB

Meaningful for IM configuration only.

– Variable Name: DETAILEDARCHIVEPERIODOVERLAP (7)NORMALARCHIVEPERIODOVERLAP (1)

These variables are related to the prevention of archive purging of PM data of 15 min(DETAILEDARCHIVEPERIODOVERLAP) and 24h (NORMALARCHIVEPERIODOVERLAP). The firstone indicates the number of days (by default a week) in which is granted that archived data relevant for15 min will not be removed from RM DB. The latter variable indicates the number of months (by defaulta month) in which is granted that archived data relevant for 24h will not be removed from RM DB.

When these variables are changed, to take them effective, it is required to exit from CDE workspace andthen login again.

11.14.3 PM Scheduled Report

Meaningful for IM configuration only.

– Relevant Process: pmMng– Variable Name: PM_DELAY_MIN (135) value in minutes

PM_DELAY_DAY (8) value in hours

PM_DELAY_MIN (relevant for 15 min data) / PM_DELAY_DAY (relevant for 24h data) an useful valueused in order to grant that when a report has to be generated, the meaningful counters have been alreadycollected and analyzed (i.e. stored in the DB). They allow to synchronize the collect & analysis and thereport generation activities.

e.g. PM_DELAY_MIN= 30 – the fifteen minutes report of the period 25/08/2000–23.00 to 23.15 will begenerated at 23.45 of 25/08/2000.

e.g. PM_DELAY_DAY= 8 – the daily report of 25/08/2000 will be generated at 8.00 AM of 26/08/2000.

11.14.4 PM Automatic Start/Stop Measures

Meaningful for IM configuration only.

– Relevant Process: pmMng– Variable Name: NLschedule15 (600)

NLschedule24 (600)

These variables allow to set the time–out value for the automatic Start and Stop of 15 min / 24h Measures.Their value has to be expressed in seconds (e.g. NLschedule15=60 means that the time–out for 15 minmeasures elapses each minute).

Page 98: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

92

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

11.15 How to change the default ASAP

In 1354RM a default ASAP for paths,trails and physical connections is created at the installation time andit is identified by the value ’default ASAP’ as userLabel (its asapId is always equal to 0).

An off–line procedure permits to substitute the default ASAP with an ASAP previously defined by the user.

The steps to execute this procedure are:

a ) Stop the system;

b ) execute a full backup (this procedure modifies the RM–DB);

c ) execute the procedure (by snml).

$ /usr/snml/bin/changeDefaultAsap

This procedure asks the userLabel of the new default ASAP to the operator.

The procedure checks if the ASAP specified by the operator is already defined. If it is not defined, the errormessage

Asap <userLabel specified by the operator> not Found’

will appear.

11.16 Procedure to set Swedish language

In order to enable the swedish chars on the keyboard you have to execute the following operations as nnmluser:

$ cd XAPPLRESDIR/C/include$ cp NLguiCommon NLguiCommon_english$ cp NLguiCommon_latin1 NLguiCommon$ cp NLfont NLfont_english$ cp NLfont_latin1 NLfont$ cp NLmatrix NLmatrix_english$ cp NLmatrix_latin1 NLmatrix

Page 99: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

93

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

12 QNN INTERFACE MANAGEMENT

12.1 Enabling / Disabling Qnn Agent Management

In order to enable or disable the management of Qnn Agent by the 1354RM PMC the following commandhas to be executed (using the ”root” Unix username) :

– # /usr/snml/etc/QnnAgentMng [ add | rem ]

The command will change the configuration file of the PMC application, but in order to make effective thenew configuration it is necessary to exit from PMC and than restart it again.

N.B. Exiting and restarting the PMC does not have any impact on the RM system status.

Before to remove the Qnn Agent by the PMC handling the user has to shutdown it.

After a patch installation the operator should perform the enabling of the QnnAgentManagement.

12.2 RM user definition for Qnn Zoom–In

The zoom–in operation from 1354NN to RM can be performed with three different profiles according tothe definitions given in the Qnn interface. The defined profiles are:

a ) NN administrator;b ) NN user;c ) NN viewer.

The first profile is mapped on the RM user ”qnnmng”, the second one is mapped on the RM user ”qnnagent”and the latter one with the RM user ”qnnview”.

If the following users are not defined, the zoom–in from NN cannot work and it is notdisplayed any additional message.

12.2.1 RM users definition script

After plug–in installation, in order to create the four gateway users (qnnmng, qnnagent, qnnview andqnnpmop) to zoom–in from NN the following command has to be executed (using the ”root” Unixusername) on all the RM workstations:

– # cd /usr/snml/etc# ./AddQnnUser

The command will define the users with the following characteristics:

RM user : Profile : NAD qnnmng : OSadmin : 1 qnnagent : PathBuilder : 301 qnnviewer : LookOnly : 40 qnnpmop : PathBuilder : 301 (to permit ftp operation from NN)

Page 100: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

94

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

12.3 RM Zoom–In from NN using RM USM

The 1354RM zoom–in execute from 1354NN is usually performed running the required application on1354RM Master system. If there are many 1354NN operators, this activity can overload the 1354RMMaster system.

In order to reduce the amount of activities on RM Master it is possible to specify which 1354RM USM ofthe same 1354RM cluster have to execute the zoom–in application instead of the 1354RM Master.

The “/usr/snml/conf/qnnDispMapping” file contains the relationship between the 1354NN X Displayrequire the zoom–in and the 1354RM USM that have to execute the application. To request this featureadd one line for each display that have to be served by 1354RM USM in the “qnnDispMapping” with thefollowing syntax:.– <nn display> <RM USM hostnamer> where “nn display” is the 1354NN display identifier, using

the X11 standard notation (eg.NNDISPLAY:0.0) and “RM USM hostname” is the hostname of theRM USM of the same 1354RM cluster of the 1354RM Master.

N.B. In case of 1354RM USM failure, the 1354RM zoom–in will fail also.

N.B. If the 1354RM USM is removed from the network also the related line(s) have to beremoved from “/usr/snml/conf/qnnDispMapping”.

Example of “/usr/snml/conf/qnnDispMapping”:nnmst1:0.0 rmusm1nnxt01:0.0 rmusm2nnmst1:1.0 rmusm3

Page 101: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

95

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

12.4 Limitation of Network Construction lead by Qnn Agent

The Qnn Agent is not able to manage a path that crosses connections between two Virtual NEsrepresenting other RM domains. It means that it doesn’t manage properly topologies with directconnections between two Virtual NEs (RM domains).

Physical ConnectionSubnetwork ConnectionVirtual NE

CTPA’ CTPB’

CTPB’’CTPA’’

1354RM

Network Domain n

Figure 3. Supported topology

Physical ConnectionSubnetwork ConnectionVirtual NE

CTPA’ CTPB’

CTPB’’CTPA’’

1354RM

Network Domain n

Figure 4. Not supported topology

A Virtual NE can represent more than one RM domain. It can represent a whole RM domain independentlyfrom its position into the topological hierarchy (contained in a subnetwork).

As workaround it is suggested:– to collapse into a single Virtual NE all the ”connected” RM domains, or– to represent remote RM domains belonging to the same ”protection route” with a single Virtual NE.

To avoid problem in the NN path allocation phase it is necessary also to disable pass–trough on virtualnode ( see Use of Virtual Nodes during Path Allocation Phase ).

Page 102: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

96

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

12.5 Limitation of Qnn path provisioning lead by RM

In the case of a SNCP protection (QosProtection=full or partial protection on the 1354NN ) asked byQnnAgent to the RM , if the RM is not able even to perform a partial protection the allocation fails (whilethe Qnn foresee a successful allocation with a degraded protection ).

It is possible change manually the protection (no protection) of that path on the RM and try to perform theredo operation from the 1354NN (only in the case of a path not corresponding ,on the Qnn, to a switchablesubnetwork connection).

12.6 Assigning Network Resources to 1354NN

Some restrictions apply on the Resource Assignment procedure to 1354NN:

a ) in order to assign an MS–Trail it is necessary to have already assigned at least one HO–LC;b ) in order to assign an HO–Trail it is necessary to have already assigned at least one LO–LC;c ) in order to assign a path, its NAPs shall be assigned.

So the suggested order to assign Network resources to 1354NN is the following (if the followingorder is not respected by the operator the result could be unpredictable):

a ) HO–LCs;b ) MS–Trail;c ) LO–LCs;d ) HO–Trail;e ) NAP’s;f ) Path.

For deassigning resources from 1354NN the following applies:

a ) in order to deassign an MS–Trail it is necessary to have already deassigned all HO–LCs;b ) in order to deassign an HO–Trail it is necessary to have already deassigned all LO–LCs.

Page 103: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

97

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

13 EML SIMULATION

The 1354RM can handle simulated EML domains and mixed networks with real and simulated EMLs.

In particular 1354RM can work in a stand–alone configuration either populating RM DB with EML data onlyor recovering a backup performed on a real RM plant.

13.1 Simulated EML data generation and EML registration

In the 1354RM a tool is provided to populate the RM database. The command is:

– $ /usr/snml/databases/dbsnml/init/gen_load <simulated data file name>

where ”file name” identifies the file that contains the data to load in the database.

N.B. The RM database must be empty before to perform this operation.

N.B. The RM doesn’t execute any congruency checks about ports contained in specific NE.

After the DB population with the ”gen_load” command all the EMLs must be registered as ”Simulated”.

– for TSD–IM Network: execute in a ”root” UNIX user window the command AddEML <EML domain>(present in the /usr/snml/bin directory), then exit from PMC (Process Monitor) application and startit again. At the end execute the manual start–up of the FEP agents.

– for SEN–IM Network: execute in a ”root” UNIX user window the command RegisterAllEmlSim(present in the /usr/snml/bin directory).

Page 104: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

98

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

13.1.1 Available Simulated data files

The directory /usr/snml/databases/dbsnml/init contains a set of TSD–IM Simulated data files and a setof SEN–IM data files which can be used for the generation. In addition, an offline tool can be used to createthe desired network file. The procedure to create a simulated data file is described in the following:

a ) Create the simulated data file by means of the command:

/usr/snml/databases/offline_conf/conf_NE

b ) The system asks for:

File name. Enter the filename and press Return.

c ) The system asks: “ Is filename a new file? “. If you answer Yes you will have to enter all values,otherwise the system wiil present you the actual file values, in order to modify them.

d ) The system asks for:

EML domain Enter the EML domain id and press Return.

EML userLabel Enter the EML userLabel and press Return.

SHversion press Return.

e ) The system asks for:

neType. Enter the number correspondent to the desired equipment type and pressReturn.

NEuserlabel Enter the NE userLabel and press Return.

sitename Enter the NE sitename and press Return.

f ) Per each slot the following mask is presented:

SLOT n. ... List of boards

1 Board name 1

2 Board name 2

n Board name n

To select the board, enter the number correspondent to the desired board and press Return.

g ) Execute steps e ) to f ) for all the network elements to specify.

h ) If you press Enter at the end of step f ), the application closes.

i ) The file created is placed under /usr/snml/databases/offline_conf

j ) Move or copy the file to the directory /usr/snml/databases/dbsnml/init, in order to render itexecutable.

Page 105: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

99

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

13.1.2 Simulated data file syntax

The syntax used in the simulated data file is as follows:

EML emlDomId=<eml domain Id> userLabel=<eml domain name> imType=<im type>senImVersion=<senim version supported> reachable=<reachable flag> virtualEML=<virtual eml>

eml domain Id = Identifier of EML domaineml domain name = EML Domain User Labelim Type = tsdIm or senImsenim version supported (if imType=senIm) = Identifies the SEN–IM version that should besupported by the defining EML. Its values must be set equal to ’v40’reachable flag = It specifies if the EML is reachable or not (its value can be ”True” or ”False”)virtual eml = It specifies if the EML is virtual or normal.

NE neType=<ne type> userLabel=<ne name> tsdImVersion=<tsd version> siteName=<site name>confType=<configuration type> version=<ne version>

ne type = Type of NE. Its value can be : ne1641sm, ne1651sm, ne1641smC, ne1651smC,ne1661smC, ne1664sm, ne1641sx, ne1631fox, ne1654sl, ne1664sl, ne9600luM &ne9600luHne name = Network Element User Labeltsd version (if imType=tsdIm) = It specifies the tsd version used (default=5.5)site name = Location of NEconfiguration type = For all NE types, but 1651SM & 1661SMC, it assumes the same value ofne type substituting ”ne” with ”cnf” (e.g. ne1641sm has configuration type cnf1641sm). For the1651SM & 1661SMC it specifies if the NE is Full Matrix or Null Matrix (cnf1651smNull orcnf1651smFull / cnf1661smCNull or cnf1661smCFull).ne version = It specifies the NE version used to check NE connectivity constraints (if no versionis known it could assume the value ’9.9’).

PORT technology=<port techno> physicalPortType=<port rate> sdhPortType=<SDH port type>userLabel=<port name> interfaceType=<cable or optGen>

(the following row allow to define the topology address of tsd ports only)Rack=<rack id> Subrack=<subrack id> Board_p=<board id> PortNumber=<port number>

port techno = It specifies the port is ’sdh’ or ’pdh’.port rate = Its value depends on ”port techno” attribute

(techno=sdh) the admitted values are : stm1, stm4, stm16, stm64 & stm0(techno=pdh) the admitted values are : c12, c3 (34 Mbit), c345Mb (45 Mbit), c4, c3C12(framed 34 Mbit), c3Conf & c3C12Conf (configurable framed 34 Mbit), c4Conf &c4C12Conf (configurable framed 140 Mbit).

SDH port type = this parameter should be specified for sdh ports only. Its values are : westAggr,eastAggr, tributary, master, slave & generic.port name = This string is added to the NE name to generate the port user label (NE name +”/” + port name).

BOARD <board type> <port prefix name> (this command allow to define in one shot more than one PDH ports)

board type = It specifies the board type (NxR means N ports of R Mbits). Its values are 21x2,3x34 & 3x45.port prefix name = This string is added to the NE name to generate the port user label plus asequential suffix number (NE name + ”/” + port prefix name + sequential number).

The NEs under the EML definition are contained in the EML domain, the ports and the boards under theNE are contained in the NE.

Page 106: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

100

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

13.2 Real Network Simulation

It is possible to transfer data of a real ”live” network on a stand–alone RM configuration in order to workwith 1354RM product on this data.

To reach this goal it is necessary to perform a RM backup of the real network and than restore it on theRM stand–alone. Finally on the RM stand–alone workstation the EMLs are to be registered as ”Simulated”:

– for TSD–IM Network: execute in a ”root” UNIX user window the command AddEML <EML domain>(present in the /usr/snml/bin directory), then exit from PMC (Process Monitor) application and startit again. At the end execute the manual start–up of the FEP agents.

– for SEN–IM Network: execute in a ”root” UNIX user window the command RegisterAllEmlSim(present in the /usr/snml/bin directory).

Page 107: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

101

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

14 HOW TO CHANGE THE USERLABEL OF NES

In this section it is described the procedure to align the userlabel of NEs to the values reported on theEMLs.

It is supposed that the operator has already changed the userLabel on the EML.

Please take care of the differences between QB3* (SEN–IM) and QB3 (TSD–IM) NEs.

14.1 NEs with SEN–IM interface

a ) Stop emlObjAgent by using the process control

b ) Stop the process control

c ) By snml, execute the following shell command

export NLnochecks=TRUE

d ) By using the same shell, launch the process control with the command

mngAgent&

e ) Start emlObjAgent

f ) Execute the EMLsynchronize for each EML which contain NEs with userLabels which are modified.With NLnochecks environment variable set to TRUE, every change on the attributes of NEs and Portsis admitted. So, it is preferable to check all the attribute value changes sent during this alignmentphase. Be sure all the EMLs are aligned (the attribute emlDomainAlignement has to be equal to nor-mal).

g ) Stop the process control.

h ) Execute the following shell command

unset NLnochecks

i ) Launch the process control and start again emlObjAgent.

j ) Eventually align the userLabel of pmNes and pmTps objects (see below).

14.2 NEs with TSD–IM interface

a ) Execute the EMLsynchronize for each EML which contain NEs with userLabels which are modified.

b ) Eventually align the userLabel of pmNes and pmTps objects (see below).

Page 108: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

102

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

14.3 Aligning the userLabel of PMNEs and PMTPs

a ) By using the process control, stop the pmMng agent.

b ) By using snml, execute the following SQL procedure

$ORACLE_HOME/bin/sqlplus $NXNL_DATABASESQL> @/usr/snml/databases/dbsnml/admin/conv/alignPmUserLabel

The procedure requires the userLabel of the migrated NE (with TSD–IM interface).

14.4 Moving ET from Generic to Meshed

a ) By using the process control, stop the topMngAgent_csa agent.

b ) By using snml, execute the following command:

$ /usr/snml/databases/dbsnml/admin/conv/etMigrationFromGenericToMeshed.com

It is required the Identifier of the elementary topology.

Page 109: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

103

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15 MIGRATION PROCEDURE

In this section the migration procedures between RM 2.4 and RM5.2.x are described.

Every procedure requires the following environment variables:

a ) NXNL_DATABASE: it points to the current RM database. This variable is usually set by the profileof the user snml;

b ) MIG_TAR: it represent a temporary directory where the tar files are stored. This directory must becreated with the permission set to readable and writable from everyone. If you choose the directory/mig as mig_tar directory, you have to execute the following UNIX commands (by snml user):

mkdir /migchmod 777

c ) login as root user (by command <su root> not <su – root> otherwise your environment are modified)and execute:

MIG_TAR=”/mig”#export MIG_TAR

d ) MIG_PAR: it points to a directory where the parameter files are present. The following UNIX com-mand must be executed to set the proper value for this variable:

MIG_PAR=”$DB_ROOT/admin/conv”#export MIG_PAR

e ) MIG_BACKUP: it represents the directory where the data files produced/used during the export/im-port phase are stored. This directory has to be created before the execution of the migration proce-dure. For example, if you choose the directory /mig_backup as mig_backup directory, you must exe-cute the following UNIX commands (by root):

#mkdir /tmp/mig_backupMIG_BACKUP=”/tmp/mig_backup”#export MIG_BACKUP

Every migration procedure checks if these variables are correctly set. If a check fails, an error messageis displayed and the executions stops.

Page 110: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

104

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15.1 1354RM R2.4 (NR3.1) to 1354RM R5.2.x Migration Procedure

Pre–conditions: 1354RM R2.4 already installed in /usr/snml (see $SNML_HOME)

a ) Be sure RM and EMLs are aligned (execute EMLsynchronize for each EML and the global consisten-cy audit/download).

b ) If you want to export also OVW–MAPs, save by DNM the maps to be converted by DNM (select menuFile–>Distribute maps–>Store map images).

c ) Perform a system full backup.

d ) Stop 1354RM system if necessary (the database must be on instead), log in as ”root” users and chan-ge your current directory to the old delivery home directory:

$ mngAgent shutdown control$ mngAgent shutdown system$ su root# cd /usr/snml

e ) Extract the export database procedures from the 1354RM R5.2.x installation kit:

# uncompress –c <1354RM_inst_kit> | tar xvf – ./databases/dbsnml/admin/conv

Particularly, the following files are used during the export phase:./databases/dbsnml/admin/conv/expDbRmRel./databases/dbsnml/admin/conv/expDbRm.par

and a couple of file with extension sql and ctl for each table of the RM database with aschema incompatible between RM2.4 and RM5.2.x (node table).

# cd $DB_ROOT/admin/conv# chmod +x expDRmRel

f ) (if necessary), create the directories (named mig–backup and mig_tar directories) where the datamigration files will be copied.

For example, if you want to create the directory /tmp/mig_backup to collect the data migration files,and the directory /mig where tar files are saved, the following command have to be executed:

# mkdir /tmp/mig_backup# mkdir /mig

g ) Assign the name of the mig–backup directory to the MIG_BACKUP environment variable, and thename of the mig_tar directory to the MIG_TAR environment variable.

For example, if the mig–backup directory is /tmp/mig_backup and /mig is the mig–tar directory, thefollowing command have to be executed:

# MIG_BACKUP=”/tmp/mig_backup”# export MIG_BACKUP#MIG_TAR=”/mig”#export MIG_TAR

Then, you have to assign the value of the MIG_PAR directory as below:

#MIG_PAR=”$DB_ROOT/admin/conv”export MIG_PAR

Page 111: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

105

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

h ) Change your current directory to the ”conversion” directory:

# cd $DB_ROOT/admin/conv

i ) Perform the export procedure:

# ./expDbRmRel release 2.4

The procedure asks the operator some confirmations concerning:

the database to be exported (environment variable $NXNL_DATABASE)the mig–backup directory (environment variable $MIG_BACKUP)the mig–tar directory (environment variable $MIG_TAR)the directory for the parameters files (environment variable $MIG_PAR).

If the variables are correctly set, the operator must press <Enter> twice, otherwise the operator canpress <Ctrl–C> and set again the uncorrect environment variable.

The procedure creates (if necessary) the directory $MIG_TAR where data to be exported will besaved.

The directory $MIG_BACKUP is saved and the file databaseRM24.tar is created in the $MIG_TARdirectory. This tar file contains all data of the ORACLE–database of RM2.4.

Then the procedure asks the operator if the OVW–MAPs are to be exported. The following messageappears

Do you want to export MAP–DB ? [y/n – default y]

If the operator press either <N> or <n> (followed by <Enter>), the directory $NXNL_MAPDBAREAis not exported, otherwise the file mapdbRM24.tar is created in the $MIG_TAR directory.

Finally, the operator can save the $MIG_TAR directory on tape. This is necessary when the RM5.2.xmust be installed over the RM2.4 and no extra WS are available. The following message appears

Do you want to save EXPORT–files on tape ? [y/n – default y]

If the operator press either <N> or <n> (followed by <Enter>), the directory $MIG_TAR is not savedon tape.

In this case, the files databaseRM24.tar and mapdbRM24.tar in the $MIG_TAR directory can besaved on an extra WS using the ftp command. The option bin of the ftp must be used to copy the twofiles.

If some errors occur the procedure stops itself and prints the log filename where the error is described(expDbRm.log in the $MIG_BACKUP directory).

Every time the procedure is executed, the previous log file is automatically saved as expDbR-m.log.save.

If you previously selected the copy of tar files on tape, the following message appears:

Do you want to save EXPORT–files on tape again ? [y/n – default y]

If the operator press either <N> or <n> (followed by <Enter>), the directory $MIG_TAR is not moresaved on tape, otherwise another copy of tar files are saved on a new tape (please remember to chan-ge the tape after every operation).

Page 112: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

106

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

j ) Install 1354RM R5.2.x delivery (see 3.1), creating a new database (variable NEW_DBSNML mustbe set to ”yes” value in /usr/snml/env_snml file (see 3.1.3)).

k ) Execute again the steps h), i) and j) if necessary.

l ) Change your current directory to the ”conversion” directory (after the 1354RM R2.4 installationDB_ROOT is the directory name of the new database):

# cd $DB_ROOT/admin/conv

m ) Be sure the system is ”off”, otherwise shutdown it using the Process control

n ) Be sure the database is running, otherwise start–up it using the Process control

o ) Perform the import procedure# ./impDbRmRel release 2.4

The procedure asks the operator some confirmations concerning:

the database to be exported (environment variable $NXNL_DATABASE)the mig–backup directory (environment variable $MIG_BACKUP)the mig–tar directory (environment variable $MIG_TAR)the directory for the parameters files (environment variable $MIG_PAR).

If all the variables are correctly set, the operator must press <Enter> twice, otherwise the operatorcan press <Ctrl–C> and set again the uncorrect environment variable.

The procedure creates (if necessary) the directory $MIG_TAR where data to be imported will besaved.

First, the operator can choose if data to be imported have been stored on tape. The following mes-sage appears

Do you want to restore IMPORT–files from tape ? [y/n – default y]

If the operator press either <N> or <n> (followed by <Enter>), no files are restored from tape (it issupposed the files databaseRM24.tar and mapdbRM24.tar – if the OVW–maps have to be imported– have been previously copied in the /mig directory by an extra ws using the ftp command with thebin option set), otherwise the tar files are restored from tape.

Then, the operator can choose if the OVW–MAPs must be imported too. In fact, the following com-mand appears

Do you want to restore MAP–DB ? [y/n – default y]

If the operator press either <N> or <n> (followed by <Enter>), the OVW–maps will not be imported.In this case, the OVW–MAPs will be rebuilt after the migration of the ORACLE–database of the RM.

If some errors occur the procedure stops itself and prints the log filename where the error is described(impDbRm.log in $MIG_BACKUP directory). If no errors occur the 1354RM R5.2.x database is popu-lated with data stored in R2.4 one.

Every time the procedure is executed, the previous log file is automatically saved as impDbR-m.log.save.

Page 113: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

107

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

N.B. The import procedure creates a big ORACLE tablespace named large_rbs_tbs. Thistablespace is dropped at the end of the procedure. However, if the import procedure failsbecause of an ORACLE error on large_rbs_tbs tablespace (or large_rbs rollback seg-ment), the following commands must be executed:

# rm $DB_ROOT/data/large_rbs_tbs.dbf $DB_ROOT/etc/create_db (to be executed by snml)The last command resets the entire ORACLE database.

p ) Execute the full backup

N.B. Moreover, PDL files produced in RM2.4 couldn’t be properly executed with RM2.3(because of the port–userLabel change between SH1.2 and SH3).

Page 114: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

108

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15.2 Virtual EML registration on Communication Infrastructure (CI)

This procedure has to be executed after the migration steps described in (15.1).It registers the EML simulator agent of 1354RM (emlSimulAgent.exe) as the process which answers toCMISE services requests forwarded to virtual Eml domains. Without this registration, you will get ”Object Manager Not Found” error messages for actions/gets/etc.involving virtual Nes.

15.2.1 Prerequisites

Prerequisite 1: you have to know the list of emlDomainIds of virtual eml.This can be done using ’Browser’ user interface manager, making a get on 1354RM (yellow) object (thechild of ’MULTI SNML–IM’, labeled ’SNML–IM’). Ask for ’Eml Domain’, press the ’Filter’ button, select’Virtual’ ’equal to’ ’Virtual’ on the filtering mask. You will find all virtual eml(s). For each of them, make a’show/set attribute’ (select one of them, then press the lens icon); the requested Id is ’EML Domain Id’ at-tribute.Note: very often, the only virtual EML is the one with emlDomainId = 0.

Prerequisite 2: you have to know UNIX root (superuser) password.

15.2.2 Procedure steps

a ) Login as ’snml ’ user, then change current directory to $NXNL_PRD/bin with the commandcd $NXNL_PRD/bin

b ) Get superuser (i.e. root) privileges issuing the following command (you will need root password):su root (Note: this is not the same as su – root)

c ) start the registration of virtual eml domain with emlDomainId = <n> issuing./RegisterSim nAnswer ’y’ if you are prompted for creation of VEML<n>simul.vlrf file.ovaddobj utility will be invoked in order to registrate emlDomain <n> objects.

d ) Repeat step c ) for every virtual EML domain.

Page 115: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

109

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15.3 Migration Procedure of NEs

In the following, the steps to be executed when an NEs is changed are described. These steps mustbe executed on RM5.2.x when:

a ) a QB3* NE is migrated in a QB3 NE one

b ) a QB3* NE is migrated in a new NE one (tipically when an NE chages its EML domain)

c ) a QB3 NE is migrated in a QB3 NE one (tipycally when an NE changes its neGroup)

The last two points are implemented with the same utility (see neTranslation).

Page 116: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

110

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15.3.1 NE migration between QB3* and QB3 interface

15.3.1.1 Overview

In the following, a brief description of the procedure to migrate one NE between QB3* and QB3 interfaceis done.

Two different cases are foreseen, ADms and DXCs.

a ) in case of ADMs, stop the supervision (all the alarms are cleared). In case of DXC, a procedure toclear alarm is available on RM (see below)

b ) Prepare a file with the association between the old and the new portId (NE migration file). In caseof DXC, this file is computed by RM. Instead, for ADMs, a procedure on SH will be available to dothis. The file name is equal to the userLabel of the NE to be migrated. The format of the file is:

BEGIN FDN_MAPPING_FILE<neUserLabel><oldSdhPortIdId> <newSdhPortIdId>END FDN_MAPPING_FILE

c ) Stop the FEP–PN process corresponding to the neGroup of the NE (when migrated in QB3)

d ) Execute a full backup of DB RM

e ) Create the new neGroup (if necessary).

f ) Execute the neMigration procedure in order to change all the fdnMapper of Ports (and NE too). Thisprocedure changes the userLabel of the NE (if required) and all the Ports accordingly to the TSD nam-ing rules.(See 1.3.2.2).

g ) Start supervision on SH.

h ) Execute on RM a synchronizeEml on neGroup at the end of the neMigration. If this operation is su-cessfully terminated (emlDomainAlignment=normal), the equipment is well converted in TSD–IM,otherwise the error messages have to be carefully analyzed and a restore of RM DB is required.

i ) Execute a consistency audit (mark audit) of NE.

During the consistency audit all the fdnMappers of the newtork objects are completely aligned.

Particularly:

1 ) MSCtps, HO–CTPs and NAPs have to be aligned to the fdnMapper of the physical port;

2 ) CAPs are aligned when the connection CTP–CAP is aligned

3 ) LO–CTPs are aligned when their CAP is aligned.

j ) Execute an alarm synchronization of NE

At the end, the equipment configuration of NE is well known by RM (the consistency status of all the objectis equal to normal). During the execution of the procedure, the NE to be migrated is in download disablemode. The procedure changes the status for you. Alarm activity is suspended (this is due to the fact allthe network objects belonging to the NE are not aligned inside the RM database).

Page 117: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

111

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15.3.1.2 Use of neMigration Tool (Qb3*/Qb3)

The tool neMigration performs the migration of NE in a new version QB3 (SH5). The tool is executed by starting the shell script neMigration as snml user.It is located in /usr/snml/databases/dbsnml/admin/conv directory.

You must set the following environment variables:

a ) MIG_LOG: it contains the directory’s name where you want to save the migration.log file.

b ) MIG_BACKUP: it contains the directory’s name where are located the migration data file.

For example, the following UNIX commands can be used in order to set these environment variables:

c ) $ export MIG_LOG=/users/snml/log

d ) $ export MIG_BACKUP=/users/snml/backup

MIG_LOG variable is assumed to be equal to MIG_BACKUP value. The tool also saves its log file intoMIG_BACKUP directory.

The utility creates a new windows containing the following functions:

1 ) Prepare DXC Ports : this function prepares a input data file with old portid and new portid tomigrate the DXC. For ADM, the data file is provoded by the SH system.

2 ) Check Data : this function checks all data involved in migration, (Ne data, Eml, ports, negroupversions). It is also checked all the connection are supported by the target version of TSD–IM..

3 ) TSD Convert : this function performs the migration of Ne in new neGroup. During this phasechecks previously described are executed again..

The new neGroup Before (supporting the TSD–IM interface) must also be created in RM database beforeexecuting the last two steps..

When you start the Prepare DXC Ports option, two options can be selected

1 ) Continue: to insert the SEN–IM Userlabel of the NE to be migrated.

2 ) Return to main menu : to go back to the main menu.

In case of DXC, this option creates a data file for DXC and saves it in MIG_BACKUP directory that youhave set previously. The file have following format:

BEGIN FDN_MAPPING_FILE<neUserLabel><oldSdhPortIdId> <newSdhPortIdId>END FDN_MAPPING_FILE

file name is the userlabel of DXC.

Page 118: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

112

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Check data option is composed by four options:

1 ) Check Ne data : this option alows to verify the data file (if it is correct and complete)

2 ) Check connectivity of Ne : it checks if the protected multi point cross connections on SH havebeen implemented. in this case, the path userLabel and the nodenames when these cross–con-nections are present are reported to the operator. Th

The operator must remove all th protected legs (except for one)

3 ) All : this function performs the options at point 1) and 2)

4 ) Return to main menu: to go back to the main menu.

When you start the TSD convert option , the following option can be choosen by the operator:

1 ) Clear alarm : this function clears the elemntary alarms correlated to networks objects belongingto the NE to be migrated . The userLabel of the NE is requested by the operator.

2 ) Convert Ne : this function performs the Ne migration.

3 ) All : this function performs the options at point 1),2,3)

The operator can enter the following data:

a ) userLabel : SEN–IM userlabel of the NE to be migrated

b ) neGroup : neGroupId (with TSD–IM interface) where the NE is to be migrated

c ) neId : ID of the Ne int the new SH (with TSD–IM interface)

d ) TSD user label : new user label of Ne (optional)., If not specified by the operator, it is as-sumed the NE doesn’t change its userLabel.

4 ) Return to main menu: to go back to the main menu.

At the end of the procedure, two choices can be selected by the operator, regarding the log file procedure:

1 ) Read log file: the operator want to read the log file

2 ) Skip log file: the operator is not interested in analyzing the log file. However, it will be possibleto read it by using a text editor. Remember that the log file is $MIG_LOG/migration.log.

Page 119: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

113

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15.3.1.2.1 Error codes:

1 ) Generic system error ! : system error, header file corrupted, etc.

2 ) Error in parameters number or parameters type ! : the list of input parameters is not correct

3 ) Database error ! : connection with DB is lost or DB is not available.

4 ) Memory allocation error ,check your free memory ! : an internal error on heap has been found

5 ) Database read fault ! : a get on DB is failed

6 ) Error in number of Ne retrieved ! : this error is generated when two or more Nes with the sameuserlabe was found

7 ) Error in number of Node retrieved ! : this error is generated when two or more Node with thesame Id was found

8 ) Database read wrong attribute ! : a wrong attribute value was found.

9 ) Generic error ! : this error is generated when a procedural error was found, tipically during theEx: prepareDXCPorts phase.

10 ) Error in number of Tp retrieved ! : a protected multi–point connection was found but its TP listis corrupted

11 ) Found switch connections in topology ! : a protected multi–point connection was found.

12 ) Ne not found in the database ! : The Ne with the specified userlabel is not retrieved in RM data-base

13 ) Migration file not found ! : the data file has not been retrieved in $MIG_BACKUP directory.

14 ) neGroup not found in the database ! : the new neGroup (TSD–IM) is not retrieved in RM DB (itis to be created off–line)

15 ) neGroup is not TSD–IM ! : the new neGroup involved in migration supports SEN–IM interface

16 ) New userLabel duplicate ! : the new userlabel of Ne is not unique.

17 ) Error in IM version ! : the Ne involved in migration is already equipped by TSD–IM interface

18 ) Database write fault ! : a DB write is failed

19 ) Database delete fault ! : this error is generated when a DB delete on observed port is failed

20 ) Migration file doesn not exist ! : the data file is not present in $MIG_BACKUP directory.

21 ) Error in clear alarm ! : the disable alarm correlate to the Ne failed.

Page 120: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

114

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15.3.1.3 How to align the Q3disableAlarms attributes of paths/trails

The neMigration procedure changes all the informations in the RM–database in order to allow the execu-tion of the download activity. During this phase, the network element is set how all the object were directlycreated with the TSD–IM interface. So, the disabledAlarms attributes of NAPs, CAPs, CTPs boundary andPDH physical ports are modified if the connections are implemented on them. In other words, it is neces-sary that the proper alarms are enabled on the physical end points of the paths/trails wich are implementedon them This task is executed by the RM when the TSD–IM interface is used.

However, the neMigration procedure is not able to compute the proper Q3disabledAlarms on the entirepaths/trails; in fact, the procedure only works on objects belonging to the migrated Ne.

Then, it is possible that the Q3DisabledAlarms attributes of the transport Servers are not correct after amigration of one NE. These attributes can be computed by the following steps:

a ) check if the PL/SQL packages are already load on your Oracle instance by using the command (assnml)

$ORACLE_HOME/bin/sqlplus $NXNL_DATABASESQL> SELECT COUNT(*) FROM user_source where name=’ALIGNENABALARMS’;

b ) if the select statement of the previous step returns 1 row, please execute the following step, else thepackage has to be loaded with the SQL COMMANDS:

SQL> @/usr/snml/databases/dbsnml/admin/conv/alignQ3AlarmsPck_specSQL> @/usr/snml/databases/dbsnml/admin/conv/alignQ3AlarmsPck_body

Pratically, the PL/SQL package must be loaded just either the first time this procedure is executedor when the database is created again.

c ) execute the SQL command

SQL> @/usr/snml/databases/dbsnml/admin/conv/alignQ3Alarms

The procedure requires the userLabel of the migrated NE (with TSD–IM interface).

Page 121: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

115

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15.3.2 neGroup modification

In order to modify the emlDomain of NEs with QB3* and Qb3 interface, the utility neTranslation must beexecuted.

This procedure allows you to change the emlDomain (neGroup in QB3 terminology) in the RM–DB. It issupposed that during the neGroup modification activity:

a ) the SEN–IM/TSD–IM object Identifiers don’t change;

b ) the EML interface doesn’t change.

You must start a shell script named neTranslation as snml user.This program is located in /usr/snml/databases/dbsnml/admin/conv directory.

Before starting this script the following environment variablesmust be set:

a ) MIG_LOG: it contains the directory’s name where you want to save the migration.log file.

b ) MIG_BACKUP: it contains the directory’s name where are located the migration data file.

For example, the following UNIX commands can be used in order to set these environment variables:

c ) $ export MIG_LOG=/users/snml/log

d ) $ export MIG_BACKUP=/users/snml/backup

If the MIG_LOG variable is not defined, all the log files are saved in the $MIG_BACKUP directory.

The utility creates a new windows containing the following functions:

1 ) Check Data : this function checks all data involved in migration, (Ne data, Eml, ports, negroupversions).

2 ) neTranslation : this function performs the translation of Ne in new neGroup, during this phase(all the checks of point a) are executed again).

Before starting the checkData you also must create a new neGroup before.

When you choose the checkData option, two options can be selected

1 ) Continue: to checks all the data which are used in the next phase;

2 ) Return to main menu : to go back to the main menu.

When you start the NeTranslation , two options can be selected

1 ) Continue: to execute the translation of the emlDomain;

2 ) Return to main menu : to go back to the main menu.

If you choose the option 1), you must enter the name of the file containing the data of the NEs to be trans-lated (complete pathname, if the directory of the file is not the directory when the utility is executed).

Page 122: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

116

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

The format of the file is the following:EMLIM_MOVE_FILE<oldNeFdnMapper1> <newNeFdnMapper1><oldNeFdnMapper2> <newNeFdnMapper2>........<oldNeFdnMapperN> <newNeFdnMapperN>END_EMLIM_MOVE_FILE

The format of the neFdnMapper is dependent on the interface (SEN–IM or TSD–IM) of the NE itself.

At the end of the procedure, two choices can be selected by the operator, regarding the log file procedure:

1 ) Read log file: the operator want to read the log file

2 ) Skip log file: the operator is not interested in analyzing the log file. However, it will be possibleto read it by using a text editor.

15.3.2.1 Error codes

1 ) Generic system error ! : system error, header file corrupted, etc.

2 ) Database error ! : database corrupted, connection with DB lost, etc.

3 ) Memory allocation error ,check your free memory ! : an internal error on heap has been found

4 ) Database read fault ! : a get on DB is failed

5 ) Generic error ! : this error is generated when a procedural error was found

6 ) Translation file error ! : the input data file is not correctly formatted.

7 ) Error in IM version ! : this error is generated when the Ne involved in migration have differentinterfaces (TSD–IM versus SEN–IM and viceversa).

8 ) Database write fault !: a DB write is failed

9 ) Error in parameters number or parameters type ! : this error is generated in case of wrong num-ber or type program parameter.

10 ) Translation file not exist ! :the data file is not present in $MIG_BACKUP directory.

11 ) Ne not found in the database ! : the Ne to be moved ins not present in RM–DB

12 ) neGroup not found in the database ! : the neGroup involved in the migration is not present inDB

Page 123: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

117

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15.4 OVW Map Conversion from 1354RM R2.4 to 1354RM R5.2.x

a ) Restore mapdbRM24.tar (RM2.4)

b ) Start RM5.2.x

c ) Start OVW (Netview)

d ) Create the new map

e ) Open a map with the DNM command File–>Distribute maps–>Get/List Map Images

f ) Save the map selecting the DNM command File–>Distribute Maps–>Store Map Image

g ) Execute the full backup.

15.4.1 Recover Maps after migration when changing ntwDomld

When migrating a RM to another one, or after trying to recovered a distributed map in a different RM,installed with ntwDomId different of the previous one, the OV maps are no more useful, as they use thentwDomId attribute as the root of the naming tree for the objects in the map.

A tool is provided to change the references to the new ntwDomId, in order to made the maps still usable.

These steps must be executed before point b) of the previous paragraph.

15.4.1.1 Change ntwDomId on saved Maps

a ) Execute the following commands:

# cd $DB_ROOT/admin/conv# MapChangeNtwDom <map–name> <new_NtwDomId>

where <map–name> is the name of the map to be converted;

b ) Now yo have the map again as an distrubuted map. To recover it, proceed as usual.

N.B. NOTE: The old map is copied as $NXNL_MAPDBAREA/<map–name>.db.OLD. You can re-cover it, in case of errors, or delete it otherwise, to save disk space.

Page 124: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

118

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

15.5 Virtual EML registration on Communication Infrastructure (CI)

This procedure has to be executed after the migration steps described in (15.1).It registers the EML simulator agent of 1354RM (emlSimulAgent.exe) as the process which answers toCMISE services requests forwarded to virtual Eml domains. Without this registration, you will get ”Object Manager Not Found” error messages for actions/gets/etc.involving virtual Nes.

15.5.1 Prerequisites

Prerequisite 1: you have to know the list of emlDomainIds of virtual eml.This can be done using ’Browser’ user interface manager, making a get on 1354RM (yellow) object (thechild of ’MULTI SNML–IM’, labeled ’SNML–IM’). Ask for ’Eml Domain’, press the ’Filter’ button, select’Virtual’ ’equal to’ ’Virtual’ on the filtering mask. You will find all virtual eml(s). For each of them, make a’show/set attribute’ (select one of them, then press the lens icon); the requested Id is ’EML Domain Id’ at-tribute.Note: very often, the only virtual EML is the one with emlDomainId = 0.

Prerequisite 2: you have to know UNIX root (superuser) password.

15.5.2 Procedure steps

a ) Login as ’snml ’ user, then change current directory to $NXNL_PRD/bin with the commandcd $NXNL_PRD/bin

b ) Get superuser (i.e. root) privileges issuing the following command (you will need root password):su root (Note: this is not the same as su – root)

c ) start the registration of virtual eml domain with emlDomainId = <n> issuing./RegisterSim nAnswer ’y’ if you are prompted for creation of VEML<n>simul.vlrf file.ovaddobj utility will be invoked in order to registrate emlDomain <n> objects.

d ) Repeat step c ) for every virtual EML domain.

Page 125: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

119

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

16 UPDATE OF MSSPRING INFOS (MS–SPRING TAKEOVER)

In the following it’s described the procedure which is able to modify the MS_SPRING–related informationcontained in the node objects that belong to an MS–SPRING ring (=et).This is required when 1354RM takes over an existing network previously administered by another OS withMS–SPRING rings containing paths/trails that you want to preserve without traffic hits. In this case, youhave to provide manually the informations (values of NODE.NODEINET and NODE.SEQNUMINETdatabase columns) that 1354RM automatically downloads to NEs (at ring implementation time); this infosare used in squelching tables management (see below). If you don’t provide this infos, RM will downloadthe default ones, so overwriting the correct ones and making squelching tables not consistent. The targetis to put in 1354RM database the same values that are stored in the NEs; this way, theimplementation–time download will have no effect.

16.1 Prerequisites

a ) The ring(s) that you want to update has(have) to be activated. When all the steps of the procedure are completed, you will have to implement the ring(s).

b ) You have to know the NODE.NODEINET and NODE.SEQNUMINET actually stored in NEs. If youdon’t know them, a way to obtain them using Craft Terminal equipment is suggested in the following.

Nodes in a MS–SPRING are numbered clockwise starting from zero and ending in <number of nodes inMS–SPRING> –1). This is the SEQNUMINET of NODE table information in RM terminology, and thenodePosition field of ringMapInfo attribute of mSSPRingProtection MOC in SENIM terminology.

Every node has a ”labeling number” whose value is between 0 and 15. The only requisite is that no nodehas this number equal to another one. This is called the NODEINET of NODE table in RM terminology,and both the nodeId attribute of mSSPRingProtection MOC and the nodeId field of ringMapInfo attributeof mSSPRingProtection MOC in SENIM terminology.This ”labeling number” is mainly used to identify nodes in squelching tables. If the values don’t match, thewhole MS–SPRING protection mechanism is compromised.

Every Network Elements knows this informations for all nodes, i.e. it has hardware registers containingall the (SEQNUMINET, NODEINET) mapping for every node.

To retrieve this information from an existing network a possible way is to use a Craft Terminal connectedto Network Elements. Please refer to document ”1664 SMECT V2.0” : ”SYNCHRONOUS MULTIPLEXER 1664 SM RELEASE2.0 EQUIPMENT CRAFT TERMINAL” (and subsequent versions). See ”MS–SPRING CONFIGURATION” chapter, ”MS–SPRING CONFIGURATION” table, ”Ring Map”sequence. In this table:

a ) the (SEQNUMINET, NODEID) infos are listed in ascending order of SEQNUMINET,possibly starting with 1 instead of 0. In RM database, the first node has to be always zero,so adapt this information accordingly.

b ) The name used for NODEINET is ”node Identifier”.

Page 126: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

120

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

16.2 Procedure steps

a ) Perform a system full backup.

b ) Stop 1354RM system if necessary (but not the database, which has to be on) using Process Controlfacility.

c ) login as ”snml” user.

d ) Enter the MS–SPRING update procedure:

./updMsspring

First of all, the procedure displays some warnings and informations.Check all, expecially this one:

the database to be managed (environment variable $NXNL_DATABASE)

Then, the procedure asks the operator for confirmation (message ”Do you want to continue ?”).If the variable $NXNL_DATABASE is correctly set, the operator must enter ”y”, otherwise the operatorcan enter ”n” (feel free to press <Ctrl–C> if you like) , (re)set the uncorrect environment variable, andrestarts ”./updMsspring”. No operation on database is performed until you enter ”y”.

N.B.: if any errors occur the procedure will stop. Check the logfile updMsspring.log (which is created in the current directory) to diagnose the error.Every time the procedure is executed, the previous log file is automatically saved asupdMsspring.log.old.

e ) Select the option ”Dump all userlabels of MS–SPRING”.The procedure will create a file (whose name you can find on the screen) containing all userlabelsof MS–SPRING rings found into database. The format is simply the userlabels enclosed in doublequotes, one per line.Delete the lines containing the userlabels of the rings(=et) you don’t want to update.

f ) Reenter the procedure, then select the option ”Dump all nodes of all rings ...”.Now you will have another file with all MS–SPRING related informations of the nodes of the rings youspecified in the previous step. This files (whose actual name you can find on the screen) will be called ”nodedata file” in the following.

g ) Edit the nodedata file. You have only to change NODEINET and SEQNUMINET values to reflect the new ones. In more details, you will find lines like:NODE WITH USERLABEL=”node 3 of Northern Seattle MS ring”: NODEINET=–1 SEQNUMINET=0If you want to make NODEINET=2 and SEQNUMINET=1, change toNODE WITH USERLABEL=”node 3 of Northern Seattle MS ring”: NODEINET=2 SEQNUMINET=1In other words, think this file as a ”form”.Don’t change the file any other way, e.g. by deleting/adding lines. If you modify anything different fromthe values of NODEINET and SEQNUMINET, the file will be refused.Expecially, do NOT modify userlabels any way.

h ) Reenter the procedure, then select the option ”Load nodes data ... into database”.The nodedata file will be compiled in sql format then submitted to sqlplus Oracle(TM) utility.If there is any error regarding the format of nodedata file, simply correct it, then repeat this step.If all your efforts eventually fail, perform a full database restore.

Page 127: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

121

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

i ) Now the datas are inserted in RM database. When you will implement the modified MS–SPRINGrings(=ets), the datas you have just inserted will be used by RM system. Mainly, they will be forwardedto lower OS layers (currently to SH system).

16.3 Format of nodedata file

Here is an example of the nodedata file required as input of step h ):

ET WITH USERLABEL ”ringA”:NODE WITH USERLABEL ”nodeA1”: NODEINET=4 SEQNUMINET=0NODE WITH USERLABEL ”nodeA2”: NODEINET=5 SEQNUMINET=1ET WITH USERLABEL ”ringB”:NODE WITH USERLABEL ”nodeB1”: NODEINET=6 SEQNUMINET=1NODE WITH USERLABEL ”nodeB2”: NODEINET=14 SEQNUMINET=0

16.4 Loading of a prebuilt nodedata file

You have to execute all procedure steps until step f ) (included), set the environment variableNXNL_EXTERNAL_NODEDATA to the name of the prebuilt nodedata file, then perform the same actionsas step h ) but selecting option ”Load nodes data from external source into database” instead of option”Load nodes data ... into database”. The procedure will ask you for data file name confirmation.If something goes wrong, first of all compare your file with the one generated in step f ), to check if youhave made some syntax error. Note that the order of rows doesn’t matter, as far as all ’NODE ...” rowsregarding nodes of the same ring are grouped together under the ’ET ..” row of the ring that they belongto. Also note that white spaces (blanks) of userlabels are meaningful, i.e. ”ringNumber1” is not the sameas ”ringNumber1 ” (note the ending blank).

Page 128: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

122

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Page 129: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

123

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

APPENDIX A INTEGRATION OF 1354RM WITH A1330AS

A.1 Installing A1330 AS

This procedure must be executed each time a new delivery of A1330AS and 1354RM has to be installed.

After the execution of the following procedure the A1330 IM processes will be integrated in the 1354RMPMC (see 7.2).

In order to integrate the 1330AS with the 1354RM you have to execute the script file present in the directory/usr/snml/etc with the name ”install_A1330”.This procedure works only if no old AS installation is present (e.g. /usr/A1330 link is present).

Execute the following commands :

# su –root# export ALARM_DIR=<A1330_installation_root_directory># [/usr/snml/etc/trace] /usr/snml/etc/install_A1330 <full_pathname_1330AS_inst_kit> [IM | US]

N.B. The procedure, in order to grant a proper installation, check that the $ALARM_DIRdirectory is empty, otherwise it gives an error.

If the install_A1330 procedure is started with the etc/trace script, it will produce a trace file of the procedureinstall_A1330 called /usr/snml/etc/install_A1330.trc.

The IM or US parameter is not related to RM, but to A1330AS product. IM means that IM 1330ASprocesses will be installed on RM workstation, US means that on RM workstation only AS user interfaceis installed and configured.

N.B. It is necessary to verify the content of the ”im_host_conf” file, since it is generated by the”install_A1330” procedure.

A.2 Deinstalling A1330 AS

In order to remove an AS installation the following procedure is available:

# su –root# /usr/snml/etc/deinstall_A1330 [IM | US]

The IM or US parameter is not related to RM, but to A1330AS product. IM means that IM 1330ASprocesses will be configured to run on RM workstation, US means that on RM workstation only AS userinterface is configured to run.

To execute it the US processes of AS have to be stopped manually. The procedure executes the followingsteps:

a ) it stops the IM AS agents;b ) it deregistrates AS agents;c ) it removes the AS installation;d ) it removes the /usr/A1330 link.

After the running of the procedure 1354RM PMC do not handle any more the AS agents.

N.B. It is necessary to verify the contents of the ”im_host_conf” file, since it is generated by the”deinstall_A1330” procedure.

Page 130: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

124

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

A.3 A1330 AS customization

1330AS is provided with a default US customization in order to see only alarms relevant in 1354RMenvironment and to distinguish them by their typology. All the AS1330 users have the possibility to changethe default customizations (HMI Layout, Counter Customizations, Colors, etc.) and so to work in a owncustomized AS environment. These customizations are not saved at the end of the work session in orderto not propagate them to all the AS users, even if at USM exit AS requests for customizations saving.

The only user that can make persistent changes to 1330AS customizations is snml and these changesare effective for all the users.

When e new configuration is made effective by running us_config_A1330 all the changes made by snmlare lost and is restored the initial default customizations.

A.3.1 Swedish language

In order to let AS–USM Components manage alarms containing swedish chars in the right way do thefollowing operations as nnml user:

$ cp /usr/snml/conf/AS_graphicResources /usr/snml/conf/AS_graphicResources_english$ cp /usr/snml/conf/AS_graphicResources_sv_SE /usr/snml/conf/AS_graphicResources

Now all the following start of AS–USM Components will be able to manage swedish chars using roman8fonts.

In order to roll back the configuration to the default one (AS–USM displaying alarms in english) performthe following commands as nnml user:

$ cp /usr/snml/conf/AS_graphicResources_english /usr/snml/conf/AS_graphicResources

Page 131: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

125

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

APPENDIX B INTEGRATION OF 1354RM WITH GENERIC OS–OS INTERFACE

Meaningful for IM configuration only

B.1 Generic OS–OS Interface Subsysystem

Generic OS–OS Interface is a product that exports, to external applications, alarm informations managedby AS1330 Subsystem.

In the following GENOS stays for Generic OS–OS Interface.

Depending on AS1330 subsystem version there is a compatible Generic OS–OS Interface version whichis able to communicate with it (see Release Notes of OS–OS Interface).

B.2 Generic OS–OS Interface Installation

Execute the following commands to launch the installation script:

# su – root# export GENOS_DIR=/alcatel/GENOS# /usr/snml/etc/install_genos <tar_file_installation_kit> <ALL | SNMP | TCP/IP>

Where: <Tar_file_installation_kit> is the full pathname of installation kit released for integration GENOS with1354RM.<ALL | SNMP | TCP/IP> specifies the type of protocol the Generic OS–OS Interface Processes useto export alarm informations:

SNMP : SNMP Protocol is usedTCP/IP : TCP/IP Protocol is usedALL : All the above protocols are used to export alarm info.

After the procedure execution GENOS processes are integrated in the 1354RM PMC.

The procedure install also a graphical tool to configure the exported alarm format, the keyword for theauthentication and informations on GENOS Processes configuration. To execute it launch the script/usr/1353sh/tools/genos/user_config.tcl.

With the GENOS installation are provided also graphical tools (dependingly on Protocol type) that simulateexternal OS communicating with Generic OS–OS processes to export alarm informations. To executethese tools launch the scripts /usr/1353sh/tools/genos/snmp_eos.tcl for SNMP protocol and/usr/1353sh/tools/genos/eos.tcl for TCP/IP protocol.

N.B. GENOS product cannot be installed everywhere in 1354RM File System. The installation ismade under the area /usr/1353sh/genos, this limitation is due to specific conditions of GENOSproduct. After the installation procedure the link /usr/genos is created and points to/usr/1353sh/genos.

N.B. GENOS product can be installed only on a 1354RM–IM.

Page 132: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

126

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

B.3 Generic OS–OS Interface deinstallation

Execute the following commands to launch the deinstallation script:

# su – root# /usr/snml/etc/deinstall_genos <full_pathname_tar_file_deinstallation_kit>

The procedure, without using any configuration file, determines the installed product version and removesthe installation area, and the registrations inside the 1354RM PMC.

Page 133: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

127

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

APPENDIX C INTEGRATION OF 1354RM WITH SEC SECURIYT SUBSYSTEM

C.1 SEC Architecture on 1354RM System

The SEC Subsystem is composed of two permanent processes:

– secim process which is the agent of the Security Subsystem and keep all the informations relatedto the users and the system;

secim process have to be running only on 1354RM–IM.

– lss process which is a kind of gate for applications who are interested on user Security profile. Thereis one lss process for each workstation/server belonging to the 1354RM system (1 for eachpresentation and each IM).

These permanent processes are configured to automatically run everytime just after the installation.

The SEC integration on 1354RM, as a first step, is intended only for the integration of SecurityManagement within AS (Alarm Survelliance). This means that each 1354RM operator using AS is ableto view/manage only alarms coming from Network resources that it can manage as in RM Browser

In order to have inside SEC Subsystem all the informations concerning Security, SEC is also integratedin SMF, in order to get informations related to new users, user removal, and initiator mgt. Moreover theintegration of SEC in SMF is also related to the Operator Backup. Each time a new Operator backup isperformed also SEC database is backuped.

If on top of 1354RM is installed also 1353SH software (Master or Presentation) for cohosted orpresentation installations you have to install SEC for SH using the axinstallGui.ptk procedure and SECfor RM as described below

Keep into account that the SEC installations for RM and SH are different, the integration schemas and theconfiguration steps are different.

Page 134: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

128

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

C.2 Installing SEC Subsystem

This procedure must be executed each time a new delivery of SEC and 1354RM has to be installed.

After the execution of the following procedure the SEC processes will be integrated in the 1354RM System.

In order to integrate SEC with the 1354RM you have to execute the script /usr/snml/etc/install_SEC.

This procedure works only if no old SEC installations for RM are present (e.g. /usr/sec link is present).

SEC 5.0 is supported on 1354RM.

Execute the following commands :

# su – root

# [/usr/snml/etc/trace] /usr/snml/etc/install_SEC <full_pathname_SEC_inst_kit><Target_installation_full_pathname>

If the install_SEC procedure is started with the etc/trace script, it will produce a trace file of the procedureinstall_SEC called /usr/snml/etc/install_SEC.trc.

N.B. The procedure, in order to grant a proper installation, check that the choosen target installationdirectory is empty, otherwise it returns an error.

N.B. Due to SH installation procedure limitation, if SEC for RM has to cohexist with SEC installation for1353SH (cohosted or SH–Presentation) installation, install first SEC for SH using the axinstallGui.ptk tool.

N.B. If a different SEC instance is alredy installed (after cohosted or 1353SH presentation installation) onthe target 1354RM host STOP all the running SEC processes with the script/usr/1353sh/install/script/stop_security.sh

After the SEC installation on top of RM restart the SEC processes installed on top of SH with the script/usr/1353sh/install/script/start_security.sh . After the installation the link /usr/sec is created in order to pointto the target installation directory choosen.

N.B. In the case in which SEC is alredy installed on RM please do a Backup of Operator datatype, deinstallold SEC, install the new version of SEC and perform a Restore of the Operator datatypes. If you want toinstall a new version of SEC it is possible that the DB have to be migrated.

Page 135: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

129

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

C.3 Deinstalling SEC

In order to remove SEC installation the following procedure is available:

# su – root

# /usr/snml/etc/deinstall_SEC

The procedure executes the following steps:

a ) it stops all the SEC processes running on the host (only related to RM installation);

b ) it removes the system configurations related to SEC;

c ) it removes the /usr/sec link;

d ) it removes all the files related to the SEC installation.

N.B.: Due to SEC installation limitation during this procedure all the installed SEC subsystems have to bestopped. If SEC on top of SH installation is installed run the script/usr/1353sh/install/script/stop_security.sh.

N.B.: After the deinstallation all the other SEC subsystems installed have to be restarted at hand.(/usr/1353sh/install/script/start_security.sh)

Page 136: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

130

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

C.4 SEC Administration

SEC Subsystem is provided with a default customization for which on an RM is automatically configuredto run secim process if RM–IM and lss process for each kind of RM (IM/US).

The default configurations are put in the directory /usr/sec/1354RM_<NTWDOMAIN>.

In order to distinguish 1354RM SEC processes from the 1353SH ones the RM processes are called<process_name>_1354RM_<NTWDOMAIN>.

The SEC configuration is also related to the automatic start of SEC process: in the /etc/inittab file is inserted1 line for each permanent SEC process. This line invokes the scriptrun_SECIM|LSS_1354RM_<NTWDOMAIN> that checks for SEC abilitation to run and launch thesecim|lss_1354RM_<NTWDOMAIN> process. The automatic start of SEC processes is set on run–level4 that is the 1354RM run–level default. No checks are performed on the 1354RM effective run–level (itis supposed to be 4).

During Operator Backup and Restore the SEC subsystem is stopped in order to add to the OperatorInformations also Informations related to SEC. The actions related to SEC start and stop are automaticallylaunched by SMF.

If some problem occurs during SMF–>Operator Administration and SEC DB is not updated on changesexecuted on RM, it is possible to launch the script as snml user through the SMF:

/usr/sec/integration/script/alignsecdb

This procedure starts from the last well finished SEC commands and alignes the SEC DB to the actualRM Security definitions.

If at login time the user receives a Message Box saying:

“Security for 1354RM_<NTWDOMAIN> is not activated. Please contact your System Administrator”,

the problem is that the user is not defined in the SEC DB, or the SEC Subsystem has been stopped(Restore proc.) or internal error.

N.B.: If the Message does not include the string 1354RM, this means that it belongs to the SEC installedfor SH.

Restrictions:

SEC 5.0 doesn’t manage the scheduling time. This means that if an user has a scheduled rule this ruleis applied everytime. This limitation is not due to the integration level but to the fact that SEC 5.0 doesn’tsupport it.

Page 137: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

131

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

C.5 Alarm Access Configuration

Even if SEC has to be not installed on top of 1354RM, in order to be able to use AS change the followingfiles:

/usr/A1330/data/ascurusm_<hostname>_<Ntw Domain>/param.cfg/usr/A1330/data/ashistusm_<hostname>_<Ntw Domain>/param.cfg/usr/A1330/data/ashistusm_<hostname>_rec<Ntw Domain>/param.cfg

in the following way:

SEC_ENABLED ”True”

have to be changed in

SEC_ENABLED ”False”

Depending on 1354RM user definitions the following AS Access Rights are granted:

System Profile AS Access Rights Alarm Access Rights

OSAdministrator ADMIN MGT

Administrator ADMIN MGT

Constructor VIEW MGT

PathBuilder VIEW MGT

LookOnly VIEW

Where:

AS Access Rights means the AS accessability, by users, in terms of AS Administration:

ADMIN: Users can invoke AS Administration and Synchronization

VIEW: Users can invoke AS Synchronization but cannot interact with AS Administration functionalities

Alarm Access Rights shows the Alarm accessability rules that are allowed to user:

MGT: Users that have this capability, if allowed by the NAD Rule (see below), can manage accessiblealarms ( acknowledgement).

Page 138: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

132

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

RM Rule Alarm Ac-cess Type

PhysicalLinkAlarms

MS–TrailAlarms

Ho–TrailAlarms

PathAlarms

Process-ing Alarms

AC_R_SNML MGT X X X X X

AC_R_PAYMAN MGT X X X X

AC_R_PADMIN MGT X

AC_R_TOPMAN MGT X X X X

AC_R_PATHRO RO X

AC_R_VPN RO X*

AC_R_EVPN RO X*

AC_R_RVPN RO X*

AC_R_PMSNML RO

AC_R_PMADMIN RO

AC_R_PMRO RO

AC_R_PMVPN MGT

AC_R_PMVPNRO MGT

AC_R_NN MGT X*

AC_R_PATHALL MGT X

Where:

Alarm AccessType shows the alarm accessability

MGT means that user have the possibility to Acknowledge alarms (ManaGemenT)

RO means that user can only access alarms in a view mode (Read–Only)

The MGT Alarm Accessability is granted if allowed by the System Profile (previous table) otherwise (forLook–Only users) is set to RO.

”X” show which alarm types that can be accessed by user with the corresponding NAD Rule associated

”X*” show alarm types (only marked with user NAD) that can be accessed by user with the correspondingNAD Rule associated

In order to provide a flexible way to configure AS Access on Alarm the configuration file/usr/snml/conf/sec/1354RM_Ruler is provided.

This file drives the user Access Rights definition in the SEC–DB must be modified before the SECinstallation in order to keep coherent user creations.

Page 139: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

133

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

In particular in order to give to Look–Only users the possibility to manage all the Alarms without keepinginto account the RM Rule change the line:

System_Profile : LookOnly : ASCURUSM_ALARM_VIEW_FAD@AsCurrentUsm,ASHISTUSM_FAD@AsHistoricalUsm :

as follows:

System_Profile : LookOnly :ASCURUSM_ALARM_MANAGER_FAD@AsCurrentUsm,ASCURUSM_ALARM_VIEW_FAD@AsCurrentUsm, ASHISTUSM_FAD@AsHistoricalUsm

On the other side, if the Look–Only users Accessability have to be extended to manage alarms dependingon 1354RM Access Rules (second table), change the line:

System_Profile : LookOnly : ASCURUSM_ALARM_VIEW_FAD@AsCurrentUsm,ASHISTUSM_FAD@AsHistoricalUsm :

as follows:

System_Profile : LookOnly : ASCURUSM_ALARM_VIEW_FAD@AsCurrentUsm,ASHISTUSM_FAD@AsHistoricalUsm : ASCURUSM_ALARM_MANAGER_FAD@AsCurrentUsm

N.B.: The remaining of the file have to be left unchanged.

Page 140: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

134

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

Page 141: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

135

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

APPENDIX D COMMAND FILE SPECIFICATION

This appendix contains a brief description of command file format which permits to manage paths andtrails. This command file will be used from 1354RM either to rebuild its database or to take over a networkpreviously managed with a different product of network management. A specific tool (named rmBatchUtil)of the product scans the command file and give the agents the proper actions to execute the commands.This tool will accept the command file name as input parameter. The commands are case sensitive.

Page 142: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

136

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1 Command Description

Some different types of commands are recognized by this specific tool:

a ) command to set the network where commands will be executed (called ”working network”);b ) commands to define, delete, update, deallocate, (de)implement and protect/unprotect paths (with or

without constraints);c ) commands to define, delete, update, (de)allocate, (de)implement, protect/unprotect and configure

trail (with or without constraints);d ) commands to change NAD to paths, nap, trails and link connections;e ) commands to treat PM features ( e.g. creating and removing measures, relating a tp to some

measures);f ) commands to deal with objects of class aSAProfile;g ) commands to manage objects of class restRule;h ) command to manage connection in topology.i ) commands to create, remove, (de)implement topology and physical connection;j ) commands to upload, remove Nap;k ) commands to configure et and physical connection;

Comment lines can also be introduced in the command file (for example to document a particularcommand).

A command file may contain all types of commands. However, it is important to set the work network beforeexecuting the commands on paths and trails. It is possible to set the work network specifying an inputparameter.

Page 143: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

137

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.1 Syntax Description

This document uses a BNF notation to describe the syntactic structure of the command. This notation usesthe punctuation showed below:

braces with vertical bars { | } means you must use one of the items in the braces separated by verticalbars;

brackets [ ] means you can optionally use the item in the brackets. If the brackets enclose multipleitems separated by vertical bars |, you can use any one item or none at all;

ellipsis ... means you can optionally repeat the previous item multiple times.

underline means if you omit all bracketed items, the underlined item will be use by default.

We also use the definition showed below:

<string>: it’s a sequence of character between single quote ’ or double quote “. or numeric.

If double quote are used, then single quotes can be used inside the string.

Ex: ’userLabel di prova’

“userLabel di prova”

“user’Label di prova”

The unadmitted characters are:

(tab)

| (pipe)

\\ (backslash)

~ (tilde)

‘ (backquote)

\” (double quotes)

<number>: it is a sequence of digits.

Ex: 32

:= it means an expression is defined.

<date>: the format of the date is: YYYY/MM/DD–hh:mm:ss (YYYY four digit of year and > 1970; MM:month (01–12), DD: day of month (01–31) – hh: hour of day(00–23); mm: minute (00–59); second(00–59)). See the SET command for further information about time reference.

N.B. In the previous text special characters are in bold to highlight them. In the following syntaxdescriptions no bold fonts are use.

Page 144: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

138

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.2 Setting time reference.

D.1.2.1Description

The SET command can be used to choose a time reference for dates. If the local time reference is chosenthen all dates are converted to GMT0 time (GMT0 and UTC are functionally equivalent). This is the typicalbehavior of a US application. If the GMT0 time reference is set then no conversion is applied to dates. Thisis the right behavior for executing a redolog operation.

The default behavior is to apply date conversion to GMT0 time.

D.1.2.2Syntax

SET local END

SET gmt0 END

D.1.3 Setting network

D.1.3.1Description

The SET command defines the number of the network where the commands will have effect.

D.1.3.2Syntax

SET ntwId <number> END

Page 145: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

139

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.4 Path commands

D.1.4.1Description

SETpath: it permits to set default values for attributes o to be specified at the path creation(definition) time.

CREATEpath: it defines a path.

CONSTRpath: it defines constraints on path for routing purposes. if the constraint list is void,it deletes all constraints previously defined on the path.

ALLOCpath: it allocates resources on defined path.

DEALLOCpath: it deallocates resources on implemented path.

IMPLpath: it implements an allocated path

DEIMPLpath: it deimplements an implemented path.

DELETEpath: it deletes a defined path.

UPDATEpath: it updates the attribute of the paths.

PROTECTpath: it changes the protection on an existing path.

ADDLEGpath: it adds a leg (and/or simply a NAP) on an existing path.

REMOVELEGpath: it removes a leg (and/or simply a NAP) on an existing path.

COMMISSIONpath: an implemented path is declared commissioned (no change are possible).

UNCOMMISSIONpath: a commissioned path has to become implemented (for example to reroute thepath).

UPDALRpath: it updates the alarmPropagationRule of an existing path.

CONNECTpath: it connects path’s Tp.

DISCONNECTpath: it disconnects path’s Tp.

ELEMALARMNGpath: it updates the Q3 PDH/SDH alarm enabling rule.

SPLITpath: it splits an existing trail in two distinct paths.

JOINpath: it joins two distinct paths.

Page 146: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

140

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

upd_path_attributes := [ pathType unidirectionalPtoPto | pathType unidirectionalBroadcast | pathType bidirectionalPtoPto ]

[ pathRate lo2Mb | pathRate lo34Mb | pathRate ho140Mb| pathRate lo45Mb]

{ protType notProtected | protType shSegmentProtected | protType sh1Plus1EToEProt | protType enhancedProtected }

[ allocRule automatic | allocRule user ]

[ allocationConstraint notAlarmedResourcesOnly |allocationConstraint noRestriction ]

[ implRule automatic | implRule user ]

{userId <string>}

[ msProtProfile normal | msProtProfile protPref] [ comment1 <string> ] [ comment2 <string> ] [ comment3 <string> ]

not_upd_path_attributes:= [alarmPropRule whenDefined | alarmPropRule whenAllocated |alarmPropRule whenImplemented | alarmPropRule whenCommissioned]]

[pmAutomatic false | pmAutomatic true]

[pathGroup <string>]

[ sdhAlrEnabRule onImplementation | sdhAlrEnabRule onCommissioning |sdhAlrEnabRule manual ]

[ pdhAlrEnabRule onImplementation | pdhAlrEnabRule onCommissioning |pdhAlrEnabRule manual ]

path_attributes:= [<upd_path_attributes> | <not_upd_path_attributes> ]

SETpath <path_attributes>END

user_label := <string>

port_name := <string>

node_name := <string>

tp_path_list := { nap <port_name> usedDir bidirectional | nap <port_name> usedDir source | nap <port_name> usedDir sink | nap <port_name> usedDir notMeaningful | node <node_name> usedDir bidirectional [portName <port_name>] | node <node_name> usedDir source [portName <port_name>] | node <node_name> usedDir sink [portName <port_name>] | node <node_name> usedDir notMeaningful [portName <port_name>] }

Page 147: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

141

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

CREATEpath userLabel <user_label> <path_attributes> endTpList <tp_path_list> <tp_path_list> [... <tp_path_list>] ENDEND

ctp_list := [ ctp <port_name> payloadPos <string> constrainType useMain | ctp <port_name> payloadPos <string> constrainType useSpare | ctp <port_name> payloadPos <string> constrainType notUseMain | ctp <port_name> payloadPos <string> constrainType notUseSpare | ctp <port_name> payloadPos <string> constrainType useMainSpare | ctp <port_name> payloadPos <string> constrainType notUse | ctp <port_name> payloadPos <string> constrainType useService |ctp <port_name> payloadPos <string> constrainType notUseService |ctp <port_name> payloadPos <string> constrainType useMainA |ctp <port_name> payloadPos <string> constrainType useMainZ |ctp <port_name> payloadPos <string> constrainType useSpareA |ctp <port_name> payloadPos <string> constrainType useSpareZ |ctp <port_name> payloadPos <string> constrainType useMainSpareA |ctp <port_name> payloadPos <string> constrainType useMainSpareZ ]

N.B. the values “useMainA–Z, useSpareA–Z, useMainSpareA–Z“ are meaningful just for unidirectionalpaths. Related to connections at node level, A is referred to the input CTP (sink for the Link Connection)and Z to the output CTP (source for the Link Connection).

CONSTRpath userLabel <user_label> [... <ctp_list>]END

ALLOCpath userLabel <user_label> END

DEALLOCpath userLabel <user_label> END

IMPLpath userLabel <user_label> END

DEIMPLpath userLabel <user_label> END

DELETEpath userLabel <user_label> END

UPDATEpath userLabel <user_label>

Page 148: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

142

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

updList [userLabel <user_label>] [<upd_path_attributes>] ENDEND

changeOpRes := { keepingMain | keepingSpare}

changeOpType := { immediate | deferred }

ttp_to_prot := { nap <port_name> | ctp <port_name> payloadPos <string> }

protCmd := {protect | addEnhancedProt }

remCmd := {removeEnhancedProt | removeEnhancedProtWithCheck }

unprCmd := {unprotect | unprotectWitchCheck}

topLev := { ntw | sbn | et }

topLevProt := { ntw | sbn | et | node }

N.B. Node topology is valid only for Drop & Continue One Node and Drop & Continue 2 Switchconnection.

connProtType := { legProtected | legNotProtected }

endLegType := {nap <port_name> | node <node_name> [portName <port_name>] }

opNapType := {keepNap | releaseNap }

PROTECTpath userLabel <user_label> <protCmd> <changeOpType> endTpList [[<ttp_to_prot> <ttp_to_prot>] [topologyLevel <topLevProt>]] ENDEND

PROTECTpath userLabel <user_label> { <unprCmd> <changeOpRes> <changeOpType> | <remCmd> <changeOpType> } endTpList [[<ttp_to_prot> <ttp_to_prot>] [topologyLevel <topLevProt>]] ENDEND

ADDLEGpath userLabel <user_label>

Page 149: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

143

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

[[allocRule automaticallyAllocated [<changeOpType>] [protRequired <connProtType>]] | [allocRule onUserRequest ]] <endLegType>END

REMOVELEGpath userLabel <userLabel> [<changeOpType>] [<opNapType>] nap <port_name>END

COMMISSIONpath userLabel <user_label>END

UNCOMMISSIONpath userLabel <user_label>END

UPDALRpath userLabel <user_label> {<alrPropRule> | pdhAlrEnabRule manual | pdhAlrEnabRule onImplementation | pdhAlrEnabRule onCommissioning | sdhAlrEnabRule manual | sdhAlrEnabRule onImplementation | sdhAlrEnabRule onCommissioning }END

N.B. The ttp_to_prot in PROTECTpath and UNPROTECTpath command have to be on the boundary ofa topology. If the topology level is not specified, the trail is protected into the upper topology level.Regarding enhancedProtected paths, it is preferable to make these paths starting from SNCP protectedpaths (protType=sh1Plus1EToEProt) and then to add the service connection with the properPROTECTpath command (see examples).

CONNECTpath userLabel <user_label> <changeOpType> endTpList ctp <port_name> payloadPos <string> ctp <port_name> payloadPos <string> ENDEND

DISCONNECTpath userLabel <user_label> endTpList ctp <port_name> payloadPos <string> ctp <port_name> payloadPos <string> ENDEND

Page 150: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

144

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ELEMALRMNGpath userLabel <user_label> {pdhElemAlr enable | pdhElemAlr disable | sdhElemAlr enable | sdhElemAlr disable }END

SPLITpath userLabel <user_label> operationalRule <opRule> node <user_label>END

JOINpath userLabel <user_label1> userLabel <user_label2> operationalRule <opRule> node <user_label>END

Page 151: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

145

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.5 Trail commands

D.1.5.1Description

SETtrail: it permits to set default values for attributes to be specified at the trail creation(definition) time.

CREATEtrail: it defines a trail. If ’payloadStructure’ attribute has a value different from’notMeaningful’ (default value), ’notTerminatedAu4’ and ’notTerminatedAu3’,the trail is implemented and also configured.

CONSTRtrail: it defines constraints to correctly allocate a trail. If the constraint list is void, itdeletes all constraints previously defined on the trail.

ALLOCtrail: it allocates resources on defined trail.

DEALLOCtrail: it deallocates resources on implemented trail.

IMPLtrail: it implements an allocated trail

DEIMPLtrail: it deimplements an implemented trail.

CONFIGtrail: it configures the payload structure of trail.

UPDATEtrail: it updates the attribute trails.

DELETEtrail: it deletes the trail.

PROTECTtrail: it changes the protection on an existing trail.

SPLITtrail: it splits an existing trail in two distinct trails.

JOINtrail: it joins two distinct trails.

UPDALRtrail: it update the Q3 SDH alarm enabling rule.

ELEMALRMNGtrail: it enables/disables Q3 SDH alarm.

CONFIGUREMsTrail: it configure the payload of a MsTrail.

Page 152: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

146

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.5.2Syntax

upd_trail_attributes := { trailType pointToPoint }

[ payloadStructure tu12Tu12Tu12 | payloadStructure tu12Tu12Tu3 | payloadStructure tu12Tu3Tu12 | payloadStructure tu3Tu12Tu12 | payloadStructure tu12Tu3Tu3 | payloadStructure tu3Tu12Tu3 | payloadStructure tu3Tu3Tu12 | payloadStructure tu3Tu3Tu3 | payloadStructure notTerminatedAu4 | payloadStructure notTerminatedAu3 payloadStructure tu12 | payloadStructure notMeaningful ] [ protType notProtected | protType sh1Plus1EToEProt | protTypeenhancedProtected]

[ msProtProfile normal | msProtProfile protPref]

{ flow bidirectional }

not_upd_trail_attributes:=[ sdhAlrEnabRule onImplementation | sdhAlrEnabRule onCommissioning |sdhAlrEnabRule manual ]

trail_attributes:= [ upd_trail_attributes | not_upd_trail_attributes ]

SETtrail <trail_attributes>END

ctp_list := ctp <port_name> payloadPos <string>

node_list := node <node_name>

end_tp_list := { <ctp_list> <ctp_list> | <node_list> <node_list>}

CREATEtrail userLabel <string> [<trail_attributes>] endTpList <end_tp_list> <end_tp_list> ENDEND

ctp_constr_list := { ctp <port_name> payloadPos <string> constrainType useMain | ctp <port_name> payloadPos <string> constrainType useSpare | ctp <port_name> payloadPos <string> constrainType notUseMain | ctp <port_name> payloadPos <string> constrainType notUseSpare | ctp <port_name> payloadPos <string> constrainType useMainSpare | ctp <port_name> payloadPos <string> constrainType notUse | ctp <port_name> payloadPos <string> constrainType useService | ctp <port_name> payloadPos <string> constrainType notUseService }

CONSTRtrail userLabel <user_label> [... <ctp_constr_list>]END

Page 153: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

147

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ALLOCtrail userLabel <user_label>END

DEALLOCtrail userLabel <user_label>END

IMPLtrail userLabel <user_label>END

DEIMPLtrail userLabel <user_label>END

CONFIGtrail userLabel <user_label> [ payloadStructure tu12Tu12Tu12 | payloadStructure tu12Tu12Tu3 | payloadStructure tu12Tu3Tu12 | payloadStructure tu3Tu12Tu12 | payloadStructure tu12Tu3Tu3 | payloadStructure tu3Tu12Tu3 | payloadStructure tu3Tu3Tu12 | payloadStructure tu3Tu3Tu3 | payloadStructure notTerminatedAu4 | payloadStructure terminatedAu4 | payloadStructure notMeaningful payloadStructure notTerminatedAu3 | payloadStructure tu12]END

DELETEtrail userLabel <user_label> END

UPDATEtrail userLabel <user_label> updList [userLabel <user_label>] [<upd_trail_attributes>] ENDEND

changeOpRes := { keepingMain | keepingSpare }

changeOpType := { immediate | deferred }

ttp_to_prot := { cap <port_name> payloadPos <string> | ctp <port_name> payloadPos <string> }

protCmd := { protect | addEnhancedProt }

remCmd := { removeEnhancedProt | removeEnhancedProtWithCheck }

unprCmd := { unprotect | unprotectWithCheck }

PROTECTtrail userLabel <user_label> <protCmd> <changeOpType> endTpList [[<ttp_to_prot> <ttp_to_prot>]

Page 154: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

148

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

[topologyLevel <topLev>]] ENDEND

PROTECTtrail userLabel <user_label> { <unprCmd> <changeOpRes> <changeOpType> | <remCmd> <changeOpType> } endTpList [[<ttp_to_prot> <ttp_to_prot>] [topologyLevel <topLev>]] ENDEND

N.B. The ttp_to_prot in a PROTECTtrail command have to be on the boundary of a topology.If the topology level is not specified, the trail is protected into the upper topology level.Regarding enhancedProtected trails, it is preferable to make these trails starting from SNCP trails(protType=sh1Plus1EToEProt) and then to add the service protection with the proper command.

opRule := { user | automatic }

SPLITtrail userLabel <user_label> operationalRule <opRule> node <user_label> END

JOINtrail userLabel <user_label1> userLabel <user_label2> operationalRule <opRule> node <user_label> END

UPDALRtrail userLabel <user_label> sdhAlrEnabRule manual | sdhAlrEnabRule onImplementation END

ELEMALRMNGtrail userLabel <user_label> sdhElemAlr enable | sdhElemAlr disable END

CONFIGUREmsTrail userLabel <user_label> Au4List [ hoAu4 | hoAu4Conc4 | hoAu4Conc16 | hoAu4Conc64 ] ENDEND

Page 155: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

149

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.6 Port User Label

For NEs with TSD–IM interface the port userlabel will be done by means of naming rules. No relationshipexists with TSD–IM userLabel attribute. The computed usarlabel should respect the following form:

NE_userlabel/rxxsybzzpkk[cjj] where:

xx = rack number,y = subrack number,zz = board number,kk = port number,jj = channel number (optional – this component will be used only for transmux ports).All the previous information can be retrieved by the identifier (FDN) of TSD–IM objects.

For the other cases the port userlabel is done by SH–WX systems.

D.1.7 CHOWN commands

These commands update the securityLabel of path, trail, nap and link connections.

D.1.7.1Syntax

objClass := { nap | path | trail }

CHOWNonObj <objClass> userLabel <user_label> securityLabel <number>END

CHOWNonObj lc userLabel <user_label> payloadPos <string> securityLabel <number>END

Page 156: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

150

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.8 PM commands

D.1.8.1Description

SET: It sets the performance monitoring Domain (pmDomain).The default value of the pmDomain is read from the environment variable NXNL_PMDOMAIN. The SET command can be used to choose a different value.

CREATE: It allows to create objects of the following classes : measure of performance (pMeasure), threshold crossing alarm profile(tCAProfile), threshold crossing report profile (tCRProfile) and performancemonitoring counter report (pmCountRep).

UPDATE: It sets attribute values for one object of the same classes specified for CREATE.

DELETE: It removes one object of the same classes specified for CREATE.

CONSmeas: It checks a measure consistency.

CORRtransToMeas: It correlates a measure to one or more paths/trails.

UNCORRtransToMeas: It deletes the correlation of a path/trail to one or more measures.

CORRTpToMeas: It correlates a termnation point object (nap, cap, ctp) to one or more measures.

CORRrepToMeas: It correlates one or more reports (objects of class pmCountRep or tCRProfile)to one or more measures.

UNCORRrepToMeas: It removes the correlation between of one or more reports and a measure.

CORRpmTpToTca: It correlates a performance monitoring terminattion point (pmTp) to one or moretCAProfile objects.

UNCORRpmTpToTca: It deletes the correlation of a pmTp to a tCAProfile objects.

Page 157: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

151

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.8.2Syntax

SET pmDomId <number>END

pmLay := { lo | ho | bothLoHo }

pmGran := { pm24Hours | pm15Min }

pmCount := { false | true }

defEnd := { false | true }

CREATE CLASS pMeasure userLabel <user_label>pmGranularity <pmGran>pmCollectCounter <pmCount>[ pmStartTime <date> ][ pmEndTime <date> ][ pmLayer <pmLay> ][ defaultEnd <boolean> ]

END

UPDATE CLASS pMeasure userLabel <user_label>updList

[ userLabel <user_label> ][ pmGranularity <pmGran> ][ pmLayer <pmLay> ][ pmCollectCounter <pmCount> ][ defaultEnd <defEnd> ][ pmStartTime <date> ]

[ pmEndTime <date> ] ENDEND

DELETE CLASS pMeasureuserLabel <user_label>

END

pmRepDesType := { file | mail | printer }

pmRepWin := { min15 | hour | day | week | month | year }

Page 158: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

152

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

CREATE CLASS tCRProfileuserLabel <user_label>pmGranularity <pmGran>pmRepDestName <string>pmReportWindow <pmRepWin>[ pmReportDestType <pmRepDesType> ][ pmThreBBE <number> ] [ pmThreES <number> ] [ pmThreSES <number> ] [ pmThreFEBBE <number> ] [ pmThreFEES <number> ] [ pmThreFESES <number> ]

END

N.B. When one of the attributes which are not mandatory is not present in the above create request, itsvalue remains unspecified.

UPDATE CLASS tCRProfile userLabel <user_label>

updList [ userLabel <user_label> ] [ pmReportDestType <pmRepDesType>] [ pmReportDestName <string> ] [ pmReportWindow <pmRepWin> ] [ pmThreBBE <number> ] [ pmThreES <number> ] [ pmThreSES <number> ]

[ pmThreFEBBE <number> ][ pmThreFEES <number> ][ pmThreFESES <number> ]

ENDEND

DELETE CLASS tCRProfileuserLabel <user_label>

END

CREATE CLASS pmCountRepuserLabel <user_label>pmRepDestName <string>pmReportWindow <pmRepWin>pmReportDestType <pmRepDesType>

END

UPDATE CLASS pmCountRepuserLabel <user_label>updList

[ userLabel <userLabel> ][ pmReportDestType <pmRepDesType> ][ pmRepDestName <string> ][ pmReportWindow <pmRepWin> ]

END

Page 159: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

153

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

DELETE CLASS pmCountRepuserLabel <userLabel>

END

N.B. objects of class tCAProfile have no attributes to update.

CREATE CLASS tCAProfileuserLabel <user_label>pmTpForTca <pmTpTca> pmGranularity <pmGran> [ bBeHigh <number> ][ bBeLow <number> ][ eSHigh <number> ][ eSLow <number> ][ sESHigh <number> ][ sESLow <number> ][ fEBBEHigh <number> ][ fEBBELow <number> ][ fEESHigh <number> ][ fEESLow <number> ][ fESESHigh <number> ][ fESESLow <number> ]

END

DELETE CLASS tCAProfileuserLabel <user_label>

END

STARTmeasuserLabel <user_label>

END

STOPmeasuserLabel <user_label>

END

CONSmeasuserLabel <user_label>

END

pathTrail := [ pathUserLabel <user_label> | trailUserLabel <user_label> ]

CORRtransToMeasmeasureUserLabel <user_label>{ <pathTrail> } ...

END

UNCORRtransToMeas{ measureUserLabel <user_label> } ...<pathTrail>

END

Tp := { nap <port_name> | cap <port_name> payloadPos <string> | ctp <port_name> payloadPos <string> }

Page 160: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

154

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

CORRTpToMeas | UNCORRTpToMeas{ measureUserLabel <user_label> } ...<Tp>

END

N.B. In the correlation case only measures with the same state can be specified.

Report := { tcr <user_label> | countRep <user_label> }

CORRrepToMeas | UNCORRrepToMeasmeasureUserLabel <user_label>{ <Report> } ...

END

CORRpmTpToTcameasureUserLabel <user_label><Tp>{ tca <user_label> } ...END

N.B. The pmTp involved in the correlation is identified by the measure it belongs to and by the Tp relatedto it.

UNCORRpmTpToTcameasureUserLabel <user_label><Tp>

END

DELETEpmTpmeasureUserLabel <user_label><Tp>

END

N.B. The pmTp to delete is identified by the measure it belongs to and by the Tp related to it.

DELETEpmTranspmeasureUserLabel <user_label><pathTrail>

END

N.B. In DELETEpmTransp <pathTrail> specifies the userLabel of the pmTransport object. If thepmTransport is a path–image the pathUserLabel token is used while if it is a trail–image the trailUserLabelis used instead. Note that a pmTransport is created with the same userLabel of the correspondingpath/trail.

Page 161: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

155

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.9 aSAP commands

D.1.9.1 Description

Objects of class aSAProfile can be handled with the following commands:

CREATE: creates one object;

UPDATE: changes one object attribute values;

DELETE: removes one object;

CORRtoaSAProfile one object of class aSAProfile is bound with objects of class path, trail andphysical connection.

D.1.9.2 Syntax

AlarmSevCode:= { nonAlarmed | minor | major | critical | warning }

CREATE CLASS aSAProfileuserLabel <user_label>[ mediaEqFail <AlarmSevCode> ][ underProtDegr <AlarmSevCode> ][ rSFailure <AlarmSevCode> ][ exBer <AlarmSevCode> ][ degSignal <AlarmSevCode> ][ confMismatch <AlarmSevCode> ][ sdhFailure <AlarmSevCode> ][ pdhFailure <AlarmSevCode> ][ qualityTC15 <AlarmSevCode> ][ qualityTC24 <AlarmSevCode> ]

END

In making the just above specified create request the optional attributes have default values as follows:mediaEqFail major, underProtDegr warning, rSFailure major, exBer major, confMismatch major,sdhFailure major, pdhFailure warning, qualityTC15 and qualityTC24 minor.

DELETE CLASS aSAProfileuserLabel <user_label>

END

asapClasses:= { path | trail | physicalConn }

objectUserLabel:= userLabel <user_label>

toBindObject:= CLASS asapClasses{ objectUserLabel }.....END

CORRtoaSAProfileuserLabel <user_label>{ toBindObject }.....

END

Page 162: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

156

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.10 restRule commands

D.1.10.1Description

Objects of class restoration Rule can be handled with the following commands:

SET: set the ’ working’ restoration domain that is the restoration domain which all thesubsequent commands related to object of class restoration Rule will be sentto;

CREATE: creates one object;

UPDATE: changes one object attribute values;

DELETE: removes one object;

ACT_UPDATE: change the attribute ’restState’ for one object of class path or trail.

Page 163: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

157

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.10.2Syntax

SET restDomId <number>END

ObjRestClass:= { path | trail }

RestorationStrategy:= { optimizedAddProt | eToEAddProt }

AllocationConstraint:= { notAlarmedResourcesOnly | noRestriction }

ConstrRule:= { dontUseConstraints | useDefConstraints }

CREATE CLASS restRuleuserLabel <user_label>objClass <ObjRestClass>[ restStrategy <RestorationStrategy> ][ holdOffTime <number> ][ usedResources <AllocationConstraint> ][ constraintRule <ConstrRule> ]

END

In the above create request holdOffTime has a value of 300 as a default.

UPDATE CLASS restRuleuserLabel <user_label>objClass <ObjRestClass>updList

[ restStrategy <RestorationStrategy> ][ holdOffTime <number> ][ usedResources <AllocationConstraint> ][ constraintRule <ConstrRule> ]

ENDEND

DELETE CLASS restRuleuserLabel <user_label>objClass <ObjRestClass>

END

N.B. In the above CREATE, UPDATE and DELETE the object of class restoration rule is identified via theuser label and the the class of the object related.

ACT_UPDATE CLASS ObjRestClassuserLabel <user_label>updList

restState supervisedEND

END

Page 164: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

158

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.11 Comments

Comments can be specified in a line of the command file beginning with the symbol !. Comments aredelimited with a new line character.

D.1.12 Sleep command

D.1.12.1Description

The execution of the SLEEP command permits the program to wait for a specified number of secondsbetween two commands.

D.1.12.2Syntax

SLEEP <number>

D.1.13 Setting timeout

D.1.13.1Description

This commands sets the timeout (number of seconds) of CI messages (get and actions).

D.1.13.2Syntax

SETtimeout <number> END

D.1.14 Exit command

D.1.14.1Description

This command stops the utility and shows final statistics (useful when the utility is running with –f– option).

D.1.14.2Syntax

EXIT

Page 165: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

159

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.15 Connection command

D.1.15.1Description

IMPLconn: This command is used to implement a connection in topology.

DEIMPLconn: This command is used to deimplement a connection in topology.

D.1.15.2Syntax

tpRole_value:={ RCV | RCV Main | RCV Spare | XMIT Main | XMIT Spare | XMIT Main RCV Main| XMIT Main RCV Spare | XMIT Spare RCV Main | XMIT Spare RCV Spare | XMITRCV | XMIT Main RCV | XMIT Spare RCV | XMIT RCV Main | XMIT RCV Spare| XMIT Service RCV Service | XMIT Service | RCV Service }

tp:= { ctp <port_name> payloadPos <string> tpRole <tpRole_value> |nap <port_name> tpRole <tpRole_value> |cap <port_name> payloadPos <string> tpRole <tpRole_value> }

conn_tp_list:= { <tp><tp>[tp][tp] }

topolevel:= { ntw | sbn | et | node }

N.B. The possible configuration are the following:

ctp–ctpnap–ctpctp–napcap–ctpctp–capcap–capnap–napctp–ctp–ctpnap–ctp–ctpctp–ctp–napcap–cap–capcap–ctp–ctpctp–ctp–ctp–ctpcap–ctp–ctp–ctpctp–cap–ctp–ctpctp–ctp–cap–ctpctp–ctp–ctp–capnap–ctp–ctp–ctpctp–nap–ctp–ctpctp–ctp–nap–ctpctp–ctp–ctp–nap

IMPLconn topologyLevel <topolevel> endTpList <conn_tp_list> ENDEND

Page 166: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

160

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

DEIMPLconn topologyLevel <topolevel> endTpList <conn_tp_list> ENDEND

N.B. Now those function can be used only at node level.

Page 167: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

161

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.16 Topology Commands

D.1.16.1Description

CREATEntw: it creates a new network topology

CREATEsbn: it creates a new subnetwork topology.

CREATEet: it creates a new elementary topology.

CREATEnode: it creates a new node.

CREATE physicalConnection: it creates a new physical connection.

REMOVE ntw: it removes a network topology.

REMOVE sbn: it removes a subnetwork topology.

REMOVE et: it removes an elementary topology.

REMOVE physicalConnection: it removes a physical connection.

IMPL ntw: it implement a network.

IMPL sbn: it implement a subnetwork.

IMPL et: it implement an elementary topology.

IMPL physicalConnection:it implement a physical connection.

DEIMPL ntw: it deimplement a network.

DEIMPL sbn: it deimplement a subnetwork.

DEIMPL et: it deimplement an elementary topology.

DEIMPL physicalConnection: it deimplement a physical connection.

Update et: it update the globalCfg attribute in et.

SPLITphysicalConnection: it split a defined physical connection.

JOINphysicalConnection: it join two physical connection.

OBJECTconnection: it connect/disconnect one or more physical connection.

Page 168: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

162

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.16.2Syntax

etType_set:= { genericRing | msSpring | meshed | msSpring4f }

stmType_set:= { stm1 | stm4 | stm16 | notHomogeneus | stm64 | stm0 }

CREATEntwuserLabel <user_label>mapId <integer>userId <string>[comment1 <string> ][comment2 <string> ]

END

CREATEsbnuserLabel <user_label>includedIn ntw <user_label>userId <string>[comment1 <string> ][comment2 <string> ]

END

CREATEetuserLabel <user_label>includedIn sbn <user_label>userId <string>etType <etType_set>stmType <stmType_set>fiberNum <integer>globalCfg <True | False>[comment1 <string> ][comment2 <string> ]

END

CREATEnodeuserLabel <user_label>includedIn <sbn | et><user_label>userId <string>neUserLabel <user_label>[seqNumInEt <integer>][nodeInEt <integer>][comment1 <string> ][comment2 <string> ]

END

Page 169: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

163

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

CREATE physicalConnectionuserLabel <user_label>userId <string>aSDHPort <user_label>zSDHPort <user_label>

END

REMOVE ntwuserLabel <user_label>

END

REMOVE sbnuserLabel <user_label>

END

REMOVE etuserLabel <user_label>

END

REMOVE physicalConnectionuserLabel <user_label>

END

IMPL <ntw | sbn | et | physicalConnection>userLabel <user_label>

END

DEIMPL <ntw | sbn | et | physicalConnection>userLabel <user_label>

END

Update et userLabel<label> globalCfg <True |False>END

SPLITphysicalConnection reqType <splitType> userLabelPhyConnToSplit <user_label> userLabelFirstPhyConn <user_label> userLabelOldFirstPort <user_label> userLabelNewFirstPort <user_label> userLabelSecondPhyConn <user_label> userLabelOldSecondPort <user_label> userLabelNewSecondPort <user_label> <split_phyConn_attr>END

Page 170: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

164

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

JOINphysicalConnection reqType <joinType> userLabelFirstPhyConn <user_label> userLabelSecondPhyConn <user_label> userLabelNewPhyConn <user_label> <join_phyConn_attr>END

OBJECTconnection actionType <actionConnection> connectMode <modeConnection> { physicalConnection <user_label> }........END

Page 171: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

165

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.1.17 Upload and Remove NAP

D.1.17.1Description

UPLOADnap: it perform the naps upload in topology level defined.

REMOVEnap: it remove all naps in topology level defined or remove a single nap defined with portname.

D.1.17.2Syntax

UPLOADnap <ntw | sbn | et | node>userLabel <user_label>

END

REMOVEnap <ntw | sbn | et | node>userLabel <user_label>

END

REMOVEnap <nap>portName <string>

END

D.1.18 Configure et, physical connection.

D.1.18.1Description

CONFIGURE: it configure the payload in et or physical connection.

D.1.18.2Syntax

CONFIGURE <et | physicalConnection>userLabel <user_label>payloadStructureList

vc3Num <integer>vc4Num <integer>vc12Num <integer>

payloadStructureListENDEND

Page 172: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

166

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.2 tool description

The tool for executing command files accepts some input parameters:

–file <string> (mandatory) to specify the command file name;

–ntw <number> to set the default work network (it is equal to SET ntwid <number> END);

–syntax to only check the syntax of the command file (without executing any command);

–f– to introduce commands from the standard input;

–stop to force the EXIT command when an error occurs;

–nochkconstr to disable checks about CTPs of CONSTRpath and CONSTRtrail commands.

D.2.1 Handling errors

The tool stops when a syntactical errors on keyword occurs. In this case the following message is printedon standard output:

line no <number> token = <keyword>

If there is an error on an attribute value, the message:

line no <number> – Value <string_value> not found in the NML d.b.

In this case, the tool only stops the execution of the commands if the wrong attribute value is specified inSET, SETpath, SETtrail commands, otherwise the command is skipped and the tool execution goes on,unless the utility is running with ’–stop’ option on.

Page 173: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

167

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3 Examples

VADM_16

Adm2

Adm5

VADM_15

VADM_18

VADM_17

VADM_2

VADM_3

VADM_11 VADM_19

VADM_33

VADM_4

VADM_5

VADM_34VADM_37

VADM_38

X_27

X_26

ADM_1

Adm7

Adm8

NE_V1

RING STM–1

RING STM–4

RING STM–16

Figure 5. Reference Network

In the following three examples it is supposed to have the Network showed at figure 5. NE_V1 is a virtualNE, while all the others ADM are real NE.

Page 174: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

168

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.1 Example on paths

In this example a simple bidirectional 2Mb path between ADM_1 and VADM_2 is created, allocated (byusing constraints) and imlemented.

! ## DATE ## 14/12/98 15:05:16SETpath allocRule user implRule user allocationConstraint noRestriction ENDSET ntwId 1 END

CREATEpath userLabel ”ADM001–VADM_3–2M–9” pathType bidirectionalPtoPto pathRate lo2Mb protType notProtected allAlgType automatic userId ”snmlr21” pmAutomatic false alarmPropRule whenImplemented endTpList nap ”ADM_1/2M/1–09” usedDir bidirectional nap ”VADM_3/2M–06” usedDir bidirectional ENDEND

!!It is not necessary to define all the constraints.!If the constaints are not defined, the routing algorithm!will choose a route for you. !However, the routing algorithm will use all the constraints!related to the path when an allocation/add–remove leg/!add–remove protection is executed!

Page 175: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

169

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

CONSTRpath userLabel ”ADM001–VADM_3–2M–9” ctp ”ADM_1/West” payloadPos ”01/1/5.2” constrainType useMain ctp ”VADM_3/STM1–2” payloadPos ”01/1/5.2” constrainType useMain ENDALLOCpath userLabel ”ADM001–VADM_3–2M–9” END!! It is not necessary to remove all the constraints ! related to the path.! If you don’t delete them, the constraints will be used for the ! next allocation phase !!CONSTRpath userLabel ”ADM001–VADM_3–2M–9” ENDIMPLpath userLabel ”ADM001–VADM_3–2M–9” END

CONNECTpath userLabel ”ADM001–VADM_3–2M–9” “immediate” endTpList ctp ”ADM_1/2M/1–09” payloadPos “03/1.1/1” ctp ”VADM_3/2M–06” payloadPos ”03/1.1/1” ENDENDDISCONNECTpath userLabel ”ADM001–VADM_3–2M–9” endTpList ctp ”ADM_1/2M/1–09” payloadPos “03/1.1/1” ctp ”VADM_3/2M–06” payloadPos ”03/1.1/1” ENDEND

Page 176: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

170

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.2 Example on paths protected with Drop & Continue

In this example an enhanced protected 2Mb path is implemented in three steps:

1) the unprotected path is implemented between Adm7 and Adm2. The path route is forced by using TPconstraints; the route is Adm2–Adm5–VADM_2–VADM_3–Adm8–Adm7;

2) the path is SNCP protected. The spare path route is forced by using TP constraints; the spare routeis Adm2–VADM_16–VADM_15–VADM_38–VADM_34–VADM_4–VADM_5–VADM_33–Adm7; SNCPconnections are created on Adm2 and Adm7;

3) the path is enhanced protected in RING STM–1 and RING STM–4. The service path routes are forcedby using TP constraints. The first service route is Adm5–VADM_17–VADM_18–VADM_15. Drop &continue connections are created on Adm5 and VADM_15. The second service route isAdm8–VADM_11–VADM_19–VADM_33. Drop & continue connections are created on Adm8 andVADM_33.

! ## DATE ## 30/09/97 09:04:19!! path enhanced protected!SETpath allocRule user implRule user allocationConstraint noRestriction END SET ntwId 1 END!! step 1– not protected path is created!CREATEpath userLabel ’Adm7–Adm2–2M–15’ pathType bidirectionalPtoPto pathRate lo2Mb protType notProtected alarmPropRule whenImplemented allAlgType automatic userId ’snmlr21’ endTpList nap ’Adm2/port2M–102’ usedDir bidirectional nap ’Adm7/port2M–115’ usedDir bidirectional ENDEND CONSTRpath userLabel ’Adm7–Adm2–2M–15’ ctp ’Adm2/West’ payloadPos ’01/1/1.3’ constrainType useMain ! ctp ’Adm5/East’ payloadPos ’01/1/1.3’ ctp ’Adm5/stm–1’ payloadPos ’01/1/1.2’ constrainType useMain ! ctp ’VADM_2/STM1–1’ payloadPos ’01/1/1.2’ ctp ’VADM_2/West’ payloadPos ’02/2/7.3’ constrainType useMain ! ctp ’VADM_3/East’ payloadPos ’02/2/7.3’ ctp ’VADM_3/STM1–3’ payloadPos ’01/1/7.2’ constrainType useMain ! ctp ’Adm8/stm–1’ payloadPos ’01/1/7.2’

Page 177: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

171

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ctp ’Adm8/East’ payloadPos ’01/2/2.2’ constrainType useMain ! ctp ’Adm7/West’ payloadPos ’01/2/2.2’ END ALLOCpath userLabel ’Adm7–Adm2–2M–15’ END!! step 2 – protection SNCP is added!CONSTRpath userLabel ’Adm7–Adm2–2M–15’ ctp ’Adm2/East’ payloadPos ’01/1/1.3’ constrainType useSpare ! ctp ’VADM_16/West’ payloadPos ’01/1/1.3’ ctp ’VADM_16/East’ payloadPos ’01/1/5.3’ constrainType useSpare ! ctp ’VADM_15/West’ payloadPos ’01/1/5.3’ ctp ’VADM_15/STM1–1’ payloadPos ’01/1/1.2’ constrainType useSpare ! ctp ’VADM_38/STM1–1’ payloadPos ’01/1/1.2’ ctp ’VADM_38/West’ payloadPos ’01/1/1.1’ constrainType useSpare ! ctp ’VADM_34/East’ payloadPos ’01/1/1.1’ ctp ’VADM_34/STM1–2’ payloadPos ’01/1/1.3’ constrainType useSpare ! ctp ’VADM_4/STM1–2’ payloadPos ’01/1/1.3’ ctp ’VADM_4/East’ payloadPos ’02/2/7.3’ constrainType useSpare ! ctp ’VADM_5/West’ payloadPos ’02/2/7.3’ ctp ’VADM_5/STM1–1’ payloadPos ’01/1/1.3’ constrainType useSpare ! ctp ’VADM_33/STM1–3’ payloadPos ’01/1/1.3’ ctp ’VADM_33/West’ payloadPos ’01/2/2.2’ constrainType useSpare ! ctp ’Adm7/East’ payloadPos ’01/2/2.2’ END!! the allocation of spare route is executed with the following command!PROTECTpath userLabel ’Adm7–Adm2–2M–15’ protect deferred endTpList nap ’Adm2/port2M–102’ nap ’Adm7/port2M–115’ topologyLevel ntw ENDEND!! step 3 – service protection is added!CONSTRpath userLabel ’Adm7–Adm2–2M–15’ ctp ’Adm5/West’ payloadPos ’01/1/2.3’ constrainType useService ! ctp ’VADM_17/East’ payloadPos ’01/1/2.3’ ctp ’VADM_17/West’ payloadPos ’01/1/4.1’ constrainType useService ! ctp ’VADM_18/East’ payloadPos ’01/1/4.1’ ctp ’VADM_18/West’ payloadPos ’01/1/5.2’ constrainType useService ! ctp ’VADM_15/East’ payloadPos ’01/1/5.2’ END!

Page 178: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

172

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

! the allocation of second spare route is executed with the following command!PROTECTpath userLabel ’Adm7–Adm2–2M–15’ addEnhancedProt deferred endTpList ctp ’Adm5/stm–1’ payloadPos ’01/1/1.2’ ctp ’VADM_15/STM1–1’ payloadPos ’01/1/1.2’ topologyLevel et ENDEND CONSTRpath userLabel ’Adm7–Adm2–2M–15’ ctp ’Adm8/West’ payloadPos ’01/1/2.2’ constrainType useService ! ctp ’VADM_11/East’ payloadPos ’01/1/2.2’ ctp ’VADM_11/West’ payloadPos ’01/1/3.3’ constrainType useService ! ctp ’VADM_19/East’ payloadPos ’01/1/3.3’ ctp ’VADM_19/West’ payloadPos ’01/1/3.3’ constrainType useService ! ctp ’VADM_33/East’ payloadPos ’01/1/3.3’ END PROTECTpath userLabel ’Adm7–Adm2–2M–15’ addEnhancedProt deferred endTpList ctp ’Adm8/stm–1’ payloadPos ’01/1/7.2’ ctp ’VADM_33/STM1–3’ payloadPos ’01/1/1.3’ topologyLevel et ENDEND CONSTRpath userLabel ’Adm7–Adm2–2M–15’ END

Page 179: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

173

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.3 Example on broadcast path

In this example, a broadcast path with 2 legs is created between VADM_38 and NE_V1 (virtual NE). Thefirst leg allocated and protected too. On the second leg just the TP sink is defined. The first leg is created.Please note the sink is related by the nodename + the portname. It could be enough to define just thenodename. In this case, the system will choose for you the port and will create the virtual NAP. If necessary,the system will create the virtual port.

! ## DATE ## 14/12/98 14:07:16SETpath allocRule user implRule user allocationConstraint noRestriction ENDSET ntwId 1 END

CREATEpath userLabel ”moni” pathType unidirectionalPtoPto pathRate lo2Mb protType notProtected allAlgType automatic userId ”lts4182/snmlr24” pmAutomatic false alarmPropRule whenImplemented endTpList nap ”VADM_38/2M–11” usedDir source node ”NE_V1” usedDir sink portName ”NE_V1/2M–21” ENDEND

!!Constraints are inserted; the will be used during the!allocation phase!CONSTRpath userLabel ”moni” ctp ”VADM_38/West” payloadPos ”06/2/7.2” constrainType useMainZ ctp ”X27/STM1–15” payloadPos ”01/2/7.2” constrainType useMainA ctp ”X27/STM1–14” payloadPos ”01/2/7.2” constrainType useMainZ ctp ”NE_V1/STM1–5” payloadPos ”01/2/7.2” constrainType useMainA ENDALLOCpath userLabel ”moni” END!!Constraints are added to protect the first leg.!(please note the constraintType is useSpare now)! route of spare is:! VADM_38,VADM_34,VADM_37,X26,NE_V1!CONSTRpath userLabel ”moni” ctp ”VADM_38/East” payloadPos ”03/1/2.1” constrainType useSpareZ

Page 180: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

174

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ctp ”VADM_34/West” payloadPos ”03/1/2.1” constrainType useSpareA ctp ”VADM_34/West” payloadPos ”01/1/1.3” constrainType useSpareZ ctp ”VADM_37/East” payloadPos ”01/1/1.3” constrainType useSpareA ctp ”VADM_37/West” payloadPos ”02/1/7.2” constrainType useSpareZ ctp ”VADM_38/East” payloadPos ”02/1/7.2” constrainType useSpareA ctp ”VADM_38/STM1–2” payloadPos ”01/2/7.3” constrainType useSpareZ ctp ”X26/STM1–15” payloadPos ”01/2/7.3” constrainType useSpareA ctp ”X26/STM1–1” payloadPos ”01/1/3.3” constrainType useSpareZ ctp ”NE_V1/STM1–6” payloadPos ”01/1/3.3” constrainType useSpareA END!!The allocation of spare is executed by using the!constraints.!PROTECTpath userLabel ”moni” protect deferred endTpList nap ”VADM_38/2M–11” nap ”NE_V1/2M–21” topologyLevel ntw ENDEND!!Onethor leg is just defined!ADDLEGpath userLabel ”moni” allocRule onUserRequest node ”NE_V1” END

Page 181: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

175

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.4 Example on broadcast paths (2nd)

In this example a broadcast path with six legs is allocated. Five legs are SNCP protected too. In thefollowing the route of the legs is described. It is supposed to have the Network as in the figure:

VADM_16

Adm2

Adm5

VADM_15

VADM_18

VADM_17

RING STM–1

Broadcast path ’circular1’ – leg1 – from VADM_17 to VADM_17 (not protected) route: VADM_17,VADM_18,VADM_15,VADM_16,Adm2,Adm5,VADM_17 – leg2 – from VADM_17 to Adm2 (protected) route main: VADM_17,Adm5,Adm2 route spare: VADM_17,VADM_18,VADM_15,VADM_16,Adm2A switch connection is created on Adm2 – leg3 – from VADM_17 to Adm5 (protected) route main: VADM_17,Adm5 route spare: VADM_17,VADM_18,VADM_15,VADM_16,Adm2,Adm5A switch connection is created on Adm5 – leg4 – from VADM_17 to VADM_15 (protected) route main: VADM_17,VADM_18,VADM_15 route spare: VADM_17,Adm5,Adm2,VADM_16,VADM_15

A switch connection is created on VADM_15 – leg5 – from VADM_17 to VADM_16 (protected) route main: VADM_17,VADM_18,VADM_15,VADM_16 route spare: VADM_17,Adm5,Adm2,VADM_16A switch connection is created on VADM_16 – leg6 – from VADM_17 to VADM_18 (protected) route main: VADM_17,VADM_18 route spare: VADM_17,Adm5,Adm2,VADM_16,VADM_15,VADM_18A switch connection is created on VADM_18

! ## DATE ## 02/02/98 14:30:46!SETpath allocRule user implRule user allocationConstraint noRestriction ENDSET ntwId 2 END!

Page 182: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

176

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

! Leg1!CREATEpath userLabel ’circular1’ pathType unidirectionalPtoPto pathRate lo2Mb protType notProtected alarmPropRule whenCommissioned allAlgType automatic userId ’lts4182/snmlr23’ pmAutomatic false endTpList nap ’VADM_17/2M–1–01’ usedDir source nap ’VADM_17/2M–1–02’ usedDir sink ENDEND

CONSTRpath userLabel ’circular1’ ctp ’VADM_17/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_18/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_18/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_15/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_15/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_16/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_16/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’Adm2/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’Adm2/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’Adm5/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’Adm5/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_17/East’ payloadPos ’01/1/1.1’ constrainType useMain ENDALLOCpath userLabel ’circular1’ END!! Leg2! nap ’Adm2/port2M–101’ is added to the path!ADDLEGpath userLabel ’circular1’ allocRule onUserRequest nap ’Adm2/port2M–101’ENDCONSTRpath userLabel ’circular1’ ctp ’VADM_17/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’Adm5/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’Adm5/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’Adm2/West’ payloadPos ’01/1/1.1’ constrainType useMain END!! Leg2 is allocated after the following command. A broadcast connection is created on node VADM_17!

Page 183: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

177

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ADDLEGpath userLabel ’circular1’ allocRule automaticallyAllocated deferred nap ’Adm2/port2M–101’ENDCONSTRpath userLabel ’circular1’ ctp ’VADM_17/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_18/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_18/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_15/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_15/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_16/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_16/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm2/East’ payloadPos ’01/1/1.1’ constrainType useSpare END!! Leg2 is protected!PROTECTpath userLabel ’circular1’ protect deferred endTpList nap ’VADM_17/2M–1–01’ nap ’Adm2/port2M–101’ topologyLevel ntw ENDEND!! Leg3! nap ’Adm5/port2M–101’ is added to the path!ADDLEGpath userLabel ’circular1’ allocRule onUserRequest nap ’Adm5/port2M–101’ENDCONSTRpath userLabel ’circular1’ ctp ’VADM_17/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’Adm5/West’ payloadPos ’01/1/1.1’ constrainType useMain END!! Leg3 is allocated after the following command. A leg is added on the broadcast connection on nodeVADM_17!ADDLEGpath userLabel ’circular1’ allocRule automaticallyAllocated deferred nap ’Adm5/port2M–101’ENDCONSTRpath

Page 184: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

178

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

userLabel ’circular1’ ctp ’VADM_17/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_18/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_18/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_15/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_15/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_16/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_16/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm2/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm2/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm5/East’ payloadPos ’01/1/1.1’ constrainType useSpare END!! Leg3 is protected!PROTECTpath userLabel ’circular1’ protect deferred endTpList nap ’VADM_17/2M–1–01’ nap ’Adm5/port2M–101’ topologyLevel ntw ENDEND!! Leg4! nap ’VADM_15/2M–1–01’ is added to the path!ADDLEGpath userLabel ’circular1’ allocRule onUserRequest nap ’VADM_15/2M–1–01’ENDCONSTRpath userLabel ’circular1’ ctp ’VADM_17/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_18/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_18/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_15/East’ payloadPos ’01/1/1.1’ constrainType useMain END!! Leg4 is allocated after the following command. A leg is added on the broadcast connection on nodeVADM_17!ADDLEGpath userLabel ’circular1’ allocRule automaticallyAllocated deferred nap ’VADM_15/2M–1–01’ENDCONSTRpath userLabel ’circular1’ ctp ’VADM_17/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm5/West’ payloadPos ’01/1/1.1’ constrainType useSpare

Page 185: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

179

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ctp ’Adm5/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm2/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm2/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_16/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_16/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_15/West’ payloadPos ’01/1/1.1’ constrainType useSpare END!! Leg4 is protected!PROTECTpath userLabel ’circular1’ protect deferred endTpList nap ’VADM_17/2M–1–01’ nap ’VADM_15/2M–1–01’ topologyLevel ntw ENDEND!! Leg5! nap ’VADM_16/2M–1–01’ is added to the path!ADDLEGpath userLabel ’circular1’ allocRule onUserRequest nap ’VADM_16/2M–1–01’ENDCONSTRpath userLabel ’circular1’ ctp ’VADM_17/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_18/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_18/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_15/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_15/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_16/East’ payloadPos ’01/1/1.1’ constrainType useMain END!! Leg5 is allocated after the following command. A leg is added on the broadcast connection on nodeVADM_17!ADDLEGpath userLabel ’circular1’ allocRule automaticallyAllocated deferred nap ’VADM_16/2M–1–01’ENDCONSTRpath userLabel ’circular1’ ctp ’VADM_17/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm5/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm5/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm2/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm2/East’ payloadPos ’01/1/1.1’ constrainType useSpare

Page 186: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

180

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ctp ’VADM_16/West’ payloadPos ’01/1/1.1’ constrainType useSpare END!! Leg5 is protected!PROTECTpath userLabel ’circular1’ protect deferred endTpList nap ’VADM_17/2M–1–01’ nap ’VADM_16/2M–1–01’ topologyLevel ntw ENDEND!! Leg6! nap ’VADM_18/2M–1–01’ is added to the path!ADDLEGpath userLabel ’circular1’ allocRule onUserRequest nap ’VADM_18/2M–1–01’ENDCONSTRpath userLabel ’circular1’ ctp ’VADM_17/West’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_18/East’ payloadPos ’01/1/1.1’ constrainType useMain END!! Leg6 is allocated after the following command. A leg is added on the broadcast connection on nodeVADM_17!ADDLEGpath userLabel ’circular1’ allocRule automaticallyAllocated deferred nap ’VADM_18/2M–1–01’ENDCONSTRpath userLabel ’circular1’ ctp ’VADM_17/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm5/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm5/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm2/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’Adm2/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_16/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_16/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_15/West’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_15/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_18/West’ payloadPos ’01/1/1.1’ constrainType useSpare END!! Leg6 is protected!

Page 187: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

181

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

PROTECTpath userLabel ’circular1’ protect deferred endTpList nap ’VADM_17/2M–1–01’ nap ’VADM_18/2M–1–01’ topologyLevel ntw ENDENDCONSTRpath userLabel ’circular1’ END

SPLITpath userLabel “ADM001–VADM_3–2M–9” operationalRule automatic node “ADM0001”END

JOINpath userLabel “ADM001–VADM_3–2M–9” userLabel “ADM0004” operationalRule automatic node “ADM0001”END

Page 188: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

182

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.5 Example on trails

In the next examples it is supposed to have the Network as in the figure:

VADM_11 VADM_19

VADM_33

Adm7

Adm8 RING STM–4

VADM_40

VADM_41 VADM_42

VADM_39

RING STM–16

VADM_29

W

E

Three trails are created and LO configured as follow: 1) trail trail8–29/1: Adm–8,Adm7,VADM_29

2) trail trail8–29/2: Adm–8,VADM_11,VADM_19,VADM_33,VADM_29

3) the last trail is SNCP protected: trail trail_prot : VADM_42,VADM_40,VADM_41 main trail trail_prot : VADM_42,VADM_39,VADM_41 spare

SET ntwId 3 END!!Trail 1!CREATEtrail userLabel ’trail8–29/1’ trailType pointToPoint flow bidirectional protType notProtected endTpList ctp ’VADM_29/West’ payloadPos ’02’ ctp ’Adm8/East’ payloadPos ’02’ END

Page 189: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

183

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ENDCONSTRtrail userLabel ’trail8–29/1’ ctp ’VADM_29/West’ payloadPos ’02’ constrainType useMain ctp ’Adm7/East’ payloadPos ’02’ constrainType useMain ctp ’Adm7/West’ payloadPos ’02’ constrainType useMain ctp ’Adm8/East’ payloadPos ’02’ constrainType useMain ENDALLOCtrail userLabel ’trail8–29/1’ ENDCONSTRtrail userLabel ’trail8–29/1’ ENDIMPLtrail userLabel ’trail8–29/1’ END!!Trail 1 is LO configured!CONFIGtrail userLabel ’trail8–29/1’ payloadStructure tu12Tu12Tu3 END!!Trail 2!CREATEtrail userLabel ’trail8–29/2’ trailType pointToPoint flow bidirectional protType notProtected endTpList ctp ’Adm8/West’ payloadPos ’02’ ctp ’VADM_29/East’ payloadPos ’02’ ENDENDCONSTRtrail userLabel ’trail8–29/2’ ctp ’Adm8/West’ payloadPos ’02’ constrainType useMain ctp ’VADM_11/East’ payloadPos ’02’ constrainType useMain ctp ’VADM_11/West’ payloadPos ’02’ constrainType useMain ctp ’VADM_19/East’ payloadPos ’02’ constrainType useMain ctp ’VADM_19/West’ payloadPos ’02’ constrainType useMain ctp ’VADM_33/East’ payloadPos ’02’ constrainType useMain ctp ’VADM_33/West’ payloadPos ’02’ constrainType useMain ctp ’VADM_29/East’ payloadPos ’02’ constrainType useMain ENDALLOCtrail userLabel ’trail8–29/2’ ENDCONSTRtrail userLabel ’trail8–29/2’ END

Page 190: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

184

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

IMPLtrail userLabel ’trail8–29/2’ END!!Trail 2 is LO configured!CONFIGtrail userLabel ’trail8–29/2’ payloadStructure tu12Tu12Tu3 END!!Trail 3 !CREATEtrail userLabel ’trail–prot’ trailType pointToPoint flow bidirectional protType notProtected endTpList ctp ’VADM_41/East’ payloadPos ’01’ ctp ’VADM_42/West’ payloadPos ’01’ ENDENDCONSTRtrail userLabel ’trail–prot’ ctp ’VADM_41/East’ payloadPos ’01’ constrainType useMain ctp ’VADM_40/West’ payloadPos ’01’ constrainType useMain ctp ’VADM_40/East’ payloadPos ’01’ constrainType useMain ctp ’VADM_42/West’ payloadPos ’01’ constrainType useMain ENDALLOCtrail userLabel ’trail–prot’ END!!Trail 3 is SNCP protected!CONSTRtrail userLabel ’trail–prot’ ctp ’VADM_41/West’ payloadPos ’01’ constrainType useSpare ctp ’VADM_39/East’ payloadPos ’01’ constrainType useSpare ctp ’VADM_39/West’ payloadPos ’01’ constrainType useSpare ctp ’VADM_42/East’ payloadPos ’01’ constrainType useSpare ENDPROTECTtrail userLabel ’trail–prot’ protect deferred endTpList cap ’VADM_41/East’ payloadPos ’01’ cap ’VADM_42/West’ payloadPos ’01’ topologyLevel ntw ENDENDCONSTRtrail userLabel ’trail–prot’

Page 191: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

185

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ENDIMPLtrail userLabel ’trail–prot’ END!!Trail 3 is LO configured!CONFIGtrail userLabel ’trail–prot’ payloadStructure tu12Tu12Tu3 END

SPLITtrail userLabel “ADM001–VADM_3–2M–9” operationalRule automatic node “ADM0001”END

JOINtrail userLabel “ADM001–VADM_3–2M–9” userLabel “ADM0004” operationalRule automatic node “ADM0001”END

CONFIGUREmsTrail userLabel “MSTRAIL–TO–TEST” Au4List hoAu4Conc4 4 ENDEND

Page 192: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

186

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.6 Example of path that uses HO trails

In this example it is supposed to have the three trails created in the previous example.An SNCP path isimplemented by using the trails.

The end points of the path are located on VADM_29 and VADM42.

SETpath allocRule user implRule user allocationConstraint noRestriction ENDSET ntwId 3 END!!First unprotected path is created!CREATEpath userLabel ’test–mig’ pathType bidirectionalPtoPto pathRate lo2Mb protType notProtected alarmPropRule whenImplemented allAlgType automatic userId ’lts4182/snmlr23’ pmAutomatic false endTpList nap ’VADM_29/2M–01’ usedDir bidirectional nap ’VADM42/2M–1’ usedDir bidirectional ENDEND!!The path uses the trail ’trail8–29/1’.!Please note that is not necessary to define the TP on node Adm7, because this TP belongs to the trail.!CONSTRpath userLabel ’test–mig’ ctp ’VADM_29/West’ payloadPos ’02/1/1.1’ constrainType useMain ctp ’Adm8/East’ payloadPos ’02/1/1.1’ constrainType useMain ctp ’Adm8/stm–1’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_41/STM1–1’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_41/East’ payloadPos ’01/1/1.1’ constrainType useMain ctp ’VADM_42/West’ payloadPos ’01/1/1.1’ constrainType useMain ENDALLOCpath userLabel ’test–mig’ END!!The path is SNCP protected.!The spare route uses the other two trails of the previous example.!CONSTRpath userLabel ’test–mig’ ctp ’VADM_29/East’ payloadPos ’02/1/1.1’ constrainType useSpare ctp ’Adm8/West’ payloadPos ’02/1/1.1’ constrainType useSpare

Page 193: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

187

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

ctp ’Adm8/stm–1’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_41/STM1–1’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_41/East’ payloadPos ’01/1/1.1’ constrainType useSpare ctp ’VADM_42/West’ payloadPos ’01/1/1.1’ constrainType useSpare ENDPROTECTpath userLabel ’test–mig’ protect deferred endTpList nap ’VADM_29/2M–01’ nap ’VADM42/2M–1’ topologyLevel ntw ENDENDCONSTRpath userLabel ’test–mig’ ENDIMPLpath userLabel ’test–mig’ END

Page 194: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

188

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.7 Example on measures

CREATE CLASS pMeasureuserLabel “Measure_1”pmStartTime ’1998/12/11–10:12:12’ pmEndTime ’1999/12/11–10:12:12’ defaultEnd truepmLayer hopmGranularity pm15MinpmCollectCounter false

END

This command creates a measure named ’Measure_1’. Measure_1 is planned on RM but nothing happens during creation in the network equipments. Measure_1 will be active on network equipments between pmStartTime and pmEndTime. It is possible to activate manually the measure with the command:

STARTmeasuserLabel “Measure_1”

END

It is possible to stop the measure manually issuing the following command:

STOPmeasuserLabel “Measure_1”

END

A performance measure aim is to describe the quality of service offered by a path or a trail, so thereforeonce created, to reach its goal a measure must be correlated to a path or a trail. A correlation request canbe submitted as follows:

CORRtransToMeasmeasureUserLabel “Measure_1”pathUserLabel “ADM_1–ADM_39”

END

Note that the end termination points of the object correlated will result automatically under measure ifattribute ’defaultEnd’ was set to ’true’ when creating the measure.In order to have a more detailed monitoring of a path (trail) performances it is possible to correlate some other path or trail termination points to the measure. This can be done with:

CORRTpToMeasmeasureUserLabel “Measure_1”nap “ADM_1–04”

END

As a measure has been bound to path, trail and their termination points so that relation can be broken usingcommands UNCORR transToMeas and UNCORRTpToMeas.Performance counters values can be reported via mail, printer or file. Doing that is achieved first creatinga new object of class pmCountRep and then correlating it to one measure. Next commands show how gettrough this job.

Page 195: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

189

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

CREATE CLASS countRepuserLabel ’CountRep_1’pmReportDestType filepmRepDestName ’/tmp/rep_1.tmp’pmReportWindow day

END

CORRrepToMeas measureUserLabel ’Measure_1’countRep ’CountRep_1’

END

Performance counters values can be checked against their overflowing a user–selected edge and resultsof this test can be sent by means of mail, printer or file as with showed just above. Steps to take creating an object of class tCRProfile and, after that, establishing a liaison between thisobject and a measure.

CREATE CLASS tCRProfileuserLabel ’Tcr_1’pmGranularity pm15MinpmReportDestType mailpmRepDestName ’/tmp/tcr_1.tmp’pmReportWindow hourpmThreBBE 10pmThreES 10

END

CORRrepToMeasuserLabel ’Measure_1’tcr ’Tcr_1’

END

!The following command creates an object of class tCAProfile:

CREATE CLASS tCAProfileuserLabel ’Tca_1’pmGranularity pm15MinpmTpForTca vc4bBeHigh 10bBeLow 1

END

An alarm will be produced if the bBe counter exceeds the range of specified values. To make a Tca working it is necessary to correlate it to a Tp. An example follows:

CORRpmTpToTcameasureUserLabel ’Measure_1’nap ’ADM_1–04’tca ’Tca_1’

END

Page 196: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

190

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.8 Example on aSAProfile

Object of class aSAProfile can be created and associated to some other objects of class path, trail andphysicalConn to stress, in some way, the importance of the alarms these objects show up.Here after a simple example give some hints.

CREATE CLASS aSAProfileuserLabel ’asap_1’mediaEqFail majorunderProtDegr warningrSFailure majorexBer majordegSignal warningconfMismatch majorsdhFailure warningpdhFailure warningqualityTC15 majorqualityTC24 minor

END

CORRtoaSAProfile userLabel ’asap_1’CLASS physicalConn

userLabel ’connec_1’userLabel ’connec_2’

ENDCLASS path

userLabel ’path_1’ENDCLASS trail

userLabel ’trail_1’END

END

Page 197: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

191

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.9 Example on restoration rule

The following command create an object of class restoration rule related to an object of class pathidentified by its user label ’path_1’.

CREATE CLASS restRuleuserLabel ’path_1’objClass path

END

If the restoration rule object just created must be changed in its value attributes:

UPDATE CLASS restRuleuserLabel ’path_1’objClass pathupdList

holdOffTime 500END

END

Related to objects of class restoration rule there may be the need to change the attribute ’restState’ valuefor object of class path or trail.

ACT_UPDATE CLASS ObjRestRuleuserLabel ’path_1’updList

restState supervisedEND

END

Page 198: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

192

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.10 Example on implement, deimplement connection

IMPLconn topologyLevel node endTpList cap ’ADM5/West’ payloadPos ’01’ tpRole ’XMIT RCV’ cap ’VADM_17/East’ payloadPos ’01’ tpRole ’XMIT RCV’ ENDEND

DEIMPLconn topologyLevel node endTpList cap ’ADM5/West’ payloadPos ’01’ tpRole ’XMIT RCV’ cap ’VADM_17/East’ payloadPos ’01’ tpRole ’XMIT RCV’ ENDEND

Page 199: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

193

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.11 Example on create, remove, implement and deimplement topology.

CREATEntw userLabel ’ntw1’ mapId 1 userId ’snml1’ comment1 ’Test to create a network’ comment2 ’Test passed’END

CREATEsbn includedIn ntw ’ntw1’ userLabel ’sbn1’ userId ’snml1’ comment1 ’Test to create a subnetwork’ comment2 ’Test passed’END

CREATEet includedIn sbn ’sbn1’ userLabel ’et1’ userId ’snml1’ etType genericRing stmType stm1 fiberNum 2 globalCfg True comment1 ’Test to create a network’ comment2 ’Test passed’END

CREATEnode includedIn sbn ’sbn1’ neUserLabel ’ne1’’ userLabel ’node1’ userId ’snml1’ comment1 ’Test to create a network’ comment2 ’Test passed’’ seqNumInEt 2 nodeInEt 3END

CREATE physicalConnection’ userLabel ’phyConn1’’ userId ’snml1’’ aSDHPort ’portWest1’’ zSDHPort ’portEast1’’END

N.B. The parameters order is not important in CREATE operation.

Page 200: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

194

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

REMOVE ntw userLabel ’ntw1’END

REMOVE sbn userLabel ’sbn1’END

REMOVE et userLabel ’et1’END

REMOVE physicalConnection userLabel ’physicalConnection1’END

IMPL ntw userLabel ’ntw1’END

IMPL sbn userLabel ’sbn1’END

IMPL et userLabel ’et1’END

IMPL physicalConnection userLabel ’physicalConnection1’END

DEIMPL ntw userLabel ’ntw1’END

DEIMPL sbn userLabel ’sbn1’END

DEIMPL et userLabel ’et1’END

Page 201: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

195

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

DEIMPL physicalConnection userLabel ’physicalConnection1’END

Update et userLabel ’STM1’ globalCfg TrueEND

SPLITphysicalConnection reqType undoSplit userLabelPhyConnToSplit ’Phy_Conn_Split’ userLabelFirstPhyConn ’Phy_Conn_1’ userLabelOldFirstPort ’Old_Port_1’ userLabelNewFirstPort ’New_Port_1’ userLabelSecondPhyConn ’Phy_Conn_2’ userLabelOldSecondPort ’Old_Port_2’ userLabelNewSecondPort ’New_Port_2’ END

SPLITphysicalConnection reqType split userLabelPhyConnToSplit ’Phy_Conn_Split’ userLabelFirstPhyConn ’Phy_Conn_1’ userLabelOldFirstPort ’Old_Port_1’ userLabelNewFirstPort ’New_Port_1’ userLabelSecondPhyConn ’Phy_Conn_2’ userLabelOldSecondPort ’Old_Port_2’ userLabelNewSecondPort ’New_Port_2’ userLabelPhyConnToSplit4f ’Phy_Conn_Split_4f’ userLabelFirstPhyConn4f ’Phy_Conn_1_4f’ userLabelOldFirstPort4f ’Old_Port_1_4f’ userLabelNewFirstPort4f ’New_Port_1_4f’ userLabelSecondPhyConn4f ’Phy_Conn_2_4f’ userLabelOldSecondPort4f ’Old_Port_2_4f’ userLabelNewSecondPort4f ’New_Port_2_4f’END

N.B. This syntax is used only in 4 fiber physical connection.

JOINphysicalConnection reqType undoJoin userLabelFirstPhyConn ’Phy_Conn_1’ userLabelSecondPhyConn ’Phy_Conn_2’ userLabelNewPhyConn ’New_Phy_Conn’END

Page 202: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

196

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

JOINphysicalConnection reqType join userLabelFirstPhyConn ’Phy_Conn_1’ userLabelSecondPhyConn ’Phy_Conn_2’ userLabelNewPhyConn ’New_Phy_Conn’ userLabelFirstPhyConn4f ’Phy_Conn_14f’ userLabelSecondPhyConn4f ’Phy_Conn_24f’ userLabelNewPhyConn4f ’New_Phy_Conn4f’END

N.B. This syntax is used only in 4 fiber physical connection.

OBJECTconnection actionType connect connectMode immediate physicalConnection ’Phy_Conn_To_Connect’ END

Page 203: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

197

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.12 Example on upload and remove nap.

UPLOADnap ntw userLabel ’ntw1’END

UPLOADnap sbn userLabel ’sbn1’END

UPLOADnap et userLabel ’et1’END

UPLOADnap node userLabel ’ntw1’END

REMOVEnap ntw userLabel ’ntw1’END

REMOVEnap sbn userLabel ’sbn1’END

REMOVEnap et userLabel ’et1’END

REMOVEnap node userLabel ’node1’END

REMOVEnap nap portName ’port_name_1END

Page 204: 1354rm

All

right

s re

serv

ed. P

assi

ng o

n an

d co

pyin

g of

this

docu

men

t, us

e an

d co

mm

unic

atio

n of

its

cont

ents

not p

erm

itted

with

out w

ritte

n au

thor

izat

ion

from

Alc

atel

.

ED

1AA

000

14 0

004

(900

7) A

4 –

ALI

CE

04.

10

198

03

957.130.882 U

/3AL 61260 AAAA TQZZA

198

198

D.3.13 Example configure physical connection and et.

CONFIGURE et userLabel ’et1’ payloadStructureList vc3Num 0 vc4Num 4 vc12Num 0 payloadStructureListENDEND

CONFIGURE physicalConnection userLabel ’physicalConnection1’ payloadStructureList vc3Num 0 vc4Num 4 vc12Num 0 payloadStructureListENDEND

END OF DOCUMENT