OptiX OSN 9500 Configuration Guide
OptiX OSN 9500 Configuration Guide
System
V100R006
Configuration Guide
Issue 04
Date 2011-06-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: [Link]
Email: support@[Link]
Purpose
This document describes the configuration of different types of services on the OptiX OSN 9500,
with regard to the basic concepts, networking diagram, signal flow and timeslot allocation, and
configuration process.
Related Versions
The following table lists the product versions related to this document.
NOTE
This document is prepared based on the T2000. The operations on the U2000 are similar to those on the T2000.
Intended Audience
This document is intended for:
Organization
This document is organized as follows.
Topic Description
1 Starting the T2000 Describes the basic operations to quickly start of the T2000.
2 Creating the Network Describes how to create an NE, how to create boards, how
to create fibers and cables, how to configure the protection
subnet, and how to configure SDH services, and how to
configure the clock on the T2000.
3 Configuring SDH Services Describes how to configure SDH services on the T2000.
6 Configuring the F1 Data Describes how to configure F1 data services on the T2000.
Service
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
General Conventions
Convention Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Boldface Buttons, menus, parameters, tabs, window, and dialog titles are
in boldface. For example, click OK.
> Multi-level menus are in boldface and separated by the ">" signs.
For example, choose File > Create > Folder.
Keyboard Operations
The keyboard operations that may be found in this document are defined as follows.
Format Description
Key Press the key. For example, press Enter and press Tab.
Key 1+Key 2 Press the keys concurrently. For example, pressing Ctrl+Alt
+A means the three keys should be pressed concurrently.
Key 1, Key 2 Press the keys in turn. For example, pressing Alt, A means the
two keys should be pressed in turn.
Mouse Operations
The mouse operations that may be found in this document are defined as follows.
Action Description
Click Select and release the primary mouse button without moving the
pointer.
Double-click Press the primary mouse button twice continuously and quickly
without moving the pointer.
Drag Press and hold the primary mouse button and move the pointer
to a certain position.
Update History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
l Engineering planning
l Configuration process (station by station)
l Creating a board
l Configuring Ethernet interfaces
l Configuring EPL services
l Configuring SDH services
l Configuring process (by trail)
Contents
8 Task Collection...........................................................................................................................8-1
8.1 Creating SDH Services....................................................................................................................................8-4
8.2 Creating SNCP Services..................................................................................................................................8-5
8.3 Configuring Trace Byte...................................................................................................................................8-6
8.4 Configuring C2 Byte.......................................................................................................................................8-7
8.5 Setting Performance Monitoring Parameters of an NE...................................................................................8-8
8.6 Checking the Configuration of SDH Services................................................................................................8-9
9 Equipment Information............................................................................................................9-1
9.1 Service Support Capability of Ethernet Boards..............................................................................................9-2
9.2 Requirements for Binding Paths with VCTRUNKs on Ethernet Boards........................................................9-2
9.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet Boards...................................................9-4
A Glossary.....................................................................................................................................A-1
B Acronyms and Abbreviations.................................................................................................B-1
Figures
Tables
The following pages introduces some preparation operations that will ensure a smooth, trouble-
free launch of the T2000.
Background Information
l Start the computer and the T2000 application in the following steps:
1. Start the computer.
2. Start the T2000 server.
3. Start the T2000 client.
l Shut down the T2000 application and the computer in the following steps:
1. Exit the T2000 client.
2. Stop the T2000 server.
3. Shut down the computer.
1.1.1 Starting the Computer
To avoid computer damage or data loss, refer to the procedure provided to start the computer.
The startup procedures of the workstation are different from those of a normal PC. Follow the
correct procedure to perform the operations as required.
1.1.2 Starting the T2000 Server
After starting the computer, you need to start the T2000 server. Then you can log in to the
T2000 to manage the network.
1.1.3 Viewing the T2000 Process Status
When you fail to log in to the T2000 client or abnormally exit the T2000 client, you can use the
System Monitor to view the T2000 process status to decide whether the server is faulty.
1.1.4 Logging In to the T2000 Client
You can manage the network in the graphic user interface (GUI) only after logging in to the
T2000 client.
1.1.5 Exiting a T2000 Client
Before restarting the T2000 client or shutting down the T2000 server, you must exit the
T2000 client.
1.1.6 Shutting Down the T2000 Server
When the T2000 server is managing the system normally, do not perform this operation. In
special circumstances, for example, when modifying the system time of the computer where the
T2000 resides, or when upgrading the version, you can use the System Monitor to shut down
the T2000 server.
1.1.7 Shutting Down the Computer
Normally, do not shut down the computer. In special situations, for example, when the computer
becomes faulty, shut down the computer in the correct sequence. The shutdown procedures of
the workstation are different from those of a normal PC. Follow the correct procedure to perform
the operations as required.
Prerequisite
l The T2000 must be installed correctly.
l The power cable of the workstation or the computer, the power cable of the monitor, data
line and Ethernet line must be connected correctly.
l If there is printer, modem or other peripherals, their power line and data line must be
connected correctly.
Background Information
The T2000 can run in the UNIX or Windows operating systems. The functions are the same in
each operating system. To learn about the recommended hardware configuration, refer to the
OptiX iManager T2000 Product Description.
Procedure
l On UNIX
1. Power on the printer, modem and other peripherals.
2. Power on the workstation and the Solaris is automatically started. The Prompt dialog
box is displayed.
3. Enter the Username and the Password in the Login dialog box. For example, User:
t2000 (by default); Password: t2000 (by default).
4. Click OK to open the Common Desktop Environment (CDE) window.
l On Windows
1. Power on the printer, modem and other peripherals.
2. Power on the computer and the Windows is automatically started.
3. Enter the Username and the Password in the Login dialog box. For example, User:
t2000 (by default); Password: t2000 (by default).
4. Click OK to open the Windows user interface.
----End
Prerequisite
l The computer where the T2000 is installed must be started correctly.
l The operating system of the T2000 server must be running correctly.
l The T2000 license must be in the correct directory. If the T2000 server is installed on UNIX,
copy the license to the directory /T2000/server/license/. If the T2000 server is installed on
Windows, copy the license to the directory \T2000\server\license\.
l On UNIX, the Sybase must be started and work normally. On Windows, the SQL Server
must be started and work normally.
Procedure
Step 1 Double-click the T2000Server icon on the desktop of the T2000 server.
Step 2 In the Login dialog box, enter User Name, Password and Server. For example, User Name:
admin, Password: T2000 (T2000 is the default password of the admin user.) and Server:
Local.
NOTE
Step 3 Click Login. Wait until the database process, T2000 core process, and the processes that are
optional according to the actual situation are in the Running state. Now the T2000 server is
started successfully.
Step 4 Optional: When needed, right-click on the process, and choose Start Process from the shortcut
menu to start the Extended NE Management Process, NGWDM NE Management Process,
RTN NE Management Process, SDH NE Management Process, WDM NE Management
Process, ASON SDH Management Process, ASON WDM Management Process, End-to-
End Common Management Process, End-to-End Eth Management Process, End-to-End
OTN Management Process, End-to-End SDH Management Process, and Northbound
Interface Module(SNMP) Process processes manually.
NOTE
If the System Monitor application is started, you can restart the T2000 server on the System Monitor.
Perform the following step:
Choose System > Start Server on the Main Menu of the System Monitor. Wait until the database process,
T2000 core process, and the processes that are optional according to the actual situation are in the
Running state, the T2000 server is started properly.
----End
Background Information
To view the status of the T2000 processes by UNIX command line, run the following command:
# /T2000/server/bin/showt2000server
If each process entered has a corresponding process ID and the specific ID does not change, the
T2000 processes are normal.
Procedure
Step 1 Start and log in to the System Monitor.
Step 2 In the user interface of the System Monitor, click the Process tab, and view whether the status
of each process is Running.
l If the process status is Stopped, right-click on the process, and choose Start Process from
the shortcut menu. In this manner, the process is in the Running state.
l If the manual startup fails, it indicates that the process is abnormal.
l To save resources, you can close unwanted processes. Set the startup mode of the desired
process to Manual, and then select Stop Process.
----End
Prerequisite
The T2000 server must be started correctly.
Background Information
When the T2000 server and the T2000 client are not on a computer, you need to install the client
on the computer where the server resides. Set ACL on the client and then issue the ACL setting
to the server.
l On the T2000 client, choose System > NMS Security Settings > ACL from the Main
Menu.
l Click Add. In the dialog box displayed, enter related information.
– Select IP Address or Segment and set an IP address or network section that can be
accessed according to the Example of format.
– Select Start IP address to end IP address and set the rang of IP addresses that can be
accessed according to the Example of format.
Procedure
Step 1 On the computer of the T2000 client, double-click the T2000Client icon on the desktop.
Step 2 Enter the User Name, Password of the T2000 client. For example, User Name: admin;
Password: T2000.
NOTE
l After the automatic login is selected, you do not need to enter the user name and password.
l By default, the initial user name is admin, and the password is T2000. To protect the T2000 from
unauthorized logins, you need to immediately change this password.
l The administrator needs to create new T2000 users and assign them to certain authority groups.
NOTE
----End
Prerequisite
The T2000 client must be started normally.
Procedure
Step 1 Choose File > Exit from the Main Menu.
Step 2 Click OK in the Confirm dialog box.
NOTE
If the layout of the view is changed and not saved, the Save Coordinates dialog box is displayed. Make a
selection and then exit the client automatically.
----End
Prerequisite
All the T2000 clients connected to the T2000 server must be shut down.
Background Information
When performing the operations related to the database (such as initializing the T2000
database, restoring T2000 databases and restoring T2000 MO data) or the operations related to
the T2000 (such as the upgrade, installing patches and re-installing the T2000), you need to shut
down the T2000 server first. You are recommended to shut down the T2000 server in the way
of "shut down the T2000 server and the System Monitor".
Procedure
l Shut down the T2000 server only.
NOTE
In this case, the MDP process is not shut down and the database cannot be initialized.
1. In the System Monitor, choose System > Stop Server from the Main Menu.
2. Click OK in the confirmation dialog box. When all the processes are in the
Stopped status, the T2000 server is stopped normally.
l Shut down the T2000 server and the System Monitor.
NOTE
After all the T2000 processes are finished, you can initialize the database.
1. In the System Monitor, choose System > Shutdown System from the Main Menu.
----End
Prerequisite
The T2000 server and client applications must be stopped.
Precaution
CAUTION
To avoid equipment damages or data loss, perform the following step one by one to shut down
the workstation.
Procedure
l On UNIX platform
1. Enter the following commands in the terminal window, the UNIX workstation shuts
down automatically:
% su root
Password: rootkit
# sync;sync;sync;sync;sync
# shutdown -y -g0 -i5
NOTE
l rootkit is the default password of super user root. If the password is changed, enter the
new password.
l To restart the Sun workstation, the last command is # shutdown -y -g0 -i6.
2. Turn off the peripheral equipment.
l On Windows platform
1. Choose Start > Shut down from the Windows desktop.
2. Choose Shut down and click OK in the dialog box. The computer shuts down
automatically.
3. Turn off the monitor and the peripheral equipment.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
l To open the Main Topology, log in to the T2000 client.
l Choose Window > Main Topology from the Main Menu.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Background Information
You can open a maximum of five NE Explorer windows at the same time.
Procedure
l Right-click an NE on the Main Topology and choose NE Explorer from the shortcut menu.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Choose Configuration > Clock View from the Main Menu.
----End
NEs and fibers or cables can be managed on the T2000 only after their topologies are created.
2.1 Creating NEs
Each equipment is represented as an NE on the T2000. Before the T2000 manages the actual
equipment, you need to create the corresponding NEs on the T2000. There are two ways of
creating NEs: creating a single NE and creating NEs in batches. When you need to create a large
number of NEs, for example, during deployment, it is recommended that you create NEs in
batches. When you need to create just a few NEs, it is recommended that you create the NEs
one by one.
2.2 Configuring the NE Data
Though an NE is successfully created, it is not configured. You need to configure the NE first
so that the T2000 can manage and operate the NE.
2.3 Checking Board Parameters
To learn about board parameter status, you can check board parameters. Before actual
configuration operations in networking, you need to check board parameters, to make sure that
the board parameter status meets the requirements of actual networking.
2.4 Creating Links
You can create fibers, Ethernet cables, serial port cables, extended ECC and virtual fibers by
using the T2000.
2.5 Creating a Topology Subnet
The subnet created here is based on a topological concept to facilitate management. In the case
of topology objects in the same network area or with similar attributes, you can allocate them
in one topology subnet.
2.6 Configuring the Equipment Level Protection
The OptiX OSN 9500 equipment supports various equipment level protection schemes,
including the 1+1 board protection, board level protection, and port protection.
2.7 Configuring the Protection Subnet
The OptiX OSN 9500 supports various network level protection schemes, including the linear
MSP and ring MSP.
2.8 Configuring Clocks
A clock is the basis for the normal running of NEs. You must configure clocks for all NEs prior
to configuring services. In addition, you need to configure clock protection for complex
networks.
2.9 Configuring Orderwire
You can configure orderwire for NEs by using the T2000.
Prerequisite
l You must be an NM user with "NM operator" authority or higher.
l The license must be installed and the license must support creating the NE of the type.
l The NE Explorer instance of the NEs must be created.
Background Information
First create a GNE, and then create a non-gateway NE.
For easy management, create optical NEs before creating NEs in batches. Otherwise, new NEs
are allocated to idle optical NEs automatically.
If the NE is not created properly or the communication between the NE and the T2000 is
abnormal, the NE is displayed in gray color.
Procedure
Step 1 Right-click in the blank space of the Main Topology and choose New > Device from the shortcut
menu. The Add Object dialog box is displayed.
Step 3 Complete the following information: ID, Extended ID, Name and Remarks.
Step 4 To create a GNE, proceed to Step 5. To create a non-gateway NE, proceed to Step 6.
Step 5 Choose Gateway Type, Protocol and set the IP address and NSAP address.
1. Select Gateway from the Gateway Type drop-down list.
2. Select the Protocol type.
If the T2000 Do...
communicates with
NEs through
OSI protocol Select OSI from the Protocol drop-down list. Enter the
NSAP Address of the GNE.
NOTE
The NSAP address is a hexadecimal number that contains a maximum of 20 bytes. Its format is:
domain address+08003e+NE ID+NSEL.
The domain address that contains a maximum of 13 bytes is entered by the user. NSEL is the port
number of the network-level protocol, with a fixed value of 1d (one byte).
Step 6 Select Non-Gateway from the Gateway Type drop-down list. Select the GNE to which the NE
is associated to from the Affiliated Gateway drop-down list.
Step 7 Enter the NE User and Password.
NOTE
The default NE user is root, and the default password is password.
Step 8 Optional: If you do not want to apply the NE configuration data in the T2000 to the NE, check
the NE Preconfiguration check box, and set NE Software Version.
NOTE
If you apply the configuration data of the preconfigured NE to the actual NE when the configuration data
on the preconfigured NE is inconsistent with that on the actual NE, the actual services will be affected.
Step 9 Click OK. Click in the blank space of the Main Topology and the NE icon appears in the position
where you clicked.
----End
Result
After an NE is successfully created, the system automatically saves the information, such as the
IP address, NSAP address, subnet mask, and NE ID to the T2000 database.
Follow-up Procedure
After an NE is created, if you fail to log in to the NE, possible causes are listed as follows:
l The communication between the T2000 and the NE is abnormal. Check the settings of
communication parameters, such as the IP address of the NE and NE ID.
l The NE user is already logged in. In this case, change to use a valid NE user.
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
l The T2000 must communicate properly with the GNE.
l The NE Explorer instance of the NEs must be created.
Procedure
Step 1 Choose File > Search for NE from the Main Menu. The Search for NE window is displayed.
Step 2 Click Add and the Input Search Domain dialog box is displayed.
Step 3 Set Address type to IP Address Range of GNE, IP Address of GNE or NSAP Address, and
enter the information of the search address. Click OK.
NOTE
You can repeat Steps 2 through 3 to add more search fields. You can delete the system default search field.
l If you use IP address to search for NEs, and the IP address of the T2000 computer and that of the GNE
are within the same network segment, you can select IP Address Range of GNE or IP Address of
GNE.
l If the IP addresses are not within the same network segment, select only IP Address of GNE.
l If you use NSAP address, you can only select NSAP address.
Step 4 Click Start. The NEs found are displayed after the search.
Step 5 When the search ends or if you click Stop, select the uncreated NEs in the Result list and click
Create. The Create dialog box is displayed.
Step 6 Enter the NE user name and password.
NOTE
----End
Follow-up Procedure
After an NE is created, if you fail to log in to the NE, possible causes are listed as follows:
l The communication between the T2000 and the NE is abnormal. In this case, check whether
the parameters such as the IP address or ID of the NE are set correctly.
l The NE user is already logged in. In this case, change to use a valid NE user.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Select the NE whose data you want to configure.
Step 2 Choose Manual Configuration and click Next. The Confirm dialog box is displayed indicating
that manual configuration clears the data on the NE side.
Step 3 Click OK. The Confirm dialog box is displayed indicating that manual configuration interrupts
the service on the NE.
Step 5 Set NE Name, Equipment Type, NE Remarks and Subrack Type and then click Next. The
NE slot window is displayed.
Step 6 Optional: Click Query Logical Information to query the logical boards of the NE.
Step 7 Optional: Click Query Physical Information to query the physical boards of the NE.
NOTE
The Query Logical Information and Query Physical Information operations cannot be performed for
a preconfigured NE.
Step 8 Right-click on the slot to add a board. Click Next to display the Send Configuration window.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The NE type and NE software version of the source NE must be consistent with those of the
copied NE.
Procedure
Step 1 Select the NE whose data you want to Replicate.
Step 2 Choose Copy NE Data and click Next. The NE Replication dialog box is displayed.
Step 3 Select the source NE from the drop-down list. Click Start. Then, the Confirm dialog box is
displayed, prompting Copying NE data will overwrite all the data of the selected NE.
NOTE
After the NE data is replicated, only the data on the T2000 side is changed, but the data on the equipment
side is not changed.
Step 4 Click OK. The Confirm dialog box is displayed indicating that the replication operation results
in the loss of the original data of the NE to which the data is copied.
Step 5 Click OK to start the replication. Wait for a few seconds. The Operation Result dialog box is
displayed.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Select the NE whose data you want to Replicate.
Step 2 Choose Upload and click Next. The Confirm dialog box is displayed indicating that the upload
may take a long time.
Step 3 Click OK to start the upload. The Operation Result dialog box is displayed when the uploading
is completed.
----End
Procedure
Step 1 Select the corresponding navigation path and check the related board parameters.
1. Check SDH board parameters. For the SDH board parameters, see Table 2-1.
Boar
Paramet Navigation
d Application Scenario
er Path
Type
2. Check data board parameters. For the data board parameters, see Table 2-2.
Boar
Parame
d Navigation Path Application Scenario
ter
Type
Boar
Parame
d Navigation Path Application Scenario
ter
Type
Step 2 Modify board parameters according to service planning and actual board configurations. For
details, see 7.2.3 Modifying Board Configuration Parameters.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The optical interfaces of every NE must be connected using fibers.
l The boards of every NE must be created on the T2000.
Background Information
l If conflicting fibers are found during the creation, delete the conflicting fibers on the T2000
before you start creating fibers.
l When a fiber between two SDH NEs passes through a WDM NE, if the normal fiber
between an SDH NE and a WDM NE has been created on the T2000, the fiber found by
the trail search function is created as a virtual fiber. If the WDM NE is not created on the
T2000, the fiber is created as a normal fiber.
l When a fiber is created, it is usually bidirectional. But when the fiber is connected to the
SDH and WDM equipment, the fiber is unidirectional.
Precautions
Searching fibers may result in service interruption.
Procedure
Step 1 Choose File > Search for Fiber/Cable from the Main Menu.
Step 2 In the left pane select some ports from one or more NEs and click Search to search for the fibers
or cables. A progress bar is displayed showing the progress of the search.
NOTE
l If you check the Do not search for ports of created fibers on T2000 check box, the system only
searches for the ports that do not have fibers.
l To check if the created fiber is consistent with the actual fiber connection, leave the check box
unchecked.
l If you check the Do not search for ports of created fibers on T2000 check box, and if all the selected
ports have fibers created, the system displays a message indicating that the search field is null.
Step 3 A prompt appears telling you that the operation was successful. Click Close.
Step 4 To create fibers, select one or more fibers from the Newly Searched Fiber list and click Create
Fiber/Cable.
NOTE
l When one or more fibers are selected in the Newly Searched Fiber list, fibers that conflict with the
selected fibers, are shown in the Existing Conflicting Fiber list. If there is any conflicting fiber,
proceed to Step 5 and delete it before creating fibers.
l During fiber creation, if all the selected fibers are in an Already created state, the system displays the
message - No fiber to create.
Step 5 To delete the conflicting fibers, from the Existing Conflicting Fiber list select one or more
fibers whose values are Yes for the Existing Conflicting link (Y/N) parameter in the
Misconnected Fiber list. Click Delete Fiber/Cable.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The boards to be connected with fibers or cables must be created.
l The dynamic port must be created.
Precautions
When a fiber is created, it is usually bidirectional. But when the fiber is connected to the SDH
and WDM equipment, the fiber is unidirectional.
Procedure
Step 1 Right-click in the Main Topology and choose New > Link. The Add Object dialog box is
displayed.
Step 3 Click the button in Source NE. Select the source board and port in the Select the source end
of the link dialog box.
Step 5 Click the sink NE of the fiber or cable on the Main Topology.
Step 6 Click the button in Sink NE. Select the sink board and port in the Select the sink end of the
link dialog box.
TIP
When selecting a wrong source or sink NE, right-click and click OK in the Object Selection dialog box
to exit.
Step 7 Click OK. Enter the information of the fiber or cable in the Create Fiber/Cable dialog box.
Step 8 Click OK. The created fiber or cable appears between the source and sink NEs on the Main
Topology.
Step 9 Select the fiber you create, right-click and choose Detect Link from the shortcut menu.
The Operation Result dialog box is displayed indicating the fiber connection information.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l You must create fiber connections according to the true fibers that connect the SDH and
WDM equipment.
Background Information
l For SDH equipment, the virtual fibers ensure the independence of automatic fiber search
and SDH trail management. .
l For WDM equipment, when true fibers change into virtual fibers at the bearer layer,
wavelength management is not affected even if the true fibers are deleted
l The source and sink ports of the virtual fibers must be the SDH ports. On the source and
sink ports, there must be two physical fibers that are connected to the WDM equipment.
Procedure
Step 1 Right-click in the blank space of the Main Topology, and choose New > Link from the shortcut
menu.
Step 2 In the Add Object dialog box, choose Link > Virtual Fiber/Cable.
Step 3 Set the attributes of the fiber or cable in the right-hand list.
----End
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Procedure
Step 1 Right-click in the blank space of the Main Topology and choose New > Link from the shortcut
menu.
Step 2 Select a cable type in the left-hand pane of the Add Object dialog box that is displayed.
Step 4 Click OK. The cable is displayed on the Main Topology between the T2000 and the GNE.
----End
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Background Information
A topology subnet is created only to simplify the user interface and has no impact on the NEs.
Procedure
Step 1 Right-click in the blank space of the Main Topology and choose New > Subnet from the shortcut
menu.
Step 2 Click the Properties tab in the Add Object dialog box. Enter the attributes of the subnet.
Step 3 Click the Select Objects tab. Select the created NEs or subnet from the Available Objects pane.
Click .
NOTE
Step 4 Click OK. Click in the blank space of the Main Topology, the icon appears in the position
where you clicked.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l A pair of cross-connect, clock, SCC or data boards must be installed.
l To create the lower order cross-connect protection pair, the GXCL or EXCL board that
supports lower order cross-connection must be installed in the OSN 9500.
Background Information
The cross-connect protection pair and the SCC protection pair can be automatically configured.
For the configuration of the 1+1 protection on other boards, see the following configuration
procedures:
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Board 1+1 Protection from the
Function Tree.
Step 2 Click Query to query the current working and protection status from the NE.
Step 3 Click New. In the Add Protection Group dialog box, set the Protection Group Type, Working
Board and Protection Board.
NOTE
If you select the working board, the protection board is automatically displayed.
Prerequisite
l The physical network topology must be established.
l The NEs, fibers, Ethernet data boards, and other boards must be created on the T2000.
l You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Configuration > Ethernet Interface
Management > Ethernet Link Aggregation Management from the Function Tree. Click the
Link Aggregation Group Management tab.
Step 2 Click New and the Create Link Aggregation Group dialog box is displayed. Set the parameters.
Step 3 Click OK. Then, the Confirm dialog box is displayed. Click OK. Click Close in the Operation
Result dialog box that is displayed.
Step 4 Optional: Click the Link Aggregation Parameters tab. Set Port Priority and System
Priority.
NOTE
l The port ID consists of Port and Port Priority. The port that has the smallest port ID in a LAG has
the priority to be aggregated first.
l The system ID consists of System Priority and System MAC Address. When the system negotiates
with the remote system, the system with the smallest ID has the priority to choose the port. In this
example, the system refers to the board, and the system MAC address refers to the MAC address of
the board. The factory-set MAC address is globally unique and cannot be modified.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Background Information
The restrictions on the application of the DLAG function are as follows:
l The equipment configured with a DLAG must be interconnected with the equipment that
runs the LACP protocol. If an intermediate node exists between two pieces of equipment
configured with DLAGs, the intermediate node must support the transparent transmission
of the protocol packets.
l The main/slave relationship exists only between two identical boards. The port on the slave
board is used only to protect the corresponding port on the main board.
l One DLAG can have a maximum of two ports. The two ports must have the same port
number.
l The slave board must not be configured with services (including Ethernet services, LAG,
cross-connections, LPT, VCTRUNK-bound paths).
l The bandwidth of the slot where the slave board is installed must be higher than or equal
to the bandwidth of the slot where the main board is installed.
l The BPS, PPS, and DLAG protection cannot be supported simultaneously on one Ethernet
data board.
l The port configured with a DLAG must be an external physical Ethernet port. One port
cannot be configured into a DLAG and a LAG at the same time.
l During the configuration of a DLAG, the attributes of the slave port automatically become
consistent with the attributes of the main port.
l Do not perform a selfloop on an external physical port that needs to be configured with a
DLAG.
l If Ethernet services are created, make sure that the bound level of the channel timeslot is
consistent with the level of the configured cross-connection service.
l If Ethernet services are created, make sure that the external physical port that needs to be
configured with a DLAG does not share the same VCTRUNK port with other external
physical ports.
l One external physical port of a DLAG can correspond to multiple VCTRUNKs. One
VCTRUNK, however, can correspond to only one external physical port of a DLAG. The
external physical ports of different DLAGs cannot be configured into one virtual bridge
(VB). This is because one VCTRUNK may correspond to multiple external physical ports
if the external physical ports of different DLAGs are configured into one VB.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Ethernet Distributed Link
Aggregation Management from the Function Tree.
Step 2 Click New, and the Create Distributed Link Aggregation Group dialog box is displayed.
----End
The MS ring protection scheme is adopted in a common ring network. Normally, it is adopted
to protect a channel to transmit additional services. By running the APS protocol, it achieves the
MS level protection.
2.7.4 Creating a Linear MS Protection Subnet
In a chain network, an NE can protect a service in different sections of the fiber after a linear
MS protection subnet is created.
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l On the NM, the data of each NE must be configured, and fibers must be created correctly.
Procedure
Step 1 Choose Protection Subnet > Create Protection Subnet > NP Chain from the Main Menu to
display the Create SDH Protection Subnet dialog box.
Step 2 Enter the name of the protection subnet.
Generally, enter the default name, for example, non-protection chain_1.
Step 3 Select the capacity level of the protection subnet,
for example, STM-4.
Step 4 Select Resource Sharing and Assigned by VC4 as needed.
NOTE
l Resource Sharing indicates that a port is mapped into multiple protection subnets. When multiple
protection subnets occupy a port of a board, Resource Sharing must be selected. When different
protection subnets occupy different ports of a board, Resource Sharing is not required.
l Assigned by VC4 indicates that different VC4s belong to different protection subnets to achieve virtual
optical path protection. For example, in the case of an STM-16 fiber, the first through fourth VC4s
belong to an STM-4 MS shared protection, while the fifth through eighth VC4s belong to a non-
protection ring. If you enable multiple MSPs for a single optical port, you can configure multiple MSP
rings by VC4 for the optical port.
Step 5 Select a node to create a non-protection chain. Double-click an NE in the Main Topology and
add it to the left node list. At the same time, is displayed on the NE icon. Double-click the
NE icon again to cancel the selection.
Step 6 Click Next to display the Select Link dialog box. Set parameters, such as Physical Link
Information.
Step 7 Click Finish to deliver the configuration data. Then the Operation Result prompt box is
displayed. Click Close.
----End
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l The NE data must be configured, and fibers must be properly created.
Procedure
Step 1 Choose Protection Subnet > Create SDH Protection Subnet > NP Ring from the Main Menu
to display the Create SDH Protection Subnet dialog box.
Step 2 Enter the name of the protection subnet.
The default name is usually used, for example, NP_Ring_1.
Step 3 Select the rate of the protection subnet,
for example, STM-4.
Step 4 Select Resource Sharing and Assigned by VC4 as needed.
l Resource Sharing indicates that a port is mapped into multiple protection subnets. When
multiple protection subnets occupy a port of a board, Resource Sharing must be selected.
When different protection subnets occupy different ports of a board, Resource Sharing is
not required.
l Assigned by VC4 indicates that different VC4s belong to different protection subnets to
achieve virtual optical path protection. For example, in the case of an STM-16 fiber, the first
through fourth VC4s belong to an STM-4 MS shared protection, while the fifth through eighth
VC4s belong to a non-protection ring. If you enable multiple MSPs for a single optical port,
you can configure multiple MSP rings by VC4 for the optical port.
Step 5 Add nodes to the protection subnet to be created. Double-click the NE on the Main Topology
and add it to the node list in the left-hand pane. Meanwhile, is displayed on the NE icon. If
you want to cancel the selection, double-click the NE again.
Step 6 Click Next to proceed to the Select Link screen of the wizard. Set parameters, such as Physical
Link Information.
Step 7 Click Finish to deliver the configuration data. Then the Operation Result prompt box is
displayed. Click Close.
----End
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l The NE data must be configured, and fibers must be properly created.
Precautions
l The number of nodes in an MSP ring cannot exceed 16.
l When creating a protection subnet, select SDH NEs only. It is not required to select WDM
equipment.
l Starting the protocol controller may interrupt the service.
Procedure
Step 1 Choose Protection Subnet > Create SDH Protection Subnet > 2f_MS_SPRing from the Main
Menu. The Prompt dialog box is displayed. Click OK to display the Create SDH Protection
Subnet dialog box.
NOTE
l To create a four-fiber bidirectional MS shared protection ring, choose Protection Subnet > Create SDH
Protection Subnet > 4f_MS_SPRing from the Main Menu to display the related dialog box.
l To create a two-fiber unidirectional MS shared protection ring, choose Protection Subnet > Create SDH
Protection Subnet > 2f_MS_DPRing from the Main Menu to display the related dialog box.
Step 4 Select Resource Sharing, Assigned by VC4, or Transoceanic Protocol according to the
requirement.
NOTE
l Resource Sharing indicates that a port is mapped into multiple protection subnets. When multiple
protection subnets occupy the same port of a board, Resource Sharing must be selected. When different
protection subnets occupy different ports of a board, Resource Sharing is not required. If MSP
Sharing is enabled, you can select the Resource Sharing check box to map a port of the board to
multiple MSP subnets.
l Assigned by VC4 indicates that different VC-4s belong to different protection subnets to realize virtual
optical path protection. For example, in the case of an STM-16 fiber, the first to fourth VC-4s are
allocated for the STM-4 MS shared protection, and the fifth to eighth VC-4s are allocated for the non-
protection.
l Transoceanic Protocol indicates whether the transoceanic MS protocol is enabled. If the transoceanic
MS protocol is enabled, the services are switched on the source and end nodes in the case of a switching
on the transoceanic ring network. This significantly shortens the duration of the service interruption in
the case of long-distance transmission and improves the service transmission quality. Hence, if a
transoceanic MS is configured, you need to select the Transoceanic Protocol option to enable the
transoceanic MS protocol.
Step 5 Add nodes to the protection subnet to be created. Double-click the NE on the Main Topology
to add it to the node list in the left-hand pane. Meanwhile, is displayed on the NE icon. If you
want to cancel the selection, double-click the NE again.
NOTE
For easy maintenance, the nodes should be added anticlockwise to the protection subnet.
Step 6 Set the attribute of the nodes. Select MSP Node in this example.
Step 7 Click Next to proceed to the Select Link screen of the wizard. Set parameters, such as Physical
Link Information.
NOTE
l If there are multiple fibers between two NEs, select them from the Physical Link Information drop-
down list.
l If Assigned by VC4 is selected, you can select the working and protection VC4 timeslots as needed.
Step 8 Click Finish to deliver the configuration data. Then the Operation Result prompt box is
displayed. Click Close.
Step 9 Right-click the protection subnet and choose Protection Subnet Attributes from the shortcut
menu.
Step 10 Click the Protection Subnet Maintenance tab to check whether the protocol controller starts.
If not, select all the NEs of the protection subnet. Right-click and choose Start/Stop Protocol
> Start from the shortcut menu. Click Yes in the dialog box that is displayed twice. Ensure that
the status of all the values in the Protocol Controller column is Protocol Started.
Step 11 Click the Protection Subnet Parameters tab and set the WTR time and SD Condition as
needed. Click Apply to deliver the configuration. The WTR time of all NEs in the same
protection subnet should be the same.
NOTE
----End
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l The NE data must be configured, and fibers must be properly created.
Precautions
Fibers that are related to an linear MSP cannot be used by other protection subnets. That is, an
linear MSP and other subnets cannot create virtual fibers together.
Starting the protocol controller may interrupt the service.
Procedure
Step 1 Choose Protection Subnet > Create SDH Protection Subnet > 1+1 linear MSP from the Main
Menu to display the Create SDH Protection Subnet dialog box.
NOTE
To create a M:N linear MS protection scheme, choose Protection Subnet > Create SDH Protection
Subnet > M:N Linear MSP from the Main Menu to display the related dialog box.
Step 4 Set Revertive Mode and Switching Mode based on the protection type and requirements.
NOTE
l For M:N linear MS protection scheme, set the number of working links to N. M indicates the number of
protection links and cannot be set. Currently, the value is 1 only.
l Revertive Mode refers to the handling strategy adopted after the faulty line recovers to normal.
l Non-Revertive: The service does not automatically revert to the working channel after the faulty line
recovers to normal.
l Revertive: The service automatically reverts to the working channel after the faulty line recovers to
normal.
l Switching Mode refers to the switching strategy adopted after a fault occurs to the line.
l Single-ended switching: To protect services, switching occurs at the receive end when the receive end
is faulty and at the transmit end when the transmit end is faulty.
l Dual-ended switching: To protect services, the switching occurs at the receive and transmit ends when
either end is faulty.
l If multiple protection subnets uses one port of a board, you need to check the Resource Sharing check box.
If different protection subnets use different ports of a board, do not check this check box.
l Select the Assigned by VC4 option when there are different VC4s belonging to different protection subnets
to achieve virtual optical path protection. For example, for an STM-16 fiber, the VC4s 1-4 belong to an
STM-4 MSP, and VC4s 5-8 belong to a PP.
Step 5 Add nodes to the protection subnet to be created. Double-click the NE on the Main Topology
to add it to the node list in the left-hand pane. Meanwhile, is displayed on the NE icon. If you
want to cancel the selection, double-click the NE again.
Step 6 Click Next to proceed to the Select Link of the wizard. Set the Physical Link Information of
Working Link and Protection Link.
Step 7 Click Finish to deliver the configuration data. The Operation Result prompt box is displayed.
ClickClose.
Step 8 Right-click the protection subnet and choose Protection Subnet Attributes from the shortcut
menu.
Step 9 Click the Protection Subnet Maintenance tab to check whether the protocol controller is
started.
NOTE
If the protocol controller is not started, select all the NEs of the protection subnet. Right-click them and
choose Start/Stop Protocol > Start from the shortcut menu. Click Yes in the dialog box that is displayed
twice. Ensure that the status of all the values in the Protocol Controller column is Protocol Started.
Step 10 Click the Protection Subnet Parameters tab and set the WTR time and SD condition as
needed. Click Apply to deliver the configuration.
NOTE
The WTR time of all NEs in the same protection subnet should be the same.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Background Information
To implement clock protection, you must configure at least two traceable clock sources for the
equipment.
After you set the clock sources for all the NEs, query the networkwide clock trace status
again. For details, see 8.23 Viewing the Clock Trace Search.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Clock Source
Priority from the Function Tree.
Step 3 Click Create. In the Add Clock Source dialog box, select a new clock source and click OK.
Step 4 Set Lowest traceable clock quality of the clock source in the Lowest traceable clock
quality drop-down list.
Step 5 Optional: If an external clock source is selected, select External Clock Source Mode according
to the type of external clock signals. For 2 Mbit/s clocks, specify the Synchronous Status
Byte to deliver SSM message.
Step 6 Select a clock source, and click or to adjust its priority level. The clock
sources are arranged in the descending order. The clock source on top is the preferred one for
the NE.
NOTE
Internal clock sources have the lowest priority because of their low precision.
Step 7 Click Apply. In the Operation Result dialog box, click Close.
NOTE
If the clock trace relation changes because of the clock source change, the Prompt dialog box is displayed,
asking you whether to refresh the clock trace relation. Usually you can click OK. If you select Disable
Prompting Next Time, the Prompt dialog box is not displayed even when the clock trace relation changes.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Clock Subnet
Configuration from the Function Tree.
Step 2 Click the Clock Subnet tab. Click Query to query the existing parameter settings.
Step 3 Select Start Standard SSM Protocol or Start Extended SSM Protocol.
NOTE
The same SSM protection protocol must be used within the same clock protection subnet.
Step 4 Set the subnet number of the clock subnet to which the NE is associated.
NOTE
Allocate the same subnet number to NEs tracing the same clock source.
Step 5 Optional: If the extended SSM protocol starts, set the clock ID of the clock source.
Step 6 Click Apply. In the Operation Result dialog box, click Close.
Step 7 Optional: If the clock ID is specified for the line clock of an NE, click the Clock ID Status tab,
and set the Enabled Status to Enabled. Click Apply. In the Operation Result dialog box, click
Close.
----End
configured, to allocate the NEs to different orderwire subnets. You can make the conference
calls between NEs that are associated with the same orderwire subnet.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Orderwire from the Function
Tree. Click the General tab.
Step 3 Set Call Waiting Time(s), Telephone No. and orderwire ports.
NOTE
l Call Waiting Time should be set to the same value for all NEs with orderwire communication. When
the number of NEs is smaller than 30, set the value to 5 seconds. Otherwise, set it to 9 seconds.
l The telephone number cannot repeat in the same orderwire subnet.
l Set the length of the telephone number according to the actual requirements. The maximum length is
eight digits and the minimum length is three digits. In the same orderwire subnet, the number length
must be the same. For the settings of the orderwire subnet, refer to 2.9.4 Dividing Orderwire
Subnets.
l The length of the telephone number must be the same as that of the conference call number.
l If the length of the subnet number is 1, the first digit of the two orderwire numbers must be the same.
If the length of the subnet number is 2, the first two digits of the two orderwire numbers must be the
same.
Step 4 Click Apply. A prompt appears telling you that the operation was successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, click the NE and choose Configuration > Orderwire from the Function
Tree. Click the Conference Call tab.s
Step 2 Click Query to query the conference call configuration of the NE.
Step 3 In the Available Conference Call Port pane, select the port where you want to configure a
conference call, and click .
NOTE
If the optical interfaces that support conference call form a loop, howler tone is generated. Hence, "releasing
loop" is a must, that is, only one optical port can be set for the conference call in a certain node.
Step 6 Click the General tab, and set Conference Call number.
NOTE
The conference call number for all NEs must be the same, and must have the same length as the orderwire
phone number. If the orderwire phone number has four digits, the conference call number is recommended
to be 9999.
----End
Example
You can follow the sample configuration to avoid a conference call loop.
As shown in the figure, if conference calls are configured for all optical ports, howls are caused.
Configure a conference call for NE3-7-SL16-1 only, rather than NE3-12-SL16-1.
Prerequisite
l You must be an NM user with "NE and network operator" authority or higher.
l The SCC board must be created.
l Two NEs must be connected through serial ports or by a telephone line.
Procedure
Step 1 In the NE Explorer, click an NE and choose Configuration > Orderwire from the Function
Tree. Click the Auxiliary tab.
l Use a serial port line to connect the communication ports and a telephone line to connect the phone
ports between two NEs.
l The auxiliary attributes configuration items of different equipment differ with each other to some
extent. Hence, the selected communication port and phone port must be consistent with the actual
equipment.
Step 6 Repeat Step 1 through Step 5 to configure the orderwire on another station.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Conference calls must be configured.
l Applies to OptiX OSN series products.
Background Information
Set the length of the subnet number before dividing the orderwire subnet, which can be of one
or two digits. Then configure the subnet number. You can obtain the subnet conference call
number by overlaying the preceding digits of the conference call number by subnet number. For
example, if the conference call number is 999 and the subnet number is 1, the subnet conference
call number of the subnet 1 is 199.
The optical interfaces with the same subnet number belong to the same orderwire subnet.
The different optical interfaces on each NE can belong to different orderwire subnets. Hence,
an NE can belong to several orderwire subnet at the same time.
Procedure
Step 1 In the NE Explorer, click the NE and choose Configuration > Orderwire from the Function
Tree.
Step 2 Optional: Click the Auxiliary tab and set Subnet NO. Length.
NOTE
When the Subnet NO. Length is set to 1, the Subnet of the Subnet No. for the Optical Interface is in the
range of 0 to 9. When the Subnet NO. Length is set to 2, the Subnet of the Subnet No. for the Optical
Interface is in the range of 0 and 10 to 99.
Step 3 Click the Subnet No. for the Optical Interface tab.
Step 5 Select an optical port where conference calls are configured, and click the subnet field and enter
a subnet number.
NOTE
The optical ports that have the same subnet number belong to the same orderwire subnet.
Step 6 Click Apply. Then, click Closed in the Operation Result dialog box that is displayed.
----End
Before configuring SDH services, it is recommended that you query the resource occupation of
the ports on the NE by using the T2000.
3.1 Basic Concepts
The following basic concepts help you understand and configure the relevant SDH services
correctly.
3.2 Configuring Services on the Non-Protection Chain
Configure the protection subnet and the services on the non-protection chain separately. It is
recommended that you configure the protection subnet before configuring the services on the
non-protection chain.
3.3 Configuring Services on the Non-Protection Ring
Configure the protection subnet and the services on the non-protection ring separately. It is
recommended that you configure the protection subnet before configuring the services on the
non-protection ring.
3.4 Configuring 1+1 Linear MSP Services
In the case of the 1+1 linear multiplex section protection (MSP), services are transmitted on the
working path and the protection path at the same time. The sink NE selects the services from
the working path in normal cases, and selects services from the protection path when the working
path becomes faulty.
3.5 Configuring 1:1 Linear MSP Services
In the case of the 1:1 linear MSP, services are transmitted on the working path and the sink NE
receives the services from the working path in normal cases. When the working path becomes
faulty, the services are switched to the protection path for transmission and the sink NE receives
the services from the protection path.
3.6 Configuring Two-Fiber Unidirectional MSP Services
The two-fiber unidirectional MSP services can provide network-level protection for the services
on NEs on the MSP ring. On the T2000, you can add all the NEs on the MSP ring to the protection
subnet to create a two-fiber unidirectional MSP ring.
3.7 Configuring Two-Fiber Bidirectional MSP Services
To configure the two-fiber bidirectional MSP services, you need to create the MSP subnet
protection and MSP services separately. There is no requirement for the configuration sequence.
intersecting rings can implement service protection when an intersecting NE fails. Hence, the
SNCP intersecting rings are applicable to the scenarios where the services need to be protected
when one intersecting node fails.
Unidirectional Service
The unidirectional service indicates the service that is received and transmitted on different
paths. A unidirectional service created between NE A and NE B can only be transmitted from
NE A (source end) to NE B (sink end) or only be transmitted from NE B (source end) to NE A
(sink end).
Bidirectional Service
The bidirectional service indicates the service that is received and transmitted on the same path.
A bidirectional service created between NE A and NE B can be transmitted and received either
from NE A to NE B or from NE B to NE A.
MSP
The multiplex section protection (MSP) provides a function that switches the signals from the
working section to the protection section between two multiplex section termination (MST)
functions.
SNCP Principle
The sub-network connection protection (SNCP) is defined by the ITU-T Recommendations.
With the 1+1 single-ended switching function, the SNCP is used for protecting services that
travel across different subnets. The SNCP is characterized by the dual-fed and selective-
receiving mode.
Tangent Ring
The tangent ring indicates an SDH network topology structure wherein two rings are connected
Through a common node NE (namely, the tangent NE), and all inter-ring services are transmitted
through the tangent NE. The tangent NE is crucial to the entire network. If the tangent NE fails,
the inter-ring services are interrupted.
Intersecting Ring
The intersecting ring indicates two ring networks that are connected by two common node NEs
to implement the inter-ring connection. The inter-ring services are simultaneously transmitted
and received over two intersecting NEs. The inter-ring services are simultaneously transmitted
and received over two intersecting NEs. If one intersecting NE is faulty, services are not affected.
Thus, the protection capability of the intersecting ring topology is much stronger than the
protection capability of the tangent ring topology.
Figure 3-2 shows the signal flow of the services on the non-protection chain and the timeslot
allocation to the services on the non-protection chain. In this example, the STM-1 service is
added to or dropped from NE1 and NE2.
1 17
VC4: VC4-1
NE1 NE2
Line Board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.7.1 Configuring a Non-Protection
Chain.
l You must be familiar with 3.2.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 1-JL64-1 As shown in Figure 3-1, the JL64 board in slot 1 of
(SDH-1) NE1 is used as the source board.
Sink Slot 17-JL64-1 As shown in Figure 3-1, the JL64 board in slot 17 of
(SDH-1) NE1 is used as the sink line board.
Sink Timeslot 1 In this example, the service sink occupies the first
Range(e.g. VC-4.
1,3-6)
Activate Yes -
Immediately
Step 2 Refer to Step 1 to configure SDH services on the sink NE (NE2). Set the required parameters.
Parameter Value in Description
This
Example
Direction Bidirectional In this example, the services are transmitted and received
on the same path. That is, the services are bidirectional
services.
Source Slot 1-JL64-1 As shown in Figure 3-1, the JL64 board in slot 1 of NE2
(SDH-1) is used as the source board.
Source Timeslot 1 In this example, the service source occupies the first
Range(e.g.1,3-6) VC-4.
Sink Slot 17-JL64-1 As shown in Figure 3-1, the JL64 board in slot 17 of NE2
(SDH-1) is used as the sink line board.
Sink Timeslot 1 In this example, the service sink occupies the first VC-4.
Range(e.g.1,3-6)
Activate Yes -
Immediately
Step 3 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 4 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly, and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
Figure 3-3 shows a non-protection ring consisting of four pieces of equipment. In this example,
the JL64 boards are used on the four NEs to implement the cross-connect grooming of services.
17
NE1
NE3
17
Figure 3-4 shows the signal flow of the services on the non-protection ring and the timeslot
allocation to the services on the non-protection ring. In this example, the STM-1 service is added
to or dropped from NE1 and NE3, and passes through NE2.
VC4: VC4-1
17 NE1
1
VC4: VC4-1
VC4: VC4-1
Line Board Line Board
Line Board Line Board NE2 Non-protection ring NE4
1-JL64 17-JL64
1-JL64 17-JL64
17
NE3
17
VC4: VC4-1
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.7.2 Configuring a Non-Protection
Ring.
l You must be familiar with 3.3.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 1-JL16-1 As shown in Figure 3-3, the JL16 board in slot 1 of NE1
(SDH-1) is used as the source line board.
Sink Slot 17-JL64-1 As shown in Figure 3-3, the JL64 board in slot 17 of
(SDH-1) NE1 is used as the sink line board.
Activate Yes -
Immediately
Step 2 Configure the SDH services of the sink NE (NE3). Refer to Step 1 to configure the SDH services
on NE3. Set the required parameters.
Parameter Value in Description
This
Example
Source Slot 1-JL16-1 As shown in Figure 3-3, the JL16 board in slot 1 of NE3 is
(SDH-1) used as the source line board.
Sink Slot 17-JL64-1 As shown in Figure 3-3, the JL64 board in slot 17 of NE3
(SDH-1) is used as the sink line board.
Activate Yes -
Immediately
Source Slot 1-JL64-1 As shown in Figure 3-3, the JL64 board in slot 1 of NE2
(SDH-1) is used as the source line board.
Sink Slot 17-JL64-1 As shown in Figure 3-3, the JL64 board in slot 17 of
(SDH-1) NE2 is used as the sink line board.
Activate Yes -
Immediately
Step 4 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 5 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly, and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
As shown in Figure 3-5, the JL16 boards are used on NE1 and NE2 to implement the cross-
connect grooming of STM-1 services and the SL64 boards are used on NE1 and NE2 to transmit
SDH services.
As shown in Figure 3-6, the signal flow of the 1+1 linear MSP services and the timeslot
allocation to the 1+1 linear MSP services are as follows:
l Traffic direction from NE1 to NE2: NE1→NE2
Services are added to the source NE (NE1) and then transmitted on the working path and
the protection path at the same time. Then, the services are dropped from the sink NE (NE2),
which selects the services from the working path.
l Traffic direction from NE2 to NE1: NE2→NE1
Services are added to the source NE (NE2) and then transmitted on the working path and
the protection path at the same time. Then, the services are dropped from the sink NE (NE1),
which selects the services from the working path.
l The STM-1 service between NE1 and NE2 occupies the first VC-4 on the SDH link between
NE1 and NE2.
When the working path from NE1 to NE2 becomes faulty, the signal flow in the case of a single-
ended switching is as follows:
l Traffic direction from NE1 to NE2: NE1→NE2
Services are added to the source NE (NE1) and then transmitted on the working path and
the protection path at the same time. Then, the services are dropped from the sink NE (NE2),
which selects the services from the protection path.
l The services between NE2 and NE1 are not affected. Traffic direction from NE2 to NE1:
NE2→NE1
Services are added to the source NE (NE2) and then transmitted on the working path and
the protection path at the same time. Then, the services are dropped from the sink NE (NE1),
which selects the services from the working path.
When the working path from NE1 to NE2 becomes faulty, the traffic flow in the case of dual-
ended switching is as follows:
17 17
VC4: VC4-1 VC4: VC4-1
1xSTM-1 1xSTM-1
18 18
NE2: NE1:
Line Board Line Board Line Board Line Board Line Board Line Board
1-JL16 17-JL64 18-JL64 1-JL16 17-JL64 18-JL64
Traffic flow on
the working STM-16 line board
path
Traffic flow on
the protection STM-64 line board
path
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.7.4 Creating a Linear MS
Protection Subnet.
l You must be familiar with 3.4.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL16-1 As shown in Figure 3-5, the JL16 board in slot 1 is used
(SDH-1) as the source line board for the bidirectional service from
NE1 to NE2.
Sink Slot 17-JL64-1 As shown in Figure 3-5, the JL64 board in slot 17 is used
(SDH-1) as the sink line board.
Activate Yes -
Immediately
1. Click . Select NE2 in the Navigation Tree that is displayed. Then, click OK.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 1-JL16-1 As shown in Figure 3-5, the JL16 board in slot 1 is used
(SDH-1) as the source line board.
Sink Slot 17-JL64-1 As shown in Figure 3-5, the JL64 board in slot 17 is used
(SDH-1) as the sink line board for the bidirectional service from
NE1 to NE2.
Activate Yes -
Immediately
Step 3 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 4 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly, and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
As shown in Figure 3-7, the JL16 boards are used on NE1 and NE2 to add and drop STM-1
services and the JL64 boards are used on NE1 and NE2 to transmit SDH services.
As shown in Figure 3-8, the signal flow of the 1:1 linear MSP services and the timeslot allocation
to the 1:1 linear MSP services are as follows:
l Traffic direction from NE1 to NE2: NE1→NE2
Services are added to the source NE (NE1) and then dropped from the sink NE (NE2). The
services are transmitted on the working path.
l Traffic direction from NE2 to NE1: NE2→NE1
Services are added to the source NE (NE2) and then dropped from the sink NE (NE1). The
services are transmitted on the working path.
l The STM-1 service between NE1 and NE2 occupies the first VC-4 on the SDH link between
NE1 and NE2.
When the working path between NE1 and NE2 becomes faulty, the signal flow is as follows:
l Traffic direction from NE1 to NE2: NE1→NE2
Services are added to the source NE (NE1) and then dropped from the sink NE (NE2). The
services are transmitted on the protection path.
l Traffic direction from NE2 to NE1: NE2→NE1
Services are added to the source NE (NE2) and then dropped from the sink NE (NE1). The
services are transmitted on the protection path.
The differences between the 1:1 linear MSP service and the 1+1 linear MSP service are as
follows:
l In the case of the 1+1 linear MSP services, services are transmitted on the working path
and the protection path at the same time. The sink NE selects the services from the working
path.
l In the case of the 1:1 linear MSP services, services are transmitted on only the working
path. Services are switched to the protection path for transmission only when the working
path becomes faulty.
17 17
VC4: VC4-1 VC4: VC4-1
1xSTM-1 1xSTM-1
18 18
NE2: NE1:
Line Board Line Board Line Board Line Board Line BoardLine Board
1-JL16 17-JL64 18-JL64 1-JL16 17-JL64 18-JL64
Traffic flow on
the working path STM-16 line board
Traffic flow on the
protection path STM-64 line board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.7.4 Creating a Linear MS
Protection Subnet.
l You must be familiar with 3.5.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL16-1 As shown in Figure 3-7, the JL16 board in slot 1 is used
(SDH-1) as the source line board for the bidirectional service from
NE1 to NE2.
Sink Slot 17-JL64-1 As shown in Figure 3-7, the JL64 board in slot 17 is used
(SDH-1) as the sink line board.
Activate Yes -
Immediately
1. Click . Select NE2 in the Navigation Tree that is displayed. Then, click OK.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 1-JL16-1 As shown in Figure 3-7, the JL16 board in slot 1 is used
(SDH-1) as the source line board.
Sink Slot 17-JL64-1 As shown in Figure 3-7, the JL64 board in slot 17 is used
(SDH-1) as the sink line board for the bidirectional service from
NE1 to NE2.
Activate Yes -
Immediately
Step 3 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 4 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly, and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
The networking diagram of a single two-fiber unidirectional MSP ring is simple. When you
construct the network, follow a certain order to create and name the NEs and ensure that the
traffic flows in a proper direction. This helps you plan the traffic directions and configure services
in future.
3.6.2 Signal Flow and Timeslot Allocation
To configure the two-fiber unidirectional MSP services, you can configure the services that need
to be added to the ring network on the source NE, to pass through the intermediate nodes, and
then to be dropped from the sink NE if the MSP protection subnet is already created.
3.6.3 Configuration Process
This topic describes how to configure the two-fiber unidirectional MSP services.
As shown in Figure 3-9, the JL16 boards are used on NE1 and NE3 on the ring to add and drop
STM-1 services and the JL64 boards are used on NE1 and NE3 as line boards to transmit SDH
services.
17 18
NE1
NE3
18 17
As shown in Figure 3-10, the signal flow of the two-fiber unidirectional MSP services and the
timeslot allocation to the two-fiber unidirectional MSP services are as follows:
l Traffic direction from NE1 to NE3: NE1→NE2→NE3
The STM-1 service is added to the ring network on the source NE (NE1), passes through
NE2, and then is dropped from the sink NE (NE3).
l Traffic direction from NE3 to NE1: NE3→NE4→NE1
The STM-1 service is added to the ring network on the source NE (NE3), passes through
NE4, and then is dropped from the sink NE (NE1).
l The STM-1 service is transmitted on the first VC-4.
When the transmission path between NE1 and NE2 becomes faulty, the signal flow of the two-
fiber unidirectional MSP services and the timeslot allocation to the two-fiber unidirectional MSP
services are as follows:
l Traffic direction from NE1 to NE3: NE1→NE4→NE3→NE2→NE3 Services are added
to the ring network on the source NE (NE1) and switched from the original working path
to the protection path. Then, the services pass through NE4 and NE3. After that, the services
are switched from the protection path to the working path on NE2. Finally, the services are
dropped from NE3.
l The services from NE3 to NE1 are not affected, and the traffic direction is
NE3→NE4→NE1.
The differences between the two-fiber unidirectional MSP service and the two-fiber bidirectional
MSP service are as follows:
l The two-fiber unidirectional MSP service uses the diverse routes, whereas the two-fiber
bidirectional MSP service uses the uniform route.
l In the case of the two-fiber unidirectional MSP service, different fibers are used for the
working timeslot and the protection timeslot. That is, one fiber is used for carrying the
working service, and the other fiber is used for protection. In the case of the two-fiber
bidirectional MSP service, the same fiber is used for the working timeslot and the protection
timeslot. That is, a certain capacity of the fiber is used for carrying the working service,
and a certain capacity of the fiber is used for protection.
VC4: VC4-1
17 18
NE2: NE1 NE4:
Line board Line board Line board Line board
1-JL64 17-JL64 1 1-JL64 17-JL64
17
VC4: VC4-1 Two-fiber
NE2 unidirectional MSP ring NE4 VC4: VC4-1
Service pass-through
Service pass-through
17 1
18 NE3
17
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.7.3 Creating an MS Ring
Protection Subnet.
l You must be familiar with 3.6.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure unidirectional services from NE1 to NE3.
1. Configure the SDH services of the source NE (NE1).
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL16-1 As shown in Figure 3-9, the JL16 board in slot 1 is
(SDH-1) used as the source line board for the unidirectional
service from NE1 to NE3.
Sink Slot 17-JL64-1 As shown in Figure 3-9, the JL64 board in slot 17 is
(SDH-1) used as the sink line board.
Activate Yes -
Immediately
l Click . Select NE2 in the Navigation Tree that is displayed. Then, click OK.
l Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL64-1 As shown in Figure 3-9, the JL64 board in slot 1 is
(SDH-1) used as the source line board. You can select different
source boards depending on the actual situation.
Sink Slot 17-JL64-1 As shown in Figure 3-9, the JL64 board in slot 17 is
(SDH-1) used as the sink line board.
Activate Yes -
Immediately
l Click . Select NE3 in the Navigation Tree that is displayed. Then, click OK.
l Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 18-JL64-1 As shown in Figure 3-9, the JL64 board in slot 18 is
(SDH-1) used as the source line board.
Sink Slot 1-JL16-1 As shown in Figure 3-9, the JL16 board in slot 1 is
(SDH-1) used as the sink line board for the unidirectional
service from NE1 to NE2.
Activate Yes -
Immediately
Source Slot 1-JL16-1 As shown in Figure 3-9, the JL16 board in slot 1 is used
(SDH-1) as the source line board for the unidirectional service
from NE3 to NE1.
Sink Slot 17-JL64-1 As shown in Figure 3-9, the JL64 board in slot 17 is used
(SDH-1) as the sink line board.
Activate Yes -
Immediately
Source Slot 1-JL64-1 As shown in Figure 3-9, the JL64 board in slot 1 is used
(SDH-1) as the source line board.
Sink Slot 17-JL64-1 As shown in Figure 3-9, the JL64 board in slot 17 is used
(SDH-1) as the sink line board.
Activate Yes -
Immediately
Source Slot 18-JL64-1 As shown in Figure 3-9, the JL64 board in slot 18 is used
(SDH-1) as the source line board.
Sink Slot 1-JL16-1 As shown in Figure 3-9, the JL16 board in slot 1 is used
(SDH-1) as the sink line board for the bidirectional service from
NE3 to NE1.
Activate Yes -
Immediately
Step 3 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 4 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
17 18
NE1
1 17
Line board 1-JL64
Line board 1-JL64 NE2 MSP ring NE4 Line board 17-JL64
Line board 17-JL64
17 1
NE3
18 17
VC4: VC4-1
17 18
NE2: NE1
Line Board Line Board
1-JL64 17-JL64 1
VC4: VC4-1
Service pass-through NE2 MSP ring NE4
17
18 NE3 17
NE4:
1xSTM-1 Line Board Line Board
STM-16 line board 1-JL16 18-JL64
Traffic flow
STM-64 line board
services on the source and sink NEs and the pass-through services on the intermediate NEs if
the protection subnet is already created.
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.7.3 Creating an MS Ring
Protection Subnet.
l You must be familiar with 3.7.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL16-1 As shown in Figure 3-11, the JL16 board in slot 1 is used
(SDH-1) as the source line board. You can select different source
boards depending on the actual situation.
Sink Slot 17-JL64-1 As shown in Figure 3-11, the JL64 board in slot 17 is
(SDH-1) used as the sink line board. You can select different sink
boards depending on the actual situation.
Activate Yes -
Immediately
Step 2 Configure the SDH services of the sink NE (NE3). Refer to Step 1 to configure the SDH services
on NE3. Set the required parameters.
Source Slot 18-JL64-1 As shown in Figure 3-11, the JL64 board in slot 18 is used
(SDH-1) as the source line board. You can select different source
boards depending on the actual situation.
Sink Slot 1-JL16-1 As shown in Figure 3-11, the JL16 board in slot 1 is used
(SDH-1) as the sink line board. You can select different sink boards
depending on the actual situation.
Activate Yes -
Immediately
Source Slot 1-JL64-1 As shown in Figure 3-11, the JL64 board in slot 1 is used
(SDH-1) as the source line board. You can select different source
boards depending on the actual situation.
Sink Slot 17-JL64-1 As shown in Figure 3-11, the JL64 board in slot 17 is
(SDH-1) used as the sink line board. You can select different sink
boards depending on the actual situation.
Activate Yes -
Immediately
Step 4 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 5 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly, and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
As shown in Figure 3-13, the JL16 boards are used on NE1 and NE3 on the ring to add and drop
services and the JL64 boards are used on NE1 and NE3 to transmit SDH services.
7 17
NE1
18 7 8
Line board 7-JL64 17 Line board 7-JL64
Line board 8-JL64 Four-fiber bidirectional Line board 8-JL64
Line board NE2 NE4 Line board
17-JL64 MSP ring 17-JL64
Line board 18-JL64 7 17 Line board 18-JL64
8 18
NE3
17 7
18 8
Line board 1-JL16
Line board 7-JL64
Line board 8-JL64
Line board 17-JL64
Line board 18-JL64
CAUTION
The switching of the four-fiber bidirectional MSP ring includes section switching and ring
switching. When only the working link becomes faulty, the section switching is performed.
When both the working link and the protection link become faulty, the ring switching is
performed.
NE2:
NE1
Line Board Line Board
8-JL64 18-JL64 18
VC4: VC4-1
Service pass-through NE2 Four-fiber NE4
bidirectional MSP
8 ring
NE3
Traffic flow on the
forward working path
Traffic flow on the STM-16 line
backward working path board 18
Traffic flow on the
forward protection path STM-64 line VC4: VC4-1 NE3:
Traffic flow on the board 1xSTM-1 Line Board Line Board
backward protection path 1-JL16 18-JL64
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.7.3 Creating an MS Ring
Protection Subnet.
l You must be familiar with 3.8.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL16-1 As shown in Figure 3-13, the JL16 board in slot 1 is used
(SDH-1) as the source line board for the service.
Sink Slot 8-JL64-1 As shown in Figure 3-13, the JL64 board in slot 8 is used
(SDH-1) as the sink line board.
Activate Yes -
Immediately
1. Click . Select NE2 in the Navigation Tree that is displayed. Then, click OK.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 18-JL64-1 As shown in Figure 3-13, the JL64 board in slot 18 is
(SDH-1) used as the source line board.
Sink Slot 8-JL64-1 As shown in Figure 3-13, the JL64 board in slot 8 is used
(SDH-1) as the sink line board.
Activate Yes -
Immediately
1. Click . Select NE3 in the Navigation Tree that is displayed. Then, click OK.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 18-JL64-1 As shown in Figure 3-13, the JL64 board in slot 18 is
(SDH-1) used as the source line board.
Source VC4 VC4-1 In this example, the services require five VC-12s.
Source VC4 is set to VC4-1, because a VC-4 contains
63 VC-12s.
Sink Slot 1-JL16-1 As shown in Figure 3-13, the JL16 board in slot 1 is used
(SDH-1) as the sink line board for the service.
Activate Yes -
Immediately
Step 4 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 5 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
17 18
NE1
1 17
Line board 1-JL64
Line board 1-JL64 NE2 Transoceanic MSP ring NE4
Line board 17-JL64
Line board 17-JL64
17 1
NE3
18 17
NOTE
l The transoceanic MS and ASON feature are mutually exclusive. That is, the ASON feature can be
configured on the transoceanic MS and the transoceanic MS can be configured on the ASON network.
thus prevents the transmission delay of a long-distance transmission network such as the
submarine cable system from being increased.
Figure 3-16 shows the service signal flow and timeslot allocation. In this example, one STM-1
service is configured so that the service is added to the ring network from NE1, passes through
NE2, and then is dropped from the sink NE (NE3).
NE1:
1xSTM-1 Line Board Line Board
1-JL16 17-JL64
VC4: VC4-1
17 18
NE2: NE1
Line Board Line Board
1-JL64 1-JL64 1
VC4: VC4-1
Service pass- NE2 NE4
through Transoceanic MSP ring
17
18 NE3 17
NE4:
1xSTM-1 Line Board Line Board
STM-16 line board 1-JL16 18-JL64
Traffic flow
STM-64 line board
Assume that a fault occurs on the section between NE1 and NE2. In this case, the transoceanic
MSP switching is performed. Figure 3-17 shows the signal flow and timeslot allocation after
the transoceanic MSP switching. The services are switched at the source and sink nodes of the
services of NE1 and NE3. In this manner, the path loopback is prevented and the service
transmission distance is decreased.
Figure 3-17 Signal flow and timeslot allocation after the switching
NE1:
1xSTM-1 Line Board Line Board
1-JL16 17-JL64
VC4: VC4-1
17 18
NE2: NE1
Line Board Line Board
1-JL64 1-JL64 1
VC4: VC4-1
Service Pass-through NE2 NE4
Transoceanic MSP ring
17
18 NE3 17
NE4:
1xSTM-1 Line Board Line Board
STM-16 line board 1-JL16 18-JL64
Traffic flow
STM-64 line board
NOTE
When the transoceanic MS is in the switched state, the extra services on the protection paths that are not
preempted by the working services during the switching are restored one minute after the switching is
performed.
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.7.3 Creating an MS Ring
Protection Subnet.
l You must be familiar with 3.7.2 Signal Flow and Timeslot Allocation.
Precautions
All the MSs on the entire ring must use the transoceanic protocol. Otherwise, the switching
cannot be performed correctly. The equipment of versions that are available cannot check that
all the MSs on the entire ring use the same protocol.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters that are required, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL16-1 In this example, the JL16 board in slot 1 is used as the
(SDH-1) source line board. See Figure 3-15. You can select
different source boards depending on the actual
situation.
Sink Slot 17-JL64-1 In this example, the JL64 board in slot 17 is used as the
(SDH-1) sink line board. See Figure 3-15. You can select
different sink boards depending on the actual situation.
Activate Yes -
Immediately
Step 2 Configure the SDH services of the sink NE (NE3). Refer to Step 1 and configure the SDH
services of NE3. Set the parameters as follows.
Parameter Value in Description
This
Example
Source Slot 18-JL64-1 In this example, the JL64 board in slot 18 is used as the
(SDH-1) source line board. See Figure 3-15. You can select different
source boards depending on the actual situation.
Sink Slot 1-JL16-1 In this example, the JL16 board in slot 1 is used as the sink
(SDH-1) line board. See Figure 3-15. You can select different sink
boards depending on the actual situation.
Sink Timeslot 1 As shown in Figure 3-16, the total capacity of the service
Range(e.g. is 1xSTM-1 according to the plan. Hence, Sink Timeslot
1,3-6) Range(e.g.1,3-6) is set to 1.
Activate Yes -
Immediately
Source Slot 1-JL64-1 In this example, the JL64 board in slot 1 is used as the
(SDH-1) source line board. See Figure 3-15. You can select
different source boards depending on the actual
situation.
Sink Slot 17-JL64-1 In this example, the JL64 board in slot 17 is used as the
(SDH-1) sink line board. See Figure 3-15. You can select
different sink boards depending on the actual situation.
Activate Yes -
Immediately
Step 4 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 5 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
17 18
NE1
1 17
Line board 1-JL64 SNCP ring Line board 1-JL64
NE2 NE4 Line board 17-JL64
Line board 17-JL64
17 1
NE3
18 17
VC4: VC4-1
17 18
NE1 NE2 and NE4:
SDH Service Service
Service Source
Sink
VC-4 1-JL64 17-JL64
1 17
VC4: VC4-1 VC4: VC4-1
Service pass-through NE2 SNCP ring NE4 Service pass-through
17 1
18 NE3 17
VC4:VC4-1
NE3:
SNCP Protection Protection
Group Working Source Service Sink
Source
Flow of the working 1xSTM-1 Protection group 1 18-JL64 17-JL64 1-JL16
STM-16 line board
service
Flow of the
protection service STM-64 line board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l You must be familiar with 3.10.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create SNCP Service on the lower-right pane. In the Create SNCP Service dialog
box that is displayed, set the required parameters, and then click OK. Click Close in the
Operation Result dialog box that is displayed.
Service Type SNCP In this example, Service Type adopts the default
value, namely, SNCP.
WTR Time(s) 600 After the working path is recovered and the
normal state lasts for 600s, the switching
recovery occurs. This parameter is valid only
when Revertive Mode is set to Revertive.
Worki Source 18-JL64-1 As shown in Figure 3-18, the JL64 board in slot
ng Slot (SDH-1) 18 is used as the source board for the working
Servic service. You can select different source boards
e for the working service depending on the actual
situation.
Sink Slot 1-JL16-1 As shown in Figure 3-18, the JL16 board in slot
(SDH-1) 1 is used as the sink line board. You can select
different sink boards depending on the actual
situation.
Protec Source 17-JL64-1 As shown in Figure 3-18, the JL64 board in slot
tion Slot (SDH-1) 17 is used as the source board for the protection
Servic service. You can select different source boards
e for the protection service depending on the
actual situation.
Step 2 Configure the SDH services of the sink NE (NE3). Refer to Step 1 to configure the SDH services
on NE3. The method and parameters for configuring the SDH services on NE3 are the same as
the method and parameters for configuring the SDH services on NE1.
Step 3 Configure pass-through services on NE2.
1. In the NE Explorer, select NE2 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 1-JL64-1 As shown in Figure 3-18, the JL64 board in slot 1 is used
(SDH-1) as the source line board. You can select different source
boards depending on the actual situation.
Sink Slot 17-JL64-1 As shown in Figure 3-18, the JL64 board in slot 17 is
(SDH-1) used as the sink line board. You can select different sink
boards depending on the actual situation.
Activate Yes -
Immediately
Step 4 Configure pass-through services on NE4. Refer to Step 3 to configure the pass-through services
on NE4. The method and parameters for configuring the pass-through services on NE4 are the
same as the method and parameters for configuring the pass-through services on NE2.
Step 5 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 6 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 7 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly, and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
SNCP ring. The services from the SNCP ring to the non-protection chain pass through the
intersecting node and are added to or dropped from the NE on the non-protection chain.
3.11.2 Signal Flow and Timeslot Allocation
To configure services on the SNCP ring with a non-protection chain, you need to plan certain
traffic directions for the services on the SNCP ring and the services on the non-protection chain.
During the timeslot allocation of the services on the SNCP ring, allocate timeslots for source
slots, which include the source timeslots of the working service and the source timeslots of the
protection service.
3.11.3 Configuration Process
Before you configure services on the SNCP ring with a non-protection chain, familiarize yourself
with the information about the source slot, sink slot, and their corresponding timeslots of the
working service and the protection service on the source and sink NEs on the SNCP ring. In
addition, you need to configure pass-through services on the intermediate NEs.
Figure 3-20 shows the networking diagram of the SNCP ring with a non-protection chain. The
SNCP ring consists of five pieces of equipment.
In this example, one STM-1 service is configured between NE3 and NE5. The JL16 boards are
used on the source NE (NE3) and the sink NE (NE5) to add and drop services and the JL64
boards are used on the source NE (NE3) and the sink NE (NE5) to transmit SDH services.
Figure 3-20 Networking diagram of the SNCP ring with a non-protection chain
Line board 1-JL64
Line board 17-JL64
1 17
NE1
Non-protection NE5
17 1 chain
Line board 1-JL64 Line board 1-JL16
NE2 SNCP ring NE4
Line board 17-JL64 Line board 17-JL64
1 17 18 17
Figure 3-21 shows the signal flow of the services on the SNCP ring with a non-protection chain
and the timeslot allocation to the services on the SNCP ring with a non-protection chain. In this
example, the STM-1 service is configured between NE3 and NE5.
In this example, the traffic direction of the services on the SNCP ring, is configured as follows:
l Traffic direction of the working service from NE3 to NE4: NE3→NE4
l Traffic direction of the protection service from NE3 to NE4: NE3→NE2→NE1→NE4
l Traffic direction of the working service from NE4 to NE3: NE4→NE1→NE2→NE3
l Traffic direction of the protection service from NE4 to NE3: NE4→NE3
In the actual configuration, you can plan other working paths and protection paths according to
the requirements.
NE4:
1 11 SNCP Protection
NE2: VC4: VC4-1 Service pass-through NE1 Group
Workin g Source Protection Source Service Sink
Protection group 1 17-JL64 1-JL64 18-JL64
SDH Service Service Source Service Sink
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.7.1 Configuring a Non-Protection
Chain.
l You must be familiar with 3.11.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE3).
1. In the NE Explorer, select NE3 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create SNCP Service on the lower-right pane. In the Create SNCP Service dialog
box that is displayed, set the required parameters, and then click OK. Click Close in the
Operation Result dialog box that is displayed.
Parameter Value in Description
This
Example
WTR Time(s) 600 After the working path is recovered and the normal
state lasts for 600s, the switching recovery occurs.
This parameter is valid only when Revertive
Mode is set to Revertive.
Wor Source Slot 17-JL64-1 As shown in Figure 3-20, the JL64 board in slot
king (SDH-1) 17 of NE3 is used as the source board for the
Ser working service.
vice
Source 1 In this example, one STM-1 service is configured
Timeslot between NE3 and NE5. Hence, the working
Range(e.g. service source occupies the first VC-4.
1,3-6)
Sink Slot 1-JL16-1 As shown in Figure 3-20, the JL16 board in slot
(SDH-1) 1 of NE3 is used as the sink board for the working
service.
Prot Source Slot 18-JL64-1 As shown in Figure 3-20, the JL16 board in slot
ecti (SDH-1) 18 of NE3 is used as the source board for the
on protection service.
WTR Time(s) 600 After the working path is recovered and the
normal state lasts for 600s, the switching recovery
occurs. This parameter is valid only when the
Revertive Mode parameter is set to Revertive.
Wor Source Slot 17-JL64-1 As shown in Figure 3-20, the JL64 board in slot
king (SDH-1) 17 of NE4 is used as the source board for the
Ser working service.
vice
Source 1 In this example, one STM-1 service is configured
Timeslot between NE3 and NE5. Hence, the working
Range(e.g. service source occupies the first VC-4.
1,3-6)
Sink Slot 18-JL64-1 As shown in Figure 3-20, the JL64 board in slot
(SDH-1) 18 of NE4 is used as the sink board for the working
service. This can implement the pass-through of
the service when the service needs to be
transmitted out of the SNCP ring.
Prot Source Slot 1-JL64-1 As shown in Figure 3-20, the JL16 board in slot
ecti (SDH-1) 1 of NE3 is used as the source board for the
on protection service.
Ser
vice Source 1 In this example, one STM-1 service is configured
Timeslot between NE3 and NE5. Hence, the protection
Range(e.g. service source occupies the first VC-4.
1,3-6)
Source Slot 17-JL64-1 As shown in Figure 3-20, the JL64 board in slot 17 of
(SDH-1) NE2 is used as the source line board.
Sink Slot 1-JL64-1 As shown in Figure 3-20, the JL64 board in slot 1 of
(SDH-1) NE2 is used as the sink line board.
Activate Yes -
Immediately
Step 4 Configure pass-through services on NE1. Refer to Step 3 to configure the SDH services on NE1.
The method and parameters for configuring the pass-through services of NE1 are the same as
the method and parameters for configuring the pass-through services on NE2.
Source Slot 1-JL16-1 As shown in Figure 3-20, the JL64 board in slot 1 of
(SDH-1) NE5 is used as the source board.
Sink Slot 17-JL64-1 As shown in Figure 3-20, the JL64 board in slot 17 of
(SDH-1) NE5 is used as the sink line board.
Activate Yes -
Immediately
Step 6 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 7 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 8 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly, and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
Figure 3-22 Networking diagram of the two-fiber bidirectional MSP ring with a non-protection
chain
Line board 1-JL64
Line board 17-JL64
1 17
NE1
Non-protection chain NE5
17 1
Line board 1-JL64 Line board 1-JL16
NE2 Two-fiber bidirectional NE4
Line board 17-JL64 MSP ring Line board 17-JL64
1 17 18 17
NOTE
On the ring network, the long path and the short path do not actually refer to the geographical distance.
They are determined by the number of intermediate NEs. As shown in Figure 3-23, when the service is
transmitted from NE3 to NE4, NE3→NE4 is the short path, and NE3→NE2→NE1→NE4 is the long path.
1 17
NE1 NE4:
Line Board Line Board
17-JL64 18-JL64
17 1
VC4: VC4-1
NE3:
STM-16 line board Line Board Line Board
1xSTM-1 18-JL64 1-JL16
STM-64 line board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.7.1 Configuring a Non-Protection
Chain and 2.7.3 Creating an MS Ring Protection Subnet.
l You must be familiar with 3.12.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE3).
1. In the NE Explorer, select NE3 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL16-1 As shown in Figure 3-22, the JL64 board in slot 1 of
(SDH-1) NE3 is used as the source board.
Sink Slot 18-JL64-1 As shown in Figure 3-22, the JL64 board in slot 18 of
(SDH-1) NE3 is used as the sink line board.
Activate Yes -
Immediately
Step 2 Refer to Step 1 to configure SDH services on the sink NE (NE5). Set the required parameters.
Parameter Value in Description
This
Example
Source Slot 1-JL16-1 As shown in Figure 3-22, the JL64 board in slot 1 of NE5
(SDH-1) is used as the source board.
Sink Slot 17-JL64-1 As shown in Figure 3-22, the JL64 board in slot 17 of
(SDH-1) NE5 is used as the sink line board.
Activate Yes -
Immediately
Source Slot 17-JL64-1 As shown in Figure 3-22, the JL64 board in slot 17 of
(SDH-1) NE4 is used as the source line board.
Sink Slot 18-JL64-1 As shown in Figure 3-22, the JL64 board in slot 18 of
(SDH-1) NE4 is used as the sink line board.
Activate Yes -
Immediately
Step 4 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 5 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly, and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
17 18
NE1
1 17
Line board 1-JL64
Line board 17-JL64 NE2 MSP ring 1 NE4
17 1
NE3
Line board 1-JL64
1 17 Line board 2-JL64
2 Line board 17-JL64
18
Line board 18-JL64
17 17
Line board 1-JL64
Line board 17-JL64 NE5 MSP ring 2 NE7
1 1
NE6
17 18
17 18
NE2: NE1
Line Board Line Board
1-JL64 17-JL64 1 17
VC4: VC4-1
Serice pass-through NE2 MSP ring 1 NE4
17 1
NE3
1 17
NE3:
Line Board Line Board VC4: VC4-1
1-JL64 2-JL64
2 18
17 17
VC4: VC4-1
MSP ring 2
Service pass-through NE5 NE7
NE5:
1 1
Line Board Line Board
1-JL64 17-JL64
17 NE6 18
NE6:
Line Board Line Board
1xSTM-1
1-JL16 17-JL64
Flow of the
STM-16 line board
working service
STM-64 line board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The protection subnets of the two tangent rings must be created and consistent with the
actual network topology. For details about how to create the protection subnets, see 2.7.3
Creating an MS Ring Protection Subnet.
l You must be familiar with 3.13.2 Signal Flow and Timeslot Allocation.
Precautions
As shown in 3.13.2 Signal Flow and Timeslot Allocation, the traffic direction on the ring is
considered as NE1-NE2-NE3-NE5-NE6. In the actual configuration, you can use another
configuration according to the requirements. You must ensure that service is transmitted to the
local MSP ring on the source NE and then is transmitted to the another MSP ring through the
tangent NE. Finally, the service must be dropped from the sink NE.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL16-1 As shown in Figure 3-24, the JL16 board in slot 1 is used
(SDH-1) as the source line board. You can select different source
boards depending on the actual situation.
Sink Slot 17-JL64-1 As shown in Figure 3-24, the JL64 board in slot 17 is
(SDH-1) used as the sink line board. You can select different sink
boards depending on the actual situation.
Activate Yes -
Immediately
Step 2 Configure the SDH services of the sink NE (NE6). Refer to Step 1 to configure the SDH services
on NE6. Set the required parameters.
Parameter Value in Description
This
Example
Source Slot 17-JL64-1 As shown in Figure 3-24, the JL64 board in slot 17 is used
(SDH-1) as the source line board. You can select different source
boards depending on the actual situation.
Sink Slot 1-JL16-1 As shown in Figure 3-24, the JL16 board in slot 1 is used
(SDH-1) as the sink line board. You can select different sink boards
depending on the actual situation.
Activate Yes -
Immediately
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 1-JL64-1 As shown in Figure 3-24, the JL64 board in slot 1 is used
(SDH-1) as the source line board. You can select different source
boards depending on the actual situation.
Sink Slot 17-JL64-1 As shown in Figure 3-24, the JL64 board in slot 17 is
(SDH-1) used as the sink line board. You can select different sink
boards depending on the actual situation.
Activate Yes -
Immediately
Step 4 Configure pass-through services on NE5. Refer to Step 3 to configure the SDH services on NE5.
The method and parameters for configuring the SDH services on NE5 are the same as the method
and parameters for configuring the SDH services on NE2.
Step 5 Configure the SDH services of the tangent NE (NE3).
NOTE
The tangent NE of two MSP tangent rings needs to be configured with only one bidirectional path service
so that the services on the two MSP rings communicate with each other. The service protection still
depending on the protection of the two MSP rings for their own services.
1. In the NE Explorer, select NE3 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL64-1 As shown in Figure 3-24, the JL64 board in slot 1 is used
(SDH-1) as the source line board. You can select different source
boards depending on the actual situation.
Sink Slot 2-JL64-1 As shown in Figure 3-24, the JL64 board in slot 2 is used
(SDH-1) as the sink line board. You can select different sink
boards depending on the actual situation.
Activate Yes -
Immediately
Step 6 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 7 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 8 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly, and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
17 18
NE1
1 17
Line board 1-JL64
Line board NE2 MSP ring 1 NE4
17-JL64
17 1
NE3 NE8
1 17 1 17 Line board 1-JL64
Line board 2-JL64
2 18 2 18 Line board 17-JL64
Line board 18-JL64
17 17
Line board 1-JL64
Line board 17-JL64 NE5 MSP ring 2 NE7
1 1
NE6
17 18
board in slot 2 to the board in slot 1. This pass-through service functions as the protection
sources of SNCP protection group 2 on NE3.
Both the MSP intersecting rings and MSP tangent rings can implement protection for the services
when a fiber is cut on each SNCP ring. Only the MSP intersecting rings, however, can protect
the services when one intersecting node fails.
NE1:
Line Board Line Board
VC4: VC4-1
1-JL16 17-JL64
17 18
NE1
17
1
VC4: VC4-1
NE2 MSP ring 1 NE4
Service pass-through
17
1
1 17
NE3 17
Cross-Connection 1 1-JL64 17-JL64
1
Cross-Connection 2
NE8
2-JL64 18-JL64
SNCP Protection
Service Sink Working Source Protection Source
Group VC4: VC4-1
Protection group 1 2-JL64 1-JL64 18-JL64
Service pass-through
Protection group 2 1-JL64 2-JL64 17-JL64
2 18 2 18
17 17
17 NE6
18
VC4: VC4-1
NE6:
Line Board Line Board
Working path STM-16 line board 1xSTM-1
1-JL16 17-JL64
Protection path STM-64 line board
(NE3). The configuration of the services on other non-intersecting NEs is the same as the
configuration of the services on the MSP tangent rings.
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The protection subnets of the two intersecting rings must be created and consistent with
the actual network topology. For details about how to create the protection subnets, see
2.7.3 Creating an MS Ring Protection Subnet.
l You must be familiar with 3.14.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 See Step 1 to Step 4 of 3.13.3 Configuration Process to configure services on NE1, NE2, NE5,
and NE6.
Step 2 Configure services from MSP ring 1 to MSP ring 2 on the intersecting NE (NE3).
1. Configure pass-through services from the board in slot 1 to the board in slot 17 on NE3.
l In the NE Explorer, select NE3 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 1-JL64-1 As shown in Figure 3-26, the SL16 board in slot 11
(SDH-1) is used as the source line board. You can select
different source boards depending on the actual
situation.
Sink Slot 17-JL64-1 As shown in Figure 3-26, the JL64 board in slot 17 is
(SDH-1) used as the sink line board. You can select different
sink boards depending on the actual situation.
Activate Yes -
Immediately
2. Configure SNCP group 1 according to the plan on the SNCP group on NE3, which is shown
in Figure 3-27.
l In the NE Explorer, select NE3 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create SNCP Service on the lower-right pane. In the Create SNCP Service
dialog box that is displayed, set the required parameters, and then click OK. Click
Close in the Operation Result dialog box that is displayed.
Parameter Value in Description
This
Example
Service Type SNCP In this example, this parameter adopts the default
value SNCP.
WTR Time(s) 600 Generally, this parameter adopts the default value
600.
Work Sourc 1-JL64-1 As shown in Figure 3-26, the JL64 board in slot 1
ing e Slot (SDH-1) is used as the source board for the working service.
Servi You can select different source boards for the
ce working service depending on the actual situation.
Prote Sourc 18-JL64-1 As shown in Figure 3-26, the JL64 board in slot 18
ction e Slot (SDH-1) is used as the source board for the protection service.
Servi You can select different source boards for the
ce protection service depending on the actual situation.
Sink Slot 2-JL64-1 As shown in Figure 3-26, the JL64 board in slot 2
(SDH-1) is used as the sink line board. You can select
different sink boards depending on the actual
situation.
CAUTION
It is recommended that you set Hold-off Time(100ms) to a value that is longer than the
maximum MSP switching time (50 ms). If Hold-off Time(100ms) is set to 0, the SNCP
and the MSP may perform the unnecessary switching again after a fiber between NE2 and
NE3 is interrupted.
Step 3 Configure the services from MSP ring 2 to MSP ring 1 on the intersecting NE (NE3).
1. Configure pass-through services from the board in slot 2 to the board in slot 18 on NE3.
l In the NE Explorer, select NE3 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 2-JL64-1 As shown in Figure 3-26, the JL64 board in slot 2 is
(SDH-1) used as the source line board. You can select different
source boards depending on the actual situation.
Sink Slot 18-JL64-1 As shown in Figure 3-26, the JL64 board in slot 18 is
(SDH-1) used as the sink line board. You can select different
sink boards depending on the actual situation.
Activate Yes -
Immediately
2. Configure SNCP group 2 according to the plan on the SNCP group on NE3, which is shown
in Figure 3-27.
l In the NE Explorer, select NE3 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create SNCP Service on the lower-right pane. In the Create SNCP Service
dialog box that is displayed, set the required parameters, and then click OK. Click
Close in the Operation Result dialog box that is displayed.
Parameter Value in Description
This
Example
Service Type SNCP In this example, this parameter adopts the default
value SNCP.
WTR Time(s) 600 Generally, this parameter adopts the default value
600.
Work Sourc 2-JL64-1 As shown in Figure 3-26, the JL64 board in slot 2
ing e Slot (SDH-1) is used as the source board for the working service.
Servi You can select different source boards for the
ce working service depending on the actual situation.
Prote Sourc 17-JL64-1 As shown in Figure 3-26, the JL64 board in slot 17
ction e Slot (SDH-1) is used as the source board for the protection service.
Servi You can select different source boards for the
ce protection service depending on the actual situation.
Sink Slot 1-JL64-1 As shown in Figure 3-26, the JL64 board in slot 1
(SDH-1) is used as the sink line board. You can select
different sink boards depending on the actual
situation.
CAUTION
It is recommended that you set Hold-off Time(100ms) to a value that is longer than the
maximum MSP switching time (50 ms). If Hold-off Time(100ms) is set to 0, the SNCP
and the MSP may perform the unnecessary switching again after a fiber between NE2 and
NE3 is interrupted.
Step 4 Configure pass-through services of MSP ring 1 and MSP ring 2 on NE8.
1. In the NE Explorer, select NE8 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 1-JL64-1 As shown in Figure 3-26, the JL64 board in slot 1 is used
(SDH-1) as the source line board. You can select different source
boards depending on the actual situation.
Sink Slot 2-JL64-1 As shown in Figure 3-26, the JL64 board in slot 2 is used
(SDH-1) as the sink line board. You can select different sink
boards depending on the actual situation.
Activate Yes -
Immediately
Step 5 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 6 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 7 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly, and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
on each NE where the SNCP protection group is configured. When configuring the SNCP
protection group on the tangent NE, you need to configure four SNCP protection groups for each
bidirectional service at the tangent point. The method of allocating timeslots for the services on
the SNCP tangent rings is the same as the method of allocating timeslots for the services on a
single SNCP ring.
3.15.3 Configuration Process
The method of configuring services on the SNCP tangent rings (except for the tangent NE) is
the same as the method of configuring SNCP services on a single ring network. On the tangent
NE, you need to configure four SNCP protection groups for each bidirectional service.
In the networking diagram shown in Figure 3-28, seven pieces of MSTP equipment construct
two SNCP tangent rings and the tangent NE is NE3. The JL16 boards are used on the source NE
(NE1) and sink NE (NE6) to add and drop services and the JL64 boards are used on the source
NE (NE1) and sink NE (NE6) to transmit SDH services.
1 17
NE5 SNCP ring 2 NE7
17 1
Line board 1-JL64 Line board 1-JL64
Line board 17-JL64 NE6 Line board 17-JL64
18 17
Figure 3-29 shows the service signal flow and timeslot allocation. The services can be
transmitted on different routes and in different directions, on the SNCP tangent rings. In this
example, the services are accessed to the ring network from NE1 and then are dropped from the
sink NE (NE6). On the tangent NE (NE3), four SNCP protection groups need to be configured.
The traffic direction is NE1-NE2-NE3-NE5-NE6 or NE1-NE2-NE7-NE6. The capacity of the
services on the ring network is 1xSTM-1.
VC4: VC4-1
VC4: VC4-1
17 18
NE1
NE2 and NE4:
SDH Service Service Source Service Source
17 1
NE3:
1 NE3 17 SNCP Protection Working Source
SNCP Group
Protection Source Service Sink
1 17
17 1
18 NE6 17
NE6:
SNCP Protection
Service
Group Working Source Protection Source
1xSTM-1 Sink
Protection Group 1 18-JL64 17-JL64 1-JL16
Flow of the
working service STM-16 line board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l You must be familiar with 3.15.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create SNCP Service on the lower-right pane to display the Create SNCP
Service dialog box. Set the parameters that are required, and then click OK. Click Close
in the Operation Result dialog box that is displayed.
Service Type SNCP In this example, Service Type adopts the default
value, namely, SNCP.
WTR Time(s) 600 Generally, this parameter adopts the default value
600.
Worki Sourc 18-JL64-1 In this example, the JL64 board in slot 18 is used as
ng e Slot (SDH-1) the source line board of the working service. See
Servic Figure 3-28. You can select different source boards
e depending on the actual situation.
Protec Sourc 17-JL64-1 In this example, the JL64 board in slot 17 is used as
tion e Slot (SDH-1) the source board of the protection service. See Figure
Servic 3-28. You can select different source boards depending
e on the actual situation.
Sink Slot 1-JL16-1 In this example, the JL16 board in slot 1 is used as the
(SDH-1) sink line board. See Figure 3-28. You can select
different sink boards depending on the actual situation.
Step 2 Configure the SDH services of the sink NE (NE6). Refer to Step 1 and configure the SDH
services of NE6. Set the parameters as follows.
Parameter Value in Description
This
Example
Service Type SNCP In this example, Service Type adopts the default value,
namely, SNCP.
Revertive Mode Revertive This parameter indicates whether the service is switched
back after the faulty line is recovered, that is, whether the
switching is revertive or non-revertive. In this example,
Revertive Mode is set to Revertive.
WTR Time(s) 600 Generally, this parameter adopts the default value 600.
Worki Source 18-JL64-1 In this example, the JL64 board in slot 18 is used as the
ng Slot (SDH-1) source line board of the working service. See Figure
Servic 3-28. You can select different source boards depending
e on the actual situation.
Protec Source 17-JL64-1 In this example, the JL64 board in slot 17 is used as the
tion Slot (SDH-1) source board of the protection service. See Figure 3-28.
Servic You can select different source boards depending on the
e actual situation.
Sink Slot 1-JL16-1 In this example, the JL16 board in slot 1 is used as the sink
(SDH-1) line board. See Figure 3-28. You can select different sink
boards depending on the actual situation.
2. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters that are required. and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Source Slot 1-JL64-1 In this example, the JL64 board in slot 1 is used as the
(SDH-1) source line board. See Figure 3-28. You can select
different source boards depending on the actual
situation.
Sink Slot 17-JL64-1 In this example, the JL64 board in slot 17 is used as the
(SDH-1) sink board. See Figure 3-28. You can select different
sink boards depending on the actual situation.
Activate Yes -
Immediately
NOTE
In this example, NE4, NE5, and NE7 are pass-through NEs. The method of configuring the services
of NE4, NE5, and NE7 is the same as the method of configuring the service of NE2. Refer to Step
3a to Step 3b.
According to the configuration principle of the SNCP tangent rings, you need to configure four SNCP
protection groups for each bidirectional service. The configuration combination of protection groups is not
fixed. You can configure the protection group according to actual requirements. The following
configuration is provided as reference only.
1. See Figure 3-29 to configure protection group 1 according to the plan of the protection
group on NE3.
l In the NE Explorer, select NE3 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create SNCP Service in the lower right portion of the window. Select Configure
SNCP Tangent Ring on the lower right of the Create SNCP Service dialog box that is
displayed and set the required parameters.
Parameter Value in Description
This
Example
Service Type SNCP In this example, Service Type adopts the default
value, namely, SNCP.
WTR Time(s) 600 Generally, this parameter adopts the default value
600.
Work Sourc 18-JL64-1 In this example, the JL64 board in slot 18 is used as
ing e Slot (SDH-1) the source line board of the working service. See
Servi Figure 3-28. You can select different source boards
ce depending on the actual situation.
Prote Sourc 2-JL64-1 In this example, the JL64 board in slot 2 is used as
ction e Slot (SDH-1) the source board of the protection service. See
Servi Figure 3-28. You can select different source boards
ce depending on the actual situation.
Step 5 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 6 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 7 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
17 18
NE1
1 17
Line board 1-JL64 Line board 1-JL64
NE2 SNCP ring 1 NE4
Line board 17-JL64 Line board 17-JL64
17 1
NE3 NE8
1 1 Line board 1-JL64
1 17
7 Line board 2-JL64
2 18 2 18 Line board 17-JL64
Line board 18-JL64
1 17
NE5 SNCP ring 2 NE7
17 1
Line board 1-JL64 Line board 1-JL64
Line board 17-JL64 NE6 Line board 17-JL64
18 17
– When the services are transmitted from SNCP ring 1 to SNCP ring 2, SNCP protection
group 1 on NE3 and SNCP protection group 1 on NE8 selectively receive the service.
Normally, the traffic direction of the selected working source is NE1→NE2→NE3.
– SNCP protection group 1 on NE6 selectively receives the service that enters SNCP ring
2. Normally, the traffic direction of the selected working source is NE3→NE5→NE6.
l Normally, the traffic direction from SNCP ring 2 to SNCP ring 1 is
NE6→NE7→NE8→NE4→NE1.
– On NE8, configure the pass-through service in the first VC-4, from the board in slot 17
to the board in slot 1. This pass-through service functions as the protection source of
SNCP protection group 1 on NE3.
– On NE8, configure the pass-through service in the first VC-4, from the board in slot 18
to the board in slot 2. This pass-through service functions as the working source of
SNCP protection group 2 on NE3.
– When the services are transmitted from SNCP ring 2 to SNCP ring 1, SNCP protection
group 1 on NE8 and SNCP protection group 2 on NE3 selectively receive the service
respectively. Normally, the traffic direction of the selected working source is
NE6→NE7→NE8.
– SNCP protection group 1 on NE1 selectively receives the service that enters SNCP ring
1. Normally, the traffic direction of the selected working source is NE8→NE4→NE1.
The traffic direction on the SNCP tangent rings is the same as the traffic direction on the SNCP
intersecting rings. In the case of the SNCP intersecting rings and SNCP tangent rings, the services
can be protected when a fiber is cut on either SNCP ring. The services, however, can be protected
only in the case of the SNCP intersecting rings, when one intersecting node fails.
17 18
NE1
17
1
VC4: VC4-1 VC4: VC4-1
NE2 SNCP ring 1 NE4
Service pass-through Service pass-through
17
1
1 17
18 NE6
17
VC4: VC4-1
NE6:
SNCP Protection
Working Source Protection Source Service Sink
Working path STM-16 line board 1xSTM-1 Group
Protection group 1 18-JL64 17-JL64 1-JL16
Protection path STM-64 line board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l You must be familiar with 3.16.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Refer to Step 1 to Step 3 of 3.15.3 Configuration Process to configure services on NE1, NE2,
NE4, NE5, and NE7.
1. On NE3, configure the pass-through service in the first VC-4, from the board in slot 1 to
the board in slot 17. This pass-through service functions as the working source of SNCP
protection group 1 on NE8.
l In the NE Explorer, select NE3 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane. In the Create SDH Service dialog box that is
displayed, set the required parameters, and then click OK. Click Close in the Operation
Result dialog box that is displayed.
Parameter Value in Description
This
Example
Source Slot 1-JL64-1 In this example, the JL64 board in slot 1 is used as
(SDH-1) the source board. See Figure 3-30. You can select
different source boards depending on the actual
situation.
Sink Slot 17-JL64-1 In this example, the JL64 board in slot 17 is used as
(SDH-1) the sink board. See Figure 3-30. You can select
different sink boards depending on the actual
situation.
Activate Yes -
Immediately
2. On NE3, configure the pass-through service in the first VC-4, from the board in slot 2 to
the board in slot 18. This pass-through service functions as the protection source of SNCP
protection group 2 on NE8.
l Refer to Step 2.1 and configure the pass-through services in the first VC-4, from the
board in slot 2 on NE3 to the board in slot 18 on NE3.
Source Slot 2-JL64-1 In this example, the JL64 board in slot 2 is used as
(SDH-1) the source board. See Figure 3-30. You can select
different source boards depending on the actual
situation.
Sink Slot 18-JL64-1 In this example, the JL64 board in slot 18 is used as
(SDH-1) the sink board. See Figure 3-30. You can select
different sink boards depending on the actual
situation.
Activate Yes -
Immediately
3. See Figure 3-31 to configure protection group 1 according to the plan of the protection
group on NE3.
l In the NE Explorer, select NE3 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create SNCP Service on the lower-right pane. In the Create SNCP Service
dialog box that is displayed, set the required parameters, and then click OK. Click
Close in the Operation Result dialog box that is displayed.
Parameter Value in Description
This
Example
Service Type SNCP In this example, this parameter adopts the default
value SNCP.
WTR Time(s) 600 Generally, this parameter adopts the default value
600.
Work Sourc 1-JL64-1 As shown in Figure 3-28, the JL64 board in slot 1
ing e Slot (SDH-1) is used as the source board for the working service.
Servi You can select different source boards for the
ce working service depending on the actual situation.
Prote Sourc 17-JL64-1 As shown in Figure 3-28, the JL64 board in slot 17
ction e Slot (SDH-1) is used as the source board for the protection service.
Servi You can select different source boards for the
ce protection service depending on the actual situation.
Sink Slot 2-JL64-1 As shown in Figure 3-28, the JL64 board in slot 2
(SDH-1) is used as the sink line board. You can select
different sink boards depending on the actual
situation.
4. See Figure 3-31 to configure protection group 2 according to the plan of the protection
group on NE3.
l The method of configuring protection group 2 is the same as the method of configuring
protection group 1. Refer to Step 2.3 and set the parameters as follows.
Service Type SNCP In this example, this parameter adopts the default
value SNCP.
WTR Time(s) 600 Generally, this parameter adopts the default value
600.
Work Sourc 18-JL64-1 As shown in Figure 3-28, the JL64 board in slot 18
ing e Slot (SDH-1) is used as the source board for the working service.
Servi You can select different source boards for the
ce working service depending on the actual situation.
Prote Sourc 2-JL64-1 As shown in Figure 3-28, the JL64 board in slot 2
ction e Slot (SDH-1) is used as the source board for the protection service.
Servi You can select different source boards for the
ce protection service depending on the actual situation.
Sink Slot 1-JL64-1 As shown in Figure 3-28, the JL64 board in slot 1
(SDH-1) is used as the sink line board. You can select
different sink boards depending on the actual
situation.
Source Slot 17-JL64-1 In this example, the JL64 board in slot 17 is used as
(SDH-1) the source board. See Figure 3-28. You can select
different source boards depending on the actual
situation.
Sink Slot 1-JL64-1 In this example, the JL64 board in slot 1 is used as the
(SDH-1) sink board. See Figure 3-28. You can select different
sink boards depending on the actual situation.
Activate Yes -
Immediately
2. On NE8, configure the pass-through service in the first VC-4, from the board in slot 18 to
the board in slot 2. This pass-through service functions as the working source of SNCP
protection group 2 on NE3.
l Refer to Step 2.1 and configure the pass-through services in the first VC-4, from the
board in slot 18 on NE8 to the board in slot 2 on NE8.
Parameter Value in Description
This
Example
Source Slot 18-JL64-1 In this example, the JL64 board in slot 18 is used as
(SDH-1) the source board. See Figure 3-28. You can select
different source boards depending on the actual
situation.
Sink Slot 2-JL64-1 In this example, the JL64 board in slot 2 is used as the
(SDH-1) sink board. See Figure 3-28. You can select different
sink boards depending on the actual situation.
Activate Yes -
Immediately
3. See Figure 3-31 to configure protection group 1 according to the plan of the protection
group on NE8.
l Refer to Step 2.3 and configure SNCP protection group 1 on NE8. Set the parameters
as follows.
Parameter Value in Description
This
Example
Service Type SNCP In this example, this parameter adopts the default
value SNCP.
WTR Time(s) 600 Generally, this parameter adopts the default value
600.
Work Sourc 1-JL64-1 As shown in Figure 3-28, the JL64 board in slot 1
ing e Slot (SDH-1) is used as the source board for the working service.
Servi You can select different source boards for the
ce working service depending on the actual situation.
Prote Sourc 17-JL64-1 As shown in Figure 3-28, the JL64 board in slot 17
ction e Slot (SDH-1) is used as the source board for the protection service.
Servi You can select different source boards for the
ce protection service depending on the actual situation.
Sink Slot 18-JL64-1 As shown in Figure 3-28, the JL64 board in slot 18
(SDH-1) is used as the sink line board. You can select
different sink boards depending on the actual
situation.
4. See Figure 3-31 to configure protection group 2 according to the plan of the protection
group on NE8.
l The method of configuring protection group 2 is the same as the method of configuring
protection group 1. Refer to Step 2.3 and set the parameters as follows.
Parameter Value in Description
This
Example
Service Type SNCP In this example, this parameter adopts the default
value SNCP.
WTR Time(s) 600 Generally, this parameter adopts the default value
600.
Work Sourc 18-JL64-1 As shown in Figure 3-28, the JL64 board in slot 18
ing e Slot (SDH-1) is used as the source board for the working service.
Servi You can select different source boards for the
ce working service depending on the actual situation.
Prote Sourc 2-JL64-1 As shown in Figure 3-28, the JL64 board in slot 2
ction e Slot (SDH-1) is used as the source board for the protection service.
Servi You can select different source boards for the
ce protection service depending on the actual situation.
Sink Slot 17-JL64-1 As shown in Figure 3-28, the JL64 board in slot 17
(SDH-1) is used as the sink line board. You can select
different sink boards depending on the actual
situation.
Step 4 Check whether the services are configured correctly. For details, see 8.6 Checking the
Configuration of SDH Services.
Step 5 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.2 Deleting SDH
Services.
Huawei MSTP equipment supports Ethernet private line (EPL), Ethernet virtual private line
(EVPL), Ethernet private local area network (EPLAN), and Ethernet virtual private local area
network (EVPLAN) services, which comply with ITU-T G.8011x/Y.1307x.
4.1 Ethernet Service Types
Huawei MSTP equipment supports Ethernet private line (EPL), Ethernet virtual private line
(EVPL), Ethernet private local area network (EPLAN), and Ethernet virtual private local area
network (EVPLAN) services, which comply with ITU-T G.8011x/Y.1307x.
4.2 Basic Concepts
Before you configure the services on the Ethernet boards, you need to learn the basic concepts
including external port, internal port, logical port, and bridge so that you can understand the
service configuration process and the signal flow when the boards process the services.
4.3 Flow of Configuring Ethernet Services
This topic describes the configuration processes related to Ethernet services. Before you
configure Ethernet services according to the flow, you need to complete the basic configurations
of the NEs according to the flow of creating a network.
4.4 Configuring EPL Services on an Ethernet Transparent Transmission Board
EPL services provide the point-to-point Ethernet transparent transmission solution where the
bandwidth is occupied exclusively. EPL services are applicable when the communication
equipment that is used to access the client-side data in the transmission network does not support
VLAN or when the VLAN planning cannot be disclosed to the network operator.
4.5 Configuring EPL Services on an Ethernet Switching Board
EPL services provide the point-to-point Ethernet transparent transmission solution where the
bandwidth is occupied exclusively. EPL services are applicable when the communication
equipment that is used to access the client-side data in the transmission network does not support
VLAN or when the VLAN planning cannot be disclosed to the network operator.
4.6 Configuring PORT-Shared EVPL (VLAN) Services
The PORT-shared EVPL (VLAN) service is applicable when the services of multiple users,
which are received from the same external port on the Ethernet board at a station, need to be
transmitted on different VCTRUNKs to another station or to another external port of the station.
4.7 Configuring VCTRUNK-Shared EVPL (VLAN) Services
When the services of multiple users that do not carry VLAN tags are accessed into a transmission
network and are transmitted on the same VCTRUNK, the VCTRUNK-shared EVPL (VLAN)
service is used to isolate the services of different users by adding VLAN tags. In this manner,
the bandwidth is shared on the SDH side.
4.8 Configuring EVPL (QinQ) Services
The EVPL (QinQ) service provides an Ethernet private line solution. The services are applicable
where the services of multiple users that have the same VLAN ID are accessed into a transmission
network and need to be transmitted on the same VCTRUNK. In the case of EVPL (QinQ)
services, a layer of S-VLAN tag is added on the network side to isolate the services of different
users from each other.
4.9 Configuring EPLAN Services (IEEE 802.1d Bridge)
The EPLAN service (IEEE 802.1d bridge) provides a LAN solution for multipoint-to-multipoint
convergence. This service is applicable where the user-side data communication equipment
connected to the transmission network does not support VLAN tags or where the VLAN planning
cannot be disclosed to the network operator.
4.10 Configuring EVPLAN Services (IEEE 802.1q Bridge)
The EVPLAN service (IEEE 802.1q bridge) provides a LAN solution for multipoint-to-
multipoint convergence. This service is applicable where the user-side data communication
equipment, which is connected to the transmission network, does not support VLAN tags or
where the VLAN planning cannot be disclosed to the network operator.
4.11 Configuring EVPLAN Services (IEEE 802.1ad Bridge)
The QinQ technology provides an economical and easy solution for Layer 2 virtual private
networks (VPNs). The IEEE 802.1ad bridge uses the QinQ technology to provide the VPN
solution, thus facilitating the identifying, differentiating, and grooming of EVPLAN services.
EPL Services
Two nodes are used to access EPL services and implement transparent transmission of the
Ethernet services of the users. The service of one user occupies one VCTRUNK and need not
share the bandwidth with the services of the other users. Hence, the extra QoS scheme and
security scheme are not required.
NE 1 NE2
Port2 Port2
VCTRUNK2
User B1 User B2
The corresponding relations between the PORTs and the VCTRUNKs are provided in Table
4-1.
Table 4-1 Corresponding relations between the PORTs and VCTRUNKs (EPL services)
NE1 NE2
EVPL Services
EVPL services of different users need to share the bandwidth. Hence, the VLAN/QinQ scheme
needs to be used for differentiating the data of different users. If the services of different users
need to be configured with different quality levels, you need to adopt the corresponding QoS
scheme. EVPL services are classified into two types, depending on whether the PORTs or
VCTRUNKs are shared.
l PORT-shared EVPL services
As shown in Figure 4-2, the services of different users are accessed through a PORT at a station,
and are then isolated from each other by using the VLAN IDs. Services are transmitted to other
PORTs at this station through different VCTRUNKs.
User C1 NE 1 NE2
Port1
VLAN 100 VCTRUNK1 Port1
VLAN 200 VCTRUNK2 Port2
User C3
The corresponding relations between the PORTs and the VCTRUNKs are provided in Table
4-2.
Table 4-2 Corresponding relations between the PORTs and the VCTRUNKs (PORT-shared
EVPL services)
NE1 NE2
NE 1 NE2
Port1 Port1
VCTRUNK1
Port2 Port2
User E1 User E2
The corresponding relations between the PORTs and the VCTRUNKs are provided in Table
4-3.
Table 4-3 Corresponding relations between the PORTs and the VCTRUNKs (VCTRUNK-
shared EVPL services)
NE1 NE2
EPLAN Services
The EPLAN services can be accessed from a minimum of two nodes. Hence, the services of
different users need not share the bandwidth. In addition, the extra QoS scheme and security
scheme are not required. re is more than one node. Hence, the nodes need to learn the MAC
addresses and forward data according to MAC addresses. Therefore, Layer 2 switching is
realized.
As shown in Figure 4-4, three branches of user F need to communicate with each other. On
NE1, the IEEE 802.1d bridge is established to implement EPLAN services. The IEEE 802.1d
bridge can create the MAC address-based forwarding table, which is periodically updated by
using the self-learning function of the system. The accessed data can be forwarded or broadcast
within the domain of the IEEE 802.1d bridge according to the destination MAC addresses.
NE3
T2000
NE2 NE4
F2 F3
PORT5
IEEE 802.1d bridge
VCTRUNK
VCTRUNK1 VCTRUNK2
F1
PORT5
EVPLAN Services
EVPLAN services of different users need to share the bandwidth. Hence, the VLAN/QinQ
scheme needs to be used for differentiating the data of different users. If the services of different
users need to be configured with different quality levels, you need to adopt the corresponding
QoS scheme.
As shown in Figure 4-5, three branches of user G need to communicate with each other. Services
of user G need to be isolated from the services of user H. In this case, the operator needs to
separately groom the VoIP services and HSI services, be established on NE1 to achieve
EVPLAN services.
IEEE 802.1q bridge: IEEE 802.1q bridge supports isolation by using one layer of VLAN tags.
This bridge checks the contents of the VLAN tags that are in the data frames and performs Layer
2 switching according to the destination MAC addresses and VLAN IDs.
NE3
T2000
PORT2 PORT2
H2 NE2 NE4
H3
PORT1 NE1 PORT1
G2 G3
H1 G1
PORT6 PORT5
VCTRUNK
As shown in Figure 4-6, the VoIP services from user M and the HSI services from user N need
to access the VoiP server and the HSI server respectively. In this case, the operator needs to
separately groom the VoIP services and HSI services, and isolate the data on the transmission
network side. On NE1, the IEEE 802.1ad bridge must be established to support the EVPLAN
services.
IEEE 802.1ad bridge: The IEEE 802.1ad bridge supports data frames with two layers of VLAN
tags. This bridge adopts the outer S-VLAN tags to isolate different VLANs and supports only
the mounted ports whose attributes are C-Aware or S-Aware. This bridge supports the following
switching modes:
l This bridge does not check the contents of the VLAN tags that are in the packets, and
performs Layer 2 switching according to the destination MAC addresses of the packets.
l This bridge checks the contents of the VLAN tags that are in the packets, and performs
Layer 2 switching according to the destination MAC addresses and the S-VLAN IDs of the
packets.
NE3
T2000
Service C-VLAN Service C-VLAN
VoIP 10 VoIP 10
HSI 20 HSI 20
PORT1 PORT1
User M NE2 NE4 User N
8 NE1 11
VoIP 11 8
HSI
PORT5 PORT6
VCTRUNK
PORT5 PORT6
To ensure that Ethernet frames can be transparently transmitted over the optical transmission
network, the Ethernet frames need to be encapsulated and mapped into VC containers at the
access point. The encapsulation and mapping protocols used by the Ethernet service board
include the high-level data link control (HDLC), link access procedure - SDH (LAPS), and
generic framing procedure (GFP).
4.2.6 Virtual Concatenation
The rate of the Ethernet service does not adapt to the rate of the standard VC container. Hence,
if you directly map the Ethernet service data into a standard VC container, a large amount of
transmission bandwidth is wasted. To solve this problem, use the virtual concatenation
technology to concatenate many standard VC containers into a large VC container that adapts
to the rate of the Ethernet service.
4.2.7 Tag Attributes
When data frames enter or exit a port on an Ethernet board, the processing mode of the data
frames is determined by the tag attributes of this port.
4.2.8 Bridge
The bridge is the functional unit that is used to implement the interconnection between two or
more LANs.
The length of the data field is variable. maximum length of the data field depends on the
maximum frame length that the ports of the equipment support.
The four-byte S-VLAN or C-VLAN field is divided into two sub-fields: the tag protocol ID
(TPID) and the tag control Information (TCI).
Both the TPID and TCI consist of two bytes. See Figure 4-8.
Figure 4-8 Positions of the TPID and TCI in the frame structure
S-VLAN C-VLAN
Destination Source MAC TPID TCI TPID TCI Length/Type Data FCS Check
MAC Address Address Character
Variable
6 bytes 6 bytes 2 2 bytes 2 bytes 2 bytes 2bytes 2 bytes 4 bytes
length
l TPID structure
The TPID consists of two bytes and indicates the VLAN tag type. TPID of the C-VLAN is
always 0x8100 whereas the TPID of the S-VLAN can be customized. Refer to Table 4-4.
NOTE
The IEEE 802.1ad specifies the TPID of the S-VLAN to 0x88a8. In actual application, the setting of TPID
for the S-VLAN tag varies according to the equipment manufacturer. To ensure compatibility between
interconnected equipment, it is recommended that you set the TPIDs of the S-VLAN tags of the
interconnected equipment to the same value within 0X600-FFFF.
l TCI structure
The TCI structure of the S-TAG is basically the same as the TCI structure of the C-TAG. VLAN
ID (VID) field consists of 12 bits and ranges from 0 to 4095. The difference is that the TCI of
the S-TAG contains the drop eligible (DE) indication and works with the priority code point
(PCP) to indicate the priority of the S-TAG frame.
The TCI structures of the C-TAG and S-TAG are shown in Figure 4-9 and Figure 4-10.
Octets: 1 2
PCP CFI VID VID
Bits: 8 6 5 4 1 8 1
Octets: 1 2
PCP DE VID VID
Bits: 8 6 5 4 1 8 1
External ports on Ethernet boards (that is, external physical ports) are also referred to as client-
side ports or user-side ports, which are used to access the Ethernet services on the user side.
Internal ports on Ethernet boards (that is, internal VCTRUNKs) are also referred to as system-
side ports or backplane-side ports in certain cases, which are used to encapsulate and map the
services into the SDH side.
VCTRUNKs are VC-based transmission paths, which can be implemented by using the adjacent
concatenation or virtual concatenation technology. On the T2000 window, paths are bound to
specify the bandwidth of different granularities for a VCTRUNK port.
Cross-
Interface Service Encapsulation/ Interface connect unit
module processing Mapping conversion
module module module Cross-
connect unit
Ethernet board
4.2.3 Auto-Negotiation
The auto-negotiation function allows the network equipment to send information of its supported
working mode to the opposite end on the network. This function also allows the network
equipment to receive similar information that the opposite end may transfer.
The working modes of the interconnected ports on the equipment at both ends must be the same.
Otherwise, the services are unavailable.
If the working mode of the port of the equipment on the opposite side is full duplex and if the
working mode of the port on the local equipment is auto-negotiation, the local equipment works
in the half-duplex mode. That is, the working modes of the interconnected ports at both ends are
different, and thus packets may be lost. Hence, when the working mode of the port of the
equipment on the opposite side is full duplex, you need to set working mode of the port on the
local equipment to full duplex.
NOTE
When the interconnected ports on both sides work in the auto-negotiation mode, the equipment on both
sides can negotiate the flow control through the auto-negotiation function.
The auto-negotiation function uses fast link pulses (FLPs) and normal link pulses (NLPs) to
transfer information of the working mode so that no packet or upper layer protocol overhead
needs to be added.
The half-duplex Ethernet port uses the back-pressure mechanism to control the flow. The full-
duplex Ethernet port applies PAUSE frames to control the flow. Currently, the half-duplex
Ethernet function is not widely applied. Hence, the flow control function realized by Ethernet
service boards is used for the full-duplex Ethernet ports.
The flow control function realized by Ethernet service boards is classified into two types: auto-
negotiation flow control and non-auto-negotiation flow control.
Realization Principle
The realization principle of the flow control function is described as follows:
1. When congestion occurs in the receive queue of an Ethernet port (the data in the receive
buffer exceeds a certain threshold) and the port is capable of sending PAUSE frames, the
port sends a PAUSE frame to the opposite end. The pause-time value in the frame is N
(0<N≤65535).
2. If the Ethernet port at the opposite end is capable of processing PAUSE frames, this Ethernet
port stops sending data within a specified period of time N (the unit is the time required for
sending 512 bits) after receiving the PAUSE frame.
3. If the congestion at the receive port is cleared (the data in the receive buffer is below a
certain threshold) but the pause-time does not end, the port sends a PAUSE frame whose
pause-time is 0 to notify the opposite end to send data.
Reserved
HDLC
The HDLC is a general data link control procedure. When using the HDLC protocol, the system
encapsulates data services into HDLC-like frames as information bits and maps the frames into
SDH VC containers.
LAPS
The LAPS is also a data link control procedure. It is optimized based on the HDLC. The LAPS
complies with ITU-T X.86.
GFP
The GFP is the most widely applied general encapsulation and mapping protocol. It provides a
general mechanism to adapt higher-layer client signal flows into the transport network and can
map the variable-length payload into the byte-synchronized transport path. The client signals
can be protocol data units (PDU-oriented, such as IP/PPP and Ethernet), block code data (block-
code oriented, such as Fiber Channel and ESCON), or common bit data streams. The GFP
protocol complies with ITU-T G.7041.
The GFP defines the following modes to adapt client signals:
l Frame-mapped GFP (GFP-F)
The GFP-F is a PDU-oriented processing mode. It encapsulates the entire PDU into the
GFP payload area and makes no modification on the encapsulated data. It determines
whether to add a detection area for the payload area, depending on requirements.
l Transparent GFP (GFG-T)
The GFP-T is a block-code (8B/10B code block) oriented processing mode. It extracts a
single character from the received data block and maps the character into the fixed-length
GFP frame.
at the path termination equipment and it can flexibly allocate bandwidth. Hence, the virtual
concatenation technology is widely used.
Virtual concatenation is of two types: virtual concatenation in a higher order path and virtual
concatenation in a lower order path. A higher order virtual concatenation VC4-Xv provides a
payload of X Container-4s (VC-4s). The payload is mapped individually into X independent
VC-4s. Each VC-4 has its own POH. The process of virtual concatenation of VC-3s is the same.
H
1 X SQ = 0 =0
POH
MFI-1 = 0 =0
MFI-2 = 0 X-1
SQ = 0 =1
POH
MFI-1 = 1 =0
MFI-2 = 0
Multiframe (MF)
SQ = X-1
H
SQ = 0 = 15
POH
MFI-1 = 15 = 0
MFI-2 = 0 X-1
SQ = 0 =0
POH MFI-1 = 0 = 15
MFI-2 = 1
H SQ = X-1
SQ = 0 = 15
POH
MFI-1 = 15 = 255
MFI-2 = 255 X-1
SQ = 0 =0
POH
MFI-1 = 0 =0
MFI-2 = 0
With the MFI and SQ, the sink end can correctly restore the position of each frame in the Cn-
Xv to prevent the frame alignment problem due to the different propagation delays of the frames.
Table 4-5 Processing mode of data frames at ports with different tags
Direction Data Frame Type Processing Mode
Ingress port Frames with VLAN Transparently Discards the frames. Transparently
tags transmits the transmits the
frames. frames.
Frames without Discards the frames. Adds the VLAN tags that contain Default
VLAN tags VLAN ID and VLAN Priority and
transparently transmits the frames.
Egress port Frames with VLAN Transparently Strips the VLAN l If the VLAN IDs
tags transmits the tags and transmits contained in the
frames. the frames. data frames are
Default VLAN
ID, strips the
VLAN tag and
transmits the
data frames.
l If the VLAN IDs
contained in the
data frames are
not Default
VLAN ID,
transparently
transmits the
data frames.
NOTE
The tag setting is valid only if the following conditions are met:
l The port type is PE or UNI.
l The entry detection function is enabled. When the Ethernet switching board works in the Ethernet
transparent transmission state and when the entry detection function is disabled, the ports transparently
transmit the received data frames regardless of whether the data frames have the VLAN tags.
Based on the tag aware, access, and hybrid features, adhere to the following principles when
setting the tag for a port:
l If the data packets transmitted from the interconnected equipment carry the VLAN tags,
set the local port to the tag aware mode.
l If the data packets transmitted from the interconnected equipment do not carry the VLAN
tags, set the local port to the access mode.
l If it is uncertain whether the data packets transmitted from the interconnected equipment
carry the VLAN tags, set the local port to the hybrid mode.
4.2.8 Bridge
The bridge is the functional unit that is used to implement the interconnection between two or
more LANs.
VB and LP
The various bridge is the unique concept for Huawei products. In the case of the Ethernet data
boards that have the Layer 2 switching capability, the switching domain can be divided into
multiple sub-switching domains. As a result, if no services are interconnected, different VBs
cannot access each other. Each VB has an independent configuration mode and uses an
independent VLAN. Different VBs can use the same VLAN.
A VB can contain a number of logical ports (LPs). By configuring the mounting relation, you
can mount multiple MAC ports and VCTRUNK ports to the same VB.
Figure 4-14 shows the relation between the VBs, LPs, PORTs, and VCTRUNKs.
Figure 4-14 Relation between the VBs, LPs, PORTs, and VCTRUNKs
PORT2 LP LP VCTRUNK2
2 5
LP LP
PORT3 VCTRUNK3
3 6
VB
2
PORT4 LP LP VCTRUNK4
1 4
PORT5 LP LP
VCTRUNK5
2 5
LP LP
PORT6 VCTRUNK6
3 6
Virtual Bridge
l The services of different virtual bridges are isolated and the services with different VLAN
IDs in the same virtual bridge are also isolated. The switching domain of the entire virtual
bridge is divided into multiple sub-switching domains according to the VLAN IDs.
NOTE
As shown in Figure 4-15, the same logical port may belong to one or more sub-switching domains with
different VLAN IDs. On the T2000, the same logical port can belong to multiple filtering tables for different
VLAN IDs.
VCTRUNK1
PORT1 VLAN1
VCTRUNK2
VLAN2 VCTRUNK3
PORT2
VCTRUNK4
VCTRUNK5
PORT3 VLAN3
VCTRUNK6
Virtual bridge
Data frame forwarding mode The forwarding port can be queried according
to the destination MAC address and VLAN
ID of the data frame, in the MAC address
table.
NOTE
To forward a Layer 2 switching service, a bridge must learn the MAC address. A bridge learns the MAC
address through one of the following methods: shared VLAN learning (SVL) and independent VLAN
learning (IVL).
Types of Bridges
As listed in Table 4-7, the Ethernet boards support three types of bridges.
l IEEE 802.1d MAC bridge: The IEEE 802.1d MAC bridge does not check the contents of
the VLAN tags that are in the data frames. It performs Layer 2 switching according to the
destination MAC addresses of the data frames.
l IEEE 802.1q bridge: The IEEE 802.1q bridge supports isolation by using one layer of
VLAN tags. This bridge checks the contents of the VLAN tags that are in the data frames
and performs Layer 2 switching according to the destination MAC addresses and VLAN
IDs.
l The IEEE 802.1ad bridge: The IEEE 802.1ad bridge supports data frames with two layers
of VLAN tags. This bridge adopts the outer S-VLAN tags to isolate different VLANs and
supports only the mounted ports whose attributes are C-Aware or S-Aware. This bridge
supports the following switching modes:
1. This bridge does not check the contents of the VLAN tags that are in the packets. It
performs Layer 2 switching according to the destination MAC addresses of the
packets.
2. This bridge checks the contents of the VLAN tags that are in the packets and performs
Layer 2 switching according to the destination MAC addresses and the S-VLAN IDs
of the packets.
l If a routing entry is not updated within a specific period of time, that is, if the MAC address fails to be learnt
because the new data frame from the MAC address is not received, this routing entry is automatically deleted.
This mechanism is considered as aging, and this period of time is considered as the aging time. The aging
time of the MAC address table is five minutes by default and can be set by using the T2000.
l A limited number of MAC addresses can be learnt at a time.
Hub/Spoke
Generally, the central station and non-central stations can access each other but the non-central
stations cannot access each other in the case of convergence services. Hence, the ports mounted
to the bridge need to be defined as Hub ports or Spoke ports.
l Hub port
Hub ports can access each other. Hub ports and Spoke ports can also access each other.
l Spoke port
Spoke ports cannot access each other. Hub ports and Spoke ports can access each other.
The mounted ports are Hub ports by default.
Required Start
Optional
Ethernet transparent Ethernet switching
transmission board board
1 1
Configure Ethernet Configure Ethernet
external ports external ports
2 2
Configure Ethernet Configure Ethernet
internal ports internal ports
3
Create EPL services
4
Create cross-
connections
5
Check service
continuity
6 Enable NE
performance
monitoring
7
Back up NE
configuration data
End
3 8.10 Creating Ethernet Private Line l If Ethernet transparent transmission boards are used,
Services and Ethernet Virtual Private go to Step 4. On Ethernet transparent transmission
Line Services boards, the EPL service connections from the PORTs
to the VCTRUNKs are considered to be created by
default.
l If Ethernet switching boards are used, the EPL service
connections between the PORTs and the VCTRUNKs
must be created.
The Ethernet switching boards are required for configuring EVPL services. The Ethernet
switching boards that support EVPL services are provided in Table 9-1.
Required Start
Optional 1
Configure Ethernet
external ports
2
Configure Ethernet
internal ports
3
Create EVPL
services
4
Create cross-
connections
5
Configure the QoS
6
Check service
continuity
7 Enable NE
performance
monitoring
8
Back up NE
configuration data
End
Required Start
Optional 1
Configure Ethernet
external ports
2
Configure Ethernet
internal ports
3
Create EPLAN
services
4 Modify Hub/Spoke
attribute of mounted
ports
5
Create cross-
connections
6
Configure the Layer
2 switching feature
7
Check service
continuity
8 Enable NE
performance
monitoring
9
Back up NE
configuration data
End
Required Start
Optional 1
Configure Ethernet
external ports
2
Configure Ethernet
internal ports
3
Create EVPLAN
services
4
Create the VLAN
filtering table
6
Create cross-
connections
7
Configure the Layer
2 switching feature
8
Configure the QoS
9
Check service
continuity
10 Enable NE
performance
monitoring
11
Back up NE
configuration data
End
Service Requirement
On the network shown in Figure 4-20, the service requirements are as follows:
l The two branches of user A that are located at NE1 and NE3 need to communicate with
each other over Ethernet. A 100 Mbit/s bandwidth is required.
l The two branches of user B that are located at NE1 and NE3 need to communicate with
each other over Ethernet. A 200 Mbit/s bandwidth is required.
l The service of user A must be isolated from the service of user B.
l The Ethernet equipment of user A and user B provides 1000 Mbit/s Ethernet electrical
interfaces that work in 1000M full-duplex mode and do not support VLAN tags.
PORT1 PORT2
Line Board 1-JL64
T2000 Ethernet Board 15-EGT6
1
NE3
17
1
NE1
17
Line Board 17-JL64
Ethernet Board 15-EGT6
PORT1 PORT2
VCTRUNK
User A1 User B1
For the method of calculating the bandwidth of the Ethernet services transmitted on a
VCTRUNK, see 9.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet
Boards.
Figure 4-21 Signal flow and timeslot allocation (Ethernet transparent transmission board)
NE1 EGT6 NE2 NE3 EGT6
PORT1 PORT1
VCTRUNK1 VCTRUNK1
User A1 User A2
VC4--xv:VC4-1 VC4:VC4-1 VC4--xv:VC4-1
PORT2
VCTRUNK2 VCTRUNK2 PORT2
User B1 User B2
VC4--xv:VC4-2 VC4--xv:VC4-2
VC4:VC4-2
VC4--xv:VC4-3 VC4--xv:VC4-3
VC4:VC4-3
SDH
Working Mode 1000M Full 1000M Full 1000M Full 1000M Full
Duplex Duplex Duplex Duplex
Prerequisite
The 2 Creating the Network task must be complete.
You must be familiar with 4.3.1 Flow of Configuring EPL Services.
Background Information
By default, EPL service connections from external ports to internal ports are already created for
Ethernet transparent transmission boards. The EPL service connections can be queried on the
T2000, but cannot be created, modified, or deleted on the T2000.
If the Ethernet boards used in the actual application scenarios are different from the boards in
this example, you need to know the requirements for configuring specific boards.
l For the EPL services supported by Ethernet transparent transmission boards, see 9.1
Service Support Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet transparent transmission boards, see
9.2 Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EPL services for user A1 and user B1 on NE1.
1. Configure the attributes of the external ports (PORT1 and PORT2 on the EGT6 board) used
by the services of user A1 and user B1.
l In the NE Explorer, select the EGT6 and then choose Communication > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Workin PORT1: 1000M Full- In this example, the Ethernet service access
g Mode Duplex equipment of user A1 and user B1 supports
PORT2: 1000M Full- the 1000M full-duplex mode. Hence,
Duplex Working Mode is set to 1000M Full-
Duplex for PORT1 and PORT2.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
2. Configure the attributes of the internal ports (VCTRUNK1 and VCTRUNK2 of the EGT6
board) used by the services of user A1 and user B1.
l Select Internal Port.
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply. Then,
the Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
Mappin VCTRUNK1: GFP In this example, the EGT6 board is used. This
g VCTRUNK2: GFP parameter adopts the default value GFP.
Protocol Mapping Protocol of the VCTRUNKs on
the Ethernet boards of the interconnected
equipment at both ends must be set to the
same value.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l Click the Bound Path tab. Click the Configuration button. Set the following
parameters in the Bound Path Configuration dialog box that is displayed. Click
and click Apply. Click Yes in the Hint dialog box that is displayed. Click
Close in the Operation Result dialog box that is displayed.
User Parameter Value in Description
This
Example
3. Configure the cross-connections from the Ethernet services to the SDH links for user A1
and user B1.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree. Click .
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters that are required, and then click Apply. Then, the Operation
Result dialog box is displayed. Click Close.
User A1 Level VC4 The timeslot bound with the service of user
A1 is at the VC-4 level. The service level
must be consistent with the level of the path
bound with the VCTRUNK.
Activate Yes -
Immediatel
y
User B1 Level VC4 The timeslot bound with the service of user
B1 is at the VC-4 level. The service level
must be consistent with the level of the path
bound with the VCTRUNK.
Activate Yes -
Immediatel
y
Step 2 Configure the pass-through services for user A1 and user B1 on NE2.
1. Click . Select NE2 in the Navigation Tree that is displayed. Then, click OK.
2. In the NE Explorer, select NE2, and then choose Configuration > SDH Service
Configuration from the Function Tree. Click .
3. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters that are required. Then, the Operation Result dialog box is displayed. Click
Close.
Parameter Value in Description
This
Example
Level VC4 The SDH service of NE1, which passes through NE2, is
at the VC-4 level.
Direction Bidirectional As shown in Figure 4-21, the SDH service from NE1 to
NE2 is a bidirectional service.
Source Slot 1-JL64-1 As shown in Figure 4-21, the service signals are
(SDH-1) transmitted from 1-JL64-1(SDH-1) to 17-JL64-1
(SDH-1). In this example, Source Slot is set to 1-JL64-1
(SDH-1).
Source 1-3 The service between user A1 and user B1 occupies three
Timeslot VC-4s.
Range(e.g.
1,3-6)
Sink Slot 17-JL64-1 As shown in Figure 4-21, the service signals are
(SDH-1) transmitted from 1-JL64-1(SDH-1) to 17-JL64-1
(SDH-1). In this example, Sink Slot is set to 17-JL64-1
(SDH-1).
Sink 1-3 The service between user A1 and user B1 occupies three
Timeslot VC-4s.
Range(e.g.
1,3-6)
Activate Yes -
Immediatel
y
Step 3 Configure the EPL services for user A2 and user B2 on NE3.
Refer to Step 1 and configure the EPL services for user A2 and user B2.
Step 4 Check whether the service between user A1 and user A2 and the service between user B1 and
user B2 are correct. For the operation procedure, see 8.15 Testing Ethernet Service
Channels.
Step 5 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.5 Deleting Ethernet
Private Line Services.
Service Requirement
On the network shown in Figure 4-22, the service requirements are as follows:
l The two branches of user A that are located at NE1 and NE3 need to communicate with
each other over Ethernet. A 100 Mbit/s bandwidth is required.
l The two branches of user B that are located at NE1 and NE3 need to communicate with
each other over Ethernet. A 200 Mbit/s bandwidth is required.
l The services of user A must be isolated from the services of user B.
l The Ethernet equipment of user A and user B provides 1000 Mbit/s Ethernet electrical
interfaces that work in 1000M full-duplex mode and do not support VLAN tags.
PORT1 PORT2
1
NE3
17
1
NE1
17
VCTRUNK
User A1 User B1
NOTE
As described in Table 9-1, the Ethernet boards are classified into the Ethernet transparent transmission
boards and Ethernet switching boards, based on the type of the accessed services. The Ethernet transparent
transmission boards support only EPL services whereas the Ethernet switching boards support EPL
services, EVPL services, and Layer 2 switching. Hence, Ethernet switching boards are used more widely
than Ethernet transparent transmission boards.
Figure 4-23 Signal flow and timeslot allocation (Ethernet switching board)
NE1 EGS8 NE2 NE3 EGS8
PORT1 PORT1
VCTRUNK1 VCTRUNK1
User A1 User A2
VC4--xv:VC4-1 VC4:VC4-1 VC4--xv:VC4-1
PORT2
VCTRUNK2 VCTRUNK2 PORT2
User B1 User B2
VC4--xv:VC4-2 VC4:VC4-2 VC4--xv:VC4-2
VC4--xv:VC4-3 VC4:VC4-3 VC4--xv:VC4-3
SDH
Working Mode 1000M Full 1000M Full 1000M Full 1000M Full
Duplex Duplex Duplex Duplex
Board EGS8
Prerequisite
The 2 Creating the Network task must be complete.
You must be familiar with 4.3.1 Flow of Configuring EPL Services.
Background Information
If the Ethernet boards used in the actual application scenarios are different from the boards in
this example, you need to know the requirements for configuring specific boards.
l For the EPL services supported by Ethernet switching boards, see 9.1 Service Support
Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 9.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EPL services for user A1 and user B1 on NE1.
1. Configure the attributes of the external ports (PORT1 and PORT2 of the EGS8 board) used
by the services of user A1 and user B1.
l In the NE Explorer, select the EGS8 and then choose Communication > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Workin PORT1: 1000M Full- In this example, the Ethernet service access
g Mode Duplex equipment of user A1 and user B1 supports
PORT2: 1000M Full- the 1000M full-duplex mode. Hence,
Duplex Working Mode is set to 1000M Full-
Duplex for PORT1 and PORT2.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the TAG Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Entry PORT1: Disabled The services of user A1 and user B1 are EPL
Detectio PORT2: Disabled transparent transmission services. Hence,
n you need not enable the entry detection
function to check the VLAN tags of the
packets. In this example, Entry Detection
needs to be set to Disabled. When Entry
Detection is set to Disabled, the parameters
of TAG, Default VLAN ID, and VLAN
Priority are invalid.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
Port PORT1: UNI The UNI interface processes the tag attribute
Type PORT2: UNI of IEEE 802.1q-compliant packets. That is,
the UNI interface processes and identifies the
VLAN information of the accessed user
packets, according to the supported tag flag,
namely, Tag Aware, Access, and Hybrid.
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Configure the attributes of the internal ports (VCTRUNK1 and VCTRUNK2 of the EGS8
board) used by the services of user A1 and user B1.
l Select Internal Port.
l Click the TAG Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Entry VCTRUNK1: Disabled The services of user A1 and user B1 are EPL
Detectio VCTRUNK2: Disabled transparent transmission services. Hence,
n you need not enable the entry detection
function to check the VLAN tags of the
packets. In this example, Entry Detection
needs to be set to Disabled. When Entry
Detection is set to Disabled, the parameters
of TAG, Default VLAN ID, and VLAN
Priority are invalid. Hence, it is
recommended that this parameter adopts the
default value.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
Port PORT1: UNI The UNI interface processes the tag attribute
Type PORT2: UNI of IEEE 802.1q-compliant packets. That is,
the UNI interface processes and identifies the
VLAN information of the accessed user
packets, according to the supported tag flag,
namely, Tag Aware, Access, and Hybrid.
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply. Then,
the Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
Mappin VCTRUNK1: GFP In this example, the EGS8 board is used. This
g VCTRUNK2: GFP parameter adopts the default value GFP.
Protocol Mapping Protocol of the VCTRUNKs on
the Ethernet boards of the interconnected
equipment at both ends must be set to the
same value.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l This operation is optional. Click the LCAS tab. After setting the parameters, click
Apply. Then, the Operation Result dialog box is displayed. Click Close.
l Click the Bound Path tab. Click the Configuration button. Set the following
parameters in the Bound Path Configuration dialog box that is displayed. Click
and click Apply. Click Yes in the Hint dialog box that is displayed. Click
Close in the Operation dialog box that is displayed.
User Parameter Value in Description
This
Example
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
3. Configure the Ethernet private line services for user A1 and user B1.
l In the NE Explorer, select the EGS8 and then choose Communication > Ethernet
Service > Ethernet Line Service from the Function Tree. Click .
l Click New on the lower-right pane to display the Create Ethernet Line Service dialog
box. Set the following parameters, and then click OK. The Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
Source C- Null In this example, the EPL service does not carry
VLAN(e.g. the VLAN tag.
1, 3-6)
Sink C- Null In this example, the EPL service does not carry
VLAN(e.g. the VLAN tag.
1, 3-6)
Source C- Null In this example, the EPL service does not carry
VLAN(e.g. the VLAN tag.
1, 3-6)
Sink C- Null In this example, the EPL service does not carry
VLAN(e.g. the VLAN tag.
1, 3-6)
4. Configure the cross-connections from the Ethernet services to the SDH links for user A1
and user B1.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree. Click .
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters that are required, and then click Apply. Then, the Operation
Result dialog box is displayed, indicating that the operation is successful. Click
Close.
User Paramete Value in Description
r This
Example
User A1 Level VC4 The timeslot bound with the service of user
A1 is at the VC-4 level. The service level
must be consistent with the level of the path
bound with the VCTRUNK.
Activate Yes -
Immediatel
y
User B1 Level VC4 The timeslot bound with the service of user
B1 is at the VC-4 level. The service level
must be consistent with the level of the path
bound with the VCTRUNK.
Activate Yes -
Immediatel
y
Step 2 Configure the pass-through services for user A1 and user B1 on NE2.
1. Click . Select NE2 in the Navigation Tree that is displayed. Then, click OK.
2. In the NE Explorer, select NE2 and then choose Configuration > SDH Service
Configuration from the Function Tree. Click .
3. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters that are required, and then click OK. Then, the Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
Level VC4 The SDH service of NE1, which passes through NE2, is
at the VC-4 level.
Direction Bidirectional As shown in Figure 4-23, the SDH service from NE1 to
NE2 is a bidirectional service.
Source Slot 1-JL64-1 As shown in Figure 4-23, the service signals are
(SDH-1) transmitted from 1-JL64-1(SDH-1) to 17-JL64-1
(SDH-1). In this example, Source Slot is set to 1-JL64-1
(SDH-1).
Source 1-3 The service between user A1 and user B1 occupies three
Timeslot VC-4s.
Range(e.g.
1,3-6)
Sink Slot 17-JL64-1 As shown in Figure 4-23, the service signals are
(SDH-1) transmitted from 1-JL64-1(SDH-1) to 17-JL64-1
(SDH-1). In this example, Sink Slot is set to 17-JL64-1
(SDH-1).
Sink 1-3 The service between user A1 and user B1 occupies three
Timeslot VC-4s.
Range(e.g.
1,3-6)
Activate Yes -
Immediatel
y
Step 3 Configure the EPL services for user A2 and user B2 on NE3.
Refer to Step 1 and configure the EPL services for user A2 and user B2.
Step 4 Check whether the service between user A1 and user A2 and the service between user B1 and
user B2 are correct. For the operation procedure, see 8.15 Testing Ethernet Service
Channels.
Step 5 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.5 Deleting Ethernet
Private Line Services.
Ethernet switching boards are required for creating EVPL services of different VLAN IDs on
NE1. In this manner, the data of different users, which are received from the same external port,
can be differentiated. Ethernet transparent transmission boards are required for creating EPL
transparent transmission services on NE2 and NE4.
Service Requirement
On the network shown in Figure 4-24, the service requirements are as follows:
l The headquarters C1 of user C is located at NE1. Two branches (C2 and C3) of user C are
located at NE2 and NE4. The services between C1 and C2 are transmitted in the VLAN of
which the VLAN ID is 100. The services between C1 and C3 are transmitted in the VLAN
of which the VLAN ID is 200.
l The services of C2 are isolated from the services of C3. The services of C2 and C3 require
a 100 Mbit/s bandwidth respectively.
l The Ethernet equipment of C1, C2, and C3 provides 1000 Mbit/s Ethernet optical interfaces
that work in 1000M full-duplex mode. The Ethernet equipment of C1 supports VLAN tags,
but the Ethernet equipment of C2 and C3 does not support VLAN tags.
– The VLAN ID used by the Ethernet services between C1 and C2 is 100.
– The VLAN ID used by the Ethernet services between C1 and C3 is 200.
Figure 4-24 Networking diagram for configuring PORT-shared EVPL (VLAN) services
T2000
NE2 NE4
PORT1 PORT1
User C3
User C2 1 17
NE1
17 1
VLAN 100
Line Board 17-JL64
PORT1
VLAN 200 VCTRUNK Line Board 1-JL64
Ethernet Board 4-EGS8
User
C1
EGT6 board each. The EPL services are configured to implement service transparent
transmission from NE2 and NE4 to NE1.
NOTE
As described in Table 9-1, the Ethernet boards are classified into the Ethernet transparent transmission
boards and Ethernet switching boards, based on the type of the accessed services. The Ethernet transparent
transmission boards support only EPL services whereas the Ethernet switching boards support EPL
services, EVPL services, and Layer 2 switching. Hence, Ethernet switching boards are used more widely
than Ethernet transparent transmission boards.
SDH
VLAN Priority 0 0
EVPL1 EVPL2
(PORT1←→VCTRUNK1 (PORT1←→VCTRUNK2
) )
Board EGS8
Parameter NE1
EVPL1 EVPL2
(PORT1←→VCTRUNK1 (PORT1←→VCTRUNK2
) )
Prerequisite
The 2 Creating the Network task must be complete.
You must be familiar with 4.3.2 Flow of Configuring EVPL Services.
Background Information
If the Ethernet boards used in the actual application scenarios are different from the boards in
this example, you need to know the requirements for configuring specific boards.
l The Ethernet switching boards that support EVPL services are provided in 9.1 Service
Support Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 9.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EVPL services for user C1 on NE1.
1. Configure the attributes of the external port (PORT1 of the EGS8 board) used by the service
of user C1.
l In the NE Explorer, select the EGS8 and then choose Communication > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the TAG Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
TAG PORT1: Tag Aware When the port is set to Tag Aware, all data
frames transmitted and received at the port
must carry VLAN tags. In this example,
TAG is set to Tag Aware.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal ports (VCTRUNK1 and VCTRUNK2 of the EGS8 board)
used by the services between user C1 and user C2 and between user C1 and user C3.
l Select Internal Port.
l Click the TAG Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply. Then,
the Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l This operation is optional. Click the LCAS tab. After setting the parameters, click
Apply. Then, the Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
l Click the Bound Path tab. Click the Configuration button. Set the following
parameters in the Bound Path Configuration dialog box that is displayed. Click
and click Apply. Click Yes in the Hint dialog box that is displayed. Click
Close in the Operation Result dialog box that is displayed.
User Parameter Value in Description
This
Example
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
3. Configure the Ethernet private line services between user C1 and user C2 and between user
C1 and user C3.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Service > Ethernet Line Service from the Function Tree. Click .
l Click New on the lower-right pane to display the Create Ethernet Line Service dialog
box. Set the following parameters, and then click OK. The Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
4. Configure the cross-connections from Ethernet services (between user C1 and user C2 and
between user C1 and user C3) to the SDH links.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree. Click .
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters that are required. Click Apply. Then, the Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
User Paramete Value in Description
r This
Example
Activate Yes -
Immediatel
y
Activate Yes -
Immediatel
y
Step 3 Check whether the services are configured correctly. For the operation procedures, see 8.15
Testing Ethernet Service Channels.
l Before testing the service connectivity between headquarters C1 and branch C2, set TAG to
Access and Default VLAN ID to 100 for PORT1 on the EGS8 board.
l Before testing the service connectivity between headquarters C1 and branch C3, set TAG to
Access and Default VLAN ID to 200 for PORT1 on the EGS8 board.
NOTE
After the test, change the parameter values back to the values specified in the service configuration.
Step 4 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.5 Deleting Ethernet
Private Line Services.
the services of different users are isolated from each other. After the data arrives at the sink node,
the VLAN tags are stripped.
4.7.3 Configuration Process
Ethernet switching boards are required on both the source and sink nodes for creating EVPL
services with different VLAN IDs. In this manner, the packets received from different external
ports are added with different VLAN tags. As a result, the services of different users are isolated
from each other when they are transmitted on the same VCTRUNK.
Service Requirement
On the network as shown in Figure 4-26, the service requirements are as follows:
l Two branches of user D are located at NE1 and NE2, and need to communicate with each
other.
l Two branches of user E are located at NE1 and NE2, and need to communicate with each
other.
l The services of user D need to be isolated from the services of user E. The traffic of user
D and the traffic of user E, however, occupy a 100 Mbit/s bandwidth during different time
period.
l The Ethernet equipment of user D and user E provides 1000 Mbit/s Ethernet optical
interfaces that work in 1000M full-duplex mode and do not support VLAN tags.
Figure 4-26 Networking diagram for configuring VCTRUNK-shared EVPL (VLAN) services
T2000
PORT1
NE2 NE4
User D2 PORT2 1
NE1
17
PORT1 PORT2 User E1
User E2
In this example, NE1 and NE2 are each configured with an EGS8 board. Different VLAN IDs
are used to isolate the data of different users transmitted on the same VCTRUNK.
l When the data of user D is accessed into the transmission network, the VLAN ID of 100
is added to the data. When the data is transmitted out of the transmission network, the
VLAN tag is stripped.
l When the data of user E is accessed into the transmission network, the VLAN ID of 200 is
added to the data. When the data is transmitted out of the transmission network, the VLAN
tag is stripped.
Figure 4-27 shows the signal flow of the VCTRUNK-shared EVPL (VLAN) services and the
timeslot allocation to the VCTRUNK-shared EVPL (VLAN) services.
For the method of calculating the bandwidth of the Ethernet services transmitted on a
VCTRUNK, see 9.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet
Boards.
PORT1 PORT1
User D1 EVPL1 EVPL1 User D2
VCTRUNK1 VCTRUNK1
PORT2 VC4-xv:VC4-1 PORT2
VC4:VC4-1 VC4-xv:VC4-1
User E1 EVPL2 EVPL2 User E2
SDH
l The EVPL services of user D and user E that share VCTRUNK1 occupy the first VC-4
(VC4:VC4-1) on the SDH link between NE1 and NE2.
l The EVPL services are added and dropped by using the first VC-4 (VC4-xv:VC4-1) on the
EGS8 board of NE1 and the first VC-4 (VC4-xv:VC4-1) on the EGS8 board of NE2.
Working Mode 1000M Full- 1000M Full- 1000M Full- 1000M Full-
Duplex Duplex Duplex Duplex
VLAN Priority 0 0 0 0
Prerequisite
The 2 Creating the Network task must be complete.
Background Information
If the Ethernet boards used in the actual application scenarios are different from the boards in
this example, you need to know the requirements for configuring specific boards.
l The Ethernet switching boards that support EVPL services are provided in 9.1 Service
Support Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 9.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EVPL services for user D1 and user E1 on NE1.
1. Configure the attributes of the external ports (PORT1 and PORT2 of the EGS8 board) used
by the services of user D1 and user E1.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the TAG Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
l Click the Network Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal port (VCTRUNK1 on the EGS8 board) used by the services
between user D1 and user D2 and between E1 and user E2.
l Select Internal Port.
l Click the TAG Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
TAG VCTRUNK1: Tag Aware When the port is set to Tag Aware, all data
frames transmitted and received at the port
must carry VLAN tags. In this example,
TAG is set to Tag Aware.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply. Then,
the Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l This operation is optional. Click the LCAS tab. After setting the parameters, click
Apply. Then, the Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
l Click the Bound Path tab. Click the Configuration button. Set the following
parameters in the Bound Path Configuration dialog box that is displayed. Click
and click Apply. Click Yes in the Hint dialog box that is displayed. Click
Close in the Operation Result dialog box.
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
3. Configure the Ethernet private line services between user D1 and user D2 and between user
E1 and user E2.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Service > Ethernet Line Service from the Function Tree. Click .
l Click New on the lower-right pane to display the Create Ethernet Line Service dialog
box. Set the following parameters, and then click OK. The Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
4. Configure the cross-connections from the Ethernet services to the SDH links for user D1
and user E1.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree. Click .
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters that are required. Click Apply. Then, the Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
User Paramete Value in Description
r This
Example
Activate Yes -
Immediatel
y
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.5 Deleting Ethernet
Private Line Services.
services, a layer of S-VLAN tag is added on the network side to isolate the services of different
users from each other.
4.8.1 Networking Diagram
When the services of multiple users that have the same VLAN ID are accessed on the same
station and need to be transmitted on the same VCTRUNK, a layer of S-VLAN tag is added to
isolate the services of different users from each other.
4.8.2 Signal Flow and Timeslot Allocation
The services of multiple users that have the same VLAN ID are accessed through different
external ports of the Ethernet board on the source node. After different S-VLAN tags are added
to the services, the services are transmitted on the same VCTRUNK. In this manner, the services
of different users are isolated from each other. After the services arrive at the sink node, the S-
VLAN tags are stripped.
4.8.3 Configuration Process
The Ethernet switching boards supporting the QinQ function need to be installed at the source
and sink nodes and need to be configured with the EVPL services of different users. Different
S-VLAN tags are added to the services of different users that have the same C-VLAN ID and
are accessed through different ports on the Ethernet switching boards. In this manner, the services
of different users are isolated from each other and are transmitted on the same VCTRUNK.
Service Requirement
On the network as shown in Figure 4-28, the service requirements are as follows:
l Two branches of user J are located at NE1 and NE2, and need to communicate with each
other.
l Two branches of user K are located at NE1 and NE2, and need to communicate with each
other.
l The services of user J need to be isolated from the services of user K. The traffic of user J
and the traffic of user K, however, occupy a 200 Mbit/s bandwidth during different time
periods.
l The Ethernet equipment of user J and user K provides 1000 Mbit/s Ethernet optical
interfaces that work in 1000M full-duplex mode. The services of all the users have the same
VLAN ID of 100 and are accessed into the transmission network.
T2000
User J2 PORT2 1
VLAN 100
NE1
17 PORT2
User K2 VLAN 100
VCTRUNK
User J1
SDH
PORT VCTRUNK
l The EVPL services of user J and user K that share VCTRUNK1 occupy the first VC-4
(VC4:VC4-1) and second VC-4 (VC4:VC4-2) on the SDH link between NE1 and NE2.
l The EVPL services of user J and user K are added and dropped by using the first VC-4
(VC4-xv:VC4-1) and second VC-4 (VC4-xv:VC4-2) on the EGS8 board of NE1 and the
first VC-4 (VC4-xv:VC4-1) and second VC-4 (VC4-xv:VC4-2) on the EGS8 board of NE2.
Working Mode 1000M Full- 1000M Full- 1000M Full- 1000M Full-
Duplex Duplex Duplex Duplex
Source S- - - - -
VLAN
Sink S-VLAN 10 20 10 20
Prerequisite
The 2 Creating the Network task must be complete.
Background Information
If the Ethernet boards used in the actual application scenarios are different from the boards in
this example, you need to know the requirements for configuring specific boards.
l For the Ethernet switching boards that EVPL services support, see 9.1 Service Support
Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 9.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EVPL services for user J1 and user K1 on NE1.
1. Configure the attributes of the external ports (PORT1 and PORT2 of the EGS8 board) used
by the services of user J1 and user K1.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed, indicating that the operation is successful.
Click Close.
Workin PORT1: 1000M Full- In this example, the Ethernet service access
g Mode Duplex equipment of user J1 and user K1 supports
PORT2: 1000M Full- the 1000M full-duplex mode. Hence,
Duplex Working Mode is set to 1000M Full-
Duplex for PORT1 and PORT2.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed, indicating that the operation is successful.
Click Close.
Parameter Value in This Example Description
l When Port Type is set to C-Aware or S-Aware, the parameters in the TAG
Attributes tab page are invalid. Hence, The parameters in the TAG Attributes tab page
need not be set.
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal port (VCTRUNK1 on the EGS8 board) used by the service
between user J1 and user J2 and the service between K1 and user K2.
l Select Internal Port.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed, indicating that the operation is successful.
Click Close.
Parame Value in This Example Description
ter
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply. Then,
the Operation Result dialog box is displayed, indicating that the operation is successful.
Click Close.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l This operation is optional. Click the LCAS tab. After setting the parameters, click
Apply. Then, the Operation Result dialog box is displayed, indicating that the
operation is successful. Click Close.
Parame Value in This Example Description
ter
l Click the Bound Path tab. Click the Configuration button. Set the parameters in the
Bound Path Configuration dialog box that is displayed. Click and then click
Apply. Click Yes in the Hint dialog box that is displayed. Click Close in the Operation
Result dialog box that is displayed.
User Paramete Value in Description
r This
Example
l When Port Type is set to C-Aware or S-Aware, the parameters in the TAG
Attributes tab page are invalid. Hence, The parameters in the TAG Attributes tab page
need not be set.
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
3. Configure the Ethernet private line services between user J1 and user J2 and between user
K1 and user K2.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
l Select Display QinQ Shared Service on the lower-right pane. Then, click New.
l Set the parameters in the Create Ethernet LAN Service dialog box that is displayed.
Click Apply. Then, the Operation Result dialog box is displayed, indicating that the
operation is successful. Click Close.
User Parameter Value in Description
This
Example
4. Configure the cross-connections from the Ethernet services to the SDH links for user J1
and user K1.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree. Click .
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters that are required. Click Apply. Then, the Operation Result is
displayed, indicating that the operation is successful. Click Close.
User Paramete Value in Description
r This
Example
Activate Yes -
Immediatel
y
Refer to Step 1 and configure the EVPL service of NE2. The procedures and parameters for
configuring the EVPL service of NE2 are the same as the procedures and parameters for
configuring the EVPL service of NE1.
Step 3 Check whether the services between NE1 and NE2 are configured correctly. For the operation
procedures, see 8.15 Testing Ethernet Service Channels.
l Before testing the service connectivity between user J1 and user J2, set TAG to Access and
Default VLAN ID to 100 for PORT1 on the EGS8 board.
l Before testing the service connectivity between user K1 and user K2, set TAG to Access and
Default VLAN ID to 100 for PORT2 on the EGS8 board.
NOTE
After the test, change the parameter values back to the values specified in the service configuration.
Step 4 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.5 Deleting Ethernet
Private Line Services.
Service Requirement
On the network as shown in Figure 4-30, the service requirements are as follows:
l Three branches (F1, F2, and F3) of user F are located at NE1, NE2, and NE4. F1 needs to
communicate with F2 and F3, and requires a 100 Mbit/s bandwidth for communication
with each branch.
l The Ethernet equipment of user F provides 1000 Mbit/s Ethernet optical interfaces that
work in 1000M full-duplex mode and support VLAN tags. The VLAN IDs and the number
of VLANs, however, are unknown and may be changed.
NOTE
The application scenarios where one branch needs to communicate with other branches are as follows:
l Branches F2 and F3 need to communicate with each other.
l Branches F2 and F3 need not communicate with each other.
If branches F2 and F3 need to communicate with each other, skip Step 1.4.
Figure 4-30 Networking diagram for configuring EPLAN services (IEEE 802.1d bridge)
NE3
T2000
NE2 NE4
1 NE1 17
PORT1 PORT1
17 1
F2 F3
PORT1 Line Board 1-JL64
VB Line Board 17-JL64
VCTRUNK VCTRUNK Ethernet Board 4-EGS8
1 2 F1
PORT1
VCTRUNK
In this example, the convergence node NE1 is configured with an EGS8 board that supports the
IEEE 802.1d bridge, thus implementing EPLAN services wherein user VLANs are not limited.
The access nodes NE2 and NE4 are configured with a EGT6 board each. The EPL services are
configured to be transparently transmitted from NE2 and NE4 to NE1.
NOTE
As described in Table 9-1, the Ethernet boards are classified into the Ethernet transparent transmission
boards and Ethernet switching boards, based on the type of the accessed services. The Ethernet transparent
transmission boards support only EPL services whereas the Ethernet switching boards support EPL
services, EVPL services, and Layer 2 switching. Hence, Ethernet switching boards are used more widely
than Ethernet transparent transmission boards.
Figure 4-31 shows the signal flow of the EPLAN services (IEEE 802.1d bridge) and the timeslot
allocation to the EPLAN services (IEEE 802.1d bridge).
For the method of calculating the bandwidth of the Ethernet services transmitted on a
VCTRUNK, see 9.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet
Boards.
VCTRUNK1 PORT1
NE1:EGS8 User F2
VC4-xv:VC4-1
C 4-1
VCTRUNK1 4:V
VC
PORT1 VC4-xv:VC4-1
User F1
VCTRUNK2
V C4 NE4:EGT6
VC4-xv:VC4-2 :VC
4-1
VB1
VCTRUNK1 PORT1
User F3
VC4-xv:VC4-1
SDH
l The Ethernet LAN services of user F occupy the first VC-4 (VC4:VC4-1) on the SDH link
between NE1 and NE2 and the first VC-4 (VC4:VC4-1) on the SDH link between NE1
and NE4.
l The Ethernet LAN services between NE1 and NE2 are added and dropped by using the
first VC-4 (VC4-xv:VC4-1) on the EGS8 board of NE1 and the first VC-4 (VC4-xv:VC4-1)
on the EGT6 board of NE2.
l The Ethernet LAN services between NE1 and NE4 are added and dropped by using the
second VC-4 (VC4-xv:VC4-2) on the EGS8 board of NE1 and the first VC-4 (VC4-
xv:VC4-1) on the EGT6 board of NE4.
Board EGS8
VB Name VB1
VCTRUNK1 Spoke
VCTRUNK2 Spoke
Prerequisite
The 2 Creating the Network task must be complete.
You must be familiar with 4.3.3 Flow of Configuring EPLAN Services.
Background Information
If the Ethernet boards used in the actual application scenarios are different from the boards in
this example, you need to know the requirements for configuring specific boards.
l For the EPLAN services supported by Ethernet switching boards, see 9.1 Service Support
Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 9.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EPLAN services for user F1, user F2, and user F3 on NE1.
1. Configure the attributes of the external port (PORT1 of the EGS8 board) used by the service
of user F1.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply. Then, click
Close in the Operation Result dialog box that is displayed.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the TAG Attributes tab. After setting the parameters, click Apply. Then, click
Close in the Operation Result dialog box that is displayed.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then,
click Close in the Operation Result dialog box that is displayed.
Parame Value in This Example Description
ter
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal ports (VCTRUNK1 and VCTRUNK2 of the EGS8 board)
used by the services of user F2 and user F3 on NE1.
l Select Internal Port.
l Click the TAG Attributes tab. After setting the parameters, click Apply. Then, click
Close in the Operation Result dialog box that is displayed.
TAG VCTRUNK1: Tag Aware The service access equipment of user F2 and
VCTRUNK2: Tag Aware user F3 supports VLAN tags and the
transmitted data frames carry VLAN tags. In
this example, TAG is set to Tag Aware for
VCTRUNK1 and VCTRUNK2.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then,
click Close in the Operation Result dialog box that is displayed.
Parame Value in This Example Description
ter
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply. Then,
click Close in the Operation Result dialog box that is displayed.
Parame Value in This Example Description
ter
Mappin VCTRUNK1: GFP In this example, the EGS8 board is used. This
g VCTRUNK2: GFP parameter adopts the default value GFP.
Protocol Mapping Protocol of the VCTRUNKs on
the Ethernet boards of the interconnected
equipment at both ends must be set to the
same value.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l This operation is optional. Click the LCAS tab. After setting the parameters, click
Apply. Then, click Close in the Operation Result dialog box that is displayed.
Parame Value in This Example Description
ter
l Click the Bound Path tab. Click the Configuration button. Set the following
parameters in the Bound Path Configuration dialog box that is displayed. Click
and then click Apply. Click Yes in the Hint dialog box that is displayed. Click
Close in the Operation Result dialog box that is displayed.
User Parameter Value in Description
This
Example
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
3. Create a bridge for the EGS8 board on NE1.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
l Click New.
l Set the parameters in the Create Ethernet LAN Service dialog box that is displayed.
Click Apply. Then, the Operation Result dialog box is displayed. Click Close.
Parameter Value in Description
This
Example
VB Type 802.1d The IEEE 802.1d MAC bridge learns and forwards
the packets according to the MAC addresses of the
user packets. The information in the VLAN tags of
the user packets, however, is not considered in the
learning and forwarding process. The IEEE 802.1d
MAC bridge is used when the entire information of
the VLANs used by the client cannot be learned or
when the data between the VLANs of the client need
not be isolated.
Bridge SVL/Ingress When the bridge adopts the SVL learning mode, all
Switch Filter the VLANs share the same MAC address table. That
Mode Disable is, the bridge learns and forwards the packets
according to the MAC addresses of the user packets
only. The information in the VLAN tags of the user
packets, however, is not considered in the learning
and forwarding process.
Bridge SVL -
Learning
Mode
Ingress Filter Disabled The IEEE 802.1d MAC bridge does not detect the
VLAN tags of the received packets.
If normal communication is required between user F2 and user F3, proceed to Step 1.5.
l Select the created bridge and click the Service Mount tab.
l Change the Hub/Spoke attribute of the port that is mounted to the bridge. After setting
the parameters, click Apply. Then, the Operation Result dialog box is displayed,
indicating that the operation is successful. Click Close.
5. Configure the cross-connections from the Ethernet services to the SDH links for user F2
and user F3.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree. Click .
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters that are required. Click Apply. Then, the Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
User Paramete Value in Description
r This
Example
User F2 Level VC4 The timeslot bound with the service of user
F2 is at the VC-4 level. The service level
must be consistent with the level of the paths
bound with the VCTRUNK.
Activate Yes -
Immediate
ly
User F3 Level VC4 The timeslot bound with the service of user
F3 is at the VC-4 level. The service level
must be consistent with the level of the paths
bound with the VCTRUNK.
Activate Yes -
Immediate
ly
Step 3 Check whether the services are configured correctly. For the operation procedures, see 8.15
Testing Ethernet Service Channels.
l Before testing the service connectivity between headquarters F1 and branch F2, set TAG to
Access and Default VLAN ID to 1 for PORT1 and VCTRUNK1 of the EGS8 board.
l Before testing the service connectivity between headquarters F1 and branch F3, set TAG to
Access and Default VLAN ID to 1 for PORT1 and VCTRUNK2 of the EGS8 board.
NOTE
After the test, change the parameter values back to the values specified in the service configuration.
Step 4 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.5 Deleting Ethernet
Private Line Services.
Service Requirement
On the network as shown in Figure 4-32, the service requirements are as follows:
l Three branches (G1, G2, and G3) of user G are located at NE1, NE2, and NE4 respectively.
The branches need to form a LAN and share a 100 Mbit/s bandwidth. G2 and G3 need not
communicate with each other.
l Three branches (H1, H2, and H3) of user H are located at NE1, NE2, and NE4 respectively.
The branches need to form a LAN and share a 100 Mbit/s bandwidth.
l The services of user G must be isolated from the services of user H.
l The Ethernet equipment of user G and user H provides 1000 Mbit/s Ethernet optical
interfaces that work in 1000M full-duplex mode and do not support VLAN tags.
Figure 4-32 Networking diagram for configuring EVPLAN services (IEEE 802.1q bridge)
NE3
T2000
The access nodes NE2 and NE4 are configured with a EGT6 board each. The EPL services are
configured to be transparently transmitted from NE2 and NE4 to NE1.
NOTE
As described in Table 9-1, the Ethernet boards are classified into the Ethernet transparent transmission
boards and Ethernet switching boards, based on the type of the accessed services. The Ethernet transparent
transmission boards support only EPL services whereas the Ethernet switching boards support EPL
services, EVPL services, and Layer 2 switching. Hence, Ethernet switching boards are used more widely
than Ethernet transparent transmission boards.
Figure 4-33 shows the signal flow of the EVPLAN services (IEEE 802.1q bridge) and the
timeslot allocation to the EVPLAN services (IEEE 802.1q bridge).
For the method of calculating the bandwidth of the Ethernet services transmitted on a
VCTRUNK, see 9.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet
Boards.
VCTRUNK1 PORT1
User G2
NE1:EGS8 -1 VC4-xv:VC4-1
C4
4:V VCTRUNK2 PORT2
VC User H2
VLAN 100 VCTRUNK1 VC4-xv:VC4-2
PORT1 2
VC4-xv:VC4-1 4-
User G1 VC
VCTRUNK2 4:
VC
VC4-xv:VC4-2 VC
VLAN 200 VCTRUNK3 4:
VC NE4:EGT6
PORT2 4-
VC4-xv:VC4-3 1
User H1
VCTRUNK4 VC PORT1
4:V VCTRUNK1
C 4-2 User G3
VC4-xv:VC4-4 VC4-xv:VC4-1
VB1 VCTRUNK2 PORT2
User H3
VC4-xv:VC4-2
SDH
PORT VCTRUNK
– Are added and dropped by using the second VC-4 (VC4-xv:VC4-2) on the EGS8 board
of NE1 and the first VC-4 (VC4-xv:VC4-1) on the EGT6 board of NE4.
l The Ethernet LAN services of user H:
– Occupy the second VC-4 (VC4:VC4-2) on the SDH link between NE1 and NE2 and
the second VC-4 (VC4:VC4-3) on the SDH link between NE1 and NE4.
– Are added and dropped by using the third VC-4 (VC4-xv:VC4-3) on the EGS8 board
of NE1 and the second VC-4 (VC4-xv:VC4-2) on the EGT6 board of NE2.
– Are added and dropped by using the fourth VC-4 (VC4-xv:VC4-4) on the EGS8 board
of NE1 and the second VC-4 (VC4-xv:VC4-2) on the EGT6 board of NE4.
VLAN 0 0 - - - -
Priority
VLAN 0 0 0 0 - - - -
Priority
Board EGS8
VB Name VB1
PORT2 Hub
VCTRUNK Spoke
1
VCTRUNK Spoke
2
VCTRUNK Hub
3
VCTRUNK Hub
4
Prerequisite
The 2 Creating the Network task must be complete.
Background Information
If the Ethernet boards used in the actual application scenarios are different from the boards in
this example, you need to know the requirements for configuring specific boards.
l The Ethernet switching boards that support EVPLAN services are provided in 9.1 Service
Support Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 9.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EVPLAN services for user G1, user G2, user G3, user H1, user H2, and user H3
on NE1.
1. Configure the attributes of the external ports (PORT1 and PORT2 of the EGS8 board) used
by the services of user G1 and user H1.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply. Click
Close in the Operation Result dialog box that is displayed.
Workin PORT1: 1000M Full- In this example, the Ethernet service access
g Mode Duplex equipment of user G1 and user H1 supports
PORT2: 1000M Full- the 1000M full-duplex mode. Hence,
Duplex Working Mode is set to 1000M Full-
Duplex for PORT1 and PORT2.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the TAG Attributes tab. After setting the parameters, click Apply. Then, click
Close in the Operation Result dialog box that is displayed.
Parame Value in This Example Description
ter
l Click the Network Attributes tab. After setting the parameters, click Apply. Then,
click Close in the Operation Result dialog box that is displayed.
Parame Value in This Example Description
ter
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal ports (VCTRUNK1, VCTRUNK2, VCTRUNK3, and
VCTRUNK4 of the EGS8 board) used by the services of user G2, user G3, user H2, and
user H3 on NE1.
l Select Internal Port.
l Click the TAG Attributes tab. After setting the parameters, click Apply. Then, click
Close in the Operation Result dialog box that is displayed.
Parame Value in This Example Description
ter
Entry VCTRUNK1: Enabled If the packets of user G2, user G3, user H2,
Detectio VCTRUNK2: Enabled and user H3 do not carry VLAN tags, the
n entry detection function must be enabled to
VCTRUNK3: Enabled check whether the packets carry VLAN tags.
VCTRUNK4: Enabled In this example, Entry Detection is set to
Enabled.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then,
click Close in the Operation Result dialog box that is displayed.
Parame Value in This Example Description
ter
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply. Then,
click Close in the Operation Result dialog box that is displayed.
Mappin VCTRUNK1: GFP In this example, the EGS8 board is used. This
g VCTRUNK2: GFP parameter adopts the default value GFP.
Protocol Mapping Protocol of the VCTRUNKs on
VCTRUNK3: GFP the Ethernet boards of the interconnected
VCTRUNK4: GFP equipment at both ends must be set to the
same value.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc VCTRUNK3: Big endian the VCTRUNKs on the Ethernet boards of
e VCTRUNK4: Big endian the interconnected equipment at both ends
must be set to the same value.
l This operation is optional. Click the LCAS tab. After setting the parameters, click
Apply. Then, click Close in the Operation Result dialog box that is displayed.
l Click the Bound Path tab. Click the Configuration button. Set the following
parameters in the Bound Path Configuration dialog box that is displayed. Click
and then click Apply. Click Yes in the Hint dialog box that is displayed. Click
Close in the Operation Result dialog box that is displayed.
User Parameter Value in Description
This
Example
Ava VC4-1 For the resources used by other boards, see 9.2
ilabl Requirements for Binding Paths with
e VCTRUNKs on Ethernet Boards.
Res
ourc
es
Ava VC4-2 For the resources used by other boards, see 9.2
ilabl Requirements for Binding Paths with
e VCTRUNKs on Ethernet Boards.
Res
ourc
es
Ava VC4-3 For the resources used by other boards, see 9.2
ilabl Requirements for Binding Paths with
e VCTRUNKs on Ethernet Boards.
Res
ourc
es
Ava VC4-4 For the resources used by other boards, see 9.2
ilabl Requirements for Binding Paths with
e VCTRUNKs on Ethernet Boards.
Res
ourc
es
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
3. Create a bridge for the EGS8 board on NE1.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
l Click New.
l Set the parameters in the Create Ethernet LAN Service dialog box that is displayed.
Parameter Value in Description
This
Example
Bridge IVL -
Learning
Mode
MAC Enabled -
Address Self-
learning
Hub/Spoke PORT1: Hub If user G2 need not communicate with user G3,
VCTRUNK1: set VCTRUNK1 and VCTRUNK2 that access
Spoke the services of user G2 and user G3 to Spoke.
Ports of the Spoke attribute cannot
VCTRUNK2: communicate with each other. A port of the
Spoke Hub attribute can communicate with a port of
PORT2: Hub the Spoke or Hub attribute.
VCTRUNK3:
Hub
VCTRUNK4:
Hub
6. Configure the cross-connections from the Ethernet services to the SDH links for user G2,
user G3, user H2, and user H3.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree. Click .
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters that are required. Click Apply. Then, the Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
User Paramete Value in Description
r This
Example
User G2 Level VC4 The timeslot bound with the service of user
G2 is at the VC-4 level. The service level
must be consistent with the level of the
paths bound with the VCTRUNK.
Activate Yes -
Immediatel
y
User G3 Level VC4 The timeslot bound with the service of user
G3 is at the VC-4 level. The service level
must be consistent with the level of the
paths bound with the VCTRUNK.
Activate Yes -
Immediatel
y
User H2 Level VC4 The timeslot bound with the service of user
H2 is at the VC-12 level. The service level
must be consistent with the level of the
paths bound with the VCTRUNK.
Activate Yes -
Immediatel
y
User H3 Level VC4 The timeslot bound with the service of user
H3 is at the VC-12 level. The service level
must be consistent with the level of the
paths bound with the VCTRUNK.
Activate Yes -
Immediatel
y
Step 3 Check whether the services are configured correctly. For the operation procedures, see 8.15
Testing Ethernet Service Channels.
Step 4 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.5 Deleting Ethernet
Private Line Services.
Service Requirement
As shown in Figure 4-34, the transmission network is required to transmit the VoIP and HSI
services.
l The VoIP services of user M and user N are accessed into the transmission network at NE2
and NE4 respectively and into the VoIP server at the convergence node NE1. The services
share a 100 Mbit/s bandwidth.
l The HSI services of user M and user N are accessed into the transmission network at NE2
and NE4 respectively and into the HSI server at the convergence node NE1. The services
share a 150 Mbit/s bandwidth.
l The VoIP services need to be isolated from the HSI services.
l The data communication equipment of user M and user N provides 1000 Mbit/s Ethernet
optical interfaces that work in 1000M full-duplex mode and support VLAN tags.
– C-VLAN ID of the VoIP services: 10
– C-VLAN ID of the HSI services: 20
NOTE
The application scenarios where one branch needs to communicate with other branches are as follows:
l User M needs to communicate with user N.
l User M need not communicate with user N.
If user M and user N need to communicate with each other, skip Step 1.5.
The operator requires that all services received from the user side should be uniformly labeled
and groomed through planned S-VLANs.
Figure 4-34 Networking diagram for configuring EVPLAN services (IEEE 802.1ad bridge)
NE3
T2000
PORT1 PORT2
Line Board 1-JL64
VCTRUNK Line Board 17-JL64
Ethernet Board 4-EGS8
-1 VCTRUNK1 PORT1
SVLAN 100 :VC4 User M
VC4 C4-2 VC4-xv:VC4-1
:V
PORT1 V C4 VC4-xv:VC4-2
VoIP VCTRUNK1
Server VC4-xv:VC4-1
VC4-xv:VC4-2
SVLAN 200 V C4
:V NE4:EGT6
VCTRUNK2 VC4 C4-1
PORT2 :VC4
HSI VC4-xv:VC4-3 -2
Server VC4-xv:VC4-4 PORT1
VCTRUNK1
VC4-xv:VC4-1
User N
VC4-xv:VC4-2
VB1 SDH
PORT VCTRUNK
Working Mode 1000M Full- 1000M Full- 1000M Full- 1000M Full-
Duplex Duplex Duplex Duplex
Board EGS8
VB Name VB1
VB Port 1 2 3 4
C-VLAN 10 20 10 20 10 20
VCTRUNK Spoke
1
VCTRUNK Spoke
2
Prerequisite
The 2 Creating the Network task must be complete.
You must be familiar with 4.3.4 Flow of Configuring EVPLAN Services.
Background Information
If the Ethernet boards used in the actual application scenarios are different from the boards in
this example, you need to know the requirements for configuring specific boards.
l The Ethernet switching boards that support EVPLAN services are provided in 9.1 Service
Support Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 9.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
The IEEE 802.1ad provider bridge supports ports with the C-Aware and S-Aware attributes only.
The C-Aware ports are used to add and strip the S-VLAN tags. The S-Aware ports are used to
transparently transmit the S-VLAN tags.
The IEEE 802.1ad provider bridge supports the following operation types:
l Adding the S-VLAN tag based on the port
l Adding the S-VLAN tag based on the port and C-VLAN
l Performing port mounting based on the port
l Performing port mounting based on the port and the S-VLAN
This topic describes the four operation types when Bridge Switch Mode of the IEEE 802.1ad
provider bridge is set to IVL/Ingress Filter Enabled.
l Adding the S-VLAN based on the port: The packets that enter the C-Aware port are added
with the preset S-VLAN tags, and are forwarded in the bridge according to the S-VLAN
filtering table. Before the packets leave the C-Aware port, the S-VLAN tags are stripped.
l Adding the S-VLAN tag based on the port and C-VLAN: The entry detection is performed
for the packets that enter the C-Aware port. Then, the corresponding S-VLAN tags are
added to the packets according to the mapping relation between the C-VLAN tags and the
S-VLAN tags of the packets. If the mapping relation does not exist, the packets are
discarded. After the S-VLAN tags are added, the packets enter the bridge, where the packets
are forwarded according to the S-VLAN filtering table. Before the packets leave the C-
Aware port, the S-VLAN tags are stripped.
NOTE
l A C-Aware port supports different C-VLAN tags being mapped into different S-VLAN tags, but
does not support the same C-VLAN tag being mapping into multiple S-VLAN tags.
l Performing port mounting based on the port: The packets that enter the S-Aware port are
not filtered. Instead, the S-VLAN switch is performed directly. The packets must have the
S-VLAN tags. Otherwise, the packets are discarded. When the packets leave the S-Aware
port, the packets are transparently transmitted.
l Performing port mounting based on the port and the S-VLAN: The entry filtering is
performed according to the preset S-VLAN tag. The packets that do not belong to the S-
VLAN are discarded. Then, the packets are forwarded according to the S-VLAN filtering
table. When the packets leave the S-Aware port, the packets are transparently transmitted.
In the case of the four operation types, the following conditions must be met before the packets
leave a port:
l The port must be contained in the S-VLAN filtering table that is created by the user.
l The S-VLAN ID corresponding to the port must be specified when the user manually
mounts the port to the bridge.
– In the case of a C-Aware port, the S-VLAN ID corresponding to the port is the S-VLAN
ID that is added when the packets enter the port.
– In the case of an S-Aware port, the S-VLAN ID corresponding to the port is the S-VLAN
ID that is set when the user mounts the port to the bridge. If the S-Aware port is mounted
based on the port, the S-VLAN ID is considered to contain all the legal S-VLAN IDs.
Procedure
Step 1 Configure the EVPLAN service of NE1.
1. Set the attributes of the external ports (PORT1 and PORT2 of the EGS8 board) used by the
VoIP server and HSI server.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
Workin PORT1: 1000M Full- In this example, the VoIP server and HSI
g Mode Duplex server support the 1000M full-duplex mode.
PORT2: 1000M Full- Hence, Working Mode is set to 1000M Full-
Duplex Duplex for PORT1 and PORT2.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
l When Port Type is set to C-Aware or S-Aware, the parameters in the TAG
Attributes tab page are invalid. Hence, The parameters in the TAG Attributes tab page
need not be set.
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal ports (VCTRUNK1 and VCTRUNK2 of the EGS8 board)
used by the services of user M and user N on NE1.
l Select Internal Port.
l Click the Network Attributes tab. After setting the parameters, click Apply. Then, the
Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
l When Port Type is set to C-Aware or S-Aware, the parameters in the TAG
Attributes tab page are invalid. Hence, The parameters in the TAG Attributes tab page
need not be set.
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply. Then,
the Operation Result dialog box is displayed. Click Close.
Mappin VCTRUNK1: GFP In this example, the EGS8 board is used. This
g VCTRUNK2: GFP parameter adopts the default value GFP.
Protocol Mapping Protocol of the VCTRUNKs on
the Ethernet boards of the interconnected
equipment at both ends must be set to the
same value.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l This operation is optional. Click the LCAS tab. After setting the parameters, click
Apply. Then, the Operation Result dialog box is displayed. Click Close.
Parame Value in This Example Description
ter
l Click the Bound Path tab. Click the Configuration button. Set the parameters in the
Bound Path Configuration dialog box that is displayed. Click and then click
Apply. Click Yes in the Hint dialog box that is displayed. Click Close in the Operation
Result that is displayed.
User Parameter Value in Description
This
Example
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
3. Create a bridge for the EGS8 board on NE1.
l In the NE Explorer, select the EGS8 board and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
l Click New.
l Set the parameters in the Create Ethernet LAN Service dialog box that is displayed.
Parameter Value in Description
This
Example
VB Type 802.1ad The IEEE 802.1ad bridge supports data frames with
two layers of VLAN tags. This bridge adopts the
outer S-VLAN tags to isolate different VLANs and
supports only the mounted ports whose attributes are
C-Aware or S-Aware.
Bridge IVL/Ingress This bridge checks the contents of the VLAN tags
Switch Mode Filter Enable that are in the packets and performs Layer 2
switching according to the destination MAC
addresses and the S-VLAN IDs of the packets.
Bridge IVL -
Learning
Mode
MAC Enabled -
Address Self-
learning
Operation Adding the S-VLAN tag based on the port and C-VLAN
Type
VB Port 1 2 3 4
C-VLAN 10 20 10 20 10 20
VLAN ID 100 According to the plan, the VoIP service uses the S-
VLAN ID of 100.
VLAN ID 200 According to the plan, the HSI service uses the S-
VLAN ID of 200.
If normal communication is required between user M and user N, proceed to Step 1.6.
l Select the created bridge and click the Service Mount tab.
l Change the Hub/Spoke attribute of the port that is mounted to the bridge.
Parameter Value in This Description
Example
Hub/Spoke PORT1: Hub User M and user N need not communicate with
PORT2: Hub each other. In this case, set VCTRUNK1 and
VCTRUNK2 that access the services of user M
VCTRUNK1: and user N to the Spoke attribute. Ports of the
Spoke Spoke attribute cannot communicate with each
VCTRUNK2: other. A port of the Hub attribute can
Spoke communicate with a port of the Spoke or Hub
attribute.
6. Configure the cross-connections from the Ethernet services to the SDH links for user M
and user N.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree. Click .
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters that are required. Click Apply. Then, click Close in the Operation
Result dialog box that is displayed.
User M Level VC4 The timeslot bound with the service of user
M is at the VC-12 level. The service level
must be consistent with the level of the
paths bound with the VCTRUNK.
Activate Yes -
Immediatel
y
User N Level VC4 The timeslot bound with the service of user
N is at the VC-12 level. The service level
must be consistent with the level of the
paths bound with the VCTRUNK.
Activate Yes -
Immediatel
y
Step 3 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 4 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 7.4.5 Deleting Ethernet
Private Line Services.
When the OptiX OSN 9500 is connected to the data terminal equipment through the broadcast
data port and is configured with broadcast data services, the broadcast data communication can
be realized.
Overview
The data is transparently transmitted through the broadcast data port. Hence, you need not
configure the port rate and transmission control protocol. The maximum transmission rate is
19.2 kbit/s. The broadcast data port is connected to the data terminal equipment. Hence, you can
configure the point-to-point and point-to-multipoint communication modes. The data can be
broadcast to multiple optical interfaces.
As shown in Figure 5-1, the overheads SERIAL1-SERIAL4 can be used as the broadcast data
channels. The broadcast data port uses the RJ-45 connector. For the pin assignment of the
broadcast data port, refer to Table 5-1.
NOTE
The broadcast data port accesses the asynchronous data and then transmits the data to the opposite end over
byte SERIAL1, SERIAL2, SERIAL3, or SERIAL4. The opposite end receives the digital signal and
converts the digital signal into an asynchronous serial signal.
A1 A1 A1 A2 A2 A2 J0
B1 E1 F1
D1 D2 D3 Serial1 Serial2
AU_PTR
B2 B2 B2 K1 K2
D4 Serial4 D5 D6
D7 D8 D9
S1 M1 E2
8 4 232RXD RS232 RX
Pin
Pi n1
5 GND Grounding
8 232TXD RS232 TX
l The port must be of the RS232 level, where logic 1 ranges from -5 V to -15 V and logic 0
ranges from +5 V to +15 V.
l When the data is not transmitted, the port must be of the RS232 high level (approximately
-9 V). Only one slave station can transmit data to the master station at a time.
l The maximum rate must not exceed 19.2 kbit/s.
l The optical interfaces that are not required must not be configured in the broadcast domain
of the broadcast data port.
l The NEs where the broadcast ports are not used must not be configured in the broadcast
domain.
l It is recommended that the signal flow is in the same direction as the NE clock tracing
direction.
In the network shown in Figure 5-2, the service requirements are as follows:
l NE1 is configured with the monitoring host. NE2, NE3, and NE4 are configured with the
environment monitors.
l The monitoring host functions as the master station, controls the data reporting from NE2,
NE3, and NE4, and broadcasts commands to the environment monitors of NE2, NE3, and
NE4.
l The environment monitors of NE2, NE3, and NE4 function as the slave stations, collect
data, and report the data to the monitoring host.
1-JL64 17-JL64
STM-16 two-fiber
NE2 NE4
bidirectional MSP ring
1-JL64 NE3
OptiX NE
Slave station
Master station
Slave station
l During the communication between the master station and the slave station, the signal flow
is as follows:
– The data of the monitoring host is added to the SDH line board of NE1 through the
broadcast data port of NE1 and is then transmitted towards the four directions of NE2
and NE4.
– On the NE2 side, the data that is transmitted from the NE1 side is dropped to the
broadcast data port of NE2 through the SDH line board of NE2, and is then transmitted
to the environment monitor of NE2. That is, the data of the monitoring host is transmitted
to the environment monitor on the NE2 side. At the same time, the data of the monitoring
host passes through the SDH line board and is then transmitted to the direction of NE3.
– On the NE3 side, the data that passes through the NE2 side is dropped to the broadcast
data port of NE3 through the SDH line board of NE3, and is then transmitted to the
environment monitor of NE3. That is, the data of the monitoring host is transmitted to
the environment monitor on the NE3 side.
– On the NE4 side, the data that is transmitted from the NE1 side is dropped to the
broadcast data port of NE4 through the SDH line board of NE4 and is then transmitted
to the environment monitor of NE4. That is, the data of the monitoring host is transmitted
to the environment monitor on the NE4 side.
l The signal flow from each slave station to the master station is in the opposite direction to
the signal flow from the master station to each slave station.
You can determine the overhead bytes, source, and sink of the broadcast data of each NE
according to the service signal flow and Figure 5-2.
NOTE
After the settings are performed for NE1 according to Table 5-2, NE1 broadcasts the data that is input
from the broadcast data source (broadcast data port) to the directions of the 1-JL64 and 17-JL64 at the same
time. The 1-JL64 and 17-JL64 transmit the input data to the broadcast data port. Hence, only one
environment monitor can transmit data to the monitoring host at a time.
Prerequisite
The 2 Creating the Network task must be complete.
You must be familiar with 5.3 Signal Flow and Timeslot Allocation.
Precautions
CAUTION
When you configure the broadcast data ports, ensure that the broadcast data ports do not form
a loop. Certain optical interfaces cannot be configured as the broadcast data ports.
Procedure
Step 1 Configure the broadcast data service of NE1.
l In the NE Explorer, select NE1 and then choose Configuration > Orderwire from the
Function Tree.
l Click the Broadcast Data Port tab. After setting the parameters, click Apply. Click Close
in the Operation Result dialog box that is displayed.
Broadcast 1-JL64 and 17- The broadcast data sink indicates the sink
Data Sink JL64 channel of the broadcast data. In the
broadcast mode, one broadcast data source
can correspond to multiple broadcast data
sinks.
l Click the quick NE switching icon and select NE2. Click OK.
l In the NE Explorer, select NE2 and then choose Configuration > Orderwire from the
Function Tree.
l Click the Broadcast Data Port tab. After setting the parameters, click Apply. Click Close
in the Operation Result dialog box that is displayed.
Overhead Byte SERIAL1 Select the broadcast data channel that needs
to be set. The setting must be the same as the
setting of NE1.
Broadcast 1-JL64 and The broadcast data sink indicates the sink
Data Sink SERIAL1 channel of the broadcast data. In the
broadcast mode, one broadcast data source
can correspond to multiple broadcast data
sinks.
l Click the quick NE switching icon and select NE3. Click OK.
l In the NE Explorer, select NE3 and then choose Configuration > Orderwire from the
Function Tree.
l Click the Broadcast Data Port tab. After setting the parameters, click Apply. Click Close
in the Operation Result dialog box that is displayed.
Parameter Value in Description
This
Example
Overhead Byte SERIAL1 Select the broadcast data channel that needs
to be set. The setting must be the same as the
setting of NE1.
l Click the quick NE switching icon and select NE4. Click OK.
l In the NE Explorer, select NE4 and then choose Configuration > Orderwire from the
Function Tree.
l Click the Broadcast Data Port tab. After setting the parameters, click Apply. Click Close
in the Operation Result dialog box that is displayed.
Overhead Byte SERIAL1 Select the broadcast data channel that needs
to be set. The setting must be the same as the
setting of NE1.
Step 5 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
The F1 data service is transparently transmitted in the point-to-point mode by using the F1 byte.
1 TX+
2 TX-
3 RX+
8 4 Not defined
Pin
Pi n1
5 Not defined
6 RX-
7 Not defined
8 Not defined
Figure 6-1 shows the networking diagram for configuring the F1 data service.
T2000
NE4
Equipment for
accessing F1 data Equipment for
NE3 accessing F1 data
services NE1
1 services
Line board 1-JL64 17
Interface board 51-JEOW NE2 Line board
1 17-JL64
17 Interface board 51-JEOW
NE1 F1 17-JL64
NE3 F1 1-JL64
Prerequisite
The 2 Creating the Network task must be complete.
You must be familiar with 6.3 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the F1 data service of NE1.
1. Right-click the NE1 icon in the Main Topology, and choose NE Explorer.
2. In the NE Explorer, select NE1 and then choose Configuration > Orderwire from the
Function Tree.
3. Click the F1 Data Port tab. After setting the parameters, click Apply. Click Close in the
Operation Result dialog box that is displayed.
Parameter Value in This Description
Example
Step 4 Enable the performance monitoring function of the NEs. For details, see 8.5 Setting
Performance Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. Three methods are available for the backup.
Option Description
The SCC board is not configured with any 8.19 Backing Up the NE Database to the SCC
CF card. Board
The SCC board is configured with a CF 8.20 Automatically Backing Up the NE
card. Database to a CF Card
The SCC board is configured with a CF 8.21 Manually Backing Up the NE Database
card. to a CF Card
----End
When you need to adjust the existing configuration data related to topologies and services, you
can modify the configuration data.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The NE must be created.
Precautions
CAUTION
Modifying the NE ID may interrupt NE communication and reset the NE.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > NE Attribute from the Function
Tree.
Step 2 Click Modify NE ID, and the Modify NE ID dialog box is displayed.
Step 3 Enter the New ID and the New Extended ID. Click OK.
Step 4 Click OK in the Warning dialog box.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, click the NE and choose Configuration > NE Attribute from the Function
Tree.
Step 2 In the NE Attribute dialog box, enter a new NE name in Name. Click Apply. A prompt appears
telling you that the operation was successful.
NOTE
An NE name can contain a maximum of 64 letters, symbols, and numerals, but cannot contain the following
special characters: | : * ? " < >.
----End
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Precautions
If an NE is deleted, the links related to the NE are also deleted.
Procedure
l Delete a single SDH NE.
1. Right-click the NE on the Main Topology and choose Delete > Delete Device from
the shortcut menu. The Confirm dialog box is displayed.
2. Click Yes. The Delete Device Results dialog box is displayed.
2. In the left-hand pane, select multiple NEs and click . The Configuration Data
Management List pane displays the configuration data of all the selected NEs.
3. Select the NEs to be deleted, right-click and choose Delete from the shortcut menu.
The Delete the NE dialog box is displayed.
4. Click OK.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Precautions
CAUTION
This operation is risky, because it may interrupt the communication.
Procedure
Step 1 Choose System > DCN Management from the Main Menu. Click the GNE tab.
Step 2 Select the GNE to be modified, right-click and choose Modify GNE from the shortcut menu.
Step 3 In the Modify GNE dialog box displayed, set Gateway Type .
l When Gateway Type is set to IP Gateway, modify IP Address.
NOTE
Step 4 Click OK. In the Operation Result dialog box that is displayed, click Close.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Procedure
Step 1 Choose System > DCN Management from the Main Menu.
Step 3 Select an NE. Double-click the Primary GNE1 field and select a GNE from the drop-down list.
Step 4 Click Apply. Click Close in the Operation Result dialog box.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The NE must be created.
l There must be idle slot on the NE Panel.
Background Information
The physical boards are the actual boards inserted in the subrack. The logical boards are created
on the T2000 and are saved on the SCC board, but they do not exist on the actual equipment.
Precautions
The NE panel is able to indicate the mapping relation between slots that house processing boards
and interface boards. When you click a processing board that is paired with an interface board
in the NE panel, the ID of the slot that houses the mapping interface board is displayed in orange.
Procedure
Step 1 Double-click the icon of the NE to open the NE Panel.
Step 2 Right-click the selected idle slot. Select the board you want to add from the drop-down list.
NOTE
If the cross-connect board is installed in the subrack, add its corresponding logical board on the T2000.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The services and protection groups must be deleted.
Procedure
Step 1 In the Main Topology, double-click the NE icon to display the NE slot diagram.
Step 2 Right-click the board that needs to be deleted and then click Delete.
----End
Prerequisite
To modify different configuration parameters of different boards, you may need to operate as
NM users with different authorities. You must be an NM user with "NE operator" authority or
higher. must be available at least.
Procedure
Step 1 In the NE Explorer, select a board and choose a proper item from the Function Tree.
Step 2 In the right-hand pane, modify the existing parameter settings and click Apply.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Procedure
Step 1 Choose File > Fiber/Cable Management from the Main Menu. The information of all fiber
cables is displayed in the pane on the right.
Step 2 In the Name column, right-click the value for a fiber cable and choose Modify Fiber/Cable
from the shortcut menu. In the Modify Fiber/Cable dialog box displayed, enter a proper name
for the fiber cable and click OK. Click Close in the Operation Result dialog box.
Step 3 In the Length(km) column, right-click the value for a fiber cable and choose Modify Fiber/
Cable from the shortcut menu. In the Modify Fiber/Cable dialog box displayed, enter the actual
length for the fiber cable and click OK. Click Close in the Operation Result dialog box.
1. In the Attenuation column, right-click the value for a fiber and choose Modify Fiber/
Cable from the shortcut menu.
2. In the Modify Fiber/Cable dialog box, enter the actual loss and click OK. Click Close in
the Operation Result dialog box.
1. In the Type column, right-click the value for a fiber and choose Modify Fiber/Cable from
the shortcut menu.
2. In the Modify Fiber/Cable dialog box displayed, select the actual type of the fiber from
the drop-down list and click OK. Click Close in the Operation Result dialog box.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Procedure
Step 1 Choose File > Fiber/Cable Management from the Main Menu.
Step 2 Select the fiber you want to delete, right-click and choose Delete Fiber/Cable from the shortcut
menu. The Warning dialog box is displayed. Click OK to delete the fiber cable.
Step 3 Click Close in the Operation Result dialog box.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 On the Main Topology, select a cable, right-click and choose Delete from the shortcut menu.
Step 2 In the Warning dialog box displayed, click OK.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Precautions
Performing this operation interrupts the service that you modify.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > SDH Service Configuration
from the Function Tree.
Step 2 Select a cross-connection and choose Display > Expand to Unidirectional.
Step 3 If the service to be modified is active, you should deactivate the service. Select the service that
you want to modify, and click Deactivate.
CAUTION
Deactivation will interrupt services.
Step 4 Click OK in the Confirm dialog box is displayed twice. The Operation Result dialog box is
displayed telling you that the operation was successful.
Step 5 Click Close.
Step 6 After the cross-connection is deactivated, modify the SDH service in the mode in Step 7 or Step
8.
NOTE
l By using the mode in Step 7, you can modify the source or sink of a service, but the source and sink
must be on the same board before and after the modification.
l If the modification requirement cannot be met in the mode in Step 7 (for example, a pass-through
service needs to be configured to the local through modification), you can delete the original service
and create the cross-connection again in the mode in Step 8, to achieve the modification.
Step 7 Optional: To modify the SDH service, choose Modify from the shortcut menu.
1. Select the service that you want to modify, right-click, and choose Modify from the shortcut
menu. The Modify SDH Service dialog box is displayed.
2. Modify Source VC4 or Sink VC4, Source Timeslot Range, and Sink Timeslot Range.
NOTE
In this mode, you can modify only Source VC4 or Sink VC4. The source VC4 and sink VC4 cannot
be modified at the same time.
3. Click OK. The Operation Result dialog box is displayed telling you that the operation
was successful.
4. Click Close.
5. Select the service that is modified, and click Activate.
6. Click OK. The Operation Result dialog box is displayed.
7. Click Close.
Step 8 Optional: To modify the SDH service, delete the service and then create the service again.
1. Select the service that you want to modify, and click Delete.
2. Click OK and the Operation Result dialog box is displayed telling you that the operation
was successful.
3. Click Close. The service is deleted.
4. Create the service again as required. For details, see 8.1 Creating SDH Services.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > SDH Service Configuration
from the Function Tree.
Step 3 Optional: If the service to be deleted is active, you should deactivate the service. Select the
service that you want to delete and click Deactivate.
CAUTION
Deactivation will interrupt services.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Ethernet Service > Ethernet
LAN Service from the Function Tree.
Step 3 To change a mount port, double-click Mount Port and select a new mount port from the drop-
down list.
Step 4 To modify a parameter of the mount port, double-click the parameter and select a new value
from the drop-down list.
Step 5 Click Apply. In the Operation Result dialog box displayed, click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Background Information
l If the aging time is too long, the MAC address table may save many outdated MAC address
items. This may use up the resources of the MAC address table. As a result, the MAC
address table may not be updated according to the change in the network.
l If the aging time is too short, the effective MAC address items may be deleted. As a result,
packets that are broadcasted cannot find the destination MAC address and the performance
of the network is affected.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Configuration > Layer-2 Switching
Management > Aging Time from the Function Tree.
Step 2 Double-click MAC Address Aging Time and the MAC Address Aging Time dialog box is
displayed. Enter the value of the aging time.
Step 3 Click OK and then click Apply. Click Close in the Operation Result dialog box.
----End
Prerequisite
l You must be an NM user with "NE or network operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and then choose Configuration > Ethernet
Service > Ethernet Line Service from the Function Tree.
Step 3 Select the Ethernet private line service to be deleted and click Delete. Click OK in the
Warning dialog box that is displayed. Then, a dialog box is displayed, indicating that the
operation is successful, that is, the Ethernet private line service is deleted successfully.
Step 4 Click Query to check whether the Ethernet private line service is deleted.
Step 5 See 7.4.2 Deleting SDH Services to delete the cross-connections of the Ethernet private line
service.
----End
Prerequisite
l You must be an NM user with "NE or network operator" authority or higher.
Background Information
Deleting an EVPLAN service involves the following:
Context
CAUTION
When the VLAN filtering table is deleted, the VLAN unicast entries and disabled MAC address
entries are deleted.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
Step 4 Select the VLAN filtering entry to be deleted and click Delete.
Step 6 Select the EVPLAN service to be deleted and click Delete. Click OK in the Prompt dialog box
that is displayed. Then, a dialog box is displayed, indicating that the operation is successful, that
is, the EVPLAN service is deleted successfully.
Step 8 See 7.4.2 Deleting SDH Services to delete the cross-connections of the EVPLAN service.
----End
Prerequisite
l You must be an NM user with "NE or network operator" authority or higher.
Context
CAUTION
When the EPLAN services are deleted, the VLAN unicast entries and disabled MAC address
entries are deleted.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
Step 3 Select the EPLAN service to be deleted and click Delete. Click OK in the Prompt dialog box
that is displayed. Then, a dialog box is displayed, indicating that the operation is successful, that
is, the EPLAN service is deleted successfully.
Step 5 See 7.4.2 Deleting SDH Services to delete the cross-connections of the EPLAN service.
----End
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l If one or more trails are configured in the protection subnet that you want to delete, delete
the trails first.
Procedure
Step 1 Choose Protection Subnet > SDH Protection Subnet Managementfrom the Main Menu.
Step 2 Right-click the protection subnet to be deleted and choose Delete from the NMorDelete from
the NEorDelete All from the NM from the short-cut menu.
NOTE
Step 3 In the Operation Promptdialog box, click Yes. After completion, the Operation Result dialog
box is displayed.
NOTE
If Delete from the NEis selected, you need to confirm the operation once more.
----End
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l On the T2000, the data of each NE must be configured, and fibers are created correctly.
l The MSP protection subnet must be configured.
Procedure
Step 1 Choose Protection Subnet > SDH Protection Subnet Maintenance from the Main Menu to
display the SDH Protection Subnet Common Attributes dialog box.
Step 2 Select an MSP protection subnet from the left pane. The attribute information of the protection
subnet is displayed in the right pane.
Step 3 Click the Protection Subnet Parameters tab.
Step 4 Click Query to query the parameters of the protection subnet in the MSP ring.
Step 5 Click the WTR Time(s) text box and enter a value.
NOTE
By default, enter 600. You can also enter a value from 300 to 720.
----End
8 Task Collection
This topic describes each operation on the T2000 that is required during the service
configuration.
8.1 Creating SDH Services
To add or drop services between a processing board and a line board, thus realizing service
transmission in an SDH network, you need to create SDH cross-connections from the processing
board to the line board.
8.2 Creating SNCP Services
SNCP supports dual-fed and selective receiving of services. The SNCP is applicable to service
protection across subnets. When configuring SDH services on a per-NE basis, you can create
SNCP services to protect services across subnets.
8.3 Configuring Trace Byte
The trace byte is used by the receive end to confirm if it has a continuous connection with the
transmit end. The trace byte can be set to any identical character for equipment of the same
vendor but if the equipment is from different vendors, the trace byte must be set to the characters
previously specified to ensure successful interconnection.
8.4 Configuring C2 Byte
The C2 byte indicates the multiplexing structure of the VC frame and the service types contained
in the VC frame.
8.5 Setting Performance Monitoring Parameters of an NE
By setting performance monitoring parameters of an NE properly and starting the performance
monitoring for the NE, you can obtain the detailed performance record during the running of
the NE. This facilitates the monitoring and analysis of the NE running status performed by
maintenance personnel.
8.6 Checking the Configuration of SDH Services
According to the alarms reported on the T2000 and MSP switching status, you can check whether
the service configuration is correct. In addition, you can obtain the service switching time from
the SDH analyzer.
8.7 Configuring External Ports on Ethernet Boards
When an NE transmits Ethernet services through the external ports (that is, PORTs) on the
Ethernet board, you need to configure the attributes of the PORTs so that the PORTs can work
with the data communication equipment on the client side. This ensures that Ethernet services
can be accessed normally.
8.8 Configuring Internal Ports on Ethernet Boards
When an NE transmits Ethernet services through the internal ports (that is, VCTRUNK ports)
on the Ethernet board to the SDH side, you need to configure the attributes of the VCTRUNK
ports so that the VCTRUNK ports can work with the Ethernet board on the opposite equipment.
This ensures that the transmission of the Ethernet services on the SDH network is normal.
8.9 Configuring Bound Paths
You can set the bandwidth and direction of a VCTRUNK by setting a bound path.
8.10 Creating Ethernet Private Line Services and Ethernet Virtual Private Line Services
When an Ethernet switching board carries private line services, the relevant information of the
private line services, such as the service source and service sink, must be specified.
8.11 Creating EPLAN Services and EVPLAN Services
When an Ethernet switching board carries LAN services, you need to create the bridge and set
the attributes of the bridge and the port mounted to the bridge.
8.12 Creating VLANs Filtering
In the case of Ethernet LAN services, when the type of the bridge is IEEE 802.1q or IEEE
802.1ad, the VLAN filtering table needs to be created for the bridge if VLANs are used to isolate
the data of different users.
8.13 Creating VLAN Unicast
You can configure VLAN unicast, to allow a packet whose destination address is the specified
MAC address to be forwarded through the specified port in the specified VLAN.
8.14 Disabling an MAC Address
You can disable an MAC address. As a result, this address receives no packets even in the same
VLAN.
8.15 Testing Ethernet Service Channels
If network cables are incorrectly connected or are faulty, the Ethernet service channels become
faulty. This affects the services. Hence, the Ethernet service channels must be normal.
8.16 Adjusting Concatenated Timeslots
To improve the utilization of lower order cross-connection timeslots, you can adjust
concatenated timeslots.
8.17 Optimizing Higher Order Pass-Through
After enabling the optimization of higher order pass-through, you can use higher order cross-
connections to realize the lower order services that do not require lower order cross-connection
resources. In this manner, the lower order cross-connection resources are saved.
8.18 Deleting the Lower Order Cross-Connect Protection Group
After the lower order cross-connect protection group is deleted, lower order cross-connect
services cannot be configured normally.
8.19 Backing Up the NE Database to the SCC Board
You need to back up the NE database during daily maintenance, to ensure that the SCC board
of the NE automatically restores to normal operation after a data loss or equipment power failure.
When you back up the NE database to the SCC board, you actually back up the NE data to the
FLASH of the SCC board. When the NE is restarted after a power failure, the SCC board
automatically reads the configuration from the FLASH and issues the configuration to the
boards.
8.20 Automatically Backing Up the NE Database to a CF Card
You need to back up the NE database during the daily maintenance. You can back up the NE
database to a CF card automatically, to ensure the automatic restoration of the operation after
the data loss on the SCC board of the NE or equipment power failure.
8.21 Manually Backing Up the NE Database to a CF Card
You need to back up the NE database during the daily maintenance. You can back up the NE
database to a CF card manually, to ensure the automatic restoration of the operation after the
data loss on the SCC board of the NE or equipment power failure.
8.22 Checking the Network Communication Status
On some occasions, the T2000 cannot manage some NEs during the running of the network. By
checking the communication status of the network, you can know the communication status
between the T2000 and NEs.
8.23 Viewing the Clock Trace Search
Correct clock trace relations are critical to ensure the clock synchronization within the entire
network. Using the T2000, you can learn about and monitor the clock trace status of each NE.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l For VC12 or VC3 services, the GXCL or EXCL board that supports lower order cross-
connection must be installed in the OSN 9500, and the lower order cross-connect protection
pair must be created.
Procedure
Step 1 In the NE Explorer, select the NE and choose Configuration > SDH Service Configuration
from the Function Tree.
Step 2 Click Query to query SDH services from the NE.
Step 3 Click Create and set the required parameters in the Create SDH Service dialog box that is
displayed.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l For VC12 or VC3 services, the GXCL or EXCL board that supports lower order cross-
connection must be installed in the OSN 9500, and the lower order cross-connect protection
pair must be created.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > SDH Service Configuration
from the Function Tree.
Step 3 Click Create SNCP Service and the Create SNCP Service dialog box is displayed.
Step 4 Set the parameters such as Service Type, Direction, Level, Working Service, and Protection
Service, and click OK. A prompt is displayed telling you that the operation was successful.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l When the cross-connections of the VC12, VC3 or VC4 levels are created, you can query
or set the trace byte of the VC12, VC3 or VC4.
Procedure
Step 1 Select the type of the trace byte.
Step 2 Click Options and the Options dialog box is displayed. Select the processing mode for the read
and write attributes of the overhead bytes.
NOTE
Step 3 Right-click the trace byte and choose the input mode.
Manual Input Click Manual Input and the Please input the overhead byte
dialog box is displayed. Choose Byte Mode and Input Mode and
enter the value of the trace byte. Click OK.
NOTE
l Choose Copy All Form Received and the contents of the trace byte received are automatically copied
to the table.
l Choose Manual Input to customize the contents of the trace byte.
Step 5 Click OK. A prompt appears telling you that the operation was successful. Click Close.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The cross-connection must be created on the NE.
Procedure
Step 1 Select the service level of the C2 byte.
NOTE
l The mode must be set to Extended Mode. You can then set the C2 byte.
l The T2000 has two kinds of processing modes for the read and write attributes of the overhead bytes,
which are Extended Mode and Standard Mode. The T2000 has a stronger processing ability for the
read and write attributes of the overhead bytes in the extended mode than in the standard mode.
Step 6 Click OK and a prompt appears telling you that the operation was successful. Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Choose Performance > NE Performance Monitoring Time from the Main Menu.
Step 3 Select the NE, and set 15-minute and 24-hour performance monitor parameters according to the
requirement.
NOTE
l The start time must be later than the current time of the network management system and the end time must
be later than the start time.
l If the end time is not set, this indicates that the performance monitoring starts from the start time and does
not stop.
Step 4 Click Apply and click Close in the Operation Result dialog box.
----End
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the T2000.
l The SDH analyzers must be correctly connected to the source NE and the sink NE, and the
corresponding service type and rate must be configured.
l You must be an NM user with "NE and network administrator" authority or higher.
Background Information
After the service type and rate are set on the SDH analyzer, the "SIGNAL" and "FRAME"
indicators changes from red to green and then are constantly on. If no alarm indicator blinks on
the SDH analyzer, it indicates that the SDH analyzer is connected to the network correctly.
SDH ring
Source SDH analyzer Sink SDH analyzer
Source NE1 Sink NE2
Precautions
Optical attenuators need to be added at the "IN" and "OUT" optical interfaces on the board that
is directly connected to the SDH analyzer. In this case, the optical attenuators can prevent the
damage due to excessive optical power on the SDH analyzer and board.
Procedure
Step 1 Enable the SDH analyzer at the source end and the SDH analyzer at the sink end to monitor the
service switching on the network.
Step 2 In the Main Topology of the T2000, right-click the source NE and choose NE Explorer. Select
the line board for service transmission from the Object Tree on the left pane. Then, choose
Configuration > SDH Interface from the Function Tree.
Step 4 Click Apply. Click OK in the Confirm dialog box that is displayed. Click OK in the Prompt
that is displayed.
NOTE
By performing Steps 2-4, you can shut down the laser that transmits services at the source end. In this case,
the service on the working path is interrupted and the service switching condition is met.
Step 5 Choose Fault > Browse Current Alarm from the Main Menu on the T2000.
Step 6 Click OK in the Filter dialog box that is displayed. In the Current Alarms window, you can
browse the R_LOS alarm reported by the line board of the sink NE that is directly connected to
the line board of the source NE and the LASER_SHUT alarm reported by the source NE. For
the meanings of the alarms and processing methods, see the Alarms Reference.
Step 7 Read the service interruption time displayed on the RESULT TS window on the SDH analyzer,
which is equal to the service switching time.
NOTE
On the SDH analyzer, the LONGEST and SHORTEST parameters in the RESULT TS window record
the longest switching time and the shortest switching time when the switching is performed for multiple
times. The LAST parameter records the time of the latest switching.
Step 8 Query the switching state and service status on the T2000 to check whether the configuration is
correct.
NOTE
Querying the MSP switching status is different from querying the SNCP switching status. Refer to Steps
9-11 to query the MSP service status. Refer to Steps 12 and 13 to query the SNCP service status.
Step 9 Choose Protection Subnet > SDH Protection Subnet Maintenance from the Main Menu of
the T2000.
Step 10 Click the Protection Subnet Maintenance tab on the right side of the SDH Protection Subnet
Common Attributes pane. Query East Status and West Status. If the status is Signal Fail
Switching - Ring or Lockout of protection-Span, the MSP switching is successful.
Step 11 Choose Fault > Browse Current Alarm from the Main Menu on the T2000. If no service alarm
is reported from the working path, the service switching is successful.
NOTE
According to the verification result obtained by performing Steps 10 and 11, the service configuration on
the MSP ring is successful.
Step 12 In the Main Topology of the T2000, right-click the NE to be queried, and choose NE
Explorer. Then, choose Configuration > SNCP Service Control from the Function Tree.
Step 13 Query Current Status, Trail Status, and Active Channel from the Working Service list and
Protection Service list on the right pane to check whether the services are switched successfully.
NOTE
The service switching and SNCP service configuration are successful if the following conditions are met:
l The current status is SF switching.
l The status of the working service path is SF.
l The status of the protection service path is normal.
l The current path is the protection path.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The Ethernet board must be created.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Configuration > Ethernet Interface
Management > Ethernet Interface from the Function Tree.
Step 2 Select External Port.
Step 3 Configure the basic attributes of the external ports.
1. Click the Basic Attributes tab.
2. Set the basic attributes of the external ports.
NOTE
Working mode: By default, the working mode is auto-negotiation. That is, the transmit port and
receive port operate in the working mode of the highest level through pulse negotiation signals
between them. The transmit port and receive port must have the same working mode settings.
Otherwise, this results in the failure of services
3. Click Apply.
Step 4 Set the flow control mode of the port.
1. Click the Flow Control tab.
2. Set the flow control mode of the port.
NOTE
l Auto-negotiation flow control mode: Select this flow control mode when the working mode of
the port is auto-negotiation. Enable Dissymmetric Flow Control means that flow control frames
are transmitted instead of being received. Enable Symmetric Flow Control means that PAUSE
frames can be transmitted and received. Enable Symmetric/Dissymmetric Flow Control means
that the auto-negotiation determines whether to adopt the symmetric or dissymmetric flow
control.
l Non-auto-negotiation flow control mode: Select this flow control mode when the working mode
of the port is not auto-negotiation. Enable Symmetric Flow Control means that PAUSE frames
can be transmitted and received. Send Only means that PAUSE frames can be transmitted only.
Receive Only means that PAUSE frames can be received only.
3. Click Apply.
Step 5 Set the tag attributes of external ports.
NOTE
3. Click Apply.
Step 6 Set the network attributes of external ports.
NOTE
Figure 8-2 Attributes of external ports on the Ethernet boards that support the QinQ function
NOTE
l If the port is of the UNI type, the port processes the tag attributes in 802.1Q. The port attributes
include Tag Aware, Access, and Hybrid.
l If the port is of the C-Aware type, the port does not process the tag attributes in 802.1Q. In this
case, the port determines that the data packets do not carry the S-VLAN tags and processes the
VLAN tags of the received packets by considering all the VLAN tags as C-VLAN tags.
l If the port is of the S-Aware type, the port does not process the tag attributes in 802.1Q. In this
case, the port determines that the data packets do not carry the C-VLAN tag and processes the
VLAN tags of the received packets by considering all the VLAN tags as S-VLAN tags.
3. Click Apply.
3. Click Apply.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Precautions
CAUTION
Incorrect configuration of binding paths may cause service interruption.
Procedure
Step 1 In the NE Explorer, click the Ethernet board and choose Configuration > Ethernet Interface
Management > Ethernet Interface from the Function Tree.
3. Click Apply.
Step 4 Set the network attributes of internal ports.
1. Click the Network Attributes tab.
2. Set the network attributes of internal ports.
Figure 8-3 Attributes of internal ports on the Ethernet boards that support the QinQ function
3. Click Apply.
Step 5 Set the encapsulation/mapping protocol for the internal ports.
1. Click the Encapsulation/Mapping tab.
2. Set Mapping Protocol and the protocol parameters.
NOTE
l Mapping Protocol of the VCTRUNKs on the Ethernet boards at both ends of the transmission
line and the protocol parameters must be consistent.
3. Click Apply.
Step 6 Configure the LCAS function of internal ports.
1. Click the LCAS tab.
2. Set the Enabling LCAS parameter and other LCAS parameters.
NOTE
Enabling LCAS of the VCTRUNKs on the Ethernet boards at both ends of the transmission line and
the LCAS protocol parameters must be consistent.
3. Click Apply.
Step 7 Set the binding path for a port.
1. Click the Bound Path tab. Click Configuration and the Bound Path Configuration
dialog box is displayed.
2. Select a VCTRUNK port from the Configurable Ports drop-down list. In the Available
Bound Paths area, select the times lot of the bearer layer and click .
3. Click OK and then click Yes. A prompt appears telling you that the operation was
successful.
4. Click Close.
3. Click Apply.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The Ethernet board must be created.
Precautions
Configuring the bound path may interrupt services.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Configuration > Ethernet Interface
Management > Ethernet Interface from the Function Tree. Click the Internal Port option
button.
Step 2 Click the Bound Path tab. Click Configuration, and the Bound Path Configuration dialog
box is displayed.
Step 3 Select the VCTRUNK port you want to bind from Configurable Ports. Select the bearer layer
path from the Available Bound Paths combo box. Click .
NOTE
Refer to the actual service requirement to select the level of the bound path.
----End
Prerequisite
l You must be an NM user with "NE or network operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and then choose Configuration > Ethernet
Service > Ethernet Line Service from the Function Tree.
Step 2 Select the proper operation from the following options according to the type of the Ethernet
private line service to be created.
Option Description
EPL service Go to Step 3.
EVPL (QinQ) service Select Display QinQ Shared Service.
Step 5 Set the attributes of the source port and sink port.
The timeslots on the transmission line, which correspond to the paths bound with the VCTRUNKs
at both ends of the transmission line, must be consistent.
----End
Prerequisite
l You must be an NM user with "NE or network operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
Step 2 Click New.
The Create Ethernet LAN Service dialog box is displayed.
Step 3 Set the attributes of the bridge.
Option Description
Configure the services that are mounted to the IEEE 802.1d or IEEE Go to Step Step 5.
802.1q bridge.
Configure the services that are mounted to the IEEE 802.1ad bridge. Go to Step Step 6.
Step 5 Optional: Configure the services that are mounted to the IEEE 802.1d or IEEE 802.1q bridge.
1. Click Configure Mount.
4. Click OK.
Step 6 Optional: Configure the services that are mounted to the IEEE 802.1ad bridge.
1. Click Configure Mount.
2. Set the parameters for configuring the mounted services.
The timeslots on the transmission line, which correspond to the paths bound with the VCTRUNKs
at both ends of the transmission line, must be consistent.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The bridge and mount ports must be created.
Make sure that you set Bridge Switch Mode to IVL/Ingress Filter Enable. Only in this way,
you can create VLAN filtering tables
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Configuration > Ethernet Service >
Ethernet LAN Service from the Function Tree. Click the VLAN Filtering tab.
Step 2 Click New and the Create VLAN dialog box is displayed. Enter a VLAN ID, select an Available
forwarding ports, and then click .
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Configuration > Ethernet Service >
Ethernet LAN Service from the Function Tree. Click the VLAN Unicast tab.
Step 2 Click New and the Create VLAN Unicast dialog box is displayed. Set VLAN ID, MAC
Address, and Physical Port, by double-clicking or entering the corresponding values.
CAUTION
The first byte of the MAC Address of VLAN unicast must be even.
Step 3 Click OK. Click Close in the Operation Result dialog box.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Precautions
This operation may interrupt the service.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and choose Configuration > Ethernet Service >
Ethernet LAN Service from the Function Tree. Click the Disable MAC Address tab.
Step 2 Click New and the Disable MAC Address Creation dialog box is displayed. Set VLAN ID
and MAC Address.
NOTE
The first byte of the MAC Address of VLAN unicast must be even.
Step 3 Click OK and then click Close in the Operation Result dialog box.
----End
Prerequisite
The Ethernet services must be created and activated.
Laptop A
T2000
NE3
NE2 NE4
NE1
Laptop B
Precautions
NOTE
TAG of the external ports on the Ethernet boards at the source and sink ends of the accessed Ethernet
service must be set to Access. In addition, Default VLAN ID of the external ports on the Ethernet boards
at the source and sink ends of the accessed Ethernet service must be set to the same value.
Procedure
Step 1 Connect the external ports on the Ethernet boards to the network ports of the laptops at the source
and sink ends of the service by using network cables, according to the test connection diagram.
Step 2 Set the IP addresses for laptop A and laptop B. Ensure that the two IP addresses are in the same
network segment.
l Set an IP address for laptop A.
– IP address: [Link]
– Subnet mask: [Link]
l Set an IP address for laptop B.
– IP address: [Link]
– Subnet mask: [Link]
CAUTION
The IP addresses cannot be set to the loopback addresses within the [Link] network segment.
Step 3 Choose Start > Run on laptop A. Then, a dialog box is displayed. Enter the ping command
ping [Link].
----End
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
Background Information
Services are created in different orders. Therefore, the allocation of lower order resources is not
always optimum. By adjusting concatenated timeslots of lower order services, you can optimize
the allocation of lower order cross-connection timeslots according to the data such as service
association. This improves the utilization of lower order cross-connection timeslots.
Precautions
Adjusting concatenated timeslots may interrupt services.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Board 1+1 Protection from the
Function Tree.
Step 2 Click Adjust Concatenated Timeslot. The Confirm dialog box is displayed.
----End
Prerequisite
You must be an NM user with "NE administrator" authority or higher.
Precautions
After you enable the optimization of higher order pass-through, services may be interrupted
during the optimization process.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Board 1+1 Protection from the
Function Tree.
Step 2 Click Optimize Higher Order Pass-Trough. The Optimize Higher Order Pass-Trough
dialog box is displayed.
----End
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
l The lower order cross-connect protection group must be created.
l Deleting the lower order cross-connect protection group is applicable in the case of the
OptiX OSN 9500.
Precautions
If lower order SDH services are configured, you need to delete the lower order SDH services or
switch the lower order SDH services to another lower order cross-connect protection group
before deleting the lower order cross-connect protection group.
Procedure
Step 1 In the NE Explorer, select the NE and then choose Configuration > Board 1+1 Protection
from the Function Tree.
Step 2 Select the lower order cross-connect protection group to be deleted from 1+1 Protection List.
Then, click Delete.
Step 3 Then, click Close in the Operation Result dialog box that is displayed.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the Main Menu, choose Configuration > Configuration Data Management.
Step 6 The Operation Result dialog box is displayed. After the backup is successful, click Close.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Log in to the NE as an NE user with "System Level" authority.
l The SCC board must be configured with the CF card.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu.
Step 3 Select one or more NEs in the Configuration Data Management List.
Step 4 Choose Back Up NE Data > Automatically Back Up to CF Card. The Automatically Back
Up NE Data to CF Card window is displayed. Set the Automatic Backup Enabling Status
and Automatic Backup Period(min).
NOTE
Before the setting, you can click Query to query the current status of the automatic backup of NE data to
a CF card.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Log in to the NE as an NE user with "System Level" authority.
l The SCC board must be configured with the CF card.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Background Information
If you know the IP address or the NSAP address of an NE, you can choose File > Ping from the
Main Menu to use the ping command to check the communication status of the NE.
Procedure
l Check the communication status between the T2000 and a non-gateway NE.
1. Choose System > DCN Management from the Main Menu.
2. Click the NE tab. Click Refresh to view the communication status of all the non-
gateway NEs.
3. Select an NE. Right-click in the Communication Status column and choose Test
NE from the shortcut menu.
4. The Operation Result dialog box is displayed indicating the test result of the non-
gateway NE.
l Check the communication status between the T2000 and the GNE.
1. Choose System > DCN Management from the Main Menu.
2. Click the GNE tab. Click Refresh to view the communication status of the GNE.
3. Right-click an NE and choose Test GNE from the shortcut menu.
4. The Operation Result dialog box is displayed indicating the test result of the GNE.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the Clock View, right-click and choose Clock Trace Search from the shortcut menu.
Step 2 In the Confirm dialog box, click OK.
Step 3 If the clock trace relation changes, the Prompt dialog box is displayed, asking you whether to
refresh the clock trace relation. Click Yes. When the search for the clock trace relation is
complete, the Clock View displays the refreshed clock trace status.
NOTE
If you right-click in the Clock View and choose Disable Clock Status Change Prompting from the
shortcut menu, the Prompt dialog box is not displayed even when the clock trace relation changes.
Step 4 In the Clock View, right-click and choose Query Networkwide Clock Synchronization
Status from the shortcut menu, to refresh the clock tracing relation.
----End
9 Equipment Information
You need to consider the service support capability of the boards used by the equipment and the
configuration requirements during the configuration process.
9.1 Service Support Capability of Ethernet Boards
Ethernet boards are classified into Ethernet transparent transmission boards and Ethernet
switching boards, based on the type of the accessed services. The Ethernet transparent
transmission boards support only EPL services, whereas the Ethernet switching boards support
EPL services, EVPL services, and Layer 2 switching function.
9.2 Requirements for Binding Paths with VCTRUNKs on Ethernet Boards
One VCTRUNK on an Ethernet board can only be bound with timeslots of the same level.
9.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet Boards
To determine the level of the bandwidths to be bound with a VCTRUNK and the number of
required paths that are required for an Ethernet service, you need to calculate theoretical
bandwidth of the Ethernet service that can be carried by a VCTRUNK.
Board Type Board Name Supported Ethernet Private Supported Ethernet LAN
Line Service Service
EGT6 EPL -
EGTH EPL -
Table 9-2 Requirements for binding paths with VCTRUNKs on Ethernet boards
l The VCTRUNKs can be bound with the VC-3 paths and VC-4 paths and cannot be bound
with VC4-xc paths.
l VCTRUNK1 and VCTRUNK2 can only be bound with the first to sixteenth VC-4s, namely,
VC4-1 to VC4-16.
l VCTRUNK3 and VCTRUNK4 can only be bound with the seventeenth to thirty-second
VC-4s, namely, VC4-17 to VC4-32.
l VCTRUNK5 and VCTRUNK6 can only be bound with the thirty-third to forty-eighth
GE06 VC-4s, namely, VC4-33 to VC4-48.
EGT6A l The VCTRUNKs can be bound with the VC-3 paths and VC-4 paths and cannot be bound
with VC4-xc paths.
l VCTRUNK1 and VCTRUNK2 can be bound only with the first to sixteenth VC-4s, namely,
VC4-1 to VC4-16.
l VCTRUNK3 and VCTRUNK4 can be bound only with the seventeenth to thirty-second
VC-4s, namely, VC4-17 to VC4-32.
l VCTRUNK5 and VCTRUNK6 can be bound only with the thirty-third to forty-eight VC-4s,
namely, VC4-33 to VC4-48.
EGT6 l The VCTRUNKs can be bound with the VC-3 paths and VC-4 paths and cannot be bound
with VC4-xc paths.
l VCTRUNK1 and VCTRUNK2 can only be bound with the first to sixteenth VC-4s, namely,
VC4-1 to VC4-16.
l VCTRUNK3 and VCTRUNK4 can only be bound with the seventeenth to thirty-second
VC-4s, namely, VC4-17 to VC4-32.
l VCTRUNK5 and VCTRUNK6 can only be bound with the thirty-third to forty-eighth
VC-4s, namely, VC4-33 to VC4-48.
EGTH l The VCTRUNKs can be bound with the VC-3 paths and VC-4 paths and cannot be bound
with VC4-xc paths.
l A maximum of 16 VCTRUNKs (namely, VCTRUNK1 to VCTRUNK16) are supported. A
maximum of 128 VC-4s (namely, VC4-1 to VC4-128) are available to be bound with the
VCTRUNKs.
l VCTRUNK1 and VCTRUNK2 can be bound only with the first to sixteenth VC-4s, namely,
VC4-1 to VC4-16.
l VCTRUNK3 and VCTRUNK4 can only be bound with the seventeenth to thirty-second
VC-4s, namely, VC4-17 to VC4-32.
l VCTRUNK5 and VCTRUNK6 can only be bound with the thirty-third to forty-eighth
VC-4s, namely, VC4-33 to VC4-48.
l VCTRUNK7 and VCTRUNK8 can only be bound with the forty-ninth to sixty-fourth
VC-4s, namely, VC4-49 to VC4-64.
l VCTRUNK9 and VCTRUNK10 can only be bound with the sixty-fifth to eightieth VC-4s,
namely, VC4-65 to VC4-80.
l VCTRUNK11 and VCTRUNK12 can only be bound with the eighty-first to ninety-sixth
VC-4s, namely, VC4-81 to VC4-96.
l VCTRUNK13 and VCTRUNK14 can only be bound with the ninety-seventh to hundred-
twelfth VC-4s, namely, VC4-97 to VC4-112.
l VCTRUNK15 and VCTRUNK16 can only be bound with the hundred-thirteenth to
hundred-twenty-eighth VC-4s, namely, VC4-113 to VC4-128.
EGS8 l The VCTRUNKs can be bound with the VC-3 paths, VC-4 paths, and VC4-xc paths.
l A maximum of 16 VCTRUNKs (namely, VCTRUNK1 to VCTRUNK16) are supported. A
maximum of 64 VC-4s (namely, VC4-1 to VC4-64) are available to be bound with the
VCTRUNKs.
l There are no limits on the timeslots that need to be bound with the VCTRUNKs, if the
available paths are at the VC-3 or VC-4 level.
l Only four consecutive VC-4s (for example, VC4-5 to VC4-8) can be bound, if the available
paths are at the VC4-xc level.
EAS1 l The VCTRUNKs can be bound with the VC-3 paths, VC-4 paths, and VC4-xc paths.
l A maximum of 24 VCTRUNKs (namely, VCTRUNK1 to VCTRUNK16) are supported. A
maximum of 64 VC-4s (namely, VC4-1 to VC4-64) are available to be bound with the
VCTRUNKs.
l There are no limits on the timeslots that need to be bound with the VCTRUNKs, if the
available paths are at the VC-3 or VC-4 level.
l Only four consecutive VC-4s (for example, VC4-5 to VC4-8) can be bound, if the available
paths are at the VC4-xc level.
NOTE
When the Ethernet board uses the GFP protocol to encapsulate Ethernet services, you can determine
whether a check field is used during the encapsulation by setting the Check Field Length parameter. By
default, FCS32 is used as the check field. In this case, if the Ethernet board uses the default GFP parameter
settings, the theoretical bandwidth of the VCTRUNK bound with five VC-12 paths is 10.938 Mbit/s when
the Ethernet frame length is 1500 bytes and the theoretical bandwidth of the VCTRUNK bound with five
VC-12 paths is 12.025 bit/s when the Ethernet frame length is 64 bytes.
In actual application scenarios, you can roughly estimate the level and quantity of the path
according to the following principle. That is, 2 Mbit/s services are carried in a VC-12 path and
48 Mbit/s services are carried in a VC-3 path. For example, in the case of a 10 Mbit/s Ethernet
service, the VCTRUNK can be bound with five VC-12 paths.
A Glossary
Numerics
1+1 protection A 1+1 protection architecture has one normal traffic signal, one working
SNC/trail, one protection SNC/trail and a permanent bridge.
Back up Copy the important data into a backing storage in case that the original is
damaged or corrupted.
Bound path The VC Trunk refers to the 2 Mbps paths which are bound together to
transmit Ethernet data. The VC Trunk is an entity between the Ethernet
port and the 2 Mbps path.
CAR Committed Access Rate. The CAR limits the input or output transmission
rate on an interface.
EPLAN Ethernet Private LAN. An EPLAN service is both a LAN service and a
private service. Transport bandwidth is never shared between different
customers.
EVPL Ethernet Virtual Private Line. An EVPL service is a service that is both
a line service and a virtual private service.
Ethernet A data link level protocol comprising the OSI model's bottom two layers.
It is a broadcast networking technology that can use several different
physical media, including twisted pair cable and coaxial cable. Ethernet
usually uses CSMA/CD. TCP/IP is commonly used with Ethernet
networks.
Loopback The fault of each path on the optical fiber can be located by setting
loopback for each path of the line. There are three kinds of loopback
modes: No loopback, Outloop, Inloop.
NE database The system control board has two types of databases: (1) DRDB: running
database, with no battery power supply; (2) FDB0 and FDB1: permanent
databases in the flash ROM. When an NE works properly, the NE
configuration data is stored in the DRDB, NVFLDB, FDB0, FDB1, and
CFDB databases. During NE database backup, the NE configuration data
is copied from the DRDB database to the FDB0 and FDB1 databases.
After being power recycled, an NE recovers its configuration data from
the NVFLDB database by default. If the NVFLDB database loses its data
due to battery power exhaustion, the NE recovers its configuration data
from the FDB0 or FDB1 database.
NNI Network Node Interface. NNI identifies the interface between the ATM
network nodes. See also SDH NNI.
RS422 The interface can change to RS232 through the hardware jumper and
others are the same as RS232.
RSTP The Rapid Spanning Tree Protocol is an evolution of the Spanning Tree
Protocol, providing for faster spanning tree convergence after a topology
change.
STP STP is a protocol that provides a loop free topology for any bridged LAN
and is used in switched networks to prevent loops.
Subnet mask Also referred to as the network mask off code, it is used to define network
segments, so that only the computers in the same network segment can
communicate with one another, thus suppressing broadcast storm between
different network segments.
UNI UNI is the abbreviation for User Network Interface. It identifies the
interface between the user and the ATM network node.
VLAN ID Namely, it is the virtual LAN identifier. One Ethernet port can support
4K VLAN routes, and one NE can support up to 8K VLAN routes.
VLAN Virtual local area network. A subset of the active topology of a Bridged
Local Area Network. Associated with each VLAN is a VLAN Identifier
(VID).
WTR time A period of time that must elapse before a - from a fault recovered - trail/
connection can be used again to transport the normal traffic signal and/or
to select the normal traffic signal from.
WTR Wait to Restore. This command is issued when working channels meet
the restoral threshold after an SD or SF condition. It is used to maintain
the state during the WTR period unless it is pre-empted by a higher priority
bridge request.
GE Gigabit Ethernet
ID Identity
LB Loopback
NA Not Available
VB Virtual Bridge
VC Virtual Connection