139
iManager U2000 Unified Network Management System V100R001C00 Operation Guide for WDM End-to-End Management Issue 02 Date 2009-10-23 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.

U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

  • Upload
    aquadig

  • View
    189

  • Download
    32

Embed Size (px)

Citation preview

Page 1: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

iManager U2000 Unified Network Management System

V100R001C00

Operation Guide for WDM End-to-EndManagement

Issue 02

Date 2009-10-23

Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Page 2: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For anyassistance, please contact our local office or company headquarters.

Huawei Technologies Co., Ltd.Address: Huawei Industrial Base

Bantian, LonggangShenzhen 518129People's Republic of China

Website: http://www.huawei.com

Email: [email protected]

Copyright © Huawei Technologies Co., Ltd. 2009. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior writtenconsent of Huawei Technologies Co., Ltd. Trademarks and Permissions

and other Huawei trademarks are the property of Huawei Technologies Co., Ltd.All other trademarks and trade names mentioned in this document are the property of their respective holders. NoticeThe purchased products, services and features are stipulated by the contract made between Huawei and thecustomer. All or part of the products, services and features described in this document may not be within thepurchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,and recommendations in this document are provided “AS IS” without warranties, guarantees or representationsof any kind, either express or implied.

The information in this document is subject to change without notice. Every effort has been made in thepreparation of this document to ensure accuracy of the contents, but the statements, information, andrecommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Page 3: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Contents

About This Document.....................................................................................................................1

1 Customer Management.............................................................................................................1-11.1 Creating a Customer........................................................................................................................................1-31.2 Browsing Customer Information.....................................................................................................................1-31.3 Viewing Relevant Trails of a Customer..........................................................................................................1-31.4 Browsing Current Alarms of a Customer........................................................................................................1-41.5 Browsing History Alarms of a Customer........................................................................................................1-51.6 Modifying Customer Information...................................................................................................................1-61.7 Deleting a Customer........................................................................................................................................1-61.8 Viewing the Customers Affected by an Alarm...............................................................................................1-61.9 Specifying the Customer of a Service.............................................................................................................1-7

2 Managing WDM Protection Subnets.....................................................................................2-12.1 Basic Concepts................................................................................................................................................2-2

2.1.1 Protection Subnet...................................................................................................................................2-22.1.2 Isolated Node..........................................................................................................................................2-2

2.2 Searching for Protection Subnets....................................................................................................................2-22.3 Configuring 1:N Wavelength Protection.........................................................................................................2-3

2.3.1 Creating 1:N Optical Channel Protection...............................................................................................2-32.3.2 Searching for 1:N Wavelength Protection Subnet.................................................................................2-52.3.3 Setting 1:N Wavelength Protection Subnet Parameters.........................................................................2-62.3.4 Verifying the 1:N Wavelength Protection Switching............................................................................2-7

2.4 Configuring Protection for an ODUk SPRing.................................................................................................2-82.4.1 Creating an ODUk SPRing Protection Group........................................................................................2-82.4.2 Searching for an ODUk SPRing Protection Subnet.............................................................................2-102.4.3 Setting Parameters of an ODUk SPRing Protection Subnet................................................................2-112.4.4 Verifying the ODUk SPRing Protection Switching.............................................................................2-112.4.5 ODUk Ring Network Protection..........................................................................................................2-13

2.5 Maintaining Protection Subnets....................................................................................................................2-172.5.1 Finding Protection Subnets..................................................................................................................2-172.5.2 Querying Protection Subnet Resources................................................................................................2-182.5.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet..................................2-182.5.4 Performing ODUk Ring Protection Switching.....................................................................................2-19

iManager U2000Operation Guide for WDM End-to-End Management Contents

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

i

Page 4: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

2.6 Deleting Isolated Nodes................................................................................................................................2-212.7 Deleting Protection Subnets..........................................................................................................................2-21

3 End-to-End WDM Management..............................................................................................3-13.1 Managing WDM Trails...................................................................................................................................3-2

3.1.1 Basic Concepts.......................................................................................................................................3-23.1.1.1 WDM Trail..........................................................................................................................................3-33.1.1.2 Conflict Trail.......................................................................................................................................3-73.1.1.3 Trail Creation Method.........................................................................................................................3-93.1.1.4 Process for Creating a Trail...............................................................................................................3-103.1.2 Creating WDM Trails by Trail Search.................................................................................................3-113.1.2.1 Searching for WDM Trails................................................................................................................3-123.1.2.2 Discrete Service Causes and Handling Measures.............................................................................3-133.1.3 Configuring WDM Trails.....................................................................................................................3-143.1.3.1 Creating an OCh Trail.......................................................................................................................3-153.1.3.2 Creating an ODUk Trail....................................................................................................................3-173.1.3.3 Creating Client Trails........................................................................................................................3-193.1.4 Viewing WDM Trails...........................................................................................................................3-203.1.4.1 Viewing Route Information of WDM Trail......................................................................................3-213.1.4.2 Viewing the Signal Flow Diagram for WDM Trails.........................................................................3-223.1.4.3 Viewing Relevant Client Trails.........................................................................................................3-233.1.4.4 Browsing Related Server Trails........................................................................................................3-233.1.4.5 Viewing the Optical Power for the Trails.........................................................................................3-243.1.4.6 Analyzing the WDM Trail Fault.......................................................................................................3-253.1.4.7 Viewing the Connectivity of WDM Services Networkwide.............................................................3-263.1.4.8 Browsing Associated Working and Protection Trails.......................................................................3-273.1.5 Maintaining WDM Trails.....................................................................................................................3-273.1.5.1 Activating/Deactivating WDM Trails...............................................................................................3-283.1.5.2 Configuring OTU Overhead on the OCh Trail.................................................................................3-293.1.5.3 Querying the 1+1 Protection for a WDM Trail.................................................................................3-303.1.5.4 Performing 1+1 Protection Switching for a WDM Trail..................................................................3-313.1.5.5 Querying the WXCP/SNCP Protection of a WDM Trail..................................................................3-323.1.5.6 Performing the WXCP/SNCP Protection Switching for a WDM Trail............................................3-323.1.5.7 Querying the DPPS Protection of a WDM Trail...............................................................................3-333.1.6 Collecting Resource Statistics..............................................................................................................3-333.1.6.1 Collecting Statistics on Client-Side Port Resources.........................................................................3-343.1.6.2 Collecting Statistics on Inter-Station Wavelength Resources...........................................................3-353.1.6.3 Collecting Statistics on WDM Link Resources.................................................................................3-363.1.7 Modifying WDM Trails.......................................................................................................................3-373.1.7.1 Modifying the Source and Sink of a Client Trail..............................................................................3-373.1.7.2 Modifying WXCP/SNCP Protection.................................................................................................3-383.1.7.3 Modifying Trail Names in Batches...................................................................................................3-393.1.8 Deleting a WDM Trail.........................................................................................................................3-40

ContentsiManager U2000

Operation Guide for WDM End-to-End Management

ii Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 5: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.1.9 Sample Application: Configuring GE Services with the WXCP Protection in End-to-End Mode.....3-413.1.10 Sample Application: Configuring an OCh Trail................................................................................3-45

3.2 Configuring EAPE........................................................................................................................................3-503.2.1 EAPE....................................................................................................................................................3-503.2.2 Creating an OCh Trail..........................................................................................................................3-543.2.3 Creating EAPE Objects........................................................................................................................3-563.2.4 Starting EAPE Adjustment...................................................................................................................3-573.2.5 Deleting EAPE Objects........................................................................................................................3-58

3.3 Managing Alarms on WDM Trails...............................................................................................................3-583.3.1 Viewing Current Alarms of a WDM Trail...........................................................................................3-593.3.2 Viewing History Alarms of a WDM Trail...........................................................................................3-593.3.3 Managing Networkwide WDM Alarm Trails in Real Time................................................................3-60

3.4 Managing the Performance of WDM Trails..................................................................................................3-603.4.1 Querying Current Performance of WDM Trails..................................................................................3-613.4.2 Browsing the History Performance of WDM Trails............................................................................3-613.4.3 Setting Performance Monitoring Parameters of an WDM Trail..........................................................3-623.4.4 Setting WDM Trail Performance Threshold........................................................................................3-63

A Glossary and Abbreviations..................................................................................................A-1A.1 Numerics........................................................................................................................................................A-2A.2 A....................................................................................................................................................................A-2A.3 B....................................................................................................................................................................A-6A.4 C....................................................................................................................................................................A-7A.5 D....................................................................................................................................................................A-8A.6 E.....................................................................................................................................................................A-9A.7 F...................................................................................................................................................................A-11A.8 G..................................................................................................................................................................A-12A.9 H..................................................................................................................................................................A-12A.10 I..................................................................................................................................................................A-13A.11 L.................................................................................................................................................................A-15A.12 M................................................................................................................................................................A-15A.13 N................................................................................................................................................................A-17A.14 O................................................................................................................................................................A-18A.15 P.................................................................................................................................................................A-20A.16 Q................................................................................................................................................................A-21A.17 R................................................................................................................................................................A-21A.18 S.................................................................................................................................................................A-22A.19 T.................................................................................................................................................................A-26A.20 U................................................................................................................................................................A-28A.21 V................................................................................................................................................................A-29A.22 W...............................................................................................................................................................A-30A.23 X................................................................................................................................................................A-31

iManager U2000Operation Guide for WDM End-to-End Management Contents

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

iii

Page 6: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)
Page 7: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Figures

Figure 3-1 Trail....................................................................................................................................................3-4Figure 3-2 OSC Trail............................................................................................................................................3-4Figure 3-3 ODUk (k = 1, 2, ...) trail.....................................................................................................................3-5Figure 3-4 ODUk (k = 0, 1, 2, ...) trail.................................................................................................................3-5Figure 3-5 40G inverse multiplexing trail ...........................................................................................................3-6Figure 3-6 10G inverse multiplexing trail ...........................................................................................................3-7Figure 3-7 A conflict trail generated because a fiber is added.............................................................................3-8Figure 3-8 A conflict trail generated because a single station cross-connection is lost.......................................3-8Figure 3-9 A conflict trail generated because a protection service is deleted on a per-NE basis........................3-8Figure 3-10 Creating trails by trail search..........................................................................................................3-10Figure 3-11 Creating trails in the automatic mode.............................................................................................3-11Figure 3-12 Network Design..............................................................................................................................3-42Figure 3-13 Station A.........................................................................................................................................3-42Figure 3-14 Station B.........................................................................................................................................3-43Figure 3-15 Station C.........................................................................................................................................3-43Figure 3-16 Station D.........................................................................................................................................3-43Figure 3-17 Network design...............................................................................................................................3-46Figure 3-18 NE panel on station A.....................................................................................................................3-47Figure 3-19 Signal flow of the trail from station B to station C........................................................................3-47Figure 3-20 Signal flow of the trail from station B to station D........................................................................3-48Figure 3-21 Signal flow of the trail from station D to station B........................................................................3-48Figure 3-22 Scenario of the single VOA unit that takes the common OTU as the source.................................3-52Figure 3-23 Scenario of the dual VOA units that take the dual-fed and selective-receiving OTUs as the sources.............................................................................................................................................................................3-53Figure 3-24 Scenario of the dual VOA units with the OLP protection units.....................................................3-53

iManager U2000Operation Guide for WDM End-to-End Management Figures

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

v

Page 8: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)
Page 9: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Tables

Table 3-1 ODUk rate level...................................................................................................................................3-3Table 3-2 Comparison of methods for creating trails...........................................................................................3-9Table 3-3 Network data table.............................................................................................................................3-46Table 3-4 The versions of the equipment and U2000 that support the EAPE function.....................................3-51

iManager U2000Operation Guide for WDM End-to-End Management Tables

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

vii

Page 10: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)
Page 11: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

About This Document

PurposeThe iManager U2000 Operation Guide for WDM End-to-End Management describes theoperation tasks of managing WDM network in the trail mode. This document also provides theglossary, and the acronyms and abbreviations.

Related VersionThe following table lists the product version related to this document.

Product Name Version

iManager U2000 V100R001C00

Intended AudienceThe intended audiences of this document are:l Network Monitoring Engineer

l Data Configuration Engineer

l NM Administrator

l System Maintenance Engineer

OrganizationThis document is organized as follows.

Chapter Description

1 Customer Management This chapter describes how to manage andmaintain the customer information.

2 Managing WDM Protection Subnets This chapter describes how to manage WDMprotection subnets.

iManager U2000Operation Guide for WDM End-to-End Management About This Document

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

1

Page 12: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Chapter Description

3 End-to-End WDM Management This chapter describes end-to-end WDMmanagement.

A Glossary and Abbreviations This part lists the glossary and abbreviationsused in the document.

Conventions

Symbol ConventionsThe following symbols may be found in this document. They are defined as follows.

Symbol Description

DANGERIndicates a hazard with a high level of riskwhich, if not avoided, will result in death orserious injury.

WARNINGIndicates a hazard with a medium or low levelof risk which, if not avoided, could result inminor or moderate injury.

CAUTIONIndicates a potentially hazardous situationthat, if not avoided, could cause equipmentdamage, data loss, and performancedegradation, or unexpected results.

NOTE Provides additional information to emphasizeor supplement important points of the maintext.

TIP Indicates a tip that may help you solve aproblem or save you time.

General ConventionsConvention Description

Times New Roman Normal paragraphs are in Times New Roman.

Boldface Names of files, directories, folders, and usersare in boldface. For example, log in as userroot.

Italic Book titles are in italics.

Courier New Terminal display is in Courier New.

About This DocumentiManager U2000

Operation Guide for WDM End-to-End Management

2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 13: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Command ConventionsConvention Description

Boldface The keywords of a command line are inboldface.

Italic Command arguments are in italic.

[ ] Items (keywords or arguments) in squarebrackets [ ] are optional.

{ x | y | ... } Alternative items are grouped in braces andseparated by vertical bars. One is selected.

[ x | y | ... ] Optional alternative items are grouped insquare brackets and separated by verticalbars. One or none is selected.

{ x | y | ... } * Alternative items are grouped in braces andseparated by vertical bars. A minimum of oneor a maximum of all can be selected.

[ x | y | ... ] * Optional alternative items are grouped insquare brackets and separated by verticalbars. A maximum of all or none can beselected.

GUI ConventionsConvention Description

Boldface Buttons, menus, parameters, tabs, window,and dialog titles are in boldface. For example,click OK.

> Multi-level menus are in boldface andseparated by the ">" signs. For example,choose File > Create > Folder.

Keyboard OperationFormat Description

Key Press the key. For example, press Enter andpress Tab.

Key 1+Key 2 Press the keys concurrently. For example,pressing Ctrl+Alt+A means the three keysshould be pressed concurrently.

iManager U2000Operation Guide for WDM End-to-End Management About This Document

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3

Page 14: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Format Description

Key 1, Key 2 Press the keys in turn. For example, pressingAlt, A means the two keys should be pressedin turn.

Mouse OperationAction Description

Click Select and release the primary mouse buttonwithout moving the pointer.

Double-click Press the primary mouse button twicecontinuously and quickly without moving thepointer.

Drag Press and hold the primary mouse button andmove the pointer to a certain position.

Update HistoryUpdates between document versions are cumulative. Therefore, the latest document versioncontains all updates made to previous versions.

Updates in Issue 02 (2009-10-23) Based on Product Version V100R001C00The updated contents are as follows.

Some bugs in the manual of the previous version are fixed.

Updates in Issue 01 (2009-09-25) Based on Product Version V100R001C00Initial release.

About This DocumentiManager U2000

Operation Guide for WDM End-to-End Management

4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 15: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

1 Customer Management

About This Chapter

By using the U2000, you can manage and maintain the customer information as required.

1.1 Creating a CustomerYou can create customer information as required, so that you can set a specific customer and amaintenance network for the trail.

1.2 Browsing Customer InformationBy browsing customer information, you can know the name, legal representative and contactmodes of the relevant customer of the service.

1.3 Viewing Relevant Trails of a CustomerIn a normally running network, the trail is the carrier of the customer service and is the resourceof the customer. In the network management, knowing the trails of different customers is veryhelpful to take care of the interests of different customers.

1.4 Browsing Current Alarms of a CustomerEach customer has a number of services that can report alarms when they run in the network.These alarms show the current status of the service. For this reason, you must query the currentalarms of the customer.

1.5 Browsing History Alarms of a CustomerBy querying the history alarms of a customer, you can learn about the long-term status of theservices that run in the network. When maintaining the services of the customer, you can usethe history alarm information for reference.

1.6 Modifying Customer InformationIf the customer information such as contact mode is changed, you need to modify the customerinformation in time.

1.7 Deleting a CustomerThe information of customers with whom contracts are fulfilled must be deleted. This operationensures that the customer information is not disclosed, and decreases the redundant informationin the database.

1.8 Viewing the Customers Affected by an Alarm

iManager U2000Operation Guide for WDM End-to-End Management 1 Customer Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

1-1

Page 16: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

When an alarm occurs on a service, you need to query the customers that are affected by thealarm. According to the query result, you can determine whether to notify the customer of thealarm.

1.9 Specifying the Customer of a ServiceWhen creating and modifying a service, you need to specify the customer that the service belongsto. This can facilitate the trail management.

1 Customer ManagementiManager U2000

Operation Guide for WDM End-to-End Management

1-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 17: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

1.1 Creating a CustomerYou can create customer information as required, so that you can set a specific customer and amaintenance network for the trail.

PrerequisiteYou must be an NM user with "network operator" authority or higher.

Procedure

Step 1 Choose Service > Customer Management from the Main Menu. The CustomerManagement window is displayed.

Step 2 Click Create, the Create Customer window is displayed.

Step 3 According to actual requirements, fill in the new customer information, such as CustomerName, Legal Representative, and Phone.

Step 4 Click OK, the new customer information field is displayed in the customer list.

----End

1.2 Browsing Customer InformationBy browsing customer information, you can know the name, legal representative and contactmodes of the relevant customer of the service.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

Procedure

Step 1 Choose Service > Customer Management from the Main Menu. In the CustomerManagement window, all customer information is displayed.

Step 2 Optional: If the customer information is changed, you can click Refresh to browse the changedcustomer information.

----End

1.3 Viewing Relevant Trails of a CustomerIn a normally running network, the trail is the carrier of the customer service and is the resourceof the customer. In the network management, knowing the trails of different customers is veryhelpful to take care of the interests of different customers.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

iManager U2000Operation Guide for WDM End-to-End Management 1 Customer Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

1-3

Page 18: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Procedure

Step 1 Choose Service > Customer Management from the Main Menu.The information of all customers is displayed in the Customer Management window.

Step 2 You can view the SDH/WDM/Ethernet/ATM trails seperately.l Right-click a record of customer information, and choose Browse Relevant Trails > SDH

Trail from the shortcut menu.l Right-click a record of customer information, and choose Browse Relevant Trails > WDM

Trail from the shortcut menu.l Right-click a record of customer information, and choose Browse Relevant Trails >

Ethernet Trail from the shortcut menu.l Right-click a record of customer information, and choose Browse Relevant Trails > ATM

Trail from the shortcut menu.The SDH/WDM/Ethernet/ATM trails of the customer are displayed in the SDH/WDM/Ethernet/ATM Trail Management window.

----End

1.4 Browsing Current Alarms of a CustomerEach customer has a number of services that can report alarms when they run in the network.These alarms show the current status of the service. For this reason, you must query the currentalarms of the customer.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

Procedure

Step 1 Choose Service > Customer Management from the Main Menu.The Customer Managementdialog box displays the information about all the customers.

Step 2 You can view the SDH/WDM/Ethernet/ATM current alarms separately.l Right-click a customer and choose Browse Relevant Alarms > SDH Current Alarm.l Right-click a customer and choose Browse Relevant Alarms > WDM Current Alarm.l Right-click a customer and choose Browse Relevant Alarms > Ethernet Current

Alarm.l Right-click a customer and choose Browse Relevant Alarms > ATM Current Alarm.The current SDH/WDM/Ethernet/ATM service alarms of the customer are displayed in theCurrent Alarms dialog box.

Step 3 To display the latest alarms, select the Display latest alarms check box in the bottom-left corner.

NOTEThis check box is similar to the refresh function. After you select this check box, theRefresh button isunavailable.

Step 4 Optional: Right-click one or more alarms, and select Check from the short menu to check theselected alarms.

1 Customer ManagementiManager U2000

Operation Guide for WDM End-to-End Management

1-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 19: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

NOTEThe check function means that one or more currently unterminated alarms on the U2000 are comparedwith those on the NE side. If the alarm is found among the current alarms on the NE side, it is not modifiedon the U2000 side. Otherwise, terminate it on the U2000 side.

Step 5 Select an alarm. The detail information and reason of the alarm are displayed in the followinglist.

Step 6 Optional: Select one or more alarms. Click Acknowledge to display the AcknowledgeAlarms dialog box.

Step 7 Optional: Click Yes. The Ack Time, Ack Status and Ack User columns of the selected alarmshows the relevant values.

NOTEThe confirmed and terminated alarms are changed to history alarms.

Step 8 Optional: Select one or more alarms, and then click Delete. In the Delete the Alarms promptbox, click Yes.The progress bar is displayed for the operation of deleting the alarms.

Step 9 Optional: Click Print or Save As to output the alarm data.

----End

1.5 Browsing History Alarms of a CustomerBy querying the history alarms of a customer, you can learn about the long-term status of theservices that run in the network. When maintaining the services of the customer, you can usethe history alarm information for reference.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

Procedure

Step 1 Choose Service > Customer Management from the Main Menu.The Customer Management dialog box displays the information about all the customers.

Step 2 You can view the SDH/WDM/Ethernet/ATM history alarms separately.l Right-click a customer and choose Browse Relevant Alarms > SDH History Alarm.l Right-click a customer and choose Browse Relevant Alarms > WDM History Alarm.l Right-click a customer and choose Browse Relevant Alarms > Ethernet History

Alarm.l Right-click a customer and choose Browse Relevant Alarms > ATM History Alarm.The history alarms of the SDH/WDM/Ethernet/ATM service are displayed in the HistoryAlarms dialog box.

Step 3 Optional: Select an alarm. The detail information and reason of the alarm are displayed in thefollowing list.

Step 4 Optional: Click Print or Save As to output the alarm data.

----End

iManager U2000Operation Guide for WDM End-to-End Management 1 Customer Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

1-5

Page 20: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

1.6 Modifying Customer InformationIf the customer information such as contact mode is changed, you need to modify the customerinformation in time.

PrerequisiteYou must be an NM user with "network operator" authority or higher.

Procedure

Step 1 Choose Service > Customer Management from the Main Menu to display the CustomerManagement dialog box.

Step 2 Select a customer from the customer list, edit the customer information, and then click Apply.

Step 3 The Operation Result prompt box is displayed. Click Close.

----End

1.7 Deleting a CustomerThe information of customers with whom contracts are fulfilled must be deleted. This operationensures that the customer information is not disclosed, and decreases the redundant informationin the database.

PrerequisiteYou must be an NM user with "network operator" authority or higher.

Procedure

Step 1 Choose Service > Customer Management from the Main Menu to display the CustomerManagement dialog box.

Step 2 Select the customer to be deleted. Click Delete. In the Warningdialog box, select Yes.NOTEDeleting the customer does not affect the information of the trails and alarms that are related to the customer.

Step 3 The Operation Result prompt box is displayed. Click Close.

----End

1.8 Viewing the Customers Affected by an AlarmWhen an alarm occurs on a service, you need to query the customers that are affected by thealarm. According to the query result, you can determine whether to notify the customer of thealarm.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

1 Customer ManagementiManager U2000

Operation Guide for WDM End-to-End Management

1-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 21: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Procedure

Step 1 Choose Fault > Browse Current Alarm or Fault > Browse History Alarm from the mainmenu. The window of viewing alarms is displayed.

Step 2 Right-click an alarm and choose Alarm Affected Customers from the shortcut menu.

NOTEYou can query the customers affected by only the alarms that occur on trails.

Step 3 In the Customer Management window, view the information about the customers that areaffected by the alarm.

----End

1.9 Specifying the Customer of a ServiceWhen creating and modifying a service, you need to specify the customer that the service belongsto. This can facilitate the trail management.

PrerequisiteYou must be an NM user with "network operator" authority or higher.

ContextFor WDM trails, you can not specify the customers of OTS, OMS, OSC level trails.

Procedure

Step 1 Choose Service > SDH Trail > SDH Trail Management, Service > WDM Trail > WDMTrail Management, Service > MSTP ATM Trail > ATM Trail Management, Service >MSTP Ethernet Trail > Ethernet Trail Management, Service > PTN Service > L3VPNService Management, Service > PTN Service > L2VPN Service Management, Service >PTN Service > CES Service Management, or Service > PTN Service > ATM ServiceManagement from the main menu.

Step 2 In the trail management window, double-click a trail. In the Details window, select the requiredcustomer.

Step 3 Click OK.

----End

iManager U2000Operation Guide for WDM End-to-End Management 1 Customer Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

1-7

Page 22: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)
Page 23: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

2 Managing WDM Protection Subnets

About This Chapter

A protection subnet has a structure of providing complete self-protection functions. The purposeof managing protection subnets is to configure and display network protection, for example,browsing, deleting, modifying and searching for protection subnets, managing isolated nodes.

2.1 Basic ConceptsAccording to the layered structure of transport network, protection subnet, belonging to thenetwork layer, refers to a network structure that has a comprehensive self-protection function.The protection subnet is a network unit of composing the optical transport network. To have agood understanding of the protection subnet, you need to learn some basic concepts of thenetwork layer.

2.2 Searching for Protection SubnetsBy searching for a protection subnet, the configured protection attributes at the NE layer on theU2000 are synchronized to the network layer on the U2000 to create protection subnetsautomatically.

2.3 Configuring 1:N Wavelength ProtectionOn the U2000, you can create 1:N wavelength protection groups, search for 1:N wavelengthprotection subnets, and perform an external switch from 1:N wavelength protection subnets.

2.4 Configuring Protection for an ODUk SPRingBy using the U2000, you can query the protection subnet resources for an ODUk SPRing, createan ODUk protection group, search for the ODUk SPRing, perform data consistency check onthe ODUk SPRing, set the protection subnet parameters for the ODUk SPRing, and delete anODUk SPRing.

2.5 Maintaining Protection SubnetsOn the U2000, you can maintain protection subnets.

2.6 Deleting Isolated NodesTo release protection resources that are used by isolated nodes, you need to delete isolated nodes.

2.7 Deleting Protection SubnetsWhen an existing protection subnet is not suitable, you can delete the protection subnet.

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-1

Page 24: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

2.1 Basic ConceptsAccording to the layered structure of transport network, protection subnet, belonging to thenetwork layer, refers to a network structure that has a comprehensive self-protection function.The protection subnet is a network unit of composing the optical transport network. To have agood understanding of the protection subnet, you need to learn some basic concepts of thenetwork layer.

2.1.1 Protection SubnetA protection subnet refers to a network architecture that has a comprehensive self-protectionfunction. It is a network that composes the optical transmission network.

2.1.2 Isolated NodeAn isolated node is not equal to an isolated NE. An isolated node refers to a special logicalsystem that is independent from any protection subnet. An isolated node does not belong to anyprotection subnet.

2.1.1 Protection SubnetA protection subnet refers to a network architecture that has a comprehensive self-protectionfunction. It is a network that composes the optical transmission network.

In the U2000, a protection subnet is a network level concept. NEs and fiber connections are thebasic elements required to construct a protection subnet. You should create NEs, perform basicconfigurations for them, and then properly create fiber connections between the NEs. You shouldhave access to sufficient resources to create a protection subnet.

2.1.2 Isolated NodeAn isolated node is not equal to an isolated NE. An isolated node refers to a special logicalsystem that is independent from any protection subnet. An isolated node does not belong to anyprotection subnet.

An isolated node is a node that is configured at NEs but cannot or does not compose a protectionsubnet with other nodes. Currently, the WDM equipment supports the 1:N optical path protectionsubnet and the ODUk SPRing protection subnet. The network node that is configured with the1:N optical path protection group or the ODUk SPRing protection group but does not belong toany protection subnet is an isolated node.

An isolated node should not exist in a transmission network that runs normally. The reason forthe existence of any isolated nodes can be as follows:

l The configuration is incorrect at the NE side.

l The fiber that should be connected to the node is not created on the U2000.

2.2 Searching for Protection SubnetsBy searching for a protection subnet, the configured protection attributes at the NE layer on theU2000 are synchronized to the network layer on the U2000 to create protection subnetsautomatically.

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 25: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Prerequisitel You must be an NM user with "network maintainer" authority or higher.

l The NE data must be configured, and fibers must be properly created.

ProcedureStep 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the Main

Menu.

Step 2 In the Consistency Verification of Existing Subnet screen, select the protection subnet andclick Next.

NOTE

If the verification is unsuccessful and the subnet becomes abnormal, the search menu is unavailable. Inthis case, you need to delete the abnormal subnet from the network layer and then re-search for the subnet.

Step 3 Click Search to start the search. The Subnet Name, Consistent Status and Subnet Typeparameters of the searched protection subnet are automatically displayed.

NOTE

If there are isolated nodes searched out, you can delete the nodes that do not form any protection subnet.Refer to 2.6 Deleting Isolated Nodes.

Step 4 Click Finish. The searched protection subnet is displayed in the Main Topology.

----End

2.3 Configuring 1:N Wavelength ProtectionOn the U2000, you can create 1:N wavelength protection groups, search for 1:N wavelengthprotection subnets, and perform an external switch from 1:N wavelength protection subnets.

2.3.1 Creating 1:N Optical Channel Protection1:N (N≤8) optical channel protection is created based on 1:N (N≤8) optical channel protectiongroup. To create 1:N (N≤8) optical channel protection, you need to create a 1:N (N≤8) opticalchannel protection group for each node.

2.3.2 Searching for 1:N Wavelength Protection SubnetAfter creating 1:N wavelength protection groups and searching for WDM trails, you need tosearch for the 1:N wavelength protection subnet. In this way, you can manage the 1:N wavelengthprotection as a protection subnet.

2.3.3 Setting 1:N Wavelength Protection Subnet ParametersYou can set parameters for a 1:N wavelength protection subnet.

2.3.4 Verifying the 1:N Wavelength Protection SwitchingAfter you search out the 1:N wavelength protection subnet and set the related parameters, youcan verify whether the subnet works properly by performing the switching and querying theswitching status.

2.3.1 Creating 1:N Optical Channel Protection1:N (N≤8) optical channel protection is created based on 1:N (N≤8) optical channel protectiongroup. To create 1:N (N≤8) optical channel protection, you need to create a 1:N (N≤8) opticalchannel protection group for each node.

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-3

Page 26: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Prerequisitel You must be an NM user with "NE operator" authority or higher.l Fibers must be correctly created, and all internal and external fibers must be correctly

connected.l An OCP board and two or more OTU boards of same kind must be created.l Applies to the OptiX BWS 1600G, OptiX BWS 320GV3, OptiX BWS 1600G OLA and

OptiX BWS 1600S.l Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA).

ProcedureStep 1 In the NE Explorer, select an NE and choose Configuration > 1:N Optical Channel

Protection from the Function Tree.

Step 2 Click Query to query the information about the protection from the NE.

Step 3 Click New. The Create dialog box is displayed.

Step 4 Double-click the Number of Working Channels field, and choose the proper number from thedrop-down list. For other parameters, refer to 1:N Optical Channel Protection.

Step 5 Double-click the OTU Optical Interface Number field corresponding to the ProtectionChannel of the Working Channel-1. Set the optical interface number of each working channelin a similar way. Double-click Protection Priorities of Protection Channel, and set the prioritybased on the actual requirement.

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 27: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

NOTE

l OTUs that serve as the working and protection channels must be configured on the same NE.

l Every board in this protection group and the OCP board must be set in the same shelf.

l If you need to check the consistency of the parameters, you need to set Parameter Consistency CheckFlag to a proper value.

Step 6 Click OK. The created 1:N (N≤8) optical channel protection group is displayed.

Step 7 Repeat Step 1 through Step 6 to configure a 1:N (N≤8) wavelength protection group of theopposite NE.

----End

2.3.2 Searching for 1:N Wavelength Protection SubnetAfter creating 1:N wavelength protection groups and searching for WDM trails, you need tosearch for the 1:N wavelength protection subnet. In this way, you can manage the 1:N wavelengthprotection as a protection subnet.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l Applies to the OptiX BWS 1600G, OptiX BWS 1600G OLA, OptiX BWS 1600S and theOptiX BWS 320GV3.

l Applies to the LWF, LWFS, LWS, LWC, LWC1, LBE, LBES, LBF, LBFS boards.

l Fibers must be created properly.

l The 1:N wavelength protection group must be created.

l The WDM trail must be created and the bidirectional client trail must be searched out.

Background InformationFor two NEs that are preconfigured as a 1:N WDM protection subnet, the protection group IDsof the WDM protection groups on the NEs must be consistent.

Procedure

Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the MainMenu.

Step 2 Click Next to perform the consistency check of the subnet.

Step 3 Click Search to search for the protection subnet.The existing 1:N wavelength protection subnet is displayed in the Protection View.

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-5

Page 28: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 4 Optional: Click Next to query the information of the isolated nodes that are searched out.

Step 5 Click Finish.

----End

2.3.3 Setting 1:N Wavelength Protection Subnet ParametersYou can set parameters for a 1:N wavelength protection subnet.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The 1:N wavelength protection subnet must be searched out.

l Applies to the OptiX BWS 1600G, OptiX BWS 1600S and the OptiX BWS320GV3. 

Context

CAUTIONChanging the protection mode may interrupt services. Exercise caution when you perform thisoperation.

Procedure

Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management fromthe Main Menu.

Step 2 Select a protection link, right-click, and choose Protection Subnet Attributes from the shortcutmenu. The Protection Subnet Attributes user interface is displayed. Click the ProtectionSubnet Parameters tab.

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 29: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 3 Set parameters for the protection subnet.

Step 4 Click Apply.

----End

2.3.4 Verifying the 1:N Wavelength Protection SwitchingAfter you search out the 1:N wavelength protection subnet and set the related parameters, youcan verify whether the subnet works properly by performing the switching and querying theswitching status.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The 1:N wavelength protection group must be searched out.

Context

CAUTIONPerforming protection switching may interrupt services.

Procedure

Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance fromthe Main Menu.

Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and clickthe Protection Subnet Maintenance tab.

Step 3 Click Query to query whether the nodes are switched and whether the protocols are enabled inthe 1:N wavelength protection subnet.

NOTE

If the protocol on a node is disabled, enable the protocol first.

Step 4 Perform the manual or forced switching on all nodes in the protection subnet one by one in thecorresponding direction.l To perform a manual switching, click East or West and select Manual Switching from

the drop-down menu. Then, select the channel that services are switched to according tothe OCP optical swtich number.

l To perform a forced switching, click East or West and select Forced Switching from thedrop-down menu. Then, select the channel that services are switched to according to theOCP optical swtich number.

NOTE

When performing the switching, maintenance or lockout on a node, you cannot select East and West at thesame time.

Step 5 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-7

Page 30: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 6 Click Query to query whether the services on all nodes are already switched to the protectionpaths in the 1:N wavelength protection subnet.

Step 7 Select all nodes in the protection subnet one by one. Click East or West, and then selectClear from the drop-down menu to clear the switching on each node.

Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

----End

2.4 Configuring Protection for an ODUk SPRingBy using the U2000, you can query the protection subnet resources for an ODUk SPRing, createan ODUk protection group, search for the ODUk SPRing, perform data consistency check onthe ODUk SPRing, set the protection subnet parameters for the ODUk SPRing, and delete anODUk SPRing.

2.4.1 Creating an ODUk SPRing Protection GroupThe ODUk SPRing protection is used in a ring network that is configured with distributedservices. It occupies two ODUk channels, realizing the protection for multiple services amongall stations.

2.4.2 Searching for an ODUk SPRing Protection SubnetThe U2000 can search for and form ODUk SPRing protection subnets according to the createdfiber cables and ODUk SPRing protection groups. After you create an ODUk SPRing protectiongroup or search for WDM trails, you need to search for ODUk SPRing protection subnets. Inthis way, ODUk SPRing networks can be managed as protection subnets.

2.4.3 Setting Parameters of an ODUk SPRing Protection SubnetThis section describes how to set parameters of an ODUk SPRing protection subnet.

2.4.4 Verifying the ODUk SPRing Protection SwitchingThis topic describes how to perform the external switching for an ODUk SPRing protection onthe U2000. During the deployment commissioning, the external switching is performed to testwhether the ODUk SPRing protection functions normally and provides protection.

2.4.5 ODUk Ring Network ProtectionIn this user interface, you can configure the east working channel, west working channel,protection channel, span ID and management node of the ODUk ring network protection.

2.4.1 Creating an ODUk SPRing Protection GroupThe ODUk SPRing protection is used in a ring network that is configured with distributedservices. It occupies two ODUk channels, realizing the protection for multiple services amongall stations.

PrerequisiteYou must be an NM user with "NE operator" authority or higher.

Currently, The ODU1/ODU2-level protection can be achieved.

When configuring the ODUk SPRing protection of ODU1 or ODU2 levels, the Service Modeof the port on the line board should be set to ODU1 or ODU2.

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 31: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Background Informationl When the protection channel forms a ring, you can search out an ODUk protection subnet

at the network layer.

l The ODUk SPRing protection of the ODU1 and ODU2 levels is supported currently.

Procedure

Step 1 In the NE Explorer, select an NE and choose Configuration > ODUk SPRing from the FunctionTree.

Step 2 Click New. The New ODUk Ring Network Protection dialog box is displayed.

Step 3 Set Protection Group ID and Level as required. In the Select Mapping Direction area, set theWest Working Unit, West Protection Unit, East Working Unit, and East Protection Unit.

To set a unit, select one channel from the Available Channel and click .

NOTE

l The services in the east and west directions must be configured on different NS2/ND2 boards.

l The working and protection channels in the east and west directions of an ODUk protection group can beon different NS2/ND2 boards.

l You can create a protection group when the Selected Channel contains at least East Protection Unit andWest Protection Unit.

Step 4 Click OK. After successful operation, click Close in the Operation Result dialog box.

Step 5 Select one protection group. In Channel Mapping Relation, select West Working Unit andEast Working Unit. Right-click them, and select Bound Span ID.

NOTE

l Before binding the span IDs, ensure that a bidirectional cross-connection is created successfullybetween the working unit in the protection group in the corresponding direction and the add/drop board.

l The span IDs need be bound only on the stations that add or drop services. In the case of those stationsthat do not add or drop services, you need not perform such an operation.

Step 6 In the Bound Span ID window, set Span ID, and then click OK. Span ID will be updated.

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-9

Page 32: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 7 Select one protection group. Right-click the Management Node, and select YES. Then clickApply. Management Node will be updated.

Step 8 Select one protection group, and you can set parameters such as WTR Time(s) and EnableSD. In Channel Mapping Relation, double-click the Hold-Off Time(s) and set the hold-offtime. For related parameters, refer to 2.4.5 ODUk Ring Network Protection.

NOTEThe hold-off time of the protection unit should be longer than that of the working unit.

Step 9 In the case of the NEs in other stations on the ring, start the NE Explorer. Then, refer to Steps1 through 8 to create the ODUk SPRing protection on the local NE, to complete the creation ofthe protection ring.

NOTEIn a ODUk SPRing protection group, there must be only one management node.

Step 10 After the protection ring is created, select one protection group, and click Start Protocol tomake the protection group take effect.

Step 11 Optional: Select one protection group and click Delete. Click OK on the Confirm dialog boxdisplayed. The protection group is deleted.

----End

2.4.2 Searching for an ODUk SPRing Protection SubnetThe U2000 can search for and form ODUk SPRing protection subnets according to the createdfiber cables and ODUk SPRing protection groups. After you create an ODUk SPRing protectiongroup or search for WDM trails, you need to search for ODUk SPRing protection subnets. Inthis way, ODUk SPRing networks can be managed as protection subnets.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l Applies to the OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I.

l Fiber connections must be created. All internal and external fibers are correctly connected.

l The bidirectional server trail must be searched out.

l An ODUk protection group must be created.

ContextNOTE

The search of an ODUk SPRing protection subnet supports only the scenario in which an ODU1 or ODU2 trailexists between the ports of adjacent protection groups.

Procedure

Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the MainMenu.

Step 2 Click Next to check consistency of the protection subnet.

Step 3 Click Search to search for the protection subnet.The ODUk SPRing protection subnet that is searched out is displayed.

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 33: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 4 Optional: Click Next to query the information of the isolated nodes that are searched out.

Step 5 Click Finish.

----End

2.4.3 Setting Parameters of an ODUk SPRing Protection SubnetThis section describes how to set parameters of an ODUk SPRing protection subnet.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l Applies to the OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I.

l The ODUk SPRing protection subnet must be searched out.

Context

CAUTIONChanging the protection mode may interrupt services. Exercise caution when you perform thisoperation.

Procedure

Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management fromthe Main Menu.

Step 2 Right-click a protection link and choose Protection Subnet Attributes from the shortcut menu.The Protection Subnet Attributes user interface is displayed. Click the Protection SubnetParameters tab.

Step 3 Click Query to query the parameters of the protection subnet from the NE side.

Step 4 Set the WTR Time(s), SD Condition, and Management Node as required.

Step 5 Optional: Click Calculate Span ID. The calculated span ID is displayed in the Span ID field.

Step 6 Click Apply. After the operation succeeds, click Close in the Operation Result dialog box.

Step 7 Click Close to return to the Protection View.

----End

2.4.4 Verifying the ODUk SPRing Protection SwitchingThis topic describes how to perform the external switching for an ODUk SPRing protection onthe U2000. During the deployment commissioning, the external switching is performed to testwhether the ODUk SPRing protection functions normally and provides protection.

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-11

Page 34: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The ODUk SPRing protection subnet must be searched out.

Context

CAUTIONThe protection switching may affect the services or the functions that are already configured.

Procedure

Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance fromthe Main Menu.

Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and clickthe Protection Subnet Maintenance tab.

Step 3 Click Query to query the statuses of protocol controller, east, and west of the protection subnetfrom the NE.

NOTE

If the protocol on a node is disabled, enable the protocol first.

Step 4 Perform the manual, forced or exercise switching on all nodes in the protection subnet one byone in the corresponding direction.

l To perform a manual switching, click East or West and select Manual Switch toProtection-Ring from the drop-down menu.

l To perform a forced switching, click East or West and select Forced Switch to Protection-Ring from the drop-down menu.

l To perform a exercise switching, click East or West and select Exercise-Ring from thedrop-down menu.

NOTE

When performing the switching, maintenance or lockout on a node, you cannot select East and West at thesame time.

Step 5 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

Step 6 Click Query to query whether the services on all nodes are already switched to the protectionpaths in the ODUk SPRing protection subnet.

Step 7 Select all nodes in the protection subnet one by one. Click East or West, and then select ClearAll from the drop-down menu to clear the switching on each node.

Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

----End

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 35: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

2.4.5 ODUk Ring Network ProtectionIn this user interface, you can configure the east working channel, west working channel,protection channel, span ID and management node of the ODUk ring network protection.

Navigation PathIn the NE Explorer, select an NE and choose Configuration > ODUk SPRing from the FunctionTree.

ButtonsButton Description

Start Protocol Starts the automatic protection switching protocol.

Stop Protocol Stops the automatic protection switching protocol.

Query Queries the ODUk protection group from the NE.

New Creates an ODUK ring network protection.

Add Working Unit Adds working units of the ODUK ring network protection.

Delete Working Unit Deletes working units of the ODUK ring network protection.

Delete Deletes the protection group.

Apply Applies the configuration of the ODUk protection group tothe NE.

Shortcut Menu ItemsShortcut Menu Item Description

Bound Span ID Sets the span ID for the protection unit.

Unbound Span ID Deletes the span ID for the protection unit.

Lockout Locks out the switching.

Forced Switching-Ring Forcibly switches the service from the working channelto the protection channel. This switching does notconsider the status of the protection channel, unless theprotection channel must satisfy higher priority bridgerequest.

Manual Switching-Ring Performs manual switching from the working channelto the protection channel. If the protection channel isnormal, the switching takes place. If the protectionchannel has a failure or must satisfy higher priorityswitching, the switching does not take place.

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-13

Page 36: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Shortcut Menu Item Description

Exercise Switching-Ring Simulates the switching operation. It is not a realswitching. By simulating the switching, you can test themultiplex section protection function of the ringnetwork, without interrupting services.

Clear Clears all the switching.

ParametersField Value Description

Protection Group ID 1-65535 Displays the ID of theprotection group.

Level ODU1, ODU2 Displays the level of theprotection group.

Switching Status Unknown, The protocol isnot started, The protocol is tobe started, Idle, EastSwitching, West Switching,Full Pass-Through, APSByte Pass-Through

Displays the switching statusof the protection group.

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 37: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Field Value Description

West Switching Request/East Switching Request

l Unknown

l Locked

l Protection SF

l SF Ring Switching -Working SF Protection SF

l SF Ring Switching -Working SD ProtectionSF

l SF Ring Switching -Working SF ProtectionSD

l SF Ring Switching -Working SF ProtectionOK

l Forced Switching - Ring

l Protection SD

l SD Ring Switching -Working SD ProtectionSD

l SD Ring Switching -Working SD ProtectionOK

l Manual Switching - Ring

l WTR - Ring Switching

l Exercise Switching - Ring

l No Request

Displays the status of east andwest switching requests.

West Remote/Near-EndIndication

Unknown, Remote-End,Near-End

Displays the west remote andlocal ends indication.l Near-End: Indicates the

local node, that is, thetransmit end of the service.

l Remote-End: Indicates thewest adjacent node, that is,the respond end of theservice.

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-15

Page 38: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Field Value Description

East Remote/Near-EndIndication

Unknown, Remote-End,Near-End

Displays the east remote andlocal ends indication.l Near-End: Indicates the

local node, that is, thetransmit end of the service.

l Remote-End: Indicates thewest adjacent node, that is,the respond end of theservice.

WTR Time(s) 300-720Default value: 300

Indicates the time intervalbetween the time when theworking service is detected tobe normal after switching andthe time when the service isswitched back to the workingpath.Click WTR Time (ODUkSPRing Protection) for moreinformation.

Enable SD Enabled, Disabled Displays whether the SDenable flag is enabled.Click Enable SD (ODUkSPRing Protection) for moreinformation.

Management Node Yes, No Displays whether it is themanagement node.

Protection Unit West Working Unit, WestProtection Unit, EastWorking Unit, EastProtection Unit

Displays the east workingunit, west working unit, eastprotection unit and westprotection unit.

Channel Mapping For example: 12-NS2-1(IN/OUT)-ODU1:1

Displays the east workingchannel, west workingchannel, east protectionchannel and west protectionchannel.

Span ID 1-31 Displays the span ID.

Channel Status Normal, SF, SD,Unmonitored, Unknown

Displays the channel status.

Hold-Off Time(s) Working Unit: 0.0-10Protection Unit: 0.5-10Default value: Working Unit:0, Protection Unit: 0.5

Displays the hold-off time.

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 39: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

2.5 Maintaining Protection SubnetsOn the U2000, you can maintain protection subnets.

2.5.1 Finding Protection SubnetsWhen there are a number of protection subnets in a network, you use the search function toquickly find the desired protection subnet.

2.5.2 Querying Protection Subnet ResourcesAfter you search out a protection subnet, you can query the usage of subnet resources, so thatyou can plan and manage the subnet in a better way.

2.5.3 Performing the Protection Switching for a 1:N Wavelength Protection SubnetYou can run an external switching command to perform or clear the switching for a 1:Nwavelength protection subnet. External switching commands include: forced switching, manualswitching, and lockout. In the deployment and commissioning, you can perform switching totest whether the 1:N wavelength protection switching works properly. In the fault maintenance,you can perform this operation to locate faults.

2.5.4 Performing ODUk Ring Protection SwitchingOn the U2000, you can perform or clear external switching for an ODUk ring network. Duringthe deployment and commissioning, you can perform external switching to test whether ODUkring switching works properly. During the fault maintenance, you can perform this operationfor fault location.

2.5.1 Finding Protection SubnetsWhen there are a number of protection subnets in a network, you use the search function toquickly find the desired protection subnet.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l The protection subnet must be created.

Procedure

Step 1 Right-click in the Main Topology and choose Search WDM Protection Subnet. The SearchProtection Subnet dialog box is displayed.

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-17

Page 40: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

NOTEYou need to select the Protection check box on the upper right corner of the Main Topology in advance.

Step 2 Set the search condition and enter the keyword.

Step 3 Click Search and the protection subnet that is searched out is highlighted in the Network View.

----End

2.5.2 Querying Protection Subnet ResourcesAfter you search out a protection subnet, you can query the usage of subnet resources, so thatyou can plan and manage the subnet in a better way.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The protection subnet must be searched out.

Procedure

Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management fromthe Main Menu.

Step 2 Right-click a protection link, and choose Protection Subnet Attributes from the shortcut menu.The Protection Subnet Attributes window is displayed. Click the Resource Description tab.

Step 3 Click Query to query the usage of the protection subnet resources.

----End

2.5.3 Performing the Protection Switching for a 1:N WavelengthProtection Subnet

You can run an external switching command to perform or clear the switching for a 1:Nwavelength protection subnet. External switching commands include: forced switching, manualswitching, and lockout. In the deployment and commissioning, you can perform switching totest whether the 1:N wavelength protection switching works properly. In the fault maintenance,you can perform this operation to locate faults.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The 1:N wavelength protection group must be searched out.

l Applies to the OptiX BWS 1600G, OptiX BWS 1600S and OptiX BWS 320GV3.

l Applies to the LWF, LWFS, LWC1, LBE, LBES, LBF and LBFS boards.

l Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA).

l Applies to the LWF, LWFS, LWC1, LBE and LBES boards.

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 41: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Context

CAUTIONForce switching and manual switching may interrupt services.

ProcedureStep 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from

the Main Menu.

Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and clickthe Protection Subnet Maintenance tab.

Step 3 Click Query to query whether the nodes are switched and whether the protocols are enabled inthe 1:N wavelength protection subnet.

Step 4 To enable or disable the protocol, click Start Protocol and select Start or Stop from the drop-down menu.

NOTE

If you want to enable or disable the protocol for the entire protection subnet, select Start the ProtocolNetworkwide or Stop the Protocol Networkwide from the drop-down menu.

Step 5 Perform the manual or forced switching on all nodes in the protection subnet one by one in thecorresponding direction.l To perform a manual switching, click East or West and select Manual Switching from

the drop-down menu.l To perform a forced switching, click East or West and select Forced Switching from the

drop-down menu.NOTE

When performing the switching, maintenance or lockout on a node, you cannot select east and west directionat the same time.

Step 6 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

Step 7 Optional: Perform the lockout operation. Select a desired node, click Lock East or LockWest, and select Lockout of Protection.

Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

Step 9 Optional: To clear protection switching, select a node, click East or West, and then selectClear from the drop-down menu.

Step 10 Optional: Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicatingthat the operation is successful. Click OK.

----End

2.5.4 Performing ODUk Ring Protection SwitchingOn the U2000, you can perform or clear external switching for an ODUk ring network. Duringthe deployment and commissioning, you can perform external switching to test whether ODUk

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-19

Page 42: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

ring switching works properly. During the fault maintenance, you can perform this operationfor fault location.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The ODUk ring protection subnet must be searched out.

Context

CAUTIONThe protection switching may affect the services or the functions that are already configured.

Procedure

Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance fromthe Main Menu.

Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and clickthe Protection Subnet Maintenance tab.

Step 3 Click Query to query the statuses of protocol controller, east, and west of the protection subnetfrom the NE.

Step 4 To enable or disable the protocol, click Start Protocol and select Start or Stop from the drop-down menu.

NOTE

If you want to enable or disable the protocol for the entire protection subnet, select Start the ProtocolNetworkwide or Stop the Protocol Networkwide from the drop-down menu.

Step 5 Perform the manual, forced or exercise switching on all nodes in the protection subnet one byone in the corresponding direction.l To perform a manual switching, click East or West and select Manual Switch to

Protection-Ring from the drop-down menu.l To perform a forced switching, click East or West and select Forced Switch to Protection-

Ring from the drop-down menu.l To perform a exercise switching, click East or West and select Exercise-Ring from the

drop-down menu.

NOTE

When performing the switching, maintenance or lockout on a node, you cannot select East and West at thesame time.

Step 6 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

Step 7 Optional: Perform the lockout operation. Select a desired node, click Lock East or LockWest, and select Lockout of Protection-Ring.

Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 43: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 9 Optional: To clear protection switching, select a node, click East or West, and then select ClearAll from the drop-down menu.

Step 10 Optional: Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicatingthat the operation is successful. Click OK.

----End

2.6 Deleting Isolated NodesTo release protection resources that are used by isolated nodes, you need to delete isolated nodes.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l One or more isolated nodes must exist.

l Applies to the isolated node which node type is ODUk SPRing.

Context

CAUTIONDeleting isolated nodes may interrupt services. Exercise caution when you perform thisoperation.

Procedure

Step 1 Choose Service > WDM Protection Subnet > WDM Isolated Node Management from theMain Menu.

Step 2 Select the isolated node you want to delete, right-click and choose Delete.

Step 3 Click Yes in the confirmation dialog box.

----End

2.7 Deleting Protection SubnetsWhen an existing protection subnet is not suitable, you can delete the protection subnet.

PrerequisiteYou must be an NM user with "network maintainer" authority or higher.

ContextNOTE

The deletion of a protection subnet will leave the equipment or services unprotected. Hence, exercisecaution before this operation.

iManager U2000Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

2-21

Page 44: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Procedure

Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management fromthe Main Menu.

Step 2 Right-click the protection subnet to be deleted and choose Delete from the NM or Delete fromthe NE or Delete All from the NM from the short-cut menu.

NOTEThe methods to delete a protection subnet are as follows:

l Delete from the NM: Deletes the relation between the protection subnet and logical systems at the NEside, to allow deleting of fibers, re-uploading, and so on. This command is not delivered to the NE anddoes not affect the services. The deleted protection subnet can be located by using the search feature.The U2000 locates it according to the NE layer protection information.

l Delete from the NE: Deletes the protection subnet, logical systems at the NE side, and all traffic inthe protection subnet. The deleted protection subnet cannot be restored without being created again.

l Delete All from the NM: Deletes data other than fibers in the network layer. The deleted protectionsubnet can be located by using the search feature. It is recommended that you do not select this option,as a large amount of data can be deleted.

Step 3 In the Operation Prompt dialog box, click Yes.

NOTE

If Delete from the NE is selected, you need to confirm the operation once more.

Step 4 After completion, click Close in the dialog box displayed to complete the operation.

----End

2 Managing WDM Protection SubnetsiManager U2000

Operation Guide for WDM End-to-End Management

2-22 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 45: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3 End-to-End WDM Management

About This Chapter

You can configure WDM services using the trail management function.

PrerequisiteThe trail management license must be provided for the U2000.

3.1 Managing WDM TrailsThis section describes how to manage end-to-end WDM services based on the trail managementfunction of the U2000.

3.2 Configuring EAPEThe U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail.By adjusting the optical power of a WDM trail, the EAPE can reduce or even eliminate bit errorsof services on the trail.

3.3 Managing Alarms on WDM TrailsYou can use the U2000 function of end-to-end trail management to manage the alarms generatedon WDM trails at the network layer.

3.4 Managing the Performance of WDM TrailsYou can use the network layer function of the U2000 to perform end-to-end performancemanagement on WDM trails.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-1

Page 46: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.1 Managing WDM TrailsThis section describes how to manage end-to-end WDM services based on the trail managementfunction of the U2000.

3.1.1 Basic ConceptsThis section describes the basic concepts of the WDM end-to-end management.

3.1.2 Creating WDM Trails by Trail SearchAfter a new network is set up or services are configured on a per-NE basis, you need to performan WDM trail search so that you can manage configured services by using the trail managementfunction.

3.1.3 Configuring WDM TrailsAfter searching out the relevant trail information on the U2000, you can create OCh, ODUk orclient trails by specifying the sources and sinks of the trails.

3.1.4 Viewing WDM TrailsThis section describes how to view the connection relation of all boards on a WDM NE.

3.1.5 Maintaining WDM TrailsThe end-to-end trails are carriers of services of the customers. In the routine maintenance, theadministrator and maintainer must find out the status of the trails to ensure that all the servicesare transmitted correctly.

3.1.6 Collecting Resource StatisticsYou can collect statistics on resources to learn the existing inventory of a network. Resourcestatistics is a key basis of network maintenance and expansion.

3.1.7 Modifying WDM TrailsDue to service requirements, sometimes, you need to modify the configuration of a WDM trail.U2000 supports manually modifying the source and sink of an exisiting WDM trail and the trailnames in batches, instead of creating WDM trails. This greatly simplifies the operations.

3.1.8 Deleting a WDM TrailThe operation deletes the WDM trails from the network layer or from the NE layer. You needto delete the trails if the network will be adjusted or rebuilt.

3.1.9 Sample Application: Configuring GE Services with the WXCP Protection in End-to-EndModeThis sample describes how to configure GE Services with the WXCP protection in the end-to-end mode.

3.1.10 Sample Application: Configuring an OCh TrailThis section describes how to configure an OCh trail in the end-to-end mode.

3.1.1 Basic ConceptsThis section describes the basic concepts of the WDM end-to-end management.

3.1.1.1 WDM TrailThe concept, type and relevant information about trails are described here.

3.1.1.2 Conflict Trail

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 47: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

If a trail exists on the U2000, but the cross-connection that forms the trail does not exist at theNE layer, this trail is a conflict trail.

3.1.1.3 Trail Creation MethodThe U2000 provides multiple methods for creating trails to meet different operation habits ofusers and requirements of different service scenarios.

3.1.1.4 Process for Creating a TrailThe trail creation process describes a series of procedures before a trail is generated on theU2000. The detailed process varies with the creation method.

3.1.1.1 WDM Trail

The concept, type and relevant information about trails are described here.

The U2000 enables you to create, search, view, join, split, and delete WDM trails. In addition,the U2000 provides the signal flow diagram that visually displays the signal flow and thetransmission media layer route of trails. This facilitates operations and improves the maintenanceefficiency.

Currently the U2000 provides the following OTN trail modules that comply with ITU-T G.872:

l Client trail

l ODUk trail: optical channel data unit (ODUk) trail

l OTUk trail: optical channel transport (OTUk) unit trail

l OCh trail: optical channel trail

l OMS trail: optical multiplexing section trail

l OTS trail: optical transmission section trail

l OSC trail: optical supervisory channel (OSC) trail

NOTE

l The first six types are related to services, and the OSC trail is related to supervisory signals.

l The OTS trail cannot be deleted from the U2000. You must delete the fiber connection before deletingthe OTS trail.

l The rate level varies with the value of "k" in ODUk/OTUk. For details, see Table 3-1. ODU5G/OTU5Gis a level customized by Huawei.

Table 3-1 ODUk rate level

Trail Level Rate (bit/s)

ODU0 1.25G

ODU1/OTU1 2.5G

ODU5G/OTU5G 5G

ODU2/OTU2 10G

ODU3/OTU3 40G

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-3

Page 48: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Trail ModuleFigure 3-1 and Figure 3-2 illustrate the relationship and location of the trails.

Figure 3-1 Trail

Client

OCh

OMS

OTSOTS OTS

ODUk

OTUk

Figure 3-2 OSC Trail

OSCTM RM TM RM

OSC OSC

OLA OTMOTM

OSC Trail OSC Trail

FIU FIU FIU FIU

ODUk TrailDifferent from other trails, an ODUk/OTUk sets the source and sink at the internal ports of anOTU board, a tributary board or a line board. Figure 3-3 displays a typical ODUk trail modulewhose source and sink are set on the internal ports of tributary ports or of line boards.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 49: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Figure 3-3 ODUk (k = 1, 2, ...) trail

RX1 TX1LP1 ODU1

OUT IN

LP1ODU1

ODU1

ODU2

OTU2

OTU2

ODU2

ODU1

OCh Trail

OTU2 Trail

ODU2 Trail

ODU1 Trail

Client Trail

Electrical Signal

Optical Signal

NS2 NS2TQS TQSSTM-16 STM-16

In the case of the client-side service whose rate is less than 1.25 Gbit/s, an ODU0 trail is added,as shown in Figure 3-4.

Figure 3-4 ODUk (k = 0, 1, 2, ...) trail

RX1 TX1

LP1 ODU1

OUT IN

LP1ODU1

ODU1

ODU2

OTU2

OTU2

ODU2

ODU1

OCh Trail

OTU2 Trail

ODU2 Trail

ODU1 Trail

Client Trail

Electrical Signal

Optical Signal

52NS252TOM 52TOM52NS2

GE GEODU0 ODU0

ODU0 Trail

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-5

Page 50: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Inverse Multiplexing TrailThe rate of the client layer of an inverse multiplexing trail is greater than the rate of the serverlayer. Hence, an inverse multiplexing client trail needs multiple trails to serve as its server layer.Currently, you can only search for an inverse multiplexing trail, but you cannot create an end-to-end inverse multiplexing trail.

An inverse multiplexing client trail can take an ODU1 or ODU2 trail as the server trail. That is,an inverse multiplexing client trail cannot take ODU1 and ODU2 trails as the server trails at thesame time.

40G inverse multiplexing trail modelThe transmission rate of a single wavelength is 40G, but a single wavelength cannot used forlong-distance transmission due to an optical layer index (such as dispersion) restriction. In a40G inverse multiplexing transmission scheme, a 40G signal is converted to four 10G ODU2signals, each of which uses one wavelength. This is equal to four 10G signals on the line sideand lowers the optical layer index requirement.

Figure 3-5 shows the inverse multiplexing trail model of the TSXL board. You cannotdynamically adjust the bandwidth of STM-256 or OC768 services whose rate is 40G. Hence,you can search for a client trail only after you configure four ODU2 trails. If you configure onlyone, two or three ODU2 trails, services are unavailable and you fail to search for the client trail.

Figure 3-5 40G inverse multiplexing trail

10G inverse multiplexing trail modelThe TDX board is a 10G inverse multiplexing tributary board that has two individualtransmission paths. Each path inversely multiplexes a 10G service to multiple ODU1 signals,which are cross-connected to a line board for transmission. The 10G service uses any or all ofthe four ODU1 signals according to bandwidth status. When the 10G service does not use all of

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 51: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

the four ODU1 signals, the 10G service share an ODU2 trail with other ODU1 signals. Thissaves line resources.

Figure 3-6 shows the inverse multiplexing trail model of the IP3 port on the TDX board. A 10Gservice is an Ethernet service for which you can dynamically adjust bandwidth. The server layerallows one, two, three or four ODU1 trails. Hence, the client trail that you search out is ofdifferent rate levels.

Figure 3-6 10G inverse multiplexing trail

3.1.1.2 Conflict TrailIf a trail exists on the U2000, but the cross-connection that forms the trail does not exist at theNE layer, this trail is a conflict trail.

CauseA trail consists of a single station cross-connection at the NE layer. If the configuration data atthe NE layer changes and a complete trail cannot be formed at the network layer, the trail thatexists on the U2000 is a conflict trail, and the corresponding cross-connection at the NE layerbecomes a discrete service.l Adding a fiber leads to trail extension.

Assume that a trail is NE A-> NE B. Create a fiber from NE B to NE C, and create a serviceon NE C. As a result, the trail is extended as NE A->NE C. The trail NE A-> NE B thatexists on the U2000 becomes a conflict trail. See Figure 3-7.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-7

Page 52: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Figure 3-7 A conflict trail generated because a fiber is added

NE A NE B NE C

l The single station cross-connection is lost.

The original trail is NE A-> NE C. The cross-connection of the trail on NE B is deleted.On the U2000, the original trail of NE A-> NE C becomes a conflict trail and services onNE A and NE C become discrete services. See Figure 3-8.

Figure 3-8 A conflict trail generated because a single station cross-connection is lost

NE A NE B NE C

l Delete a protection service on a per-NE basis.

NE 1 and NE 2 comprises a 1+1 linear protection and the original trail is NE 1-> NE 2. Ifcross-connection D of NE 2 is deleted, the original trail of NE 1-> NE 2 becomes a conflicttrail. See Figure 3-9.

Figure 3-9 A conflict trail generated because a protection service is deleted on a per-NEbasis

Working Trail

Protection Trail

NE1 NE2

Cross-ConnectionA

Cross-ConnectionB

Cross-ConnectionC

Cross-ConnectionD

Handling MethodDuring trail search, if the U2000 searches out a conflict trail, the U2000 stops the searching andasks you to confirm the conflict trail. There are the following two handling methods:l Stop searching.

If you fail to verify that the conflict trail is correct, you can choose to stop searching. Theconflict trail remains, but the U2000 does not generate a new trail.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 53: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

l Continue to search.

The system deletes the conflict trail from the network layer. This operation does not deletethe cross-connection on a per-NE basis, and does not affect services on the NE.

NOTEAfter the conflict trail is deleted, its customized information, including the trail name, user, andremarks, is permanently lost and cannot be restored.

3.1.1.3 Trail Creation Method

The U2000 provides multiple methods for creating trails to meet different operation habits ofusers and requirements of different service scenarios.

To successfully create a trail on the U2000, the following prerequisites must be met:

l All the NEs that the trail passes through must have enough idle resources.

l The data on the U2000 must be consistent with the data on the NE.

l The fibers on the U2000 are correctly connected.

Table 3-2 shows the methods, features, and application scenarios of the trail creation.

Table 3-2 Comparison of methods for creating trails

Trail Creation Method Feature Application Scenario

Creating trails by trail search On a per-NE basis, configureall nodes that a service passesthrough. Then, by using thenetwork-layer trail searchfunction, combine cross-connections of each node toform end-to-end trails.

This method is applicable tothe scenario that the service isalready configured on a per-NE basis.This method requires bettertechnical knowledge ofusers. During the search,users may need to handleconflict trails and discreteservices.

Creating trails in theautomatic mode

l The service is configureddirectly at the networklayer. After the activationof the trail, the U2000deliver the cross-connections related to thetrail to all NEs involved.

l The route can be computedautomatically.

l If multiple routes existbetween the selectedsource and sink, you canset the compulsory link,the prohibited node toselect a route.

This method is applicable tothe creation of a majority ofnormal trails.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-9

Page 54: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.1.1.4 Process for Creating a TrailThe trail creation process describes a series of procedures before a trail is generated on theU2000. The detailed process varies with the creation method.

Figure 3-10 shows the process for creating trails by trail search. Figure 3-11 shows the processfor creating trails in the automatic mode.

Figure 3-10 Creating trails by trail search

End

Y

N

Obtain all cross-connectionsof NEs networkwide

Y

Stop the trail search

N

Check whetherdiscrete services that do

not form trails exist

Y

N

Start

Sort cross-connections by level

Search out trails at the serverlayer and then the client layer

Check whethernew trails conflict with

original trails

The network managementsystem starts to manage

new trails

The information about discreteservices is displayed

The searched is paused andconflicting trails are displayed

Whether to resumethe searchDelete conflicting trails

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 55: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Figure 3-11 Creating trails in the automatic mode

End

Y

N

Check whether theserver trail for the trail to

be created exists

N

Y

Set trail attributes, such as thedirection, level, and rate

Set the source and sink NEsfor the trail

Set route restriction conditionsrelated to the node, link, and

timeslot (optional)

Whether to set thetrail as an SNCP trail

Set basic attributes for the trail

Activate the trail

Start

Set the SNCP protection route

Create or search out theserver trail

3.1.2 Creating WDM Trails by Trail SearchAfter a new network is set up or services are configured on a per-NE basis, you need to performan WDM trail search so that you can manage configured services by using the trail managementfunction.

3.1.2.1 Searching for WDM TrailsAfter you create fibers and configure services for WDM equipment on the U2000, the trailinformation does not exist in the network layer of the U2000. To manage WDM trails, you need

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-11

Page 56: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

to search for the data of cross-connections and fiber connections over the network to generateend-to-end WDM trails at the network layer of the U2000.

3.1.2.2 Discrete Service Causes and Handling MeasuresAfter trail search, discrete services are usually caused by the following factors, which areunsatisfied trail search conditions, U2000 trail search restrictions, incomplete or wrongconfiguration of cross-connections.

3.1.2.1 Searching for WDM TrailsAfter you create fibers and configure services for WDM equipment on the U2000, the trailinformation does not exist in the network layer of the U2000. To manage WDM trails, you needto search for the data of cross-connections and fiber connections over the network to generateend-to-end WDM trails at the network layer of the U2000.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l Fiber connections must be created correctly for the WDM equipment.

Contextl Among the five types of trails, only the OTS trail can be managed directly without being

searched, because the data is stored at the network layer when fibers are created.l The networking in which no fiber connection exists between cross-connections of the same

level is not supported.l The U2000 supports the ability to search for an unterminated trail.

l The U2000 supports the ability to search for a WDM trail that has multiple sources andsinks.

l The U2000 supports the ability to restore the user-defined information. When the you deletea trail from the network layer of the U2000, the user-defined information of the trail issaved in the system. Hence, when you search for a trail that has the same source or sinkand direction as the deleted trail, you can restore the user-defined information.

l You can only search for an inverse multilplexing client trail.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Search from the Main Menu.

Step 2 Under Advanced settings, set the search policies.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 57: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

NOTE

In the mode of searching by subnet, the selected subnet range should be independent from the networkingaspect. That is, no fiber connection exists between the selected subnet range and the area that beyond theselected subnet range.

Step 3 Click Next to begin to search for trails. The U2000 takes some time to return the results,depending on the number of services.

NOTE

l If there are cross-connections that are collisions and these cross-connections cannot form end to endtrails, the U2000 shows the conflicting trails after you perform the search operation.

l The principles of verifying a conflict trail are as follows: The networking changes. The trail may causeinterruption of service flow. For example, the key information of the trail, including deleting a cross-connection or fiber, is verified.

Step 4 Optional: Click Next to view the conflicting trail information . If you want to set a trailmanagement flag, check the Management Flag check box or right-click it and select themanagement flag.

NOTE

Skip this step if the Automatically create trails after searching policy is selected in Step 2.

Step 5 Click Next to view all discrete services in the network.

NOTE

If Step 4 is executed, the U2000 deletes trails that do not have the management flag from the network layer.This does not affect services of the actual NE or the data of an individual NE on the U2000.

Step 6 After the search is complete, click Finish.

----End

3.1.2.2 Discrete Service Causes and Handling MeasuresAfter trail search, discrete services are usually caused by the following factors, which areunsatisfied trail search conditions, U2000 trail search restrictions, incomplete or wrongconfiguration of cross-connections.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-13

Page 58: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Causes of Discrete Services1. Unsatisfied trail search conditions

l The data on the U2000 is inconsistent with those on NEs.

l The fibers created on the U2000 do not match actual fiber connections.

l Protection subnets are not created or cannot be searched.

l The NE data configuration is incorrect. For example, a non-protection chain service iscreated on the protection ring, the NE logic system of the service does not belong toany protection subnet, or the protection subnet configuration is wrong.

2. Incomplete or wrong configuration of cross-connectionsl The timeslot for the protection route is not configured.

l The timeslot configured for the protection route is wrong.

l The SNCP service configuration is wrong, which results in an incomplete protectionroute.

l The service configuration is incomplete. Check whether incomplete services areconfigured in the station-by-station mode, for example, pass-through services may notbe configured on pass-through NEs. You should complete this service configurationand search for the trails again.

Handling Discrete Services1. Perform a consistency check to check whether the data on the U2000 and the data on the

NEs are consistent or not. If not, upload the configuration data to the U2000.2. Verify that the fiber connections created on the U2000 are consistent with the actual fiber

connections, and that there are no errors like wrong fiber connection on the U2000.3. Perform a trail search on the U2000.4. If discrete services are found, analyze and handle them according to the causes displayed

on the U2000 and the handling measures that are given above. It is recommended that youhandle the discrete services at add/drop tributaries first, then handle the those SDH NNIdiscrete services, and finally the pass-through discrete services.

How to Avoid Discrete ServicesUse the trail management function to configure services whenever possible. This is becauseservices configured in this way do not form discrete services. When a discrete service is found,handle it as soon as possible so that it does not affect subsequent service configuration.

3.1.3 Configuring WDM TrailsAfter searching out the relevant trail information on the U2000, you can create OCh, ODUk orclient trails by specifying the sources and sinks of the trails.

3.1.3.1 Creating an OCh TrailThe U2000 supports creating OCh trails in an end-to-end mode. After you specify the sourceand sink of a service, the U2000 can generate an OCh trail based on the searched server trail.The WDM trail creation feature simplifies the service configuration procedure and ensuresproper operation. In addition, you can groom and deploy services in a flexible manner inapplication scenarios (deployment or expansion).Before creating an EAPE pair, you shouldcreate OCh trails. The EAPE function uses OCh trails to identify EAPE pairs. In the case of the

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 59: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

equipment with the dynamic optical cross-connection boards, you can create OCh trails manuallyby using the trail management function of the U2000.

3.1.3.2 Creating an ODUk TrailThe U2000 supports creating ODUk trails in an end-to-end mode. After you specify the sourceand the sink of a service, the U2000 automatically searches for the server trail and creates theODUk trail. The WDM trail creation feature simplifies the service configuration procedure andensures proper operation. In addition, you can groom and deploy services in a flexible mannerin application scenarios such as deployment or expansion.

3.1.3.3 Creating Client TrailsThe U2000 supports creating client trails in an end-to-end mode. After you specify the sourceand sink of a service, the U2000 generates a client trail based on the searched or created servertrail. The WDM trail creation feature simplifies the service configuration procedure and ensuresproper operation. In addition, you can groom and deploy services in a flexible manner inapplication scenarios such as deployment or expansion.

3.1.3.1 Creating an OCh TrailThe U2000 supports creating OCh trails in an end-to-end mode. After you specify the sourceand sink of a service, the U2000 can generate an OCh trail based on the searched server trail.The WDM trail creation feature simplifies the service configuration procedure and ensuresproper operation. In addition, you can groom and deploy services in a flexible manner inapplication scenarios (deployment or expansion).Before creating an EAPE pair, you shouldcreate OCh trails. The EAPE function uses OCh trails to identify EAPE pairs. In the case of theequipment with the dynamic optical cross-connection boards, you can create OCh trails manuallyby using the trail management function of the U2000.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The OMS server trail must be searched out.

Background InformationThe U2000 does not support the ability to reuse discrete cross-connections.

The source and sink of an OCh trail are the ports at the line side of the OTU boards. The boardsthat the trail passes should support dynamic optical cross-connection or should contain staticoptical cross-connection. The boards that support the dynamic optical cross-connection areclassified by equipment domain as follows:l For the OptiX BWS 1600G: WSM9, WSD9, WSM5, WSD5 and RMU9.

l For the OptiX Metro 6100V1E: WSM9, WSD9, RMU9, and WSMD4.

l For the OptiX OSN 3800, the OptiX OSN 6800, and the OptiX OSN 8800 I: WSM9, WSD9,RMU9, ROAM, WSMD4, 11RDU9, 11WSMD2, 12WSM9, 12WSD9, 13WSM9,13WSD9, RDU6, WSM6.

Typical OCh networking scenarios are as follows:l The typical scenario of non-protected OCh networking is as follows:

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-15

Page 60: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

OTU WSD WSMFIU

OSC

FIU FIU FIU

OSCOSC

ONE2

ONE3ONE1

D40 M40

OCh

OCh OCh

oxcfiber

OTU

OTU

OTU

l The typical scenario of protected OCh networking is as follows:

OTU

WSD WSM

OSC OSC

ONE2 ONE4ONE1

OChoxcfiber

OLP

FIU

OSC

WSD WSM

OSC

OSC

OSC

ONE3

FIU

FIU

FIU

FIU

FIU

FIU

FIU

OLP

OTU

NOTEThe source and sink of an OCh trail cannot be modified.

Procedure

Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu.

Step 2 Set the level and direction of the service.Set the level to OCh and set the direction according to the specific networking.

Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE,board, and port.

TIP

l During the selection of source or sink in the NE Panel, when you move the cursor to a board, thewavelength information of the board port is displayed.

l By default, if you already select one end (source or sink) of a trail and open the NE Panel to selectanother end, the U2000 uses the board and port that have the same band and wavelength with priority.

Step 4 Optional: Click a server tail between the source and sink NEs, and select the included servertrail in the dialog box displayed. You can click the trail again, and cancel the selected servertrail in the dialog box displayed.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 61: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 5 Optional: Double-click the other NE in the protection subnet to specify the NE that the routecannot pass through. The sign is displayed on the NE. Double-click the NE again to cancelyour selection.

Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box isdisplayed. Select a path and click OK.

Step 7 Click the General Attributes, set the basic trail attributes, including the name and ID.

Step 8 Optional: Check the Activate the trail check box.

Step 9 Optional: Click Port Attribute, set the OPA Mode in the dialog box displayed and clickOK.

Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close.

----End

Result1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and

select the proper filter criteria for the trails.TIP

You can filter other trails according to the source and sink of the new trail.

2. In the WDM Trail Management user interface, find out that the trail is correctly created.

3.1.3.2 Creating an ODUk Trail

The U2000 supports creating ODUk trails in an end-to-end mode. After you specify the sourceand the sink of a service, the U2000 automatically searches for the server trail and creates theODUk trail. The WDM trail creation feature simplifies the service configuration procedure andensures proper operation. In addition, you can groom and deploy services in a flexible mannerin application scenarios such as deployment or expansion.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The OTU1 ODU1, ODU2, ODU3 or OTU2 server trail must be searched out.

Context

The configuration principles are as follows:

l The source and sink of an ODUk (k = 0, 1, 2, 3, 5G) trail are LP ports of the TDG, TQM,or TQS boards. The source and sink of an ODU0 trail are the LP ports of the tributaryboards, such as the 52TOM boards.

l The line boards that support the grooming of ODU0 services are as follows: 52NS3, 52NQ2,52ND2, and 52NS2.

l The boards support the grooming of ODU0 services only in the synchronous mode. Theboards, however, do not support the grooming of ODU0 services in the asynchronous mode.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-17

Page 62: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

NOTE

In the synchronous mode, the boards (including tributary and line boards) that support the groomingof ODU0 services work with synchronous cross-connect boards. The cross-connect board can be the52XCH boards.

l Only ODU0, ODU1 and ODU2 trails can be created. ODU5G and ODU3 trails cannot becreated, but can be searched.

l If no cross-connect board (for example, XCS board) is available, the tributary board andline board must be installed in paired slots of the same subrack.

l During the installation of cross-connect board (for example, XCS board), the tributaryboard and line board must be installed on the same subrack.

l An ODU1 trail cannot be created on an OTU1 server trail formed by the networking of theTQS boards.

l Currently, two types of boards support the inverse multiplexing trail. The TSXL boardsupports the inverse multiplexing of the 40 Gbit/s service and the TDX board supports theinverse multiplexing of the 10 Gbit/s service

l The U2000 supports the ability to reuse discrete cross-connections.

l The U2000 does not support the ability to create a trail whose source and sink use the samesubrack.

l The U2000 does not support the ability to create a trail that is terminated at one end.

An example of the ODUk networking scenario is as follows:

RX1 TX1LP1 ODU1

OUT IN

LP1ODU1

ODU1

ODU2

OTU2

OTU2

ODU2

ODU1

OCh Trail

OTU2 Trail

ODU2 Trail

ODU1 Trail

Client Trail

Electrical Signal

Optical Signal

NS2 NS2TQS TQSSTM-16 STM-16

Procedure

Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu.

Step 2 Set the level, rate and direction of the service.

Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE,board, and port.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 63: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 4 Optional: Click a server tail between the source and sink NEs, and select the included servertrail in the dialog box displayed. You can click the trail again, and cancel the selected servertrail in the dialog box displayed.

Step 5 Optional: Double-click the other NE in the subnet to specify the NE that the route cannot passthrough. The sign is shown on the NE. Double-click the NE again to cancel your selection.

Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box isdisplayed. Select a path and click OK.

Step 7 Optional: Click the Protection Setting tab, and set the SNCP protection route. Right-click theNE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. In theupper left corner of the NE icon, is displayed. Right-click the NE that selectively receivesservices and choose Set Selective-Receiving Point from the shortcut menu. In the upper leftcorner of the NE icon, is displayed.

Step 8 Click the General Attributes, set the basic trail attributes, including the name and ID.

Step 9 Optional: Check the Activate the trail check box.

Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close.

----End

Result1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and

select the proper filter criteria for the trails.TIP

You can filter other trails according to the source and sink of the new trail.

2. In the WDM Trail Management user interface, find out that the trail is correctly created.

3.1.3.3 Creating Client TrailsThe U2000 supports creating client trails in an end-to-end mode. After you specify the sourceand sink of a service, the U2000 generates a client trail based on the searched or created servertrail. The WDM trail creation feature simplifies the service configuration procedure and ensuresproper operation. In addition, you can groom and deploy services in a flexible manner inapplication scenarios such as deployment or expansion.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l An OCh or ODUk server trail is correctly searched out or created.

Background InformationThe restrictions for configuring cross-connections and networking are as follows:l The working route and protection route of WXCP/SNCP trails must be different server

trails.l Currently, the U2000 only supports the Client trails created based on the ODUk server trails

in a network composed all by NG WDM equipment. The server trail can be ODU1 trail,ODU5G trail and ODU2 trail.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-19

Page 64: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

l The U2000 supports the creation and search for the Client trails using the SW SNCPscheme.

l For the dual-fed OTU, if services are configured at only one port, the client trail cannot becreated even if the OCh trail is searched out.

l The U2000 supports the ability to create a mono nodal trail.

Procedure

Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu.

Step 2 Set the level, rate and direction of the service.

Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE,board, and port.

Step 4 Optional: Click a server tail between the source and sink NEs, and select the included servertrail in the dialog box displayed. You can click the trail again, and cancel the selected servertrail in the dialog box displayed.

Step 5 Optional: Double-click the other NE in the subnet to specify the NE that the route cannot passthrough. The sign is shown on the NE. Double-click the NE again to cancel your selection.

Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box isdisplayed. Select a path and click OK.

Step 7 Optional: Click the Protection Setting tab, and set the SNCP protection route. Right-click theNE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. In theupper left corner of the NE icon, is displayed. Right-click the NE that selectively receivesservices and choose Set Selective-Receiving Point from the shortcut menu. In the upper leftcorner of the NE icon, is displayed.

Step 8 Click the General Attributes, set the basic trail attributes, including the name and ID.

Step 9 Optional: Check the Activate the trail check box.

Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close.

----End

Result1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and

select the proper filter criteria for the trails.TIP

You can filter other trails according to the source and sink of the new trail.

2. In the WDM Trail Management user interface, find out that the trail is correctly created.

3.1.4 Viewing WDM TrailsThis section describes how to view the connection relation of all boards on a WDM NE.

3.1.4.1 Viewing Route Information of WDM TrailThe U2000 provides the transmission media route of the trails. You can view the transmissionmedia layer route to find out the transmission media of the trail.

3.1.4.2 Viewing the Signal Flow Diagram for WDM Trails

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 65: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

The U2000 provides the signal flow diagram for trails of an optical NE. In the signal flowdiagram, you can view fiber connections between boards on optical NEs. The signal flowdiagram visually display the flow direction of optical signals, and facilitates operation andmaintenance.

3.1.4.3 Viewing Relevant Client TrailsAt a level higher than sever trails, client trails are used to carry services. By using the U2000,you can view the client trail information of a specified trail.

3.1.4.4 Browsing Related Server TrailsThe U2000 supports querying related server trails. By using this function, you can learn aboutthe information including status and attributes of a server trail related to the desired trail.

3.1.4.5 Viewing the Optical Power for the TrailsYou can query the optical power for trails. The U2000 provides a way to manage the opticalpower that is related to the NE layout, topology structure and routing.

3.1.4.6 Analyzing the WDM Trail FaultThis section describes how to query relevant information about the WDM trail status.

3.1.4.7 Viewing the Connectivity of WDM Services NetworkwideThe U2000 periodically checks the connectivity of the trails that receive alarm notifications anddisplays the result. You can learn about the connectivity of services networkwide by viewingthe check result and thus adopt different handling policies. For example, the alarm that causesservice interruption is handled with priority.

3.1.4.8 Browsing Associated Working and Protection TrailsU2000 supports the function of displaying associated working and protection trails of an opticalNE on an optical layer trail. Through the function of querying a WDM trail, you can view theother associated working and protection trails of a trail in the trail list.

3.1.4.1 Viewing Route Information of WDM Trail

The U2000 provides the transmission media route of the trails. You can view the transmissionmedia layer route to find out the transmission media of the trail.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l The WDM trails must be created.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.l If you need to filter all the trails, click Filter All.l If you need to add to the list more trails that match the requirement, click Incremental

Filter.l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Choose a trail and click Transmission Media Layer Route in the bottom portion of the window.The transmission media is displayed in the bottom window.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-21

Page 66: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

NOTEHover the cursor over the trail and the source and sink port information of this route is displayed.

----End

3.1.4.2 Viewing the Signal Flow Diagram for WDM Trails

The U2000 provides the signal flow diagram for trails of an optical NE. In the signal flowdiagram, you can view fiber connections between boards on optical NEs. The signal flowdiagram visually display the flow direction of optical signals, and facilitates operation andmaintenance.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l There must be correct WDM trails.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.l If you need to filter all the trails, click Filter All.l If you need to add to the list more trails that match the requirement, click Incremental

Filter.l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a trail, and select the Signal Flow Diagram tab in the bottom portion of the window. Thesignal flow direction of the entire trail is shown.

NOTE

Hover the cursor on a trail to display the source and sink port information of that section of the route.

Step 4 Optional: Right-click on the view of signal flow diagram, and choose Legend from the shortcutmenu. The fibers related to the trail are displayed in the signal flow diagram. Dotted linesrepresents intra-station fibers and real lines represents inter-station fibers.

Step 5 Optional: When an alarm is generated in the case of fiber cut, you can refresh the signal flowdiagram manually. Right-click on the view of signal flow diagram, and choose Refresh. Then,the broken fiber is highlighted in red, so that you can easily view the alarm status and start initialfault location.

Step 6 Optional: To query the current working route of a trail, select the trail, right-click on the viewof signal flow diagram, and then choose Display valid routes from the shortcut menu. The validpositive working route is highlighted in green, while the valid negative working route ishighlighted in orange.

NOTE

l The auto-refresh function of the valid routes is not supported.

l This function does to support trail groups.

----End

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-22 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 67: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.1.4.3 Viewing Relevant Client Trails

At a level higher than sever trails, client trails are used to carry services. By using the U2000,you can view the client trail information of a specified trail.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l The WDM trail must be created or serached out.

Context

In the network models specified in the ITU-T G.872 and G.805, the OTN transport network isdivided.That is, each layer manages its own overheads and each layer can be classified into sub-layers and the relationship between the adjacent layers is client and server.

A connection of the client layer is carried by an adjacent server trail for transmission. Forexample, the link connection of a OCh trail is provided by a OMS trail, while the link connectionof a Client trail is provided by an OCh or ODUk trail. The OMS layer is the server layer of theOCh layer, and the OCh trail is the client trail of the OMS layer. The OCh or ODUk layer is theserver trail of the Client layer, and the Client trail is the client trail of the OCh or ODUk trail.For details of the trail models, refer to 3.1.1.1 WDM Trail.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click FilterAll. The trails are displayed in the list.

NOTE

l Click Filter All to refresh and display all the qualified trails.

l Click Secondary Filter to filter the trails that are already displayed.

l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that arealready displayed.

Step 3 Right-click a trail and choose Browse Relevant Client Trails from the shortcut menu. Thecorresponding client trail information is displayed in the trail list.

----End

3.1.4.4 Browsing Related Server Trails

The U2000 supports querying related server trails. By using this function, you can learn aboutthe information including status and attributes of a server trail related to the desired trail.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l A WDM trail must be searched out or created.

l OTS trails do not support querying related server trails.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-23

Page 68: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

ContextIn the network models specified in the ITU-T G.872 and G.805, the OTN transport network isdivided.That is, each layer manages its own overheads and each layer can be classified into sub-layers and the relationship between the adjacent layers is client and server.

A connection of the client layer is carried by an adjacent server trail for transmission. Forexample, the link connection of a OCh trail is provided by a OMS trail, while the link connectionof a Client trail is provided by an OCh or ODUk trail. The OMS layer is the server layer of theOCh layer, and the OCh trail is the client trail of the OMS layer. The OCh or ODUk layer is theserver trail of the Client layer, and the Client trail is the client trail of the OCh or ODUk trail.For details of the trail models, refer to 3.1.1.1 WDM Trail.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.l If you need to filter all the trails, click Filter All.l If you need to add to the list more trails that match the requirement, click Incremental

Filter.l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Right-click a trail and choose Browse Related Server Layer Trails from the shortcut menu.This trail and the related server trails are displayed in the user interface.

Step 4 You can select another trail to continue the query.

----End

3.1.4.5 Viewing the Optical Power for the TrailsYou can query the optical power for trails. The U2000 provides a way to manage the opticalpower that is related to the NE layout, topology structure and routing.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l The WDM trails must be correctly created.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and clickFilter All. The trails are displayed in the list.

NOTE

l Click Filter All to refresh and display all the qualified trails.

l Click Secondary Filter to filter the trails that are already displayed.

l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails thatare already displayed.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-24 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 69: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 3 Right-click a trail and choose Query Relevant Optical Power from the shortcut menu.

Step 4 In the Optical Power Management window displayed, click the Table tab. Click Query toquery the optical power information of ports from the NE. In the Operation Result dialog boxdisplayed, click Close.

NOTE

In the View tab, move the cursor on a link. The U2000 shows the optical power information of all fibresin the link.

Step 5 Click the Graphic tab to query the graphic interface of the port optical power.

NOTE

l Green indicates that the current optical power is in the normal range.

l Orange indicates that the current power exceeds the reference deviation and there is an exception.

l Black "E" shape in the histogram indicates the allowable deviation range of the optical power.

----End

3.1.4.6 Analyzing the WDM Trail Fault

This section describes how to query relevant information about the WDM trail status.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l WDM trails must be created and in the active state.

l Client trails, ODUk (k =0, 1, 2, 3, and 5G) trails, and OTUk (k =1, 2, 3, and 5G) trails aresupported.

l Trails that have multiple sources and sinks are not supported.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-25

Page 70: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 In the Filter dialog box displayed, select the filter criteria. Then, the desired trails are displayedin the trail list.

NOTE

l To filter all the trails on the U2000, click Filter All.

l To add trails that meet the new criteria based on the existing trails, click Incremental Filter.

l To filter the trails again according to the new criteria based on the existing trails, click SecondaryFilter.

Step 3 Select an WDM trail in the trail list, right-click the trail, and then choose Analyse TrailStatus.

Step 4 In the Operation Result dialog box displayed, click Close.

Step 5 In the WDM Trail Status dialog box displayed, view Trail Status.

----End

3.1.4.7 Viewing the Connectivity of WDM Services Networkwide

The U2000 periodically checks the connectivity of the trails that receive alarm notifications anddisplays the result. You can learn about the connectivity of services networkwide by viewingthe check result and thus adopt different handling policies. For example, the alarm that causesservice interruption is handled with priority.

PrerequisiteYou must be an NM user with "network operator" authority or higher.

Context

In the case of the trails that reports the alarms, certain services of the trails are interrupted whileother services of the trails are not interrupted. The services that are interrupted cannot beidentified when you view alarms. You can only handle those alarms one by one. The alarm thatcauses service interruption, however, is not handled in time.

After the service interruption is detected, the U2000 automatically generates a service-levelalarm that is displayed in the Browse Current Alarm window.

Procedure

Step 1 Choose Fault > Service Minitoring > Real-Time Faulty WDM Trail Management from theMain Menu.

Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and clickFilter All. The trails are displayed in the list.

Step 3 View Connection Status. The connectivity of the service is refreshed in real time.

----End

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-26 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 71: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.1.4.8 Browsing Associated Working and Protection TrailsU2000 supports the function of displaying associated working and protection trails of an opticalNE on an optical layer trail. Through the function of querying a WDM trail, you can view theother associated working and protection trails of a trail in the trail list.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l There must be created or searched WDM trails.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.l If you need to filter all the trails, click Filter All.l If you need to add to the list more trails that match the requirement, click Incremental

Filter.l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a trail, right click and select the Browse Associated Working/Protection Trails.

NOTE

If there are associated working and protection trails, they are displayed with the selected trail on the trailmanagement interface. If there are no associated working and protection trails, only the selected trail is displayed.

----End

3.1.5 Maintaining WDM TrailsThe end-to-end trails are carriers of services of the customers. In the routine maintenance, theadministrator and maintainer must find out the status of the trails to ensure that all the servicesare transmitted correctly.

3.1.5.1 Activating/Deactivating WDM TrailsDeactivating WDM trails deletes the related services from the NE side and saves the relevantdata on the U2000 to release the occupied path resource. Activating trails enables the serviceson the WDM trails according to the trail data that is saved on the U2000.

3.1.5.2 Configuring OTU Overhead on the OCh TrailYou can use the U2000 to configure the overhead bytes of the trail node through the overheadmanagement function of the OTU layer that corresponds to the end-to-end OCh trail.

3.1.5.3 Querying the 1+1 Protection for a WDM TrailThis section describes how to query the 1+1 protection status for a WDM trail from the networklayer.

3.1.5.4 Performing 1+1 Protection Switching for a WDM TrailYou can perform 1+1 protection switching for a WDM trail.

3.1.5.5 Querying the WXCP/SNCP Protection of a WDM TrailThis section describes how to query the WXCP or SNCP protection state of a WDM trail fromthe network layer.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-27

Page 72: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.1.5.6 Performing the WXCP/SNCP Protection Switching for a WDM TrailThe U2000 supports performing the WXCP or SNCP protection switching for the trails in theend-to-end mode. Performing the WXCP or SNCP protection switching for the trails in the end-to-end mode is more direct and easier than that on the per-NE basis.

3.1.5.7 Querying the DPPS Protection of a WDM TrailThis section describes how to query the DPPS protection state of a WDM trail from the networklayer.

3.1.5.1 Activating/Deactivating WDM TrailsDeactivating WDM trails deletes the related services from the NE side and saves the relevantdata on the U2000 to release the occupied path resource. Activating trails enables the serviceson the WDM trails according to the trail data that is saved on the U2000.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The Client, ODUk, OTUk or OCh trail must be created.

Context

CAUTIONDeactivating WDM trails may interrupt the services.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.l If you need to filter all the trails, click Filter All.l If you need to add to the list more trails that match the requirement, click Incremental

Filter.l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Optional: Select one or more trails, right-click and choose Deactivate.

Step 4 Optional: Select one or more trails, right-click and choose Activate.

NOTEIf a certain server trail carries an active client trail or a partially active client trail, you need to deactivatethe client trail and then the server trail.

Step 5 Click OK in the Confirm window and the Reconfirm window displayed. A prompt appearstelling you that the operation was successful.

Step 6 Click Close.

----End

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-28 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 73: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.1.5.2 Configuring OTU Overhead on the OCh TrailYou can use the U2000 to configure the overhead bytes of the trail node through the overheadmanagement function of the OTU layer that corresponds to the end-to-end OCh trail.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The OCh trail must be searched, and the source and sink OTU boards must support overheadmanagement.

Context

CAUTIONYou need to configure OTU overheads correctly. Otherwise, services may be interrupted.

ProcedureStep 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.l If you need to filter all the trails, click Filter All.l If you need to add to the list more trails that match the requirement, click Incremental

Filter.l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select an OCh trail, click Maintenance, and select Overhead Management. The OTUOverhead window is displayed.

Step 4 Select a port from the object list. Right-click on the TTI to be Received or TTI to be Sentcolumn. Select the overhead bytes input mode.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-29

Page 74: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

NOTE

l Choose Copy All Form Received to automatically copy the contents of current overhead bytes receivedto the table.

l Choose Manual Input to customize the contents of the overhead bytes.

Option Description

Copy All Form Received Click Copy All Form Received.

Manual Input Click Manual Input, and the Please input the overhead bytedialog box is displayed. Enter the information about SourceFlag, Sink Flag and User Tag. Click OK.

Step 5 Click Apply.The Confirm dialog box is displayed.

Step 6 Click OK.A prompt appears telling you that the operation was successful.

Step 7 Click Close.

----End

3.1.5.3 Querying the 1+1 Protection for a WDM TrailThis section describes how to query the 1+1 protection status for a WDM trail from the networklayer.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l The optical line protection or 1+1 protection groups must be configured.

l Trail search must be performed properly.

l Applies to Client, OCh, and OMS trails.

ContextYou can query the status and parameters of inter-board 1+1 protection, intra board 1+1protection, client-side 1+1 protection, optical line protection, 1+1 optical path protection, andinter-subrack 1+1 protection for a trail.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-30 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 75: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set filter criteria and methodsas needed. Click Filter All.

Step 3 In the WDM Trail Management view, select a trail that is configured with the 1+1 protection.Click Maintenance and choose WDM Trail 1+1 Parameter Settings from the drop-downmenu. The WDM Trail 1+1 Parameter Settings window is displayed. The 1+1 protectioninformation of the WDM trail is shown in the window.

Step 4 Select a protection group of WDM trails. Click Function and select Query Switching Status.The Operation Result dialog box is displayed indicating that the operation is successful.

Step 5 Click Close.

----End

3.1.5.4 Performing 1+1 Protection Switching for a WDM Trail

You can perform 1+1 protection switching for a WDM trail.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The 1+1 protection status of the WDM trail is queried.

l A trail search must be performed properly.

l Applies to OCh client, OCh or OMS trails.

Context

CAUTIONServices may be interrupted when performing 1+1 protection switching for a WDM trail.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set filter criteria and methodsas needed. Click Filter All.

Step 3 Select a client trail that has WDM 1+1 protection, click Maintenance and select WDM Trail1+1 Parameter Settings.

Step 4 Select a trail in the WDM Trail 1+1 Parameter Settings window. Right-click in the CurrentStatus field and choose Force to Working or any of the other switching operations. In theConfirm dialog box, confirm the operation. The Operation Result dialog box is displayed,indicating that the operation is successful.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-31

Page 76: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

NOTE

You need to confirm the operation only when performing the forced switching and trail locking.

Step 5 Click Close.

----End

3.1.5.5 Querying the WXCP/SNCP Protection of a WDM TrailThis section describes how to query the WXCP or SNCP protection state of a WDM trail fromthe network layer.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l A trail with the WXCP or SNCP protection must be configured.

ProcedureStep 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria andmethods as needed. Click Filter All.

Step 3 Select a trail with WXCP or SNCP in the WDM Trail Management window. Click theMaintenance button and select WXCP/SNCP Service Control from the drop-down list. TheWXCP/SNCP Service Control window is displayed, indicating the WXCP or SNCPinformation of the WDM trail.

Step 4 Select the protection group of this WDM trail and click Query.The Operation Result dialog box is displayed, indicating that the operation is successful.

Step 5 Click Close.

----End

3.1.5.6 Performing the WXCP/SNCP Protection Switching for a WDM TrailThe U2000 supports performing the WXCP or SNCP protection switching for the trails in theend-to-end mode. Performing the WXCP or SNCP protection switching for the trails in the end-to-end mode is more direct and easier than that on the per-NE basis.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l A trail with the WXCP or SNCP protection must be configured.

Context

CAUTIONServices may be interrupted when performing the WXCP/SNCP protection switching for aWDM trail.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-32 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 77: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria andmethods as needed. Click Filter All.

Step 3 In the WDM Trail Management view, select a trail with the WXCP or SNCP protection. ClickMaintenance and select WXCP/SNCP Service Control from the drop-down list. The WXCP/SNCP Service Control window is displayed, indicating the WXCP or SNCP information of theWDM trail.

Step 4 Select the protection group of this WDM trail. Click Function and select the forced or manualswitching from the drop-down list.The Operation Result dialog box is displayed, indicating that the operation is successful.

Step 5 Click Close.

----End

3.1.5.7 Querying the DPPS Protection of a WDM TrailThis section describes how to query the DPPS protection state of a WDM trail from the networklayer.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l A trail with the DPPS protection must be configured.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria andmethods as needed. Click Filter All.

Step 3 Select a trail with DPPS in the WDM Trail Management window. Click the Maintenancebutton and select DPPS Query from the drop-down list. The DPPS Protection window isdisplayed, indicating the DPPS information of the WDM trail.

Step 4 Select the protection group of this WDM trail and click Query, the DPPS information of theWDM trail is displayed.

----End

3.1.6 Collecting Resource StatisticsYou can collect statistics on resources to learn the existing inventory of a network. Resourcestatistics is a key basis of network maintenance and expansion.

3.1.6.1 Collecting Statistics on Client-Side Port ResourcesBy collecting statistics on resource inventory for WDM client-side ports (Ethernet service andclient-side ports of the OTU board), you can check whether the resources are sufficient beforeconfiguring services.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-33

Page 78: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.1.6.2 Collecting Statistics on Inter-Station Wavelength ResourcesThe statistics report of inter-station wavelength resources shows the usage of the wavelengthresources of one or more trails between the selected stations. This provides reference for serviceplanning and increases the service availability ratio.

3.1.6.3 Collecting Statistics on WDM Link ResourcesBy using this function, you can learn about the usage of the WDM link resources between thespecific stations. This provides reference for service planning and increases the serviceavailability ratio.

3.1.6.1 Collecting Statistics on Client-Side Port Resources

By collecting statistics on resource inventory for WDM client-side ports (Ethernet service andclient-side ports of the OTU board), you can check whether the resources are sufficient beforeconfiguring services.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

Procedure

Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of WDM Client-Side PortResources from the Main Menu.

Step 2 In the left-hand pane, select an NE and click the double-right-arrow button (red).

Step 3 Click Statistics to query the resource information of the WDM client-side ports.

Step 4 Click Used Port, Unused Port or Dynamic Port tab to query details of the ports.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-34 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 79: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

NOTE

l If a client-side port is not used by a trail, this port is idle. Otherwise, this port is used.

l Discrete services are taken as idle resources.

Step 5 Optional: Click Print or Save As to output the report.

----End

3.1.6.2 Collecting Statistics on Inter-Station Wavelength Resources

The statistics report of inter-station wavelength resources shows the usage of the wavelengthresources of one or more trails between the selected stations. This provides reference for serviceplanning and increases the service availability ratio.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l You cannot collect statistics on the wavelengths that are used by WDM ASON trails at theOCh level.

l You cannot collect statistics if the trail to be counted is bidirectional, and the source andsink ends of the trail use the optical multiplexer/demultiplexer board or optical add/dropmultiplexing board.

Context

To ensure that statistics are correct, it is recommended that you search for WDM trails beforeyou collect statistics on wavelength resources.

Procedure

Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of Inter-Station WavelengthResources from the Main Menu.

Step 2 Set the Level and Direction of the trail to be counted.

NOTE

Currently, only OCh trails are supported.

Step 3 Click Browse to select the source end and click the button again to select the sink end. ClickOK in the Search NE dialog box.

NOTE

The source and sink ends can be optical NEs, NEs or boards.

Step 4 Optional: Click Browse to select the intermediate NE.

NOTE

l The intermediate NE can only be an optical NE.

l You can select multiple intermediate NEs to determine the trail to be counted out of multiple trailsbetween the source and sink ends.

Step 5 Click Count. The Confirm dialog box is displayed prompting you to search for trails beforecollecting statistics.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-35

Page 80: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 6 Click OK. The Operation Result dialog box is displayed indicating that the operation wassuccessful. Click Close. You can view the created report in the right-hand pane.

NOTE

If there is a large number of network data, it takes a long time to create the report.

Step 7 Optional: Click Print or Save As to output the report.

----End

3.1.6.3 Collecting Statistics on WDM Link Resources

By using this function, you can learn about the usage of the WDM link resources between thespecific stations. This provides reference for service planning and increases the serviceavailability ratio.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

Procedure

Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of WDM Link Resourcesfrom the main menu.

Step 2 In the left-hand pane, select an NE and click the double-right-arrow button (red).

Step 3 In the Inter-Station Link Resource Statistics pane, view the link resources among stations.

Step 4 In the Inter-Station Link Resource Statistics pane, select a record. Then, in the Link Listpane, view the details of all the links between the two stations.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-36 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 81: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 5 Optional: Right-click one or more links in the Link List pane and choose Browse RelevantClient Trails from the shortcut menu to view the client trail of this link.

----End

3.1.7 Modifying WDM TrailsDue to service requirements, sometimes, you need to modify the configuration of a WDM trail.U2000 supports manually modifying the source and sink of an exisiting WDM trail and the trailnames in batches, instead of creating WDM trails. This greatly simplifies the operations.

3.1.7.1 Modifying the Source and Sink of a Client TrailBecause of service requirements, you may need to modify the source and sink of a WDM trail.The U2000 supports manually modifying the source and sink of an existing WDM trail. As aresult, you need not create a new WDM trail, and thus the operation is simplified.

3.1.7.2 Modifying WXCP/SNCP ProtectionIn the case of a trail change, you can modify the WXCP/SNCP protection for trail.

3.1.7.3 Modifying Trail Names in BatchesThe network administrator can set the trail naming rules and modify trail names in batchesaccording to these rules.

3.1.7.1 Modifying the Source and Sink of a Client TrailBecause of service requirements, you may need to modify the source and sink of a WDM trail.The U2000 supports manually modifying the source and sink of an existing WDM trail. As aresult, you need not create a new WDM trail, and thus the operation is simplified.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l Idle ports must be available at the source and sink ends.

ContextThe configuration principles are as follows:l The OTU boards at the source and sink ends, such as the L4G, LOG, and LQG boards,

must support configuring cross-connections and must be installed on different NEs.l Applies to a trail with only one source and one sink.

l The source and sink of a trail represent specific service ports.

l The U2000 supports the ability to modify the source and sink ends of a client trail that isin service.

l The U2000 does not support the ability to modify a cross-subrack WDM trail. If you wantto modify the sink end of a WDM trail, the sink end before modification and the sink endafter modification must reside in the same subrack.

CAUTIONModifying the source or sink of a trail interrupts services.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-37

Page 82: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

ProcedureStep 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Condition dialog box is displayed. Set filter criteria and methodsas needed.

NOTE

l To filter all trails on the U2000, click Filter All.

l Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter.

l Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.

Step 3 Select a desired trail, click Create/Modify, and choose Modify Trail from the drop-down menu.The Modify WDM Trail window is displayed.

Step 4 Click Browse corresponding to Source to select a source port.

Step 5 Click Browse corresponding to Sink to select a sink port.

Step 6 Optional: Click a server tail between the source and sink NEs, and select the included servertrail in the dialog box displayed. You can click the trail again, and cancel the selected servertrail in the dialog box displayed.

Step 7 Click Finish, and if the modified trail is an activated trail, the Confirm dialog box is displayed,click Yes.

Step 8 The Operation Result dialog box is displayed. Click Close.

----End

Result1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and

select the proper filter criteria for the trails.TIP

You can filter other trails according to the source and sink of the new trail.

2. In the WDM Trail Management user interface, find out that the trail is correctly modified.

3.1.7.2 Modifying WXCP/SNCP ProtectionIn the case of a trail change, you can modify the WXCP/SNCP protection for trail.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l Support the function of modifying the WXCP/SNCP protection for Client, ODU0, ODU1,and ODU2 trails.

Context

CAUTIONThis operation may cause short interruption of the services.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-38 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 83: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and clickFilter All. The trails are displayed in the list.

NOTE

l Click Filter All to refresh and display all the qualified trails.

l Click Secondary Filter to filter the trails that are already displayed.

l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails thatare already displayed.

Step 3 Select a trail and click Create/Modify and choose Modify Trail.

Step 4 Click the Protection Setting tab.

l Add WXCP/SNCP protection.

– Right-click the dual-fed point and choose Set Dual-Fed Point from the shortcut menu,and the node is displayed as . Right-click the selective-receiving point and chooseSet Selective-Receiving Point from the shortcut menu, and the node is displayed as

.

– Right-click the blank area in the Node List frame and choose Add from the shortcutmenu. The Add the dual-fed and selective-receiving node is displayed, select Dual-Fed Point and Selective-Receiving Point. Click OK.

l Delete WXCP/SNCP protection.

– Right-click the dual-fed point and choose Cancel Dual-Fed Point from the shortcutmenu, right-click the selective-receiving point and choose Cancel Selective-ReceivingPoint from the shortcut menu.

– Right-click a record in the Node List frame and choose Delete from the shortcut menu.Click OK.

– Click Delete Protection.

l Modify WXCP/SNCP protection.

Click Protection Setting. In the Specify Route Channel window, sets the Server LayerTrail and Channel of the protection route .

Step 5 Click Finish. In the Confirm dialog box, click Yes. In the Operation Result dialog box, clickClose.

----End

3.1.7.3 Modifying Trail Names in Batches

The network administrator can set the trail naming rules and modify trail names in batchesaccording to these rules.

Prerequisitel You must be an NM user with "network maintainer" authority or higher.

l The trail naming rules must be set on the U2000.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-39

Page 84: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click FilterAll. The trails are displayed in the list.

NOTE

l Click Filter All to refresh and display all the qualified trails.

l Click Secondary Filter to filter the trails that are already displayed.

l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that arealready displayed.

Step 3 Right-click one or more trails from the list, and choose Name from the shortcut menu. For thenaming rules, refer to Customizing Naming Rule.

Step 4 In the Confirm dialog box displayed, click OK.

----End

3.1.8 Deleting a WDM TrailThe operation deletes the WDM trails from the network layer or from the NE layer. You needto delete the trails if the network will be adjusted or rebuilt.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The trail is not the OTS trail.

l The trail must have the highest priority.

l The trails that contain dynamic cross-connections must be deactivated before deleted. Othertrails can be directly deleted.

ContextA WDM trail can be deleted from the network side or the NE side.

l If a trail is deleted from the network side, only the WDM trail at the network layer is deletedon the U2000 side. The deleted trail is not delivered to the NE. Moreover, the service isnot affected. Generally, this method is adopted to synchronize the trail information on theU2000 side and the trail information at the network layer. After the trail is deleted from thenetwork layer, you can search for and find it again based on the service information at theNE layer.

l If a trail is deleted at the NE layer, the trail on the NE side is deleted accordingly. After thetrail is deleted, the service is interrupted. If the service configuration of the trail is incorrector needs to be modified, you can delete the trail at the NE layer and then create anothertrail.

l The U2000 supports the ability to delete a WDM trail and to delete a dynamic cross-connection related to the trail.

l The U2000 does not support the ability to delete the WDM trail that has a client trail.

l The U2000 does not support the ability to delete an OTS trail.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-40 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 85: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

l Before you delete a WDM trail, the dynamic cross-connection related to the trail must beinactive. If active, an error is displayed during the deletion.

CAUTIONDeleting the trails from NE layer will affect service.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.l If you need to filter all the trails, click Filter All.l If you need to add to the list more trails that match the requirement, click Incremental

Filter.l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Optional: Deleting WDM Trails from the NE Layer.1. Select the WDM trail that you want to delete, right-click it and choose Delete.2. In the Confirm and Reconfirm dialog boxes displayed, click OK. The operation is

complete.

Step 4 Optional: Deleting WDM Trails from the Network Layer.1. Select the WDM trail that you want to delete, right-click it and choose Delete from

Network Layer.2. In the Operation Result dialog boxes displayed, click Close.

----End

3.1.9 Sample Application: Configuring GE Services with the WXCPProtection in End-to-End Mode

This sample describes how to configure GE Services with the WXCP protection in the end-to-end mode.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The Optical NE must be created as shown in Figure 3-12.

l The NEs and boards must be created as shown in NE Panel.

ContextNetwork Design

The Project T constructs a ring network with station A, station B, station C and station D. Allthe equipments are OptiX Metro 6100V1E. Station A is an Optical Terminal Multiplexer (OTM)station. The station A has two back-to-back OTMs including two NEs. Station B, station C and

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-41

Page 86: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

station D are Optical Add/Drop Multiplexer (OADM) stations. Each station has one NEs. Thenetwork design is shown in Figure 3-12.

Figure 3-12 Network Design

OADM

D

A

B

C

OTM

Slot Diagram

Figure 3-13 Station A

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-42 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 87: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Figure 3-14 Station B

Figure 3-15 Station C

Figure 3-16 Station D

Service Requirements

In the network management center, the maintenance engineer is responsible for the servicedeployment and adjustment. Suppose that the engineer is familiar with all the services carriedby the WDM network. One of the routine tasks of this engineer is to deploy the GE level serviceto a wavelength. After receiving a request, the engineer must follow the request to configure aGE level service with WXCP from station A to station C.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-43

Page 88: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Procedure

1. Query the available resources of the WDM side.2. Search for WDM trails.3. Create a GE trail with the WXCP protection.

Procedure

Step 1 Query the available resources of the WDM side.1. Choose Inventory > WDM Statistic Report > Statistics Report of WDM Client-Side

Port Resources from the Main Menu.2. Select the optical NE A and the optical NE C from the Navigation Tree. Click the double

arrow button to add the port resources of the two NEs to the statistics area at the right-handside.

3. Click Used Port and Unused Port to view the using status of each port.4. Record all the available resources.

Step 2 Search for WDM trails.1. Connect fibers on the U2000 according to the actual networking diagram.2. Choose Service > WDM Trail > WDM Trail Search from the Main Menu.3. Under Advanced settings, set the search policies.

4. Click Next to begin to search for trails. The U2000 takes some time to return the results,depending on the number of services.

5. Click Next to view the conflicting trail information . If you want to set a trail managementflag, check the Management Flag check box or right-click it and select the managementflag.

NOTEIf no trails conflict, no window about conflicting trails is displayed. After you click Next, theU2000 displays the window about discrete services.

6. Click Next to view all discrete services in the network.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-44 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 89: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

7. After the search is complete, click Finish.

Step 3 Create a GE trail with the WXCP protection.1. Choose Service > WDM Trail > Create WDM Trail from the Main Menu.2. Set the level, rate and direction of the service.

Set the service level as GE, and set the service direction as Unidirectional.3. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the

NE, board, and port.

Set the source port as No.3 port of the No.1 timeslot LQG on NE331.

Set the sink port as No.3 port of the No.1 timeslot LQG on NE333.4. Click the Protection Setting tab, and set the SNCP protection route. Right-click the NE

that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. In theupper left corner of the NE icon, is displayed. Right-click the NE that selectively receivesservices and choose Set Selective-Receiving Point from the shortcut menu. In the upperleft corner of the NE icon, is displayed.

Set optical NE A as the dual transmitting node and optical NE C as the receiving node.5. Click the General Attributes, set the basic trail attributes, including the name and ID.6. Check the Activate the trail check box.7. Click Apply. A prompt is displayed, indicating that the operation was successful. Click

Close.

----End

3.1.10 Sample Application: Configuring an OCh TrailThis section describes how to configure an OCh trail in the end-to-end mode.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The optical NE as shown in Figure 3-17 must be created.

l The NEs and boards as shown in NE Panel must be created.

ContextProject network design

Project T is a ring network that consists of stations A, B, C, and D. The network uses the OptiXMetro 6100 equipment. Stations A, B, C, and D are optical add/drop multiplexer (OADM)stations. Each station has only one NE. Figure 3-17 shows the network design, and Table 3-3lists the network configuration data.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-45

Page 90: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Figure 3-17 Network design

OADM

D

A

B

C

Table 3-3 Network data table

Station NE Type NE Name IP Address Remarks

A OADM NE403 129.9.1.174 Gateway NE

B OADM NE430 129.9.1.145 Non-gatewayNE

C OADM NE401 129.9.1.146 Non-gatewayNE

D OADM NE402 129.9.1.147 Non-gatewayNE

NE Panel

In the project, the configurations for NEs on stations A, B, C, and D are the same.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-46 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 91: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Figure 3-18 NE panel on station A

L4G

SC2

SCC

FIU

PMU

FIU

WSD9

WSM9

L4G

Service demand

A main responsibility of the transmission equipment maintenance engineers in the transmissionmaintenance department of the network management center is to provision and groom servicesin the WDM network. An engineer receives a grooming order for provisioning two services.One is a unidirectional service from station B to station C. The other is a bidirectional servicefrom station B to station D. Based on the services, the planned OCh trails are as follows:

l There is a unidirectional trail from station B to station C. The route is B->C. The wavelengthof the service is wavelength 1. Figure 3-19 shows the trail signal flow.

Figure 3-19 Signal flow of the trail from station B to station C

l There is a bidirectional trail from station B to station D. The route from station B to stationD is B->C->D. This route passes through station C. The wavelength of the service iswavelength 2. The route from station D to station B is D->A->B. This route passes throughstation A. The wavelength of the service is wavelength 2. Figure 3-20 and Figure 3-21show the trail signal flows.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-47

Page 92: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Figure 3-20 Signal flow of the trail from station B to station D

Figure 3-21 Signal flow of the trail from station D to station B

Configuration procedure

1. Search for WDM server trails.2. Create an OCh trail from station B to station C.3. Create an OCh trail between station B and station D.

Procedure

Step 1 Search for WDM server trails.

1. Connect fibers on the U2000 according to the actual networking and signal flow diagrams.

2. Choose Service > WDM Trail > WDM Trail Search from the Main Menu.

3. Under Advanced settings, set the search policies.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-48 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 93: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

4. Click Next to begin to search for trails. The U2000 takes some time to return the results,depending on the number of services.

5. Click Next to view the conflicting trail information . If you want to set a trail managementflag, check the Management Flag check box or right-click it and select the managementflag.

NOTEIf no conflict trail exists, the window of conflict trails is not displayed. Click Next. The U2000displays a window that displays discrete services.

6. Click Next to view all discrete services in the network.7. After the search is complete, click Finish.

Step 2 Create an OCh trail from station B to station C.1. Choose Service > WDM Trail > Create WDM Trail from the Main Menu.2. Set the level and direction of the service.

Set the service level to OCh, and set the service direction to Unidirectional.3. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the

NE, board, port and wavelength.

Set the source port to port 1 of the L4G in slot 1 on NE430 and the sink port to port 1 ofthe L4G in slot 1 on NE401.

4. Click the General Attributes, set the basic trail attributes, including the name and ID.5. Check the Activate the trail check box.6. Click Apply. A prompt is displayed, indicating that the operation was successful. Click

Close.

Step 3 Create an OCh trail between station B and station D.1. Choose Service > WDM Trail > Create WDM Trail from the Main Menu.2. Set the level, rate and direction of the service.

Set the service level to OCh, and set the service direction to Bidirectional.3. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the

NE, board, and port.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-49

Page 94: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Set the source port to port 1 of the L4G in slot 2 on NE430 and the sink port to port 1 ofthe L4G in slot 2 on NE402.

4. Click the General Attributes, set the basic trail attributes, including the name and ID.

5. Check the Activate the trail check box.

6. Click Apply. A prompt is displayed, indicating that the operation was successful. ClickClose.

----End

3.2 Configuring EAPEThe U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail.By adjusting the optical power of a WDM trail, the EAPE can reduce or even eliminate bit errorsof services on the trail.

3.2.1 EAPEThe U2000 provides the enhanced automatic power pre-equilibrium (EAPE) function. TheEAPE adjustment can be enabled to ensure that the receive-end signal quality of each channelmeets the preset requirement and that the services are available.

3.2.2 Creating an OCh TrailThe U2000 supports creating OCh trails in an end-to-end mode. After you specify the sourceand sink of a service, the U2000 can generate an OCh trail based on the searched server trail.The WDM trail creation feature simplifies the service configuration procedure and ensuresproper operation. In addition, you can groom and deploy services in a flexible manner inapplication scenarios (deployment or expansion).Before creating an EAPE pair, you shouldcreate OCh trails. The EAPE function uses OCh trails to identify EAPE pairs. In the case of theequipment with the dynamic optical cross-connection boards, you can create OCh trails manuallyby using the trail management function of the U2000.

3.2.3 Creating EAPE ObjectsThe U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail.For a WDM service configured with the EAPE, the U2000 fine-tunes the optical power of thetransmit end according to signal quality detected by the receive end. This can improve the signalquality.

3.2.4 Starting EAPE AdjustmentIn the case of a WDM service configured with EAPE, when the OTU at the sink end detects thesignal degrade, an exceptional EAPE event is reported to and displayed on the U2000. This eventprompts the user to start EAPE adjustment so that the VOA at the source end finely tunes theoptical power at the transmit end. This can enhance the signal quality.

3.2.5 Deleting EAPE ObjectsWhen you need to activate a trail or the EAPE function on the trail is not required, you canmanually delete the EAPE.

3.2.1 EAPEThe U2000 provides the enhanced automatic power pre-equilibrium (EAPE) function. TheEAPE adjustment can be enabled to ensure that the receive-end signal quality of each channelmeets the preset requirement and that the services are available.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-50 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 95: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Function Description

In practice of WDM system operation, the optical power flatness of each channel, comparedwith that during deployment commissioning, greatly changes due to fiber condition variation.As a result, the quality of received signals does not meet the requirement. In this case, EAPEadjustment can be enabled to ensure that the receive-end signal quality of each channel meetsthe preset requirement and that the services are available.

Function Implementation

The procedure to implement the EAPE function is as follows:

1. During deployment commissioning, manually adjust the optical power of each channel toobtain signal quality that meet the requirement. This ensures that each channel normallyoperates.

2. During system operation, the OTU at the receive end detects the signal quality of eachchannel.

3. When the OTU at the receive end detects an alarm, if the optical power of the OTU at thereceive end does not cross the threshold, adjust the optical power attenuation ratio of thecorresponding channel according to the actual situation. This ensures that the receive-endsignal quality of each channel meets the preset requirement and that the services areavailable.

Involved Units

The Table 3-4 lists the equipment and U2000 versions that support the EAPE function and theirrelations.

Table 3-4 The versions of the equipment and U2000 that support the EAPE function

Equipment Version U2000 Version

OptiX OSN 6800/3800 V100R003 or laterversions

V100R001 or later versions

OptiX OSN 3800A/6800A V100R001C01 orlater versions

V100R001 or later versions

OptiX OSN 1600A/G(NA) V100R003C02 orlater versions

V100R001 or later versions

The service board and the SCC board are jointly used to achieve the EAPE function. Thisfunction involves the following types of boards and ports:

l OTU detection unit

– Detects the receive-end signal quality of each channel and reports any EAPE unbalanceevent detected.

– The boards that support this function include the OTUs and line boards with the FECfunction.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-51

Page 96: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

l Adjustment unit: It is the EAPE adjustment entity that adjusts the optical attenuation ofeach channel. The boards that support this function include ROAM, WSM9, WSD9,WSM5, WSD5, WSMD4, DWC, EDWC, V40, M40V, D40V, V48, VA2, VA1 and VA4.

l Received signal selection unit– The system locates the point to be adjusted according to the current protection state of

the OLP or DCP board.– The boards that support this function include the OLP and DCP.

l System control and communication unit– It is the system entity that carries out the EAPE function.

– The boards that support this function include the SCC.

NOTE

For the EAPE function, EAPE protocol frames can be sent to each node as long as the physicalcommunication route is reachable. The EAPE protocol frames can be sent in modes such as the OSC andESC.

Networking ScenariosThe EAPE function can be applied in three typical scenarios.

EAPE application scenario 1 is with the basic configuration that only a trail with VOA unitexists. Figure 3-22 shows the networking diagram of this application mode. The figure illustratesonly the unidirectional EAPE pair.

Figure 3-22 Scenario of the single VOA unit that takes the common OTU as the source

EAPE application scenario 2 is applicable to the dual fed and selective receiving OTU board.Each of the two receive optical interfaces of the dual fed and selective receiving OTU has anFEC module. Two trails with VOA units exist. Hence, in this networking mode, you need toconfigure two EAPE pairs.Figure 3-23 shows the networking diagram of this application mode.The figure illustrates only the unidirectional EAPE pair.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-52 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 97: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Figure 3-23 Scenario of the dual VOA units that take the dual-fed and selective-receiving OTUsas the sources

EAPE application scenario 3 is applicable to the 5 Gbit/s, 10 Gbit/s and 40 Gbit/s OTUs. In thisnetworking mode, the intra-board 1+1 protection needs to be configured. Only one EAPE pairneeds to be configured. When the sink OTU detects an anomaly, the system locates the VOA tobe adjusted according to the current services operating channel. Figure 3-24 shows thenetworking diagram of this application mode. The figure considers the OLP board as an exampleto illustrate only the unidirectional EAPE pair.

Figure 3-24 Scenario of the dual VOA units with the OLP protection units

Configuration Principle

The EAPE configuration principles are as follows:

l When creating the EAPE, you must create the corresponding OCh trail firstly.

l Based on the basic application scenario, you just need to specify the source OTU, sink OTUand adjustment unit.

l When the OTU is jointly used with the OLP or DCP board for networking, besidesspecifying the source OTU and sink OTU, you also need to specify the OLP or DCP boardand the active and standby adjustment units. In this networking mode, the sink OLP or DCPboard and the sink OTU must be configured on one NE; the adjustment unit and the sourceOTU must be configured on another NE.

l The FEC type of the source and sink OTU must keep consistent. After EAPE is configured,the FEC working mode of the OTU must not be changed; the FEC function of the OTUmust be enabled.

l EAPE requires that the monitored path is a complete end-to-end wavelength without anyintermediate add or drop wavelength.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-53

Page 98: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

l An OCh trail with regenerating stations equals to two independent wavelengths and thusneed be configured with two EAPE pairs.

l EAPE requires that the adjustment unit is configured in the transmit-end station and theOTU detection unit is configured in the receive-end station.

l An OCh trail with multiple sources and sinks does not support the EAPE function.

l The uploading function is not supported, but the script importing and exporting function issupported.

l If the EAPE ID on the U2000 is inconsistent with that on the NE, you need to delete thetrail on the U2000 from the network layer, search for a new trail, and then query or createEAPE objects. In this way, you can obtain the EAPE objects with consistent data betweenthe U2000 and the NE.

l When an OCh trail has the corresponding EAPE objects, you cannot modify or deactivatethe trail.

l The adjustment board cannot be on the sink NE, and the selective receiving board cannotbe on the source NE.

l The FEC mode of the source OTU and sink OTU should be the same.

3.2.2 Creating an OCh TrailThe U2000 supports creating OCh trails in an end-to-end mode. After you specify the sourceand sink of a service, the U2000 can generate an OCh trail based on the searched server trail.The WDM trail creation feature simplifies the service configuration procedure and ensuresproper operation. In addition, you can groom and deploy services in a flexible manner inapplication scenarios (deployment or expansion).Before creating an EAPE pair, you shouldcreate OCh trails. The EAPE function uses OCh trails to identify EAPE pairs. In the case of theequipment with the dynamic optical cross-connection boards, you can create OCh trails manuallyby using the trail management function of the U2000.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The OMS server trail must be searched out.

Background Information

The U2000 does not support the ability to reuse discrete cross-connections.

The source and sink of an OCh trail are the ports at the line side of the OTU boards. The boardsthat the trail passes should support dynamic optical cross-connection or should contain staticoptical cross-connection. The boards that support the dynamic optical cross-connection areclassified by equipment domain as follows:l For the OptiX BWS 1600G: WSM9, WSD9, WSM5, WSD5 and RMU9.

l For the OptiX Metro 6100V1E: WSM9, WSD9, RMU9, and WSMD4.

l For the OptiX OSN 3800, the OptiX OSN 6800, and the OptiX OSN 8800 I: WSM9, WSD9,RMU9, ROAM, WSMD4, 11RDU9, 11WSMD2, 12WSM9, 12WSD9, 13WSM9,13WSD9, RDU6, WSM6.

Typical OCh networking scenarios are as follows:l The typical scenario of non-protected OCh networking is as follows:

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-54 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 99: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

OTU WSD WSMFIU

OSC

FIU FIU FIU

OSCOSC

ONE2

ONE3ONE1

D40 M40

OCh

OCh OCh

oxcfiber

OTU

OTU

OTU

l The typical scenario of protected OCh networking is as follows:

OTU

WSD WSM

OSC OSC

ONE2 ONE4ONE1

OChoxcfiber

OLP

FIU

OSC

WSD WSM

OSC

OSC

OSC

ONE3

FIU

FIU

FIU

FIU

FIU

FIU

FIU

OLP

OTU

NOTEThe source and sink of an OCh trail cannot be modified.

Procedure

Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu.

Step 2 Set the level and direction of the service.Set the level to OCh and set the direction according to the specific networking.

Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE,board, and port.

TIP

l During the selection of source or sink in the NE Panel, when you move the cursor to a board, thewavelength information of the board port is displayed.

l By default, if you already select one end (source or sink) of a trail and open the NE Panel to selectanother end, the U2000 uses the board and port that have the same band and wavelength with priority.

Step 4 Optional: Click a server tail between the source and sink NEs, and select the included servertrail in the dialog box displayed. You can click the trail again, and cancel the selected servertrail in the dialog box displayed.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-55

Page 100: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 5 Optional: Double-click the other NE in the protection subnet to specify the NE that the routecannot pass through. The sign is displayed on the NE. Double-click the NE again to cancelyour selection.

Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box isdisplayed. Select a path and click OK.

Step 7 Click the General Attributes, set the basic trail attributes, including the name and ID.

Step 8 Optional: Check the Activate the trail check box.

Step 9 Optional: Click Port Attribute, set the OPA Mode in the dialog box displayed and clickOK.

Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close.

----End

Result1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and

select the proper filter criteria for the trails.TIP

You can filter other trails according to the source and sink of the new trail.

2. In the WDM Trail Management user interface, find out that the trail is correctly created.

3.2.3 Creating EAPE ObjectsThe U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail.For a WDM service configured with the EAPE, the U2000 fine-tunes the optical power of thetransmit end according to signal quality detected by the receive end. This can improve the signalquality.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l An OCh trail must be created or searched out.

Procedure

Step 1 Choose Trail > WDM Trail Management from the Main Menu. Select filter criteria accordingto requirements.

Step 2 Select a desired OCh trail, click Maintenance, and select EAPE Management from the drop-down menu. The EAPE Management dialog box is displayed.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-56 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 101: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Step 3 Click New to create the EAPE management.

NOTE

l You need not configure the data of the EAPE objects. The U2000 automatically calculates and then appliesthe data to the sink NE. The data of the EAPE objects is not displayed in the user interface. By default, theadjustment board nearest to the source is used.

l If the OLP dual fed board is available, a power adjustment board for the protection trail is required.

----End

3.2.4 Starting EAPE AdjustmentIn the case of a WDM service configured with EAPE, when the OTU at the sink end detects thesignal degrade, an exceptional EAPE event is reported to and displayed on the U2000. This eventprompts the user to start EAPE adjustment so that the VOA at the source end finely tunes theoptical power at the transmit end. This can enhance the signal quality.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-57

Page 102: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The EAPE must be created.

l The 15-min performance monitoring must be started on the sink NE.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Select filtercriteria according to requirements.

Step 2 Select a desired OCh trail, click Maintenance , and select EAPE Management from the drop-down menu. The EAPE Management dialog box is displayed.

Step 3 If the Status is Can Be Adjusted, click Start Adjustment to start adjusting the EAPE.

NOTE

l When the adjustment is finished, Status changes to Adjustment Not Required.

l Status indicates the current adjustment status of the EAPE. The status can be Adjustment NotRequired, Can Be Adjusted, Being Adjusted, Unequalized, or Not Specified. Unequalizedindicates that the optical power received by the sink end exceeds the threshold or the received signaldegrades.

Step 4 Repeat Step 1 to 3 to start the reverse adjustment.

----End

3.2.5 Deleting EAPE ObjectsWhen you need to activate a trail or the EAPE function on the trail is not required, you canmanually delete the EAPE.

Prerequisitel You must be an NM user with "network operator" authority or higher.

l The EAPE must be created.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Select filtercriteria according to requirements.

Step 2 Select an OCh trail whose EAPE that you want to delete, click Maintenance, and select EAPEManagement from the drop-down menu. The EAPE Management dialog box is displayed.

Step 3 Click Delete to delete the EAPE objects on the trail.

----End

3.3 Managing Alarms on WDM TrailsYou can use the U2000 function of end-to-end trail management to manage the alarms generatedon WDM trails at the network layer.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-58 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 103: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.3.1 Viewing Current Alarms of a WDM TrailBy querying current alarms of a WDM trail, you can learn about faults on this trail to performmaintenance in a timely and effective manner.

3.3.2 Viewing History Alarms of a WDM TrailBy querying history alarms of a WDM trail, you can learn about history faults on this trail andprovide reference for maintenance of current faults.

3.3.3 Managing Networkwide WDM Alarm Trails in Real TimeThe U2000 can manage the networkwide WDM alarm trails in real time. It manages all theWDM trails that have current alarms. If an alarm ends, the related trail is automatically removedfrom the user interface.

3.3.1 Viewing Current Alarms of a WDM TrailBy querying current alarms of a WDM trail, you can learn about faults on this trail to performmaintenance in a timely and effective manner.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.l If you need to filter all the trails, click Filter All.l If you need to add to the list more trails that match the requirement, click Incremental

Filter.l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a desired trail, click Alarm, and choose Current Alarm from the drop-down menu.The current alarms on this trail are displayed in the window.

Step 4 Perform maintenance according to the current alarms reported on this trail.

----End

3.3.2 Viewing History Alarms of a WDM TrailBy querying history alarms of a WDM trail, you can learn about history faults on this trail andprovide reference for maintenance of current faults.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-59

Page 104: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

l If you need to filter all the trails, click Filter All.l If you need to add to the list more trails that match the requirement, click Incremental

Filter.l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a desired trail, click Alarm, and choose History Alarm from the drop-down menu.The history alarms on this trail are displayed in the window.

Step 4 Learn about the history alarms reported on this trail to provide reference for maintenance ofcurrent faults.

----End

3.3.3 Managing Networkwide WDM Alarm Trails in Real TimeThe U2000 can manage the networkwide WDM alarm trails in real time. It manages all theWDM trails that have current alarms. If an alarm ends, the related trail is automatically removedfrom the user interface.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l The license for trail management must be available.

ProcedureStep 1 Choose Fault > Service Minitoring > Real-Time Faulty WDM Trail Management from the

Main Menu.

Step 2 Set the trail filter criteria and click Filter All.

Step 3 In the Alarm Affected WDM Trails window displayed, the alarm affected WDM trails thatmeet the criteria are displayed.

Step 4 Optional: Right-click the title of a parameter column and set the trail attributes to be displayed.

Step 5 Choose Alarm. Select the corresponding command from the drop-down menu to query or setthe alarm data of each trail.

Step 6 Optional: To query the performance data of a trail, click Performance > BrowsePerformance.

Step 7 Optional: To print the trail information, click Print. To save the trail information, click SaveAs.

----End

3.4 Managing the Performance of WDM TrailsYou can use the network layer function of the U2000 to perform end-to-end performancemanagement on WDM trails.

3.4.1 Querying Current Performance of WDM TrailsYou can find out the running status of the service carried by the WDM trails by querying theperformance data.

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-60 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 105: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.4.2 Browsing the History Performance of WDM TrailsBy querying the history performance data of a WDM trail, you can learn about the running statusof the services carried on the trail in a specific period in the past and provide reference foranalyzing the current performance of this trail.

3.4.3 Setting Performance Monitoring Parameters of an WDM TrailPerformance monitoring keeps a detailed record of the performance of services over a trail,helping the maintenance engineer to monitor and analyze the states of services.

3.4.4 Setting WDM Trail Performance ThresholdIn this user interface, you can set performance thresholds based on a trail. Specifically, you canset the corresponding performance thresholds for the performance events and performance typeson the source and sink of a trail.

3.4.1 Querying Current Performance of WDM TrailsYou can find out the running status of the service carried by the WDM trails by querying theperformance data.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.l If you need to filter all the trails, click Filter All.l If you need to add to the list more trails that match the requirement, click Incremental

Filter.l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a trail, click Performance and select Browse Performance from the drop-down list.

Step 4 Click the 15-Minute Current Performance or 24-Hour Current Performance tab and querythe latest 15-minute or 24-hour performance data of the trail. Perform the maintenance operationaccording to the current performance events.

Step 5 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualifiedperformance events are displayed.

----End

3.4.2 Browsing the History Performance of WDM TrailsBy querying the history performance data of a WDM trail, you can learn about the running statusof the services carried on the trail in a specific period in the past and provide reference foranalyzing the current performance of this trail.

PrerequisiteYou must be an NM user with "network monitor" authority or higher.

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-61

Page 106: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and viewthe desired trails in the trail list.

l If you need to filter all the trails, click Filter All.

l If you need to add to the list more trails that match the requirement, click IncrementalFilter.

l If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a desired trail, click Performance and select Browse Performance from the drop-downlist.

Step 4 Click the 15-Minute History Performance or 24-Hour History Performance tab and viewthe history performance data.

Step 5 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualifiedperformance events are displayed.

----End

3.4.3 Setting Performance Monitoring Parameters of an WDM TrailPerformance monitoring keeps a detailed record of the performance of services over a trail,helping the maintenance engineer to monitor and analyze the states of services.

PrerequisiteYou must be an NM user with "network operator" authority or higher.

Procedure

Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click FilterAll.

NOTE

l Click Filter All to refresh and display all the qualified trails.

l Click Secondary Filter to filter the trails that are already displayed.

l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that arealready displayed.

Step 3 Select a trail. Click Performance and choose from the drop-down menu.

Step 4 In the dialog box displayed, select an monitored object, and set the monitor status and autoreporting status.

Step 5 Click Apply. In the Operation Result dialog box displayed, click Close.

----End

3 End-to-End WDM ManagementiManager U2000

Operation Guide for WDM End-to-End Management

3-62 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 107: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

3.4.4 Setting WDM Trail Performance ThresholdIn this user interface, you can set performance thresholds based on a trail. Specifically, you canset the corresponding performance thresholds for the performance events and performance typeson the source and sink of a trail.

Prerequisitel You must be an NM user with "network monitor" authority or higher.

l The trail must be created.

Procedure

Step 1 Select Service > WDM Trail > WDM Trail Management from the main menu.

Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click FilterAll.

NOTE

l Click Filter All to refresh and display all the qualified trails.

l Click Secondary Filter to filter the trails that are already displayed.

l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that arealready displayed.

Step 3 Select one or more trails. Click Performance and choose Performance Threshold from thedrop-down menu.

Step 4 In the Performance Threshold window, double-click Threshold Value to change theperformance threshold value.

----End

iManager U2000Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

3-63

Page 108: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)
Page 109: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

A Glossary and Abbreviations

Glossary and abbreviations are listed in an alphabetical order.

Numerics, A, B, C, D, E, F, G, H, I, L, M, N, O, P, Q, R, S, T, U, V, W, X

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-1

Page 110: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

A.1 Numerics2-channel Add/DropUnit

2-channel Add/Drop Unit

2xGigabit EthernetUnit

2xGigabit Ethernet Unit

32-channelDemultiplex Unit

32-channel Demultiplex Unit

32-channel MultiplexUnit

32-channel Multiplex Unit

40-channelDemultiplexing Unit

40-channel Demultiplexing Unit

40-channelMultiplexing Unit

40-channel Multiplexing Unit

40-channelMultiplexing Unit WithVOA

40-channel Multiplexing Unit With VOA

4xSTM-1/4 MultiplexOptical WavelengthConversion Board

4xSTM-1/4 Multiplex Optical Wavelength Conversion Board

A.2 AAccess Control List Access Control List (ACL) is a list of IP address. The addresses listed in the ACL are

used for authentication. If the ACL for the user is not null, it indicates that the addresswhere the user logged in is contained in the list.

ACE Adaptive Communication Environment.

ACL See Access Control List

Active/standbyswitching of cross-connect board

If there are two cross-connect boards on the SDH equipment, which are in hot back-uprelation of each other, the operation reliability is improved. When both the cross-connectboards are in position, the one inserted first is in the working status. Unplug the activeboard, the standby one will run in the working status automatically. When the activecross-connect board fails in self-test, the board is pulled out, the board power supplyfails or the board hardware operation fails, the standby cross-connect board canautomatically take the place of the active one. XC1, XC4, GTC, X16, X64, XCS, TXC,DTD, AXCS and STG boards all support active/standby switching.

Add/drop wave band A board like MB2 divides the wavelength resources into such fixed wavelength groupsas 1 - 4, 5 - 8 and 9 - 12, etc. A wavelength group is called a wave band, and a wave bandbearing the added/dropped services is called add/drop wave band.

Add/drop wavelength In the OADM equipment, the boards MR2, MR3, MR4, MR8 and MB2 bear thewavelength directly adding/dropping services.

ADM Add/Drop Multiplexer.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-2 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 111: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

AIS Alarm Indication Signal.

AIS insertion If there are excessive errors in a channel, AIS is inserted in this channel to indicate it isunavailable. For a line board, it can be set whether to insert AIS when there are excessiveerrors in the B1, B2 and B3 bytes. For tributary board at the E1/T1 level, it can be setwhether to insert AIS when there are excessive errors in BIP-2. For tributary board atthe E3 level or higher, it can be set whether to insert AIS when there are excessive errorsin the B3 byte.

Alarm A message reported when a fault is detected by a device or by the network managementsystem during the process of polling devices. Each alarm corresponds to a recoveryalarm. After a recovery alarm is received, the status of the corresponding alarm changesto cleared.

Alarm correlationanalysis

In case alarm2 is generated within five seconds after alarm1 is generated, and it complieswith the conditions defined in the alarm correlation analysis rule, you can either maskthe alarm or raise the level of alarm2 according to the behavior defined in the alarmcorrelation rule. Such a process is called alarm correlation analysis.

Alarm correlation rules It refers to the rule of processing alarm1 and alarm2 under certain conditions. Suchconditions are supported as follows:(1) Alarm1 and alarm2 occur on the same object;?(2) Alarm1 occurs in the service upstream of alarm2;? (3) Alarm1 occurs at the oppositeservice end of alarm2.? The following actions are supported at present:(1) Alarm1 masksalarm2;? (2) Raise the level of alarm2The alarm correlation rule is the basis for alarmcorrelation analysis, which affects the result of alarm correlation analysis. Set it withcaution.

Alarm filtering Alarms are detected and reported to the NMS system, and whether the alarm informationis displayed and saved is decided by the status of the alarm filter. An alarm with thefiltering status set to "Filter" is not displayed and saved on the NMS, but is monitoredon the NE.

Alarm hold-off time Alarm delay includes starting delay and stopping delay. An alarm is not regarded asbeing generated until the NE has been detecting it for a period of time, and this periodof time is the alarm start hold-off time; An alarm is not regarded as being ended untilthe NE has been detecting the ending of it for a period of time, and this period of timeis the alarm end hold-off time; Setting the hold-off time can avoid the generation ofunnecessary alarms due to misreport or jitter.

Alarm indication On the cabinet of an NE, there are three indicators with different colors indicating thecurrent status of the NE: Green indicator on: The NE is powered on; Red indicator on:A critical alarm is generated; Orange indicator on: A general alarm is generated. Youcan stop the NE alarm indication through the NMS.

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-3

Page 112: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Alarm inversion For the port that has already been configured but has no service, this function can beused to avoid generating relevant alarm information, thus preventing alarm interference.The alarm report condition of the NE port is related to the alarm inverse mode (notinverse, automatic recovery and manual recovery) setting of the NE and the alarminversion status (Enable and Disable) setting of the port. When the alarm inversion modeof NE is set to no inversion, alarms of the port will be reported as usual no matter whateverthe inversion status of the port is.? When the alarm inversion mode of the NE is set toautomatic recovery, and the alarm inversion state of the port is set to Enabled, then thealarm of the port will be suppressed. The alarm inversion status of the port willautomatically recover to "not inverse" after the alarm ends. For the port that has alreadybeen configured but not actually loaded with services, this function can be used to avoidgenerating relevant alarm information, thus preventing alarm interference.? When thealarm inverse mode of the NE is set as "not automatic recovery", if the alarm inversionstatus of the port is set as Enable, the alarm of the port will be reported.

Alarm inversion mode After the service is accessed or the fault is removed, whether the port is automaticallyrestored to the normal status depends on the alarm inversion mode of this NE. There arethree alarm inversion modes: normal, revertible and non-revertible.? (1) Automaticrestoration mode: If the NE alarm inversion mode is set to automatic restoration, afterthe NE port set to the inversion status accesses services or the fault is removed, it willbe restored to the normal status automatically and an event is reported;? (2) Manualrestoration mode: If the NE alarm inversion mode is set to manual restoration, after theNE port set to the inversion status accesses services or the fault is removed, it will notbe restored to the normal status automatically and manual restoration is required;? (3)Not-to-invert mode: If the NE alarm inversion mode is set to not-to-invert, how theinversion status of the NE port is set will not affect alarm reporting of this port.

Alarm mask Alarm mask means not monitoring the alarm event of a specific object.? The object heremay be the networkwide equipment, a specific NE, a specific board and even a specificfunctional module of a specific board.

Alarm severity Alarm severity is to identify the severity of an alarm or event. It is divided up into fourlevels: critical, major, minor, and warning alarm.

Alarm storing mode There are two modes for saving alarms: stop and wrap.? Under stop mode, new alarmswill be discarded when the alarm register in NE is full.? Under wrap mode, the earliestalarms will be deleted and new alarms will always be saved when the alarm register inNE is full.

alarm threshold When the bit error reaches a specific limit, the equipment will report an alarm. This limitis the bit error alarm threshold. The threshold can be divided into crossing threshold anddefect threshold.

Alarm type Classification of alarms with different attributes. There are six alarm types as following:Communication: alarm indication related with information transfer. Processing: alarmindication related with software or information processing Equipment: alarm indicationrelated with equipment fault Service: alarm indication related with QoS of the equipmentEnvironment: alarm related with the environment where the equipment resides, usuallygenerated by a sensor Security: alarm indication related with security

ALC See Automatic Level Control

ALC link The ALC link is a piece of end-to-end configuration information, which exists in theequipment (single station) as an ALC link node. Via the ALC function of each node, itfulfills optical power control on the line that contains the link.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-4 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 113: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

ALC node ALC functional unit, which corresponds to the equipment, achieves the ALC functionthrough the coordination among the VOA, WBA, SC1/SC2 and MS2 boards.

ALS See Automatic laser shutdown

AMI Alternate Mark Inversion.

AMI code Alternate Mark Inversion code.

APE Automatic Optical Power Equalization

APS Automatic Protection Switching.

ASN.1 Abstract Syntax Notation One.

ASON Automatically Switched Optical Network

Asynchronous transfermode

An electronic digital data transmission technology. In June 1992, ATM is designated bythe ITU-T as the transfer and switching mode for B-ISDNs. Because of its high flexibilityand support for multimedia services, ATM is considered as the key to implementingbroadband communications.

ATM See Asynchronous transfer mode

ATM protection group It refers to the logically bound ATM VP network/sub-network connections that sharethe same physical transmission channel. In the VP Group (VPG), a pair of VPconnections (working connection and its protective connection) is used for monitoringthe automatic protection switching, called monitoring connections (APS VPCs). If themonitoring connections switch over, the whole VPG will switch over to quicken theATM protection switching (as quick as the protection switching of the SDH layer.

Auto-negotiation The rate/work mode of the communication party set as self-negotiation is specifiedthrough negotiation according to the transmission rate of the opposite party.

Automatic alarmreport

Report the alarm to the NMS as soon as it is generated at the equipment side. The NMSpops up the alarm panel. The user can view this alarm information in the alarm panelwithout active query.

Automatic alarmsynchronization

The NMS can automatically acknowledge all unacknowledged alarms before thespecified days at 3:00 AM every day.? The ended alarm that has been acknowledgedwill become the history alarm. The user in the acknowledgement information is"Automatic Acknowledgment".

Automatic lasershutdown

Automatic laser shutdown means that automatic laser shutdown is permitted when theoptical interface board does not bear services or the optical fiber is faulty. Its service lifecan be prolonged by decreasing the on time of the laser. In shutdown period, the laserwill start automatically every other a period of time (off time) to test whether the line isnormal. In the laser shutdown period, the test function can be manually startedimmediately (by clicking ) without the off time. The NMS will test whether the serviceover the fiber is restored to normal. If yes, the laser will be turned on again and startsworking normally. If no, the laser will be shut down again after continuous light emittingafter a certain period of time (continuously on time). The on and off time of the laserduring automatic test can be set on the NMS .

Automatic LevelControl

Automatic Level Control. A technique (procedure) to automatically reduce the outputpower of optical amplifiers to avoid exposure to hazardous levels.

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-5

Page 114: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Automatic switching When a fault occurs to the line, the line board will detect SD (signal deterioration) or SF(signal failure) condition and then report it to the SCC board that will generate K byteand send it out via the line board according to APS protocol. The line boards of othernodes will report it to the SCC board after receiving K byte. Finally SCC board willspecify the switching status of the node according to protocol, and send command toXCS board to perform the switching of payloads. Fault restoration. After switchingrestoration time, this protection sub-network will switch to the working route and resumenormal working status.

AUX Auxiliary Equipment

A.3 BBER Basic Encoding Rules

Binding In virtual cascaded payload configuration, designating one bind number to identify theVC4s of the same virtual cascaded payload is called "bind". If a fault occurs to one ofthe bound services, all bound services will switch as a whole. The bind ID is of 1-24characters. On the same NE, the bind ID is unique. However, the bind IDs of the samevirtual cascaded payload on the passed NE can be different.

BIOS Basic Input/Output System

Bit error Bit error means that an error occurs to some bits in the digital code stream after beingreceived, judged, and regenerated, thus damaging the quality of the transmittedinformation.

BITS Building Integrated Timing Supply System

BML Business Management Layer

Bound path The VC Trunk refers to the 2M paths which are bound together to transmit the Ethernetdata. The VC Trunk is an entity between the Ethernet port and the 2M path. It isintroduced for the use of the routing and convergence functions in the future. Each ET1has eight Ethernet ports and each ET1 board can be configured with up to 16 VC Trunks.The number of VC12s assigned to each VC Trunk are configurable. As in the networkingapplication one ET1 board can provide 48 VC12s at most, one VC Trunk can beconfigured with up to 48 VC12s, with the corresponding bandwidth as 100M, of whichthe payload bandwidth is 90M. The specific configuration is dependent on the bandwidththat users need. On the same ET1 board, one VC12 can be assigned to only one VCTrunk.

Broadcast service The unidirectional services from one service source to multiple service sinks are calledthe broadcast service. Since the tone interface provided by the TDA board does notcontain such call and control signals as ringing current and signaling, it is only applicableto the semi-permanent connection between the equipment with the tone interface, eitherpoint-to-point private line connection or point-to-multipoint broadcast connection.Broadcast service is a wide application of the TDA board. For example, in a pagingcenter, the TDA board is adopted to sent the signals to the TDA boards of other stationsvia fibers, and send the received signals to the wireless paging transmitters for furthertransmission.

BWS Backbone WDM System

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-6 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 115: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

A.4 CCAR Committed Access Rate

CC Continuity Check

CDE Common Desktop Environment

Charging zone The time zone between the start time and end time of charging.

Class of Service Class of Service. CoS keeps the priority mapping rules. It works in internal ports,especially when there is congestion, CoS is even more important. The services atdifferent levels are processed according to the corresponding priorities. The service withhigher priority is processed first and the service with lower priority is discarded whenthe bandwidth is insufficient.

Client mode The login mode of a client, which includes the single-user mode and multi-user mode.By default, the login mode is the multi-user mode.

Concentrated routingEthernet trail

It means that several SDH end-to-end trails (such as VC12, VC3, VC4, cascade service,etc) transporting Ethernet services have the same server trail.

Configuration data It refers to the data that configures the NE hardware for coordination between this NEand other NEs in the entire network and operation of specified services. Configurationdata is the instruction file of NEs, and it is the key for efficient network running.? Thetypical configuration data includes board configuration, clock configuration andprotection relationship.

CORBA Common Object Request Broker Architecture.

CoS See Class of Service

CRC Cyclic Redundancy Check.

CRC Cyclic Redundancy Code.

Current alarm An alarm that is uncleared and unacknowledged, uncleared but acknowledged, or clearedbut unacknowledged.

Current performancedata

For each performance parameter of each performance monitoring entity, the NE providestwo types of registers:(1) 15-minute register: Accumulates the performance event datawithin 15 minutes;? (2)24-hour register: Accumulates the performance event data within24 hours Each type of register can be further divided as follows:(1) Current register: Thecurrent 15-minute register or current 24-hour register (only one for each) is applied tocollect the performance data in the current monitoring period. It changed within themonitor period.? (2) History register: The 15-minute history register (16 pieces) or 24-hour history register (6 pieces) is a first-in-first-out queue. If the history registers are full,the register storing the earliest history data will be overwritten.? The performance datastored in the current register is called current performance data.

Custom View A subset of the main topology view, which contains network entities such as NEs, theNMS or submaps. The network administrator needs to customize custom views and selectmanaged network entities from the main topology view.

CWDM Coarse Wavelength Division Multiplexing

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-7

Page 116: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

A.5 DD32 32-channel Demultiplex Unit

D40 40-channel Demultiplexing Unit

Data CommunicationChannel

Data Communications Channel. The data channel that uses the D1-D12 bytes in theoverhead of an STM-N signal to transmit information on operation, management,maintenance and provision (OAM&P) between NEs. The DCC channels that arecomposed of bytes D1-D3 is referred to as the 192 kbit/s DCC-R channel. The otherDCC channel that are composed of bytes D4-D12 is referred to as the 576 kbit/s DCC-M channel.

Data interface service The data interface service works in point-to-point mode. The service that uses the F1byte or some undefined bytes to transmit information such as call charge, networkmanagement system information and power supply monitoring.

Data on NE It is the NE configuration data saved on the SCC board of the OptiX equipment, whichcan be uploaded on the NMS and then saved in the NMS.

DCC See Data Communication Channel

DCN Data Communication Network.

DDF Digital Distribution Frame

DDN Digital Data Network.

Delete protection sub-network at networklayer

Delete the association between the logical systems of the protection sub-network and theNE . After deletion, such functions as deleting optical fiber and re-uploading NE dataare available. The command is not sent to NE and has no effect on the service. Afterconfiguring, search the protection sub-network again, and then search the trail in the trailview to create the original service.

Delete protection sub-network on NE side

Delete the logical systems of the protection sub-network and the NE and delete all therelated services.? A deleted protection sub-network cannot be restored but can bereestablished.

Delete SDH NNI atnetwork layer

After successfully deleting it, the SDH NNI becomes an isolated node and has no effecton service. After creating the isolated node as SDH NNI again, the SDH NNI can befound again in the trail view.

Delete SDH NNI on NEside

Delete the SDH NNI and all its service directly, and can not resume them later.

Device set It is an aggregate of multiple managed equipments.? Device set facilitates the authoritymanagement on devices in the management domain of the NMS. If some operationauthorities over one device set are assigned to a user (user group), these operationauthorities over all devices of the device set are assigned to the user (user group), thuseliminating the need to set the operation authorities over these devices respectively. It issuggested to design device set according to such criteria as geographical region, networklevel, device type, etc.

DGE Dynamic Gain Equalizer

Discrete service The cross-connection that exists on an NE but cannot form trails on the networkmanagement system.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-8 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 117: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Disk Mirroring A procedure that involves duplicating data from a NetWare partition on one hard diskto the NetWare partition on another disk. Disk mirroring pairs multiple hard disks on thesame channel, and like disk duplexing, writes data to both the original and secondarydisk. If the original disk fails, the secondary disk automatically takes over. Disk mirroringcannot protect against failures that occur along the channel between the disks and theNetWare server, because the duplicate disks exist on the same channel.

Dispersed routingEthernet trail

It means that several SDH end-to-end trails (such as VC12, VC3, VC4, cascade service,etc) transporting the Ethernet service have different server trails.

Division as per VC4 Division as per VC4 means that different timeslots in a fiber belong to different protectionsub-networks. Assign timeslots, as per VC4, into different protection sub-networks. Itfunctions to implement virtual optical path protection. It means that some of the VC4sover the fiber can be put into one protection sub-network.? For example, in an STM-16fiber, the 1st to 4th VC4s belong to an STM-4 unprotected ring, while the 5th to 8thVC4s belong to another unprotected link.

DNI Dual Node Interconnection

DNI Dual node interconnection is an architecture between two rings where two nodes in eachring are interconnected. The two interconnections between the two rings can be arrangedto provide protection of the traffic crossing from one ring to the other. The servicebetween ring networks can be classified into the Single Node Interconnection (SNI)mode and the dual node interconnection (DNI) mode. The former can be protected inline protection mode. However, in this mode, protection is only valid for fiber and opticaltransmitting/receiving ports, and protection fails in the case of interconnection nodefailure. In the latter mode, specific regulations on the protection mode for the inter-ringservice are made in G.? 842 Recommendation. It regulates the protection modes of thetwo interconnection nodes both on a MSP ring or a PP ring, therefore, by adopting therecommended protection modes, the protection of the interconnecting service betweentwo ring networks composed of the devices of different manufacturers and in differentprotection modes can be realized. Moreover, in case of fiber failure or node failure,services can also be protected

DPC Destination (signalling) Point Code

DRDB Dynamic Random Database

DS-n Digital Signal, Level n

DSE Dispersion Slope Equalizer

DWDM Dense Wavelength Division Multiplexing

A.6 EEGT Gigabit Ethernet Transparent Transmission Board

EML Element Management Layer.

EMS Element Management System.

Environment MonitorUnit

As one type of power and environment monitoring unit, EMU is installed on the top ofthe equipment cabinet to monitor the environment variables, such as the power supplyand temperature. With external signal input through the relay, fire alarm, smoke alarm,burglary alarm, etc. can be monitored as well. With the display on NMS system, thechange of environment can be monitored timely and accurately.

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-9

Page 118: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

EPL Ethernet Private Line

EPLAN Ethernet Private LAN

ESCON Enterprise System Connection

ET1 board The ET1 (Ethernet Transparent Transmission Unit) has eight 10M/100M standardEthernet interfaces (in compliance with the IEEE 802.? 3 recommendation). Itsapplications are as follows:(1) The ET1 board can map the Ethernet frames of 1 to 810/100Base-T ports into 1 to 48 2Ms.? Where, each network port can also be mappedinto 1 to 48 2Ms.? The ET1 board can perform bandwidth separation and managementfor users in VLAN mode. In this way, different users can be differentiated in the same10M/100M signal so as to manage the bandwidth. Besides, the VLAN-based portbandwidth sharing and statistical multiplexing can be realized.? (3) As the Ethernetframes are mapped into N 2Ms (N=<48) and transmitted in the same point-to-point modeas the SDH, the protection capability of the SDH can be fully used. The board attributesinclude tributary loopback, path protection, path impedance, retiming work mode, SXTwork mode, path service type, code pattern, path phase lock, input type equalization, to-be-sent J2, to-be-received J2, ser

Ethernet end-to-endtrail

It is the MAC port to MAC port Ethernet service transparent transport trail provided bymultiple SDH end-to-end trails (such as VC12, VC3, VC4, cascade service, etc).

Ethernet interfaceboard

The processing board and wire led-out board are separated in the Ethernet interface unit.Therefore, when different interfaces are needed, if the 100M optical interface is to beused or more network interfaces are to be added for example , now it only needs to replaceor add the corresponding wire led-out board. It not only saves costs for users but alsofacilitates the upgrade and maintenance.? The ET1 board has two types of interfaceboards: ETF4 and EFF4. As the Ethernet service outlet board of the Ethernet transparenttransmission interface unit, they have the following functions: 1. Support the access offour 10/100Base-T Ethernet services (ETF4 board); Support the port self-adaptationfunction; Support port full duplex and half duplex; 2. Support the access of four 100Base-FX Ethernet services (EFF4 board); Provides the single-mode/multimode opticalinterface; Support the automatic shutdown function of multimode optical interface.

EVPL Ethernet Virtual Private Line

EVPLAN Ethernet Virtual Private LAN

Exercise switching Exercise switching is used to test whether a switching protocol can work normally andno switching operation is really conducted.

Exerciser - Ring This command exercises ring protection switching of the requested channel withoutcompleting the actual bridge and switch. The command is issued and the responses arechecked, but no working traffic is affected.

Exerciser - Span This command exercises span protection of the requested channel without completingthe actual bridge and switch. The command is issued and the responses are checked, butno working traffic is affected.

Extended IP address ofNE

It is the serial number of a sub-network where an NE resides, which is usually used todistinguish different network segments in a WAN. An extended ID and an ID form thephysical ID of an NE.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-10 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 119: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Extended protectionsubnet

An unprotected chain like ADM-ADM-TM or ADM-ADM-ADM. The end-point NEsof a link is of the ADM type. As this type of protection subnetwork can be extended, wename it extended protection subnetwork. For a chain protection sub-network, the logicalsystems at the two ends should be configured as TM, with only the one in the middleconfigured as ADM. But in the process of practical engineering installation, thenetworking equipments at the bottom layer may arrive in different batches. Thus the partof no protection line is not available, but the service on it needs activating graduallyduring project building.? Then, another protection sub-network is needed to support theincomplete protection sub-network. As it is can be extended, we name it extendedprotection sub-network. The NMS can support searching for it, deleting it and deletingit from network layer but creating it. When the new equipment arrive, the user shoulddelete it from network level and search for protection sub-network and trail once more.

A.7 FF1 byte It is the user path byte, which is reserved for the user but usually it is special for network

providers. It is mainly used to provide the temporary data/voice path for specialmaintenance Objectives. It belongs to the regenerator section overhead byte.

F2, F3 bytes They are the path user channel bytes. These two bytes provide the user with thecommunication between path units related to payload. They belong to the higher orderpath overhead byte.

FCAPS Fault Management,Configuration Management,Accounting Management,PerformanceManagement,Security Management

FD Frequency Diversity

FDB Flash Database

FEC Forward Error Correction

fiber/cable Fiber & Cable is the general name of optical fiber and cable. It refers to the physicalentities that connect the transmission equipment, carry transmission objects (userinformation and network management information) and perform transmission functionin the transmission network. The optical fiber transmits optical signal, while the cabletransmits electrical signal.? The fiber/cable between NEs represents the optical fiberconnection or cable connection between NEs. The fiber/cable between SDH NEsrepresents the connection relation between NEs. At this time, the fiber/cable is of opticalfiber type.

File Transfer Protocol A very common method of moving files between two Internet sites. FTP is a special wayto log in to another Internet site for the purposes of retrieving or sending files. There aremany Internet sites that have established publicly accessible repositories of material thatcan be obtained using FTP.

Forced switch This function forces the service to switch from the working channel to the protectionchannel, with the service not to be restored automatically. This switch occurs regardlessof the state of the protection channels or boards, unless the protection channels or boardsare satisfying a higher priority bridge request.

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-11

Page 120: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Forecast laserperformance

It is to forecast the laser performance within a certain period of time on the basis of thecollected laser performance data and according to a certain performance model so thatyou can replace the laser in time if necessary.? The forecast can be roughly divided intotwo types: 1. Forecast the bias current, input optical power and output optical power ata moment in future; 2. Forecast the period of time which is taken for the bias current,input optical power and output optical power to reach the specified value.

FTP See File Transfer Protocol

Full duplex The system that can transmit information in both directions on a communication link.Onthe communication link, both parties can send and receive data at the same time.

Full mode In the full searching mode, all the trail information at the NM side will be deleted first(but the service configuration information of respective NEs is saved at the NM side).Then the service configuration information of respective NEs at the NM side is re-searched to form the trail information in the network.

Full search In the full search mode, all the trail information on the NM side will be deleted first (Onlythe trail information at the network layer on the NM side are deleted, while the serviceconfiguration information of NE in NE layer on the NM side and on the NE side stillremain). Then the service configuration information of respective NEs in the NE layeron the NM side is re-searched to form the trail information in the network layer on theNM side.

A.8 GGateway ID A gateway ID refers to the ID of an NES serving as a gateway.

Gateway NE Gateway NE refers to the NE that communicates with the NMS via Ethernet or serialport line. The non-gateway NE communicates with the gateway NE via ECC andcommunicates with the NMS via the gateway NE. The gateway NE is a communicationroute that the NMS must pass through when managing the entire network. Thecommunication status between the gateway NE and the NMS can be:(1) Normal: Thecurrent communication is efficient;? (2) Connecting: The destination gateway responds,and the communication is interrupted but is being connected;? (3) Disconnected: Thedestination gateway does not respond (Maybe the network cable is disconnected or notwithin the same network segment), and the communication is unreachable or the gatewayis disabled manually.

GCM Global Cluster Manager

GE Gigabit Ethernet.

GNE Gate Network Element

GUI Graphical User Interface.

A.9 HHA High Availability.

Half duplex On the communication link, only one party can send data, while the other party can onlyreceive data.

History Alarm An alarm that is acknowledged and cleared.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-12 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 121: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

History performancedata

For each performance parameter of each performance monitoring entity, the NE providestwo types of registers:(1) 15-minute register: accumulating the performance event datawithin 15 minutes;? (2) 24-hour register: accumulating the performance event data within24 hours.? Each type of register can be further divided as follows:(2) Current register:The current 15-minute register or current 24-hour register (only one for each) is appliedto collect the performance data in the current monitoring period. It changes within themonitor period.? (2) History register: The 15-minute history register (16 pieces) or 24-hour history register (6 pieces) is a first-in-first-out queue. If the history registers are full,the register storing the earliest history data will be overwritten.? The performance datastored in the history register and the auto-report performance data saved on the NM arecalled history performance data in a unified way.

Hotline phone The hotline phone number can be called immediately by picking up only, but not bydialing.

HSB Hot-Standby

HTTP Hyper-Text Transmission Protocol

A.10 IIdle resource opticalNE

When the NMS is started successfully, an NE icon called "Idle ONE" will be displayedon the topological view.? In this NE, the subracks and boards that are not divided to otheroptical NEs (such as OTM, OADM and other NEs) are retained. In this NE, idle DWDMsubracks and boards are reserved, which can be distributed to other ONEs. Double-clickthe NE icon to view all the currently idle DWDM subracks or boards in the network.

IGMP Internet Group Management Protocol.

IMA Inverse Multiplexing for ATM.

iMAP Integrated Management Application Platform.

Incremental filteringtrail

In this search mode, the network management system first reserves the trail data of thecurrent client and then re-searches the service configuration data of respective NEs onthe network management system according to the newly given search condition to formthe new trail data and combine it with the original trail data to get the result.

Incremental mode The incremental mode means to compare the trail information of the NM side with theservice configuration information of respective NEs at the NMS side. If inconsistent, thetrail information will be fed back into the list as an "Inconsistent Trail". When the userhas deleted the inconsistent trail information, the system will re-search for the serviceconfiguration information of the NMS side which has not formed the trail information.

Incremental search The increment search mode means to compare the trail information in network layer onthe NMS side with the service configuration information of respective NEs on the NMSside. If they are inconsistent, the trail information will be fed back into the list as an"Inconsistent Trail". When the user has deleted the inconsistent trail information, thesystem will re-search for the service configuration information that has not formed thetrail in the NE layer on the NMS side.

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-13

Page 122: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Inter-boardwavelength pathprotection

The optical wavelength inter-board channel protection is mainly implemented by theSCC judging the alarm report in the line of the wavelength conversion board to turn offthe laser in the tributary of the board. The dual fed is implemented by adding a passiveoptical splitter to the tributary. The signal selection is implemented by the SCC turningoff the laser in the tributary with poorer signal quality according to the signal quality ofthe lines of two wavelength conversion boards, and letting the channel of light withhigher quality pass through the coupler. The coupler is also a passive device and onlyone channel of light can pass through it. If there are two channels of light passing throughthe coupler, they will interfere each other that would cause bit error to the service.Therefore, it is necessary to ensure that only the channel of light with higher quality passthrough the coupler at a destined time.

Intermediate office It refers to the equipment used for optical fiber management and dispatch in themetropolitan area. It has multiple pairs of interfaces for the optical fiber connection.Every two interfaces in a pair are connected with each other to form a longer physicaloptical fiber path. The physical optical fiber path connecting the transmission equipmentcan comprise two or more sections of optical fiber cascaded via the intermediate office.There is an intermediate office information list for some fiber & cable connections, whichshows the section information about the fiber & cable.

Intra-Board opticalwavelength pathprotection

The intra-board optical wavelength path protection is mainly implemented by thewavelength conversion board with dual fed and signal selection function. The dual fedis implemented by the optical divider inside the board, while the signal selection isimplemented by the board turning off the laser of one of the receiving optical interfaces.Therefore, this protection mode is also called optical wavelength intra-board channelprotection. The switching in this protection mode can be completed within a short time,but the services must be interrupted during the maintenance of the damaged boards ordevices. Therefore this protection mode will have a relatively lower reliability.

ION Intelligent Optical Network

IP Internet Protocol.

IP address In the TCP/IP protocol, it is used to uniquely identify the 32-bit address of thecommunication port, An IP address consists of a network ID and a unique host ID. AnIP address consists of the decimal values of its eight bytes, separated with periods; forexample,192.168.7.27.

IPA Intelligent Power Adjustment

ISDN Integrated Services Digital Network.

Isolated node A type of special NE or an optical port on an NE. An isolated node does not refer to anisolated NE, instead, it refers to a type of special logical system which does not belongto any protection sub-network or SDH NNI.? It is the node that has been configured onthe NE side but cannot form (or has not formed) a corresponding protection sub-networkwith other nodes. This node may be either an NE or a logical system on the NE.? Anisolated node may be formed when:(1) There is something wrong with the configurationinformation of the NE side;? (2) The fiber/cable connected to this node has not beencreated on the NMS.? The sub-network where this node resides is of unprotected type.

ITL Interleaver Unit

ITU-T International Telecommunication Union-Telecommunication Standardization Sector

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-14 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 123: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

A.11 LLAN Local Area Network.

LCAS Link Capacity Adjustment Scheme

LCD Liquid Crystal Display

LCT Local Craft Terminal

LDG 2xGigabit Ethernet Unit

LLID Locate Loopback ID

Lock NE login This function prohibits the users at lower levels from logging in NE and forces loggedNE users with lower level to log out.

Lock NE setting It is to divide the NE into the configuration module, alarm module, performance moduleand other modules.? You can lock the setting function of these modules, disabling otherNM clients from setting the locked modules.

Lock status Services are not switched to the protection board or channel when a fault occurs, ifcurrently no switching takes place. If currently the switching takes place, after theworking board or channel recovers to normal, the services are not switched back to theworking board or channel.

Lock Switching When the switching condition is satisfied, this function disables the service from beingswitched from the working channel to the protection channel. When the service has beenswitched, the function enables the service to be restored from the protection channel tothe working channel.

Logical system relation It is to set the logical protection relation of two linear multiplex section types. NE logicalsystems and their logical protection relation will be generated when defining the NElogical system relation

LOS Loss Of Signal

LPT Link-state Pass Through

LQS 4xSTM-1/4 Multiplex Optical Wavelength Conversion Board

LSP Label Switching Path

LWC STM-16 Line Wavelength Conversion Unit

LWF STM-64 Transmit-receive Line Wavelength Conversion Unit With FEC

LWM Multirate Optical Wavelength Conversion Unit

LWS STM-64 Transmit-receive Line Wavelength Conversion Unit With FEC

LWX Arbitrary Bit Rate Wavelength Conversion Unit

A.12 MM32 32-channel Multiplex Unit

M40 40-channel Multiplexing Unit

MAC port Media Access Control, that is a media access control port, such as the 8 ports of ET1.

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-15

Page 124: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Manual switching When the protection channel is efficient and there is no higher-level switching request,services are manually switched from the working channel to the protection channel, thustesting whether the network still has the protection capability.

Masking status Under suppression status, NE will not monitor the corresponding alarm conditions andthe alarm will not occur even when the alarm conditions are met.

MB2 Bandpass Filter Expandable 2-Channel Optical Add/Drop Multiplexing Board

MCA Multi-channel Spectrum Analyzer Unit

MDB Memory Database

MDI Medium Dependent Interface

MDP Message Dispatch Process

Mgr Manager

MIB Management Information Base.

MML Man-Machine Language.

MO Managed Object.

MODEM MOdulator-DEModulator.

MOIT Managed Object Instance Tree.

MON Monitor

MP port A logical port which achieves transparent transmission of the MAC service over SDH,for example, the 16 ports of the ET1.

MPLS Multi-Protocol Label Switching

MR2 2-channel Add/Drop Unit

MS Multiplex Section

MS node The WDM network node that has the spectrum analysis unit in the link for which theALC function is configured. The node is unique on the ALC link.

MSP See Multiplex section protection

MTBF Mean Time Between Failures.

MTTR Mean Time to Recovery.

Multi-trail protectionservice

It is a protection mode in which multiple services with different trails but with the samesink protect an important service with the same sink.? This protection mode supportsprotecting important services through non-optical network trails, such as microwave. Itpresently supports that three protection trails protect one service trail.? At the trail sink,it monitors the quality of protection trail signals and protects important servicesaccording to the priority and the signal quality.? The most significant characteristic ofthe multi-service protection trail is: Flexible networking. It supports either the protectiontrail passing the line board or the protection trail passing the tributary board.? It supportsthe trails other than the optical ones, for example, a microwave trail, to provideprotection.

Multiplex sectionprotection

The nodes online achieve protection switching through the K1 and K2 bytes in themultiplex section,? including linear 1+1 MS protection switching link, linear 1:n MSprotection switching link, dedicated MS protection ring and shared MS protection ring.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-16 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 125: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

A.13 NNE See Network Element

NE database There are three types of database on NE SCC board as following:(1) DRDB: a dynamicdatabase in a dynamic RAM, powered by battery;? (2) SDB: a static database in a power-down RAM;? (3) FDB0, FDB0: permanently saved databases in a Flash ROM.? Inefficient operation, the NE configuration data is saved in DRDB and SDB at the sametime.? Backing up an NE database means backing up the NE configuration data fromSDB to FDB0 and FDB1.? When an NE is restarted after power-down, the NE databaseis restored in the following procedures: As the SDB data is lost due to power-down, themain control restores the data first from DRDB.? If the data in DRDB is also lost due tothe exhaustion of the battery, the data is restored from FDB0 or FDB1.

NE ID In a network, each NE corresponds to a unique identifier, The NM uses NE ID, in aninterface or a database, to identify various NEs in a network.

NE layer data on NM It is the NE configuration data saved in the NM database. Consistency between the dataon the NM side and that on the NE side is the precondition of efficient running of thetransmission equipment.? If there is any data on the NE side, the NMS can save suchdata in the NE layer on the NM side through the upload function, thus forming the NElayer data on the NM side.? If there is no data on the NE side, the NMS can send the NElayer data on the NM side through the upload function, thus forming the data on the NEside.? Meanwhile, the NE layer data on the NM side is one of the important data sourcesof the network layer data on the NM side.

NE side The NE configuration data saved on the SCC board of the equipment, which can beuploaded to the network management system and then stored in databases on the networkmanagement system NE side.

NEL Network Element Level

Network Element It is the network element, including the hardware unit and the software running on it.Usually, one NE has at least SCC (System Control & Communication Unit) board whichresponsible for the management and monitoring of the NE. The host software runs onthe SCC board.

Network entity Network entity refers to the universal basic devices used to describe the functions andstructure of the transmission network, which considerably facilitates the description ofthe network. The network entities include transmission object and sub-network.

Network layer data onNM

It is the network configuration data saved in the NM database and is the data source forthe network function of the NMS.? The network layer data on the NM side includes threeparts: fiber connection data, protection sub-network and SDH NNI data and trailinformation.

Network NodeInterface

Network Node Interface. The interface at a network node which is used to interconnectwith another network node. See also NNI.

NM Network Management

NML Network Management Layer

NMS Network Management System.

NNI See Network Node Interface

NSAP Network Service Access Point

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-17

Page 126: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

NTP Network Time Protocol

Number of routescalculating

Usually,the NMS can work out multiple trails which comply with the requirementsaccording to the route restriction. The user can select one of them. The number selectedhere is the maximum number of optional routes which is worked out by the NMS .

A.14 OOA Optical Amplifier

OADM Optical Add/Drop Multiplexer

OAM Operations, Administration, and Maintenance

OAMS Optical fiber line Automatic Monitoring System

OAU Optical Amplifier Unit

OBU Optical Booster Board

OCH Optical Channel

OCP Optical Channel Protection

OD Optical Demultiplexing

ODU Optical Demultiplexing Unit

ODUk Optical Channel Data Unit-k

OEQ Optical Equalizer

Office To facilitate management and show the actual physical relation of the equipment, all theNEs in respective actual transmission equipment rooms are grouped into offices.

OIF Optical Internetworking Forum

OLA Optical Line Amplifier

OLP Optical Line Protection

OM Optical Multiplexing

OMS Optical Multiplexing Section

OMU Optical Multiplexer Unit

ONE Optical Network Element

Operation set A collection of multiple client operations. Operation set facilitates authority managementin the NMS system. Since different client operations have different influences on systemsecurity, the operations with similar influence on system security are added in anoperation set. In this way, if the authority in this operation set is assigned to a user (usergroup), the user (user group) will have the authority of all operations in the operationset.? The NMS has a default operation set. If the default operation can not meet therequirement for authority assignment, the user can create a new one.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-18 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 127: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Optical NE Optical Network Element (ONE) is the transport entity that implements the NE functions(terminal multiplexing, add/drop multiplexing, cross-connection and regeneration) in aDWDM layer network. The types of ONEs include OTM, OADM, OLA, REG and OXC.The locating of an ONE is equivalent to that of a common NE.? In a view, an ONE isdisplayed with an icon, like a common NE and its alarm status can be displayed withcolors. Logically, an ONE consists of different subracks.? Like a common NE, an ONEcannot be expanded or entered like a sub-network.? Similar to a common NE, an ONEprovides a list of the subracks that form the NE to display the board layout.

Optical supervisorychannel

Optical Supervision Channel is an independent optical channel in the DWDM system,which achieves the management function similar to the frame overhead bytes in the SDHsystem.? Optical monitor channel features independence of traffic channel.? In theoptical signal transmission direction, the optical signals of the supervisory channel andthe multiplexed and amplified optical signals of the service channel are converged to thebackbone transmission fiber. In the optical signal receiving direction, the optical signalsof the supervisory channel are split first and then the service channel is preamplified anddemultiplexed.? Therefore, in DWDM transmission system the monitor channel opticalsignals are not amplified, but they are terminated and regenerated at each site. Howeverthe service channel optical signals are on the contrary. They are amplified many timesduring the transmission, but they are not terminated or regenerated.

Optical trail It is the end-to-end optical wavelength. After creating the fiber/cable among the DWDMequipments, the optical trails OCH, OTS and OMS are available at the same time, soyou do not need to create/search for any more optical trail.

OPUk Optical Channel Payload Unit-k

Orderwire break-in The called party in communication receives the call prompt (BB tone) of the third party,he can directly press the "#" key to clear the line currently in communication and thenestablish the communication with the break-in party. The phone with the forced break-in authority can be used to break in the phone forcedly by dialing "# + phone number".Orderwire authorized break-in cannot be done unless no hotline or private telephone isset on the corresponding Phone port.

OSC Optical Supervisory Channel

OSC board The SC1 or SC2 board, which is responsible for ALC protocol byte processing.

OSF Operation System Function

OSI Open Systems Interconnection.

OSN Optical Switch Node

OSNR Optical Signal to Noise Ratio

OTDR Optical Time-Domain Reflectometer

OTM Optical Terminal Multiplexer

OTN Optical Trassmission Network

OTS Optical Transmission Section

OTU Optical Transponder Unit

OTUk Optical Channel Transport Unit-k

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-19

Page 128: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

A.15 PP2P Point To Point

PC Personal Computer

PDH Plesiochronous Digital Hierarchy

PE Provider Edge.

Performance register Performance register is the memory space for performance event counts, including 15-min current performance register, 24-hour current performance register, 15-min historyperformance register, 24-hour history performance register, UAT register and CSESregister. The object of performance event monitoring is the board functional module, soevery board functional module has a performance register. A performance register isused to count the performance events taking place within a period of operation time, soas to evaluate the quality of operation from the angle of statistics.

Performance threshold Performance events usually have upper and lower thresholds. When the performanceevent count value exceeds the upper threshold, a performance threshold-crossing eventis generated; when the performance event count value is below the upper threshold fora period of time, the performance threshold-crossing event is ended. In this way,performance jitter caused by some sudden events can be shielded. A few performanceevents only have one threshold, which is the special case that upper threshold and lowerthreshold are equal.

PM Performance Monitoring

PMU See Power Monitor Unit

Port inversion It is to set port alarm monitoring as contrary to the practical situation. If an alarm israised, it is reported normally. This function applies to a port configured with but notloaded with services to prevent the generation of any meaningless alarm that willinterfere with alarm analysis.

Power andenvironmentmonitoring unit

The power and environment monitoring unit is installed at the top of the cabinet of theSDH equipment and is used to monitor the environment variables, such as the powersupply and temperature. With external signal input through the relay, fire alarm, smokealarm, burglary alarm, etc. can be monitored as well. With the display on NMS system,the change of environment can be monitored timely and accurately. For the equipmentinstalled with a power & environment monitoring board, the following parameters canbe set: relay switch output control, temperature alarm threshold, relay usage and alarmsetting, query of DIP switch status, etc.

Power Monitor Unit As one type of power and environment monitoring unit, PMU (short for PowerMonitoring Unit) is installed on the OptiX 155/622B, the OptiX 155/622, the OptiX2500, the OptiX 2500+, the OptiX BWS 320G NE, and the OptiX 10G(Metro 5000).

Private line Both communication parties are connected permanently.

Protection strategy In case the service route provides multiple service protections, different protectionstrategies can be selected as required. Protection strategy refers to the protection modegiven the priority in use for the trail: protection, no protection, and extra traffic. Of theabove, the protection preference is divided into trail protection and sub-networkconnection protection.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-20 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 129: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Protection sub-network In the NMS, the protection sub-network becomes a concept of network level other thanmultiplex section rings or path protection ringsin the original NES or RMS+ NMS. Theprotection sub-network involves NEs and fiber/cable connections. In other words, theresources that form a protection sub-network include NEs and fiber/cable. Only after theNE is created, the basic configurations for the NE is done and the fiber & cableconnections among NEs are correctly set up, enough resources can be available for thecreation of a protection sub-network. These are the preconditions for creating a protectionsub-network. From the viewpoint of logical system, the creation of the protection sub-network actually means that corresponding logical system is configured for each NE bymeans of creating the protection sub-network, the optical interfaces (or VC4) of eachboard are mapped into the logical system, and then these independent logical systemsare connected with one another to form a complete network structure.

Protocol controllerstatus

Start or stop status of the protocol controller of the protection sub-network, includingsuch statuses as not started, protocol start, protocol is starting, part start.

Prototype trail The prototype trail is the server layer trail, and those listed are all server layer trails thatsatisfy the source/sink and board conditions. If the centralized route has been selectedin the first step, only one prototype trail needs to be selected here. The system willautomatically find out other trails whose routes are consistent with the selected prototypetrail, and If the amount found can not meet the bandwidth requirement, the system willautomatically copy the prototype trail. If the separated route has been selected in the firststep, prototype trails as many as the number of bandwidths should be selected.

PSTN Public Switched Telephone Network.

PVP Permanent Virtual Path.

PW Pseudo Wire

PWE3 Pseudo-Wire Edge-to-Edge

A.16 QQoS Quality of Service.

A.17 RRAS Remote Access Server

RDMS Relational Database Management System

Remote NetworkMonitoring (RMON)

A manage information base (MIB) defined by the Internet Engineering Task Force(IETF). RMON is mainly used to monitor the data flow of one network segment or theentire network.

RES Resume

Resource sharing Resource sharing means that a physical resource may belong to two protection sub-networks.

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-21

Page 130: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Route The IP route selection is in table driving mode. In each host and each router of the Internet,there is a routing table that contains information about how the service is transmittedfrom the source to the sink, providing a basis for route selection.? Ethernet static routingin ET1 refers to the mapping relationship between the Ethernet port and the bound path.?Its routing type includes port routing and VLAN routing.? Port routing: It meansconfiguring a route between the Ethernet port and the bound path port, which is usuallyused for point-to-point networking communication;? VLAN routing: It meansconfiguring a route between the Ethernet port and the bound path port based on the VLANservice. It can be used flexibly in point-to-point, point-to-multipoint or multipoint-to-multipoint communication. The implementation is to divide and converge the data streamaccording to the VLAN flag of the packet. As a VLAN flag can be added to the Ethernetport, the equipment can be applied more flexibly.

Route restriction The constraint conditions for calculating a route. When creating a trail, the user canspecify the explicit route and the NEs that the trail cannot pass. The explicit route andthe NEs are the constraints for calculating the route. The inevitable trail only functionswhen the number of routes is calculated as 1. Double-click the NE icon can set the NEas an NE that cannot be passed, and double-clicking it again can cancel the setting.

RPR Resilient Packet Ring.

RS Regenerator Section

RS232 The 25-pin interface standard that is defined by EIA. In the asynchronous transfer modeand there is no hand-shaking signal. It can communicate with RS232 and RS422 of otherstations in point-to-point mode and the transmission is transparent. Its highest speed is19. 2 kbit/s.

RS422 The specification that defines the electrical characteristics of balanced voltage digitalinterface circuits. The interface can change to RS232 via the hardware jumper and othersare the same as RS232.

RSTP Rapid Spanning Tree Protocol

RSVP Resource Reservation Protocol.

RTN Radio Transmission Node

RUP Rational Unified Process

A.18 SS1 byte In an SDH network, each network element traces step by step to the same clock reference

source through a specific clock synchronization path, thus realizing the synchronizationof the whole network. If a clock reference source traced by the NE is lost, the clock ofthis NE will trace another clock reference source of lower level. To implement protectionswitching of clocks in the whole network, the NE must learn about the clock qualityinformation of the clock reference source it traces. Therefore, ITU-T defines S1 byte totransmit the network synchronization status information. It uses the lower four bits ofthe multiplex section overhead S1 byte to indicate 16 types of synchronization qualitygrades. The specific coding information is shown in the following table. Auto protectionswitching of clocks in the synchronous network can be implemented by using S1 byteand following the certain switching protocol.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-22 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 131: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Safe control switch The APR/IPA safe switch is set in consideration of the long-span networkingrequirement, which cannot allow too low output optical power. If the safe control switchis turned off, APR/IPA restarting optical power is the specified output power of the OAU.Otherwise, the APR restarting optical power is restricted to less than 10dBm.

SAN Storage Area Network

SC1 Single Directional Optical Supervising Channel Unit

SC2 Dual Directional Optical Supervising Channel Unit

SCC System Control & Communication Unit

SCE System control & Communication Unit for Extended Subrack

Script file It is the text file describing the physical information and configuration information ofthe entire network, including the NE configuration file, port naming file, end-to-endconfiguration file, NE physical view script file, NMS information file and serviceimplementation data script file.

SCS Sync Optical Channel Separator Board

SD trigger condition SD refers to signal degradation.? The multiplex section protocol defaults to startswitching in case of signal loss.? In practice, signal degradation severely affects someservices, so protection switching is needed. Or, you can turn off this trigger conditionthrough the switch to avoid MS switching when the signal degrades.

SDH Synchronous Digital Hierarchy.

SDH NNI SDH Network Node Interface. It is applied to build communications connection withthe equipment beyond the NMS management area.? Usually, the NMS creates aprotection sub-network by creating a logical system on the port of an idle line board, andthe NE must be a TM without protection and fiber connection.? Though both the SDHNNI and the isolated node are implemented via the logical system, the isolated node isa logical system not belonging to any protection sub-network or SDH NNI. An isolatednode satisfying specified conditions can be used to create an SDH NNI, and a node isindependent when the SDH NNI is deleted from the network layer. SDH NNI is widelyused in the 10GV2, because no tributary board is available. An SDH NNI should usuallybe created to support the E4 service. As no logical system is available in the 10GV2, theSDH NNI is fulfilled only on the NMS side, without providing the searching function.

Search domain Search field refers to the range of IP addresses being searched. In the TCP/IP, the IPaddresses include:Category A address (1.0.0.0---126.255.255.255). For example,10.*.*.*, whose search field is 10.255.255.255, all 10.*.*.* to be searched. Category Baddress (128.0.0.0---191. 255. 255. 255). For example, 129.9.*.*, whose search field is129.9.255.255, all 129.9.*.* to be searched.Category C address (192.0.0.0---223. 255.255. 255). For example, 192.224.9.*, whose search field is 192.224.9.255, all192.224.9.* to be searched.Category D address (224.0.0.0---230.255.255.255), which isreserved.Category E address (240.0.0.0---247.255.255.255), which is reserved.Net-id127.*.*.*, in which .*.*.* can be any number. This net-ID is a local address.

Secondary filter trail In this search mode, the NMS re-searches the trail data displayed by the current clientaccording to the given search conditions, helping the customer find the trail data whichinterests him the most.

Serial Line InterfaceProtocol

Serial Line Interface Protocol, defines the framing mode over the serial line to implementtransmission of messages over the serial line and provide the remote host interconnectionfunction with a known IP address.

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-23

Page 132: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Serial port extendedECC

The ECC channel realized by means of serial port.

Server layer trail andclient layer trail

There is an inclusion relation between the trails of different levels, e. g. a trail of a certainlevel contains multiple trails of lower levels. In such a structure, the upper level trailbearing another trail of lower level is called the server layer trail, while the lower leveltrail is called the client trail.

Service clock workingroute

In the 1600G system, it is the route of a service clock from the source to the sink.? Theworking route can be in the form of point-to-point or broadcast (That is, an input clocksource corresponds to multiple output clock sources).

Service configurationstrategy

When pass-through services are configured on the newly added nodes, the mode of high-order or low-order to pass through can be selected.? When the VC12 service over a VC4exceeds a preset threshold, higher order cross-connect is selected, otherwise lower ordercross-connect is selected. When the services are not VC12 ones, they shall be convertedinto VC12 equivalents. For example: if there are 2 VC3 and 4 VC12 services on a VC4,there should be 21*2+4 = 46 VC12 services. If the threshold value is 42, pass-throughof this VC4 shall be made through higher order cross-connect.

Service loadingindication

The payload loading indication is used to set the path of the tributary board. Usually itis used for path alarm suppression. When the tributary payload loading indication of thispath is set as "Unloaded", alarms of this path related to the service can be suppressed.

SLIP See Serial Line Interface Protocol

SMC Optical Supervisory Channel Unit

SML Service Management Layer

SMN Secondary Metro Node

SMS Service Management System

SMTP Simple Mail Transfer Protocol.

SNCMP Sub-Network Connection Multiple Protection

SNCP See Sub-network connection protection

SNCP node Set the SNC node on the protection sub-network to support sub-network connectionprotection that spans protection sub-networks. The SNCP node of the ring sub-networkcan support electric circuit dually feed and selectively receive a timeslot out of the ring,thus implementing sub-network connection protection. The SNCP node is generally seton the node on the line board with the path protection type of the dual fed and selectivelyreceived.

SNML Sub-Network Management Layer

SNMS Subnetwork Management System

SONET Synchronous Optical Network

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-24 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 133: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Spread type The spread type of ATM service includes point-to-point (p2p) and point-to-multipoint(including p2mpRoot and p2mpLeaf). The p2p spread type supports real-time bi-directional communication service. The two communication parties are in the same statusand participate the session actively. p2mpRoot and p2mpLeaf belong to the point-to-multipoint spread type. It supports point-to-multipoint multicast service. During thecreation of a point-to-multipoint (multicast) connection, a connection to identify thisgroup of connections is necessary. This connection is a p2mpRoot connection, whileother connections are p2mpLeaf connections. If there is a p2mpLeaf connection in agroup of connections, the p2mpRoot cannot be deleted. To create a multicast connection,the p2mpRoot connection must be created before the creation of p2mpLeaf connection.

SRLG Shared Risk Link Group

SSM Synchronization Status Message

STS Synchronous Transport Signal

Sub-network Sub-network is the logical entity in the transmission network and comprises a group ofnetwork management objects.? The network that consists of a group of interconnectedor correlated NEs, according to different functions. For example, protection subnet, clocksubnet and so on. A sub-network can contain NEs and other sub-networks.? Generally,a sub-network is used to contain the equipments which are located in adjacent regionsand closely related with one another, and it is indicated with a sub-network icon on atopological view.? The NMS supports multilevels of sub-networks.? A sub-networkplanning can better the organization of a network view. On the one hand, the view spacecan be saved, on the other hand, it helps the network management personnel focus onthe equipments under their management.

Sub-networkconnection protection

Sub-network connection protection uses the 1+1 mode. SNCP is of 1+1 protection mode.Payloads are transmitted simultaneously on both the working and the protection sub-network connections. When the working sub-network connection fails, or when itsperformance deteriorates to a certain level, at the receiving end of the sub-networkconnection, the signal from the protection sub-network connection is selected accordingto the preference rule. Switching usually takes the single-end switching mode, thus noprotocol is needed

Sub-network number It is used to differentiate the different network sections in the sub-network conference.Actually it is the first several digits (one or two) of the user phone number. An orderwirephone number is composed of the sub-network number and the user number.

subnet A type of topology object, which contains child submaps, nodes and connections. It isdisplayed in the topology view as the subnet icon.

Subnet mask The number of bits in a network prefix, also called network mask. The subnet mask isused to divide a network into different network segments, so that communication can bedone only within the same network segment. In this manner, broadcast storms aresuppressed. According to the subnet mask and IP address, the IP network can be classifiedinto three commonly used classes of subnets: class A subnets with 256*256*256 IPaddress resources subnetted by the mask 255.0.0.0, class B subnets with 256*256 IPaddress resources subnetted by the mask 255.255.0.0, and class C subnets with 256 IPaddress resources subnetted by the mask 255.255.255.0.

SVLAN SERVICE VLAN

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-25

Page 134: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Switching priority There may be the case that several protected boards need to be switched; thus the tributaryboard switching priority should be set. If the switching priority of each board is set thesame, the tributary board that fails later cannot be switched. The board with higherpriority can preempt the switching of that with lower priority. For the OptiX 155/622and the OptiX 2500 equipment, there are three switching priorities: "Priority 1", "Priority2", and "Priority 3". For the OptiX 2500+ equipment, the switching priority is classifiedinto priorities 1 - 8, where priority 1 is the highest one, and priority 8 is the lowest one.For the OptiX 10G(Metro 5000), the highest switching priority is priority 1 and the lowestone is priority 5.

Switching restorationtime

It refers to the period of time between the start of detecting and the moment when theline is switched back to the original status after protection switching occurs in the MSPsub-network.

Synchronize NE time Send the system time of the NMS server to NEs so as to synchronize all NEs with theserver.

A.19 TTag/UnTag The Ethernet port that can recognize and send the packet with a 802.? 1Q tag header is

called a Tag port; otherwise it is called an UnTag port. The port set as Tag can onlyrecognize the packet with a 802.? 1Q tab header and will discard the packet without a802.? 1Q tag header. The port set as UnTag processes the packet as an ordinary packet.Packets either with or without a 802.? 1Q tag headerscan pass through the port. For thepacket with a 802.? 1Q tag header sent from the port, the UnTag port will remove its802.? 1Q tag header, thus the packet with a 802.? 1Q tag header is converted into anordinary packet.

TC1 Unidirectional Optical Supervisory Channel And Timing Transporting Unit

TC2 Bidirectional Optical Supervisory Channel and Timing Transmission Unit

TCM Time Compressed Multiplex

TCP/IP Transmission Control Protocol/Internet Protocol

TDA Tone & Data Access Unit

TDA board service The TDA board can be configured with 1 - 12 two/four-wire audio interfaces (the rateis 64 kbit/s), or with 4 RS-232 and 4 RS-422 data interfaces (the maximum rate is 19.?2kbit/s). The service added/dropped to/from these interfaces correspond to the time slots1 - 20 of the NMS "Local 2M" (12 audio interfaces correspond to time slots 1 - 12respectively, 4 RS-232s correspond to time slots 13 - 16 respectively and 4 RS-422scorrespond to time slots 17 - 20). The TDA board occupies at least one 1 2Mbit/s, or atmost 4 2Mbit/s (corresponding to 2M-1, 2M-2, 2M-3 and 2M-4 in the NMS). Thecorresponding time slot range of each 2M-1, 2M-2, 2M-3 and 2M-4 is 1-31. All TDAboards in the whole network can share 1 - 4 2Mbit/s, i.? e. the whole network occupies1 - 4 2Mbit/s altogether. In order to send these tone signals and digital signals to the SDHnetwork for transmission, it is necessary to cross-connect the local 2M (20 64 kbit/spayloads) and four 2M signals (2M-1, 2M-2, 2M-3 and 2M-4) added/dropped from theXCS- board.

TDA clock source TDA is short for Tone Data Access. For the 2500+ NE equipment, it can be installedwith the external TDA board for which the clock source must be set so that the TDAboard can switch according to the set clock source sequence when clock source switchingoccurs.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-26 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 135: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

TDA feeding selection It can be selected whether the audio port of the SS42TDA board is in feeding mode ornon-feeding mode. When the feeding mode is selected, two lines have -48V DC feeding.After the telephone set is connected and the audio service configured, the user can makea phone call without dialing. Generally, the feeding mode is configured during test so asto connect the telephone set for test. When the non-feeding mode is selected, the non-feeding terminal (MODEM, for example) can be connected to transmit services.

TDC Tunable Dispersion Compensator

TE See Traffic Engineering

TIM Trail trace Identifier Mismatch

Time of charging datacircuit deactivation

If the circuit is active at the moment when the charging time zone ends, this moment isthe time of deactivating the charging data circuit. Otherwise, it is the general time ofcircuit deactivation.

TMF TeleManagement Forum.

TMN Telecommunications Management Network.

Topology The NMS topology is a basic component of the man-machine interactive interface. Thetopology clearly shows the structure of the network, the alarms of different NEs, sub-networks in the network, the communication status as well as the basic network operationstatus.

TPS Tributary Protection Switching

Traffic Engineering The network congestion is a main factor that affects the backbone network performance.It may be caused by the insufficiency of network resource or the imbalanced load ofnetwork resource. Traffic engineering is a remedy to the congestion that results fromimbalanced load.

It monitors the network traffic and the load of network unit dynamically, modify thetraffic management parameters, routing parameters and resource constraint on a realtimebasis, optimizes the usage of network resource and avoid the congestion caused by theload imbalance.

Traffic frame discardflag

It is the traffic frame discard control. Two options are provided: enable and disable. Itindicates the means by which the NE discards cells when the network is congested. Whenthe frame discard mark is closed, the cells will be discarded at the cell level; when it isopened, they will be discarded at the frame level. Here, "frame" refers to the AALprotocol data unit.

Trail A trail is a kind of transport entity, mainly engaged in transferring messages from theinput of the trail source to the output of the trail sink, and monitoring the integrality ofthe transferred messages. According to the different levels of the trail, the trail includesvarious types (OTS, OCH, OMS, SPI, RS, MS, VC4 server trail, VC4, VC3 and VC12).Among them, OTS, OCH and OMS represent the trails in a DWDM layer network. Forthe ADM and TM equipment in the SDH network, each optical fiber connectioncorresponds to an SPI, RS or MS trail, and a trail is the general name for service carriers,including SDH and PDH services.

Trail consistency check Check whether the circuit route and the activation status of the NMS side and NE sideare the same, clear the superfluous MOs and combine some of the circuits.? Duringnetwork expansion, such an operation as adding fibers to the SDH NNI or configuring/deleting services through the configuration layer will result in circuit inconsistency.

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-27

Page 136: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Transmission medialayer route

It refers to the physical media such as optical fibers and NEs passed by the trail.

Tributary loopback A fault can be located for each service path by performing loopback to each path of thetributary board.? There are three kinds of loopback modes. 1. No loopback: It is thenormal status. No loopback is needed when the equipment runs efficiently; 2. Outloop:When arriving at the line board after passing the input port in the local NE, the inputsignal is directly looped back to the service output end; 3. Inloop: The input signal isreturned along the original trail from the tributary board of the target NE.

TU Tributary Unit

TU 1: N protection TU protection is of the equipment level and it uses one standby TU to protect n TUs.When the working protected board is faulty, e.? g. when board self-test fails, the boardis pulled out, and the board power supply fails, etc.? , the SCC will send switchingcommand, and the payload of the protected board can be automatically switched over tothe specified protection board and the work will be accomplished by the protection board.After the fault is cleared, the service will be automatically switched to the original board.Switching priority can be set for each protected board to make the switching setting moreflexible. Some operations in the tributary board protection switching will trigger someabnormal events.

A.20 UUAT Unavailable Time.

UML Unified Modeling Language.

Unavailable time event It is also called Unavailable Time (UAT). A UAT event is reported when the monitoredobject generates 10 consecutive severely errored seconds (SES) and the SESs begin tobe included in the unavailable time. The event will end when the bit error ratio per secondis better than 10-3 within 10 consecutive seconds.

UNI See User Network Interface

Unprotected sub-network

It refers to a sub-network without any protection mechanism. The purpose of suchconfiguration is to provide the basic data of trail protection for the subsequent trailmanagement.

UPC/NPC See Usage Parameter Control/Network Parameter Control

Upload Report all or part of the configuration data of the NE to the NMS and overwrite theconfiguration data saved in the NE layer on the NMS side.

UPS Uninterrupted Power Supply.

UPSR Unidirectional Path Switched Ring

Usage ParameterControl/NetworkParameter Control

Usage Parameter Control/Network Parameter Control.During the communication, theUPC is implemented to monitor the actual traffic on each virtual circuit that is input tothe network. Once the specified parameter is exceeded, measures will be taken to control.NPC is similar to the UPC in function. The difference is that the incoming trafficmonitoring function is divided into UPC and NPC according to their positions. The UPClocates at the user/network interface, while the NPC at the network interface.

User A client user of the NMS. The user name and password uniquely identifies the operationrights of a user in the NMS.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-28 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 137: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

User group User set refers to the set of NMS users with the same management authorities. The defaultuser group includes: system administrator, system maintainer, system operator andsystem supervisor. The attributes of user set include name and detailed description.

User Network Interface UNI is the abbreviation for User Network Interface. It identifies the interface betweenthe user and the ATM network node.

A.21 VV40 40-channel Multiplexing Unit With VOA

VB Virtual Bridge

VC12, VC3 trail The channel rates of the VC12 trail and VC3 trail are respectively 2.048Mbit/s and34.368Mbit/s.? The VC12 and VC3 trails are transparent channels (i.? e. circuit group)provided for circuit-layer network nodes (e.? g. a switch) in a path-layer network, andact as the basic unit of transport capacity among circuit-layer network node channels. Itsserver layer trail is VC4 server trail. The VC12 or VC3 trail is established on the basisof VC4 server trail, which can only be created after the VC4 server trail.? If the VC12and VC3 trails only pass one VC4 server trail, lower order cross-connect is performedover the NEs at the two ends during the creation, the VC4 pass-through is configuredover the intermediate NE. If the VC12 and VC3 trails pass multiple VC4 server trails,in addition to that mentioned above, lower order cross-connect is configured over theNE at the crosspoint of two VC4 server trails during the creation, thus making the VC12and VC3 trails pass through.

VC4 loopback The fault of each VC4 path on the optical fiber can be located by setting loopback foreach VC4 path of the line.? There are three kinds of loopback modes. 1. No loopback:It is the normal status. No loopback is needed when the equipment runs efficiently; 2.Outloop: When arriving at the line board after passing the input port in the local NE, theinput signal is directly looped back to the service output end; 3. Inloop: The output signalis directly returned after passing the line board.

VC4 Server Trail The path rate of the VC4 server trail is 150.? 336Mbit/s.? The VC4 server trail providestransparent channels (i.? e. circuit group) for circuit-layer network nodes (e.? g. a switch)in a path-layer network, and acts as the basic unit of inter-office communication path.The VC4 server trail is the basis of the VC3 and VC12 trails. When the VC4 server trailis configured, only the higher order cross-connection of VC4 is generated in theintermediate NE, but no cross-connection is generated at the two ends, that is, no serviceis added/dropped. Therefore, the VC4 server trail is not a traditional service. It is onlythe basis for VC3 and VC12 trail creation. The created VC4 is a point-to-point servicetrail, only the source/sink NE can be specified instead of the source/sink port.

VCC See Virtual Chanel Connection

VCG Virtual Concatenation Group

VCI See Virtual Channel Identifier

VCS Veritas Cluster Server.

Virtual ChanelConnection

Virtual Channel Connection. The VC logical trail that carries data between two endpoints in an ATM network.

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-29

Page 138: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Virtual ChannelIdentifier

The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in both NNI cell orUNI cell. It indicates the virtual channel in the path. The VPI and VCI together indicatea virtual connection. The identifier in the ATM (Asynchronous Transfer Mode) cellheader that identifies to which virtual channel the cell belongs.

Virtual concatenation When the standard virtual containers (including VC4/VC3/VC12/VC11) are incapableof carrying the volume of a SDH signal, the containers can be concatenated to functionas a larger container.

Virtual leased line An emulation of the traditional leased line service. By emulating the leased line throughthe IP network, it provides asymmetric and low-cost "DDN" service. For end users ofthe VLL, it is similar to the traditional leased line.

Virtual Local AreaNetwork

A technology used to realize the virtual work group by logically classifying the deviceson a LAN into multiple network segments.

Virtual NE Like a common NE, a virtual NE is also displayed with an icon on a view, but it is onlyan NE simulated according to the practical situation, which does not represents an actualNE. Therefore, the actual status of this NE cannot be queried and its alarm status cannotbe displayed with colors.? Usually, when the trail management function is used for theNEs or sub-networks the NMS cannot manage, or the equipment is interconnected withother vendors NEs for service configuration, the end-to-end service configurationmethod and the trail management capability are provided.

Virtual PathConnection

The VPC is shorted for Virtual Path Connection.

Virtual PathIndentifier

The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the NNI cell, and 8 bitsin the UNI cell.The field in the ATM (Asynchronous Transfer Mode) cell header thatidentifies to which VP (Virtual Path) the cell belongs.

Virtual privatenetwork

An extension of the private network. A VPN contains shared links or encapsulated,encrypted, and authenticated links on the public network. A VPN can connect users orsites over the Internet.

VLAN See Virtual Local Area Network

VLAN ID Namely, it is the virtual LAN identifier. One Ethernet port can support 4K VLAN routes,and one NE can support up to 8K VLAN routes.

VLL See Virtual leased line

VOA Variable Optical Attenuator Unit.

VPI See Virtual Path Indentifier

VPLS Virtual Private LAN Service.

VPN See Virtual private network

VT Virtual Tributary

VVR Veritas Volume Replicator

VxVM Veritas Volume Manager.

A.22 WWAN Wide Area Network.

A Glossary and AbbreviationsiManager U2000

Operation Guide for WDM End-to-End Management

A-30 Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

Page 139: U2000 Operation Guide for WDM End-To-End-(V100R001C00_02)

Wavelength pathprotection ring

The wavelength path protection ring comprises the working ring and the protection ring.Service signals are transmitted in the two rings in opposite directions. In the wavelengthpath protection ring, service signals from one node (such as node A) to another node(such as node C) are transmitted via the working ring and the protection ring at one time.Node C receives the signals from the two rings at the same time and selects the signalwith higher quality. Similarly, the signals from Node C to Node A are transmitted alongboth the working ring and protective ring, and Node A selects the signal with higherquality. Wavelength path protection can protect optical fibers and equipments. Itprovides protection against optical fiber damages, wavelength conversion board failure,optical module failure, and optical amplifier failure. The restore time is less than 50ms.

Wavelength protectiongroup

The wavelength protection group is important to describe the wavelength protectionstructure. Its function is similar to that of the protection sub-network in the SDH NE.The wavelength path protection can only work with the correct configuration of thewavelength protection group.

Wavelength protectionsub-network

A wavelength protection sub-network is a ring-chain structure used to describewavelength protection, it is the basic network-level information. With the functionsimilar to that of the protection sub-network in an SDH network, it is the basic network-level data oriented to the user.? Create or delete a protection sub-network as requiredand set the parameters of the protection sub-network for the purpose of management onthe network hierarchy.

WBA WDM Optical Booster Amplifier Unit

WDM Wavelength Division Multiplexing

WDM path protection At the place where the signals are input to the DWDM equipment, the same channel ofoptical signals are input to two boards/ports of the WDM equipment respectively via twooptical fibers. The two boards/ports are backed up mutually. When faults occur to theactive path, the input terminal of the DWDM equipment will switch over to the standbypath. This is the path protection switching function. If the detection shows that the activepath signal recovers, the input terminal of the DWDM equipment will switch back to theactive path when it meets the setting requirement. This is the path protection switchingrecovery function.

WMASN WDM Access Node

WSF Work Station Function

WTR Wait-to-Restore

WXCP Wavelength Cross Connection Protection

A.23 XXCS Cross-connect and Synchronous Timing Board

iManager U2000Operation Guide for WDM End-to-End Management A Glossary and Abbreviations

Issue 02 (2009-10-23) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.

A-31