Professional Documents
Culture Documents
User Manual
Version 7
426006-2413-013-A00
LCT-BGF User Manual
V7
Catalog No: X36346
May 2007
1st Edition
Figure 6-39: L2 Switch Configuration Management window - FDB tab ....................... 6-46
Figure 6-40: L2 Switch Configuration Management window - Bridge STP tab............ 6-51
Figure 6-41: L2 Switch Configuration Management window - Port STP tab ............... 6-53
Figure 6-42: L2 Switch Configuration Management window - Priority tab ................... 6-55
Figure 6-43: Up/Down Load Bridge Configuration Data window ................................. 6-57
Figure 6-44: Task window showing clear configuration data operation ....................... 6-59
Figure 6-45: Task window showing save configuration data operation ....................... 6-60
Figure 6-46: Bandwidth Profile window........................................................................ 6-61
Figure 6-47: Create Policer window............................................................................. 6-62
Figure 6-48: Policer List window .................................................................................. 6-63
Figure 6-49: Policer List window showing filters .......................................................... 6-64
Figure 6-50: Policer List window - editing the policer list ............................................. 6-65
Figure 6-51: Edit Policer window.................................................................................. 6-65
Figure 6-52: Policer Upload window - Policer Upload tab ........................................... 6-66
Figure 6-53: Policer Upload window - Policer Compare tab ........................................ 6-67
Figure 6-54: ESW_2G_8F - EPL.................................................................................. 6-68
Figure 6-55: ESW_2G_8F - EVPLAN .......................................................................... 6-68
Figure 6-56: Create VPN window (EPL) ...................................................................... 6-69
Figure 6-57: Create VPN window (EVPLAN)............................................................... 6-70
Figure 6-58: Create VPN window (EVPLAN) - select NNI ports.................................. 6-71
Figure 6-59: Create VPN window (EVPLAN) - add policer.......................................... 6-72
Figure 6-60: Create VPN window (EVPLAN) - mapped policer................................... 6-73
Figure 6-61: VPN List window...................................................................................... 6-74
Figure 6-62: VPN List window showing filter options................................................... 6-74
Figure 6-63: VPN Upload window - VPN Upload tab................................................... 6-75
Figure 6-64: VPN Upload window - VPN Compare tab ............................................... 6-76
Figure 6-65: VPN List window showing menu options................................................. 6-76
Figure 6-66: View VPN window.................................................................................... 6-77
Figure 6-67: Edit VPN window ..................................................................................... 6-78
Figure 6-68: Export VPN List window .......................................................................... 6-79
Figure 6-69: Select File window ................................................................................... 6-79
Figure 6-70: Import VPN List and Select File windows................................................ 6-80
Figure 6-71: Import VPN List window showing import results ..................................... 6-81
Figure 6-72: Global vFIB Attributes window................................................................. 6-82
Figure 6-73: Trace MAC window.................................................................................. 6-84
Figure 6-74: MSTP Configuration window - General tab ............................................. 6-86
Figure 6-75: MSTP Configuration window - Instance tab ............................................ 6-87
Figure 6-76: MSTP Port Configuration window - Port Attributes tab ........................... 6-89
Figure 6-77: MSTP Configuration window - Instance Attribute tab.............................. 6-90
Figure 6-78: Link aggregation ...................................................................................... 6-91
Figure 6-79: Create/Edit Aggregation Ports window.................................................... 6-92
Figure 6-80: ESW_2G_8F card window showing aggregation groups ........................ 6-93
Figure 14-6: Set Subcard Attributes window showing frame attribute for SM10 ......... 14-7
Figure 14-7: Set Subcard Attributes window - E1 Physical Connection Attribute tab.. 14-8
Figure 14-8: Set Subcard Attributes window - FE Board Attribute tab......................... 14-9
Figure 14-9: Set Subcard Attributes window - User Interface tab.............................. 14-10
Figure 14-10: Set Subcard Attributes window - SM_V35_2 ...................................... 14-11
Figure 14-11: Set Subcard Attributes window - SM_Omnicentor Card Attribute tab. 14-12
Figure 14-12: Set Subcard Attributes window............................................................ 14-13
Figure 14-13: Set Subcard Attributes window for SM_V24 card - 1 channel ............ 14-14
Figure 14-14: Set Subcard Attributes for SM_V24 card - 2 channels........................ 14-15
Figure 14-15: Set Subcard Attributes window for SM_V24 card - 8 channels........... 14-16
Figure 14-16: Set Subcard Attributes window - E1_PCM.......................................... 14-17
Figure 14-17: Set Subcard Attributes window - SM_EM_24W_6E............................ 14-18
Figure 14-18: Set Subcard Attributes window - SM_FXS_8E ................................... 14-19
Figure 14-19: Set Subcard Attributes window - SM_V35E ........................................ 14-20
Figure 14-20: Set Subcard Attributes window - SM_Omni_E.................................... 14-20
Figure 14-21: Set Subcard Attributes window - SM_10E .......................................... 14-21
Figure 14-22: Set Subcard Attributes window - SM_V24E - 2 channels ................... 14-22
Figure 14-23: Set Subcard Attributes window - SM_V24E - 4 channels ................... 14-23
Figure 14-24: Set Subcard Attributes window - SM_V24E - 8 channels ................... 14-24
Figure 14-25: Set Subcard Attributes window - SM_V24E card - point-to-multipoint 14-25
Figure 14-26: Board Assignment window .................................................................. 14-26
Figure 14-27: SM10E Slot Assignment window......................................................... 14-27
Figure 14-28: Sync Timing Configuration window ..................................................... 14-28
Figure 14-29: SM10E Timing Configuration window - SyncTiming
Configuration tab ........................................................................................................ 14-29
Figure 14-30: SM10E Timing Configuration window - Timing Trace tab ................... 14-30
Figure 14-31: Get Clock Work Mode window ............................................................ 14-31
Figure 14-32: Upload/Download PCM Configuration Data window ........................... 14-32
Figure 14-33: XCs Upload window - XCs Upload tab ................................................ 14-33
Figure 14-34: XCs Upload window showing comparison results............................... 14-34
Figure 14-35: Create XC window ............................................................................... 14-35
Figure 14-36: Create XC window - Send List tab....................................................... 14-36
Figure 14-37: XC Management window - XC List tab................................................ 14-37
Figure 14-38: Set Ethernet Timeslot Share Sign window .......................................... 14-38
Figure 14-39: Upload XCs window - XCs Upload tab ................................................ 14-39
Figure 14-40: Upload XCs window - Compare Result tab ......................................... 14-40
Figure 14-41: XCs Upload window - XCs In Local Database But Not In NE page .... 14-41
Figure 14-42: Create XC window - SM_10E.............................................................. 14-42
Figure 14-43: Create XC window - Send List tab - SM_10E ..................................... 14-43
Figure 14-44: XC Management window - SM_10E.................................................... 14-44
Figure 14-45: Upload XCs window - XCs Upload tab - SM_10E............................... 14-45
Figure 14-46: Upload XCs window - Compare Result tab - SM_10E ........................ 14-46
Figure 14-47: Upload XCs window - Compare Result tab - XCs in Local
Database but Not in NE page - SM_10E ................................................................... 14-47
Figure 14-48: PCM Event window.............................................................................. 14-49
Figure 14-49: PCM Alarm window - Current Alarm tab.............................................. 14-50
Figure 14-50: Alarm Filter (PCM) window.................................................................. 14-51
Figure 14-51: Select File window ............................................................................... 14-51
Figure 14-52: PCM Alarm window - History Alarm tab .............................................. 14-52
Figure 14-53: Set Alarm Attributes window................................................................ 14-54
Figure 14-54: Alarm Mask window............................................................................. 14-55
Figure 14-55: Alarm Severity window ........................................................................ 14-56
Figure 14-56: Current Alarm View window - SM_10E ............................................... 14-58
Figure 14-57: Return Command window displaying the run time .............................. 14-59
Figure 14-58: Run Time window - SM_10E ............................................................... 14-59
Figure 14-59: Run Command window displaying the SM10 card electronic label..... 14-60
Figure 14-60: SM_10E Shelf View window................................................................ 14-61
Figure 14-61: SM_10E Electronic Label window ....................................................... 14-61
Figure 14-62: Loopback Attribute window.................................................................. 14-62
Figure 14-63: Loopback Attribute window - SM_10E................................................. 14-63
Figure 14-64: PCM Ping window................................................................................ 14-64
Figure 14-65: Device Reset Operation window - SM_10E ........................................ 14-65
Figure 14-66: PCM NE Software Upgrade window.................................................... 14-66
Figure 14-67: Please select the file for upgrading window ........................................ 14-66
Figure 14-68: PCMNE Software Upgrade window after starting the upgrade ........... 14-67
Figure 15-1: License control workflow ......................................................................... 15-3
Figure 15-2: Workflow for manually inputting the license code ................................... 15-4
Figure 15-3: License File window ................................................................................ 15-6
Figure 15-4: Import License - Select File window ........................................................ 15-7
Figure 15-5: Export License - Select File window........................................................ 15-7
Figure 15-6: Activate License window ......................................................................... 15-8
Figure 15-7: BG-20 license sticker............................................................................... 15-8
Figure 15-8: Activate License window showing warning message.............................. 15-9
In this chapter:
Intended Audience............................................................................................ xv
Document Organization.................................................................................... xv
Document Conventions .................................................................................. xvii
Related Documentation .................................................................................. xvii
Obtaining Technical Documentation............................................................. xviii
Technical Assistance ..................................................................................... xviii
Intended Audience
The BroadGate LCT-BGF User Manual is intended for BG-40/BG-20
equipment installation personnel and field engineers.
Document Organization
The following list presents the information appearing in this guide:
| Chapter 1, Introducing the LCT-BGF - presents a general description of
the LCT-BGF and its main operational and technical features.
| Chapter 2, Installing the LCT-BGF - describes how to install the
LCT-BGF.
| Chapter 3, Using the Boot Configuration Tool - describes the procedures
available in the Boot Configuration Tool facility for configuring a new
element.
| Chapter 4, Getting Started with the LCT GUI - provides a
comprehensive description of GUI functionality for the LCT-BGF.
Document Conventions
When applicable, this manual uses the following conventions.
Related Documentation
The following publications may be of assistance to you regarding LCT-BGF
operations:
| BG-40 Miniature MSPP for Metro-Access General Description
| BroadGate BG-40 Installation, Operation, and Maintenance Manual
| BroadGate EMS-BGF Installation Guide
| BroadGate EMS-BGF User Manual
| LightSoft Network Management System User Manual
Obtaining Technical
Documentation
To obtain technical documentation related to the LCT-BGF or any other ECI
Telecom product, please contact:
ECI Telecom Ltd.
Transport Networking Division
Documentation Department
30 Hasivim St.
Petach Tikva 49130
Israel
Fax: +972-3-9268060
Email: on.documentation@ecitele.com
Technical Assistance
The configuration, installation, and operation of the LCT-BGF and its
operation in a network are highly specialized processes. Due to the different
nature of each installation, some planning aspects may not be covered in this
manual.
If you have questions or concerns about your network design or if you require
installation personnel to perform the actual installation process, ECI Telecom
maintains a staff of design engineers and highly trained field service personnel.
The services of this group are available to customers at any time.
If you are interested in obtaining design assistance or a network installation
plan from ECI Telecom's Customer Support team, contact your ECI Telecom
sales representative. With any support related issues, technical or logistic,
please contact the ECI Telecom Customer Support center at your location. If
you are not familiar with that location, please contact our central customer
support center action line at:
Telephone +972-3-9266000
Telefax +972-3-9266370
Email on.support@ecitele.com
In this chapter:
Overview ......................................................................................................... 1-1
Hardware and Software Requirements ............................................................ 1-2
Overview
The LCT-BGF supplements the EMS-BGF for several vital functions,
including initial configuration of an element, by providing the address IDs (it
can also be used when performing software upgrades on element cards).
The LCT-BGF system is based on the TCP/IP protocol and is connected to the
SDH network element (NE) via the Ethernet port provided by the MCU. It
implements element configuration and maintenance management functions and
coordinates with the EMS-BGF to perform management for error correction
facilities.
The LCT-BGF (V7) software is used to perform initial data configuration and
equipment software download for BG-40 and BG-20 network elements.
Maintenance personnel can modify parameters of an operating NE to detect and
solve specific problems within the element.
System Components
The system package consists of the following software and hardware modules:
| The LCT GUI and Boot Configuration Tool software running on the
Microsoft Windows operating system, which acts as a graphical user
interface between the BG-40 and BG-20 equipment and the user
| The boot software running on the BOOT ROM of the BG-40 or BG-20
equipment, which acts as a boot configuration server
| USB-based hardware license key
In this chapter:
Overview ......................................................................................................... 2-1
Installing the LCT-BGF Application............................................................... 2-2
Overview
This section describes the installation procedure for the LCT-BGF.
4. Click Next. The Setup Status window appears. A progress bar shows the
progress of the operation.
When file copying is completed, the LCT System Config window opens.
5. Click Config.
6. In the TU-TimeSlot Mapping Options area, select the Standard radio
button. The Installation Complete window opens.
In this chapter:
Overview ......................................................................................................... 3-1
Boot Configuration Tool Procedures............................................................... 3-2
Downloading Embedded Software and the FPGA File ................................... 3-5
Obtaining IDPROM Data ................................................................................ 3-8
Configuring the No Recovery Next Startup Attribute ..................................... 3-9
Configuring the Serial Port Close Attribute .................................................. 3-10
Overview
This section describes how to login and utilize the Boot Configuration Tool,
which is used for the initial configuration of BG-40 and BG-20 NEs.
4. Click Login in the upper-left corner of the window. The Input IP window
opens.
Configuring Parameters
After a successful login to the Boot Configuration Tool, you can configure
basic parameters, as described in the following table.
2. Click Get. The Boot Configuration Tool retrieves the configuration data
from the equipment and a confirmation window appears.
3. Click Apply. The Boot Configuration Tool sends the configuration data to
the equipment and a confirmation window appears.
Downloading Embedded
Software and the FPGA File
The embedded software is the control software on the element cards. The
FPGA file is the programmable file supporting hardware on the cards.
Embedded software is located in the element's upper/lower-area memories,
whereas the FPGA file is located in the file memory.
Embedded Area - located in the Upper Area and Lower Area memories
Active Area - currently activated area used in conjunction with the
Embedded Area
2. Click Select File to select the filename to be downloaded, which appears in
the field to the right. Select the Upper Area or Lower Area radio button in
the Embedded Area for the software download location. This selection
should always be different from the Active Area when reverting back to the
original software.
3. Click Download to download the software to the equipment. A
confirmation window appears.
4. After software download, click Apply to activate the software.
To get IDPROM:
| In the Boot Configuration Tool window (on page 3-2), select
Configuration > Get IDPROM. The Boot Configuration Tool retrieves
the IDPROM data from the equipment and displays it in the IDPROM
window.
2. Select the No Recovery Next Startup checkbox for the NE to restart using
the default configuration instead of the current configuration. Leave this
checkbox deselected for the NE to restart using the current configuration.
3. Click Get. The Boot Configuration Tool retrieves the No Recovery Next
Startup attribute from the equipment. A confirmation window is displayed.
4. Click Apply. The Boot Configuration Tool sends the No Recovery Next
Startup attribute to the equipment and a confirmation window is displayed.
2. Select the Serial Port Close checkbox if you want the serial port to be
closed. Leave this checkbox deselected for the serial port to remain open,
which enables you to view debug information from the serial out port.
3. Click Get. The Boot Configuration Tool retrieves the Serial Port Close
attribute from the equipment. A confirmation window is displayed.
4. Click Apply. The Boot Configuration Tool sends the Serial Port Close
attribute to the equipment. A confirmation window is displayed.
In this chapter:
Overview ......................................................................................................... 4-1
Starting the LCT GUI ...................................................................................... 4-2
Configuring Parameters ................................................................................... 4-4
Configuring Static IP Routes ........................................................................... 4-6
Overview
The LCT GUI is essentially an element management system (EMS) interface
for the BG-40 or BG-20 and performs typical management functions.
3. Double-click the shortcut icon on your desktop or select Start > All
Programs > LCT. The LCT GUI Login window opens.
7. Click Logout the NE to disconnect from the NE. The Login window
reappears and you can log in again.
Configuring Parameters
After successful login to the LCT software, you can configure the following
parameters:
| Basic parameters: NE ID, NE MAC address, NE mode, Ethernet port IP,
Ethernet port mask
| Static IP routes
To configure parameters:
1. In the LCT-Login BG-40 NE window, select Configuration > Basic
Parameter Configuration. The Basic Parameter Configuration window
opens.
2. In the Add Static IP Routes fields, enter the Destination Network IP,
Subnet Mask, and Next Hop IP.
3. Click Add to add the new static IP routes to the Existing Static IP Routes
area.
4. In the Existing Static IP Routes fields, select the static IP routes entry that
you want to delete and click Delete.
5. Click Get to retrieve the static IP routes from the equipment and display
them in the Existing Static IP Routes fields. A confirmation window
appears.
6. Click Apply to send the static IP routes to the equipment. A confirmation
window appears.
In this chapter:
Configuring NEs.............................................................................................. 5-1
Resetting NEs .................................................................................................. 5-8
Configuring Orderwire Attributes ................................................................... 5-9
Configuring Communication Parameters ...................................................... 5-13
Configuring NEs
NE configuration configures attributes, services, and relevant functions for an
unconfigured (initial default status) NE, according to requirements of the
networking application. The NE's configuration data determines all the actions
of the NE.
During NE configuration, the NE configuration database is defined and set up.
Before service configuration can be performed on an NE, relevant attributes
and parameters must be set, such as the NE attribute and card attribute. A
configuration wizard is provided for this purpose.
A single NE includes the following classified configuration contents:
| NE attributes
| Card assignment
| Service configuration
| Clock synchronization configuration
| Card attribute configuration
| Card electronic label
2. Click PC Time to directly read the system time of the PC, or manually
enter the time.
3. Click Apply to set the time. A confirmation message is displayed.
Setting NE Attributes
The common attributes of the NE include two parts: basic attributes and
management attributes.
Basic NE attributes include the NE name, NE ID (read-only), NE type, NE
working mode, and NE system software version (read-only). For the BG-40
NE, the NE type is BG-40, which is a read-only attribute. For the BG-20 NE,
the NE type is BG-20, which is a read-only attribute. The NE working mode
refers to different working modes of the same type of equipment.
NE management attributes refer to information used for management purposes,
such as the vendor, location, user label, run date, and notes. Management
attributes do not influence the work and service configuration of the NE.
To set NE attributes:
1. Select Configuration > NE Attributes in the main menu. The NE
Attributes window opens.
2. After entering the above information, click Apply to send the information
to the NE. A confirmation message is displayed.
3. Click Close to exit the window.
2. After adding the corresponding card type in the corresponding slot, click
Apply. A confirmation message is displayed in the Operation Result area
of the window. If the logical configuration is inconsistent with the physical
configuration, alarms such as card out, card unexpected, card type
mismatch, and card fault (CBUS disconnection) will occur.
This window displays the list of cards for this NE for which the maximum
traffic must be set. This list contains the following information:
Select - a checkbox indicating that you want to select this card. You
must select a card before conducting Query, Get, or Apply operations.
Card - card name.
Max - maximum traffic value.
Range - permitted setting range. If the card is configured with any
timeslot, the permitted setting range is the maximum serial number of
the configured timeslot and the maximum value of the card. If E1ML
uses the eighth VC-12 as the maximum timeslot when being configured
with a cross connection, the maximum traffic range can be 8 through
21.
The Ethernet Card button is used to configure the maximum traffic for
FEL_12 and ESW_2G_8F Ethernet cards.
2. Select the card and enter the corresponding values in the Max column.
3. Click Apply and wait for a confirmation that the operation was completed
successfully.
4. Click Close to exit the window.
Resetting NEs
When an NE physical device does not work normally and needs to be
initialized, an NE reset function is used. The NE reset operation resets all the
cards except the MCU.
Both warm and cold resets are available. A warm reset resets only the main
processing unit of the card, meaning it resets the application program that is
running. A warm reset has no influence on the service. A cold reset resets not
only the main processing unit but also the peripheral chips. A cold reset
influences services on the card.
To reset an NE:
1. Select an NE in the topology view and then select Maintenance > NE
Reset in the main menu. The Device Reset Operation window opens.
Configuring Orderwire
Attributes
Orderwire attribute configuration configures the orderwire telephone, orderwire
attributes, and orderwire routing of all NEs. Orderwire telephone configuration
relates to the entire network and can only be performed on NEs in the
management domain. Operation authorities are needed from all NEs in the
network to perform orderwire configuration in the network.
BG-40/BG-20 NEs have Allow/Prohibit orderwire telephone attributes. When
set as Allowed, the orderwire telephone function of this NE is started. When set
as Prohibited, the orderwire telephone function of this NE is disabled.
The orderwire telephone is used for orderwire contacts between SDH NEs that
support the addressing call and conference calls. The orderwire number is a
three-digit integer number.
The Conference Telephone attribute refers to the NE conference telephone
when it is used in conversation. There are two options: Listen and Talk and
Listen Only.
The Conference Telephone Number attribute refers to the conference telephone
number for all NEs that support conference calling.
The Call Waiting Time attribute applies to the entire network. The unit is
seconds.
An orderwire routing table is saved in the MXC4X of each NE. The orderwire
routing table records the next hop and the outgoing direction (outgoing slot and
outgoing optical port) for each endpoint to which an orderwire call is to be
made. Since each NE knows the next hop NE, a path to the endpoint can be
established.
SDH orderwire provides communication for field engineers and equipment
maintenance personnel, and supports address-selective calls and conference
calls.
LCT-BGF orderwire configuration functions include:
| Setting the orderwire phone number for each NE
| Setting a uniform conference call number
| Setting the orderwire phone routing table. The LCT-BGF calculates
orderwire trails automatically, based on NE connection states in the
topology view. When configuring an orderwire phone, make sure that the
network topology is correctly connected.
The left side of this window displays the NE tree listing all NEs already
created, including those created in the user management area. The right side
contains two tabs:
The left side of this window displays the NE tree listing all NEs already
created, including those created in the user management area. The right side
is used to set the orderwire telephone number and other orderwire attributes
of the NE.
2. After selecting one or more NEs in the NE tree, click one of the following
buttons to configure the orderwire telephone number and orderwire
attribute:
Query - to display the NE orderwire attributes in the LCT-BGF
database
Get - to display the NE orderwire attributes obtained from the NE
equipment
Apply - to deliver the orderwire attributes of the selected NE to the NE
equipment and save them to the LCT-BGF database
Configuring Communication
Parameters
The powerful network management function of SDH needs strong support from
the ECC stack. As a managed object itself, the ECC stack should be
manageable. ECC stack management information enables you to receive
prewarning signals in sufficient time before an NE is disconnected due to DCC
hardware channel performance deterioration, and to locate the problem for a
specific NE after disconnection. It also provides some necessary network test
measures. Every NE must be set with some communication parameters, such as
gateway attributes, the Ethernet port's IP address, the DCC port's IP address,
and the LCT-BGF computer's IP address.
A gateway NE is an NE directly connected with the LCT-BGF. In terms of the
physical channel, information exchange between the gateway NE and the
LCT-BGF does not pass the DCC channel and needs no forwarding via any
other NE. A nongateway NE is an NE that communicates with the LCT-BGF
via a gateway NE. Generally, it is connected with the gateway via an optical
channel for data transmission over the DCC channel.
DCC transparent transmission means that the DCC code stream passes the NE
transparently, meaning it is transmitted transparently from the STM-N RX end
of the NE to another STM-N TX end. In this context, transparent refers to
protocol independence and the physical connection rate is purely N 64 Kbps.
In contrast, termination means local generation of DCC code streams at the
STM-N TX end.
There are two possibilities for termination:
| Access permitted - accesses the DCC code stream to the protocol processor
for processing
| Access prohibited - does not process the DCC code stream at all
Use this window to set gateway attributes, the Ethernet port IP address, and
the MCUE Ethernet port IP. If Gateway is selected in the Gateway
Attribute field, both local and remote NEs can be managed through the
LCT-BGF or the EMS-BGF. If No Gateway is selected, only the local NE
can be managed through the LCT-BGF or EMS-BGF. The Save and Apply
operations can only be performed by an advanced operator or system
operator.
The left side of this window displays the NE tree, listing all BG-40 NEs.
On the right, there are six operation tabs:
DCC Access
VC12 to SM10
V.35 Work Mode
DCCSwap Attribute
DCC Cross
DCC Overhead Config
DCC access
At present, two DCC access control modes are supported: six RDCCs (default)
and three RDCCs +1 MDCC. The DCC Access tab is used to configure DCC
access.
Figure 5-11: DCC Configuration and DCC Overhead Management window - DCC
Access tab
VC12 to SM10
The VC12 To SM10 tab, shown in the figure DCC Config and DCC Overhead
Management window (on page 5-15), is used to set the VC-12-10, VC-12-11,
and VC-12-12 access for the integrated mEP1subcard to the SM10. You can
perform Query, Get, and Apply operations on the NE selected in the NE tree.
To set a VC-12-12 link to the SM10, you must check whether the MXC4X
V.35 is in Traffic Path mode. If it is, such a link is prohibited. To set a
VC-12-10 or VC-12-11 link, first check whether it has been configured with
any overhead. If it has, such a link is prohibited.
Figure 5-12: DCC Configuration and DCC Overhead Management window - VC12
To SM10 tab
Figure 5-13: DCC Configuration and DCC Overhead Management window - V.35
Work Mode tab
The MXC4X cross-connect clock control card provides one V.35 interface and
supports the following three working modes:
| Traffic path
| Extended DCC
| V.11 overhead interface
The following conditions apply when configuring the V.35 interface:
| VC-12-12 can only work in Traffic Path mode when it is not connected to
the SM10.
| If V.35 has been configured with DCC or DCC access control, its working
mode cannot be modified and can only be Extended DCC.
| Traffic can be set only when the working mode is Traffic Path.
| The DCC type can be set as RDCC or MDCC only when the working mode
is Extended DCC.
DCCSwap attribute
The DCCSwap Attribute tab is used to set the optical port SWAP type and
switch of each card in the NE.
The optical port SWAP setting only restricts its MS property. After SWAP, its
MS can only be cross connected with an RS (an alien RS or its own RS). In
addition, there is no restriction to the RS that supports transparent transmission.
The operation objects include the optical ports under all subcards of the
selected NE. Query, Get, and Apply operations can be performed on these
ports.
DCC cross
Through cross connection, DCC transparent transmission and DCCSWAP
configuration can be performed using the DCC Cross tab.
Figure 5-15: DCC Configuration and DCC Overhead Management window - DCC
Cross tab
Query, Get, Apply, Add Items, Remove, and Remove All operations can be
performed in this window.
The following conditions apply for DCC configuration:
| EOC can only be configured for DCC when the corresponding VC-12 is
not connected to the SM10.
| V.35 must be configured in Extended DCC mode. Then, its cross-connect
granularity can be determined according to the set DCC type.
| For DCC transparent transmission, cross connections (RSDCC&RSDCC or
MSDCC&MSDCC) between an identical cross connect can be in EOC,
V.35, and SOH. DCC access is prohibited for the granularity used in
transparent transmission.
Figure 5-16: DCC Configuration and DCC Overhead Management window - DCC
Overhead Configuration tab
Query, Get, Apply, Add Items, Remove, and Remove All operations can be
performed in this window.
In this chapter:
Configuring Card Attributes ............................................................................ 6-1
Resetting a Card............................................................................................... 6-3
Viewing the Electronic Card Label ................................................................. 6-4
Viewing Card Information............................................................................... 6-5
Managing BG-20 Special Cards ...................................................................... 6-6
Managing FE_L12 Card Special Attributes .................................................. 6-10
Configuring ESW_2G_8F Special Attributes ............................................... 6-20
Configuring Ethernet Attributes .................................................................... 6-36
3. Define the following card attributes and then click Apply for your changes
to take effect:
SDH interface card (OMD1, OMS4, ESM1_1, and so on) attributes:
J0 sent/J0 received to/from RS and whether to insert AIS downward
during mismatch
J1 sent/J1 received to/from VC-4 and whether to insert AIS
downward during mismatch
C2 sent/C2 received to/from VC-4 and whether to insert AIS
downward during mismatch
Resetting a Card
When the physical device of a card does not work normally and needs to be
initialized, a card reset operation is performed. Both warm and cold resets are
available.
A warm reset only resets the central processing unit of the cards, meaning it
repositions the running of card usage programs. A cold reset resets both the
central processing unit and the peripheral hardware. Warm resets do not affect
traffic, while cold resets do.
This window displays the electronic information of the card, including the
card name, serial number, hardware version number, tester number, test
date, boot version, invalid date, programmer, software version, finish date,
and reservation byte.
Slot assignments for the BG-20 are listed in the following table.
The following figures show the BG-20 shelf view and slot assignment,
respectively.
The following figures show the SAM1 and SAM4 windows, respectively.
The functional blocks contained in the FE_L12 card include eight VCGs, eight
EoSs, and 16 ports. The port involves two layers: MAC and PHY. VCG is the
collection of VC-12s or VC-3s. The specific number of VC-12s or VC-3s
depends on the VCG's virtual cascade mode and maximum traffic.
Attribute management for the FE_L12 card includes:
| Configuration management:
VCG configuration
Acquisition of VCG timeslot resources
Addition of VCG member attributes and LCAS status
EoS encapsulation protocol configuration
CID table configuration
Port attribute configuration
Port connection
| Fault management:
Current alarms
Historical alarms
| Performance management:
Current performance
Historical performance
Performance threshold
| Maintenance:
Real-time traffic view
MST maintenance
Use this window to configure the virtual cascade mode (VC-12/VC-3) and
bandwidth of each VCG.
3. To acquire VCG timeslot resources, select Configuration > Get Time Slot
Resource in the menu. The Get FEM Time Slot Resource window opens.
This window displays the virtual cascade mode of each VCG and the
timeslot number assigned to this VCG.
4. To configure VCG member Add attributes and LCAS Status, select a VCG
and then select Configuration > VCG Member Add Attribute Set and
LCAS Status in the menu.
The operation objects are VCGs in the FE_L12 card. For every member of
this VCG, an Add or Not Add attribute can be set. The FE_L12 card
determines whether to add or remove the corresponding LCAS member
according to variations of this attribute.
5. Click Get in the VCG Attribute window to acquire the Add attributes and
the added member status of all members of a VCG from the NE equipment:
Received CNTL domain value
Received MST status
Sent CNTL domain value
Sent MST status
Value ranges for these attributes are as follows:
CNTL domain value - FIXED, IDLE, NORM, EOS, ADD, and DNU
MST domain value - OK and FAIL
Descriptions for sending and receiving member status must adhere to the
rules described in the table Member status rules (on page 6-19). All other
combinations are considered abnormal.
7. To configure the CID table, select Configuration > CID Table. The CID
Table window opens.
If an EOS channel has been set with Linear Extension Header GFP
encapsulation, you must configure the EOS GFP CID table. In this table,
8 indicates No (no MAC is added), and 0 through 7 correspond to MAC1
through MAC8. The default setting is 8.
The same MAC number cannot appear in the same line, but it can
appear repeatedly in the same line.
N cannot appear in the middle of a line (meaning, the values at both
sides are non-N), which can only appear at the end.
If the Null Extension Header GFP, LAPS, or LAPF encapsulation
protocol is adopted for an EOS channel, the corresponding MAC
cannot be used by any other EOS.
8. To configure the Port attribute, select Configuration > PORT Attribute.
The Port Attributes window opens.
The attribute value range and default values are shown in the table Port
attribute values (on page 6-20).
10. To view real-time traffic, select the Maintenance > Get Current Payload.
The Get Current Payload Rate window opens.
In this window, you acquire the RX and TX traffic of EoS and MAC ports
(ports 1 through 8). The traffic here refers to the average traffic within the
first 15 minutes in the acquisition process.
For the acquired traffic information, the data display unit can be specified
in B per second, Kbps, or Mbps. You can also select the adaptive option. In
this case, the system displays the data in the appropriate unit according to
the data size.
ESW_2G_8F Hardware
The ESW_2G_8F is a front-access card containing the following interfaces:
| Two GE interfaces (SFP)
| Eight FE interfaces (RJ-45)
| An LED indicator for the ESW_2G_8F card: Alarm/Active/Fail
| An LED indicator for the ports: LINK/RX/SPEED
The following figure shows the ESW_2G_8F card.
ESW_2G_8F Ports
The ESW_2G_8F provides three types of ports:
| 16 x FE WAN ports - for connecting to P/PE RS (NNI) or Ethernet L1
cards (UNI) via CALLA (EoS Mapper) and the internal matrix to an
aggregate interface.
The WAN port contains three objects: WAN, EoS, and VCG.
The following figure shows the ESW_2G_8F card window with its ports.
The ESW_2G_8F has the following managed objects that can be managed
through the EMS-BGF:
| LAN ports:
LAN
| WAN ports:
VCG
EoS
WAN
| Switch kernel:
Bridge
Use this window to configure the virtual cascade mode (VC-12/VC-3) and
bandwidth of each VCG.
3. To configure the LCAS status, select the LCAS tab in the VCG Attribute
window. The following window is displayed:
The operational objects in this window are the VCGs in the ESW_2G_8F
card. For every member of an VCG, an Add or Not Add attribute can be
set. The ESW_2G_8F card determines whether to add or remove the
corresponding VCG member according to variations of this attribute.
The Dedicate attribute value may be Yes or No. The default is No.
In this window, three attributes can be configured and three attributes are
read-only.
Duplex Status
Speed Status
Flow Control Status
Configurable attributes are:
In this window, four attributes can be configured and three are read-only.
Duplex Status
Speed Status
Flow Control Status
Configurable attributes are:
Negotiation
Duplex
Speed
Flow Control
8. To view real-time traffic, select the Maintenance > Get Current Payload
in the ESW_2G_8F card window menu. The Get Current Payload Rate
window opens.
In this window, you acquire the RX and TX traffic of EoS and WAN ports
(ports 1 through 16). The traffic here refers to the average traffic within the
first 15 minutes in the acquisition process.
For the acquired traffic information, the data display unit can be specified
in bits per second (bps), Kbps, or Mbps. You can also select the adaptive
option. In this case, the system displays the data in the appropriate unit
according to the data size.
9. To view the neighbors connected to a WAN port, select a WAN port in the
ESW_2G_8F card window and then select Maintenance > Port
Connected Neighbor in the menu. The Port Connected Neighbor
window opens, which lists the neighbors connected by WAN ports.
10. To perform MST maintenance, select a VCG port in the ESW_2G_8F card
window and then select Maintenance > MST Maintenance in the menu.
The MST Maintenance window opens.
12. Set the Loopback type for each VCG in this window, and click Apply to
save the configuration.
Figure 6-34: FE_L12 card window showing how to access the Layer 2 Switch
Configuration Management window
NOTE:
| If the FE_L12 port's autonegotiation is enabled and the
connected port's autonegotiation is disabled, the FE_L12
port works in Half mode (even if the connected port is in
Full mode), and flow control is disabled (even if flow
control is enabled on the connected port).
| If the FE_L12 port's autonegotiation is enabled, all
attributes (rate, mode, and flow control) are
autonegotiated. Some attributes cannot be configured for
autonegotiation. Some equipment does not support flow
control autonegotiation. In this case, the FE_L12 must
configure the port attributes manually. Otherwise, the
FE_L12 works with flow control disabled.
2. Click Get to list the port attributes. The attributes' working values are
displayed in the Duplex Status, Speed Status, and Flow Control Status
columns.
3. Configure port autonegotiation. This configuration is only performed for
one specified port. For the eight ports in the FE_L12 card, some ports can
be set with autonegotiation enabled and some with autonegotiation
disabled.
The FE_L12 does not support filtering based on the frame type. If an
untagged frame enters the ingress port, it is not dropped. A tag is added to
the MAC frame to indicate that the frame belongs to the default VLAN of
the ingress port. The frame then enters the filter processing.
A Layer 2 port of the FE_L12 card can be a tagged member port of several
VLANs, but cannot be an untagged member port of multiple VLANs. For
example, a port can be the tagged member port of VLAN 100 and
VLAN 200, and the untagged member port of VLAN 300. However, this
port cannot be the untagged member port of VLAN 400 at the same time.
2. Select the Static VLAN or Current VLAN radio button and then click Get
to retrieve the static VLAN table and current VLAN table.
The FE_L12 Layer 2 module has a dynamic address-learning function. All the
dynamically learned addresses need aging.
The following considerations apply to the aging process:
| When an address is learned dynamically, the aging timer is started.
| If the address can be learned during the Aging Time, it is removed from the
vFIB.
| The Aging Time is the initial value for the aging timer.
| If no aging mechanism is used, the vFIB may contain many invalid
addresses.
Static MAC addresses are MAC addresses configured by the LCT-BGF that do
not age. These MAC addresses are unicast addresses. There are three relevant
fields in the Static FDB table: Port, MAC Address, and VLAN. For a specific
VLAN, a port's unicast MAC address must be unique. Different VLANs can
have the same MAC address.
When the FE_L12 Layer 2 port's Port Lock is enabled, the address-learning
function is disabled. If a MAC frame contains a new source MAC address, this
frame is discarded.
Together, the Port Lock and the Static vFIB Table provide port access security.
If a port can only be accessed by two specific users, set these users' MAC
addresses in the Static vFIB Table and enable the Port Lock. Other network
devices cannot access this port.
Configuring STP
The Spanning Tree Protocol (STP) is a Layer 2 link management protocol that
provides path redundancy while preventing undesirable loops in the network.
For a Layer 2 Ethernet network to function properly, only one active path can
exist between any two stations. STP operation is transparent to end stations,
which cannot detect whether they are connected to a single LAN segment or a
switched LAN of multiple segments.
When you create fault-tolerant internetworks, you must have a loop-free path
between all nodes in a network. The STP algorithm calculates the best
loop-free path throughout a switched Layer 2 network. Layer 2 LAN ports send
and receive STP frames at regular intervals. Network devices do not forward
these frames, but use the frames to construct a loop-free path.
Multiple active paths between end stations cause loops in the network. If a loop
exists in the network, end stations may receive duplicate messages and network
devices may learn end station MAC addresses on multiple Layer 2 LAN ports.
These conditions result in an unstable network.
STP defines a tree with a root bridge and a loop-free path from the root to all
network devices in the Layer 2 network. STP forces redundant data paths into a
standby (blocked) state. If a network segment in the spanning tree fails and a
redundant path exists, the STP algorithm recalculates the spanning tree
topology and activates the standby path.
When two Layer 2 LAN ports on a network device are part of a loop, the STP
port priority and port path cost setting determine which port is put in the
forwarding state and which port is put in the blocking state. The STP port
priority value represents the location of a port in the network topology and how
well located it is to pass traffic. The STP port path cost value represents the
media speed.
IEEE defined the 802.1D specification in 1998. The STP protocol is the
spanning tree protocol supported by most current Ethernet switches. The
FE_L12 Layer 2 supports the 802.1D specification.
STP configuration sets STP parameters in order to select the proper spanning
tree topology and block nodes. STP configuration involves two tabs in the L2
Switch Configuration Management window: the Bridge STP tab and Port
STP tab. The parameters in these tabs set Layer 2 and port parameters,
respectively. The STP protocol can be enabled or disabled in the Bridge STP
tab.
STP algorithm
Each port has five statuses, which are described in the following table.
Variable Description
Hello timer Determines how often the network device broadcasts hello
messages to other network devices
Forward delay timer Determines how long each listening and learning state lasts
before the port begins forwarding
Maximum age timer Determines the amount of time protocol information received
on a port is stored by the network device
The following information about a bridge's ports can be viewed in the Port STP
tab:
| Port STP enabled or disabled status.
| Port path cost. The higher the rate, the lower the path cost. The path cost is
19 for 100BaseT ports.
| Port STP priority. The lower the value, the higher the priority. This is used
for selecting the root port or a designated port.
| Port State (Disable, Blocking, Listening, Learning, Forwarding).
The FE_L12 switch supports two priority queues on each of the eight
10BaseT/100BaseT ports, and two priority queues for packet transfers to the
CPU. The switch assigns a priority to each packet, based on the following
algorithm:
| The BPDU packets are always marked with high priority when forwarding
to the CPU.
| Unknown unicast destination addresses are always set to low priority.
| To determine the priority of the other packets received on one of the eight
ports, the following algorithm is applied:
If the <Priority_Override> is selected by the LCT-BGF, then priority is
determined by the <Default_Priority> configured by the LCT-BGF.
Otherwise, a packet is normally classified as Low priority unless at
least one of the following is true:
The packet contains a tag (per the IEEE 802.1Q definition), then the
three bits of the 802.1p user priority tag are used. If the
corresponding bit is set, the packet is assigned a high priority.
The input port default priority is high.
| A fixed mapping of the three-bit received priority tag to the priority queue
is used: 0 to 3 to the low Priority queue and 4 to 7 to the high priority
queue.
| The priority weight in the round-robin between the high- and low-priority
TX queues on the 10BaseT/100BaseT ports is as follows:
000 - one packet transmitted from high, one packet from low.
001 - two packets transmitted from high, one packet from low.
010 - four packets transmitted from high, one packet from low.
011 - six packets transmitted from high, one packet from low.
100 - eight packets transmitted from high, one packet from low.
101 - 10 packets transmitted from high, one packet from low.
110 - 12 packets transmitted from high, one packet from low.
111 - all packets transmitted from high, zero packets from low.
When creating an EVPLAN, each UNI port must have a policer. Each policer
can be used only once. Policers values can be identical, except for the policer
name.
To create a policer:
1. In the ESW_2G_8F card window, select Bridge > VPN Configuration >
Create Policer in the menu. The Create Policer window opens.
3. Change the policer values as required, and click Apply to save the settings.
To delete a policer:
1. In the Policer List window, select the policer to be deleted and then click
Delete.
2. A confirmation window is displayed.
3. Click OK to delete the policer, or Cancel to abort the deletion operation.
To upload a policer:
1. In the Policer List window, click Upload. The Policer Upload window
opens.
2. Click Upload for the LCT-BGF to upload policers from the ESW_2G_8F
card.
The status bar shows the consistency status between the NE and the
LCT-BGF database.
If the NE and the LCT-BGF database are inconsistent, select the Policer
Compare tab to display the inconsistency results.
To create an EPL:
1. In the ESW_2G_8F card window, select Bridge > VPN Configuration >
Create VPN in the menu. The Create VPN window opens.
To create an EVPLAN:
To create an EVPLAN, you should configure the NNI ports, UNI ports, and
policers.
1. In the ESW_2G_8F card window, select Bridge > VPN Configuration >
Create VPN in the menu. The Create VPN window opens.
2. In the Service Type field, select the EVPLAN radio button.
3. Enter the Customer, User Label, VPNID, S-VLAN ID, and FDB Quota
values at the top of the window.
4. Select an NNI port in the Add Port and Map Policer drop-down list, and
click >> to add it to the Ports list. Repeat this step for each NNI port.
5. Select a UNI port in the Port drop-down list, and click >> to add it to the
Ports list. When selecting a UNI port, the Tag Type and C-VLAN ID
values should also be set.
If the NE and the LCT-BGF database are inconsistent, select the VPN
Compare tab to display the differences.
To view a VPN:
| In the VPN List window (on page 6-74), right-click a VPN to select it, and
select View VPN in the pop-up menu.
The VPN attributes are shown in the window, including the Service Type,
VPNID, Customer, User Label, and Ports.
To edit a VPN:
1. In the VPN List window (on page 6-74), right-click a VPN to select it, and
select Edit VPN in the pop-up menu. The Edit VPN window opens.
2. Modify the VPN settings as needed and click Apply to save the settings.
To delete a VPN:
1. In the VPN List window (on page 6-74), right click a VPN to select it, and
select Delete VPN in the pop-up menu.
2. A confirmation window is displayed.
3. Click OK to delete the VPN.
3. Enter the file name and click Save to save the VPN export file.
2. Select the VPN list file in the Select File window, and click Open. The
imported VPN list is displayed in the window.
3. Select the specific VPN to be imported, and click Apply to import it.
| One day
| No aging
The following considerations apply to the aging process:
| When an address is learned dynamically, the aging timer is started.
| If the address can be learned during the Aging Time, it is removed from the
vFIB.
| The Aging Time is the initial value for the aging timer.
| If no aging mechanism is used, the vFIB may contain many invalid
addresses.
2. Click Get in the Aging Time area to retrieve the aging time settings. The
default value for the aging time is five minutes.
3. Set the aging time value and click Apply to save the setting.
The Trace MAC Address feature enables you to show which ports/VPNs/NEs
correspond to the input MAC address.
2. Input the MAC address in the Enter MAC address text box.
3. Click Trace MAC to display the results.
Configuring MSTP
The ESW_2G_8F supports the Multiple Spanning Tree Protocol (MSTP).
MSTP builds multiple spanning trees (STs) in a region. Each S-VLAN is
carried by a single ST. STs are referred to as Multiple Spanning Tree Instances
(MSTIs) and are denoted by MSTi (where i ranges from 1 to N).
The key reason for using MSTP is to use all the links of the network. This is
important because a link may be blocked for one tree but active for another.
Another key reason is to choose good roots per service. For example, a
broadcast should be rooted at the broadcasting node.
Regions are constructed autonomously by the MST protocol. A digest of the
mapping of S-VLAN IDs to MSTi is used as part of the region designator.
Changing this mapping influences the region definition. Therefore, the
mapping should only be changed when the regions and trees are to be changed
not when a service is added.
MSTP ensures that regions are contiguous. If there are noncontiguous islands
of MSTP-speaking elements, each island becomes a region and (multiple)
separate trees are created in each region.
Filtering identifier
There is a Common and Internal Spanning Tree (CIST) common to all regions
and RSTP-only bridges. MSTIs are specific to regions.
In each region, there is a CIST regional root bridge, as well as an MSTI
regional root for each MSTI. Interregional traffic reaches the regional root on
the MSTi and then moves to the CIST regional root on the CIST until reaching
the destination (region).
2. In the General tab, click Get to retrieve the bridge MSTP general settings.
3. In the Instance tab, click Get to retrieve the MSTP instance information.
Variable Description
Hello timer Determines how often the network device broadcasts hello
messages to other network devices
Forward delay timer Determines how long each listening and learning state lasts
before the port begins forwarding
Maximum age timer Determines the amount of time protocol information received
on a port is stored by the network device
The following information about a bridge's ports can be viewed in the Port
MSTP tab:
| Port MSTP enabled/disabled status.
| Edge Port enabled/disabled status.
| Hold-off Time.
| Port path cost. This path cost is per instance. The higher the rate, the lower
the path cost. The path cost is 19 for 100BaseT ports.
| Port MSTP priority. This priority is per instance. The lower the value, the
higher the priority. This is used to select the root port or a designated port.
| Port State (Disable, Blocking, Listening, Learning, Forwarding).
5. Click Apply to save the results. The aggregation group is added to the list
in the ESW_2G_8F card window.
Server load balancing and failover mechanisms are supported via flexible link
aggregation that is based on the MAC destination and source addresses. The
port within a Link Aggregation Group (LAG) that is to be used as a destination
can be selected based on the Ethernet source and/or destination address or the
IP source and/or destination address. The ESW_2G_8F card does not support
IP addresses.
The alarms of a link aggregation group and its member ports can be
masked.
In this chapter:
Overview ......................................................................................................... 7-1
Configuring and Managing Server Trail XCs ................................................. 7-1
Configuring and Managing Client Trail XCs ................................................ 7-10
Setting Up MSP 1+1 XC Protection.............................................................. 7-17
Configuring SNCP Attributes........................................................................ 7-20
Exporting Trails as a File............................................................................... 7-22
Importing Trails from a File .......................................................................... 7-24
Uploading XCs .............................................................................................. 7-25
Overview
LCT-BGF cross-connection (XC) management provides XC configuration at
the NE level.
Figure 7-1: Manual Trail Management - Create Server Trail XC window - Create
XC tab
2. Set the service type by selecting either the Working or Protection radio
button.
3. Specify the direction by selecting the Bidirectional, Unidirectional, or
Broadcast radio button.
4. Select the needed timeslots in the Source Time Slot and Sink Time Slot
lists. If multiple timeslots are selected, the number of source and sink
timeslots should be the same. Source/sink timeslot selection should comply
with cross-connection principles.
5. Click Add XC to add the selected source/sink timeslots to the send list. If
the number of selected timeslots is inconsistent or the timeslot selection
does not comply with cross-connection principles, an error message is
displayed.
6. Select the Send List tab. This window displays the configured cross
connections.
Figure 7-2: Manual Trail Management - Create Server Trail XC window - Send
List tab
Activate
Select one or more Inactive cross connections in the XC list and then
click Activate. If the operation succeeds, the cross connection is set up
on the NE side, and the XC status in the LCT-BGF changes from
Inactive to Active.
Deactivate
Select one or more Active cross connections in the XC list and then
click Deactivate. If the operation succeeds, the cross connection is
deleted from the NE side, and the XC status in the LCT-BGF changes
from Active to Inactive.
This window contains a toolbar, filtering area, and server trail list area.
2. Click XC List to list all the server trail cross connections for this NE.
3. Select the server trail(s) to be activated. Use the Shift key to select multiple
trails. The selected server trail is highlighted.
4. Activate a server trail using one of the following methods:
Click Activate
OR
Right-click a server trail and select Activate
When deactivating a server trail XC, the system displays the Task Status
Monitor window. If the server trail XC is successfully deactivated, its
status changes from Active to Inactive.
2. Select the server trail to be deleted and click Delete. The following
confirmation message is displayed:
Figure 7-7: Manual Trail Management - Create Client Trail XC window - Create
XC tab
Activate
Select one or more inactive cross connections in the XC list and then
click Activate. If the operation succeeds, the cross connection is set up
on the NE side, and the XC status in the LCT-BGF changes from
Inactive to Active.
Deactivate
Select one or more active cross connections in the XC list and then
click Deactivate. If the operation succeeds, the cross connection is
deleted from the NE side, and the XC status in the LCT-BGF changes
from Active to Inactive.
2. Click XC List to list all the client trail cross connections of this NE.
3. Select a client trail XC to be activated.
4. Click a client trail XC in the client trail list or use the Shift key to select
multiple client trail XCs. Any selected client trail is highlighted.
5. Activate a client trail XC by clicking Activate.
When a client trail XC is successfully activated, it status changes from
Inactive to Active.
One or multiple client trails can be deactivated at one time. The Deactivate
operation cannot be performed for client trails with a Not Active status. Only
client trails with an Active or Not All Active status can be deactivated.
Deactivating a client trail in Not All Active status sends the XCs included in it
to the equipment and deletes these XCs in the equipment.
If the Switching attribute is set as Force, the double-receive point adopts the
service of specified paths in Mandatory mode, instead of switching
automatically, regardless of the status of the service. If this attribute is set to
Automatic, the double-receive point automatically switches, based on the
quality of service.
The Restoration attribute for SNCP has a switching mode that can be set to
either Restoration or No Restoration. For the No Restoration switching mode,
as long as the standby path maintains smooth service, it is not switched to the
original operating path, even if the original operating path restores to normal.
If both paths are working properly, the working path is used. If the Switching
attribute is set to Force, the Restoration attribute becomes invalid. The
Restoration attribute is not validated until the Mandatory attribute is set to
Automatic.
3. Select the XCs to be exported and click Save. The Select File window
opens.
4. Enter the file name in the corresponding field and click Save.
Figure 7-21: Import Trail From File window showing importing of a server trail
4. Select the trail to be imported in this page and click Save to DB to save the
trail to the LCT-BGF. The procedure for importing client trail NE XCs is
the same as that for server trails.
Uploading XCs
This operation uploads current XC data from the BG-40 NE. Use this operation
to check the data consistency between the trail information on the equipment
and the trail information in the LCT-BGF.
To upload an XC:
1. Click XC > XCs Upload in the main menu. The XCs Upload window
opens.
2. Click Upload. If successful, the trail data uploaded from the equipment is
displayed in the list and the number of NE XCs and trail consistency
information is displayed at the bottom of the window.
3. Click Overwrite. The NE's trail data is deleted in the LCT-BGF and the
uploaded trail data is saved to the database.
If the compare results are consistent, the four Compare pages are null and
the operation button in this tab is grayed out. If results are inconsistent, one
of the following is displayed, depending on the type of inconsistency
found:
In this chapter:
Overview ......................................................................................................... 8-1
Configuring Synchronous Timing ................................................................... 8-2
Configuring the Synchronous Timing Table ................................................... 8-3
Viewing the SEC Work Mode and External Clock References ...................... 8-5
Calibrating the Clock Card Frequency ............................................................ 8-6
Overview
Synchronous timing configuration enables an NE to automatically select and be
synchronized with the highest-quality clock source in the network, in order to
achieve clock synchronization for the entire network.
The following operations can be performed:
| Configure synchronous timing
| Obtain the clock working mode
| Calibrate the clock card frequency
| Calibrate the active/standby switching of the clock card
These operations can be performed by the system operator level.
The NE synchronous timing table is accessed through the main menu and the
right-click menu of the NE. The window lists all the clocks for external
references that can be selected. You manually select options and set priorities
for them to form a synchronous clock table, and then send it to the equipment.
After setting the synchronous timing table, determine whether the equipment is
correctly locked with the expected clock source by viewing the clock working
mode. In addition, you can open the Timing Configuration window - Timing
Maintenance tab (on page 8-5) from the main menu to view the current clock
working mode and clock reference of the NE.
3. Select the corresponding external references for the clock and click Apply
to send the external clock references to the NE.
Clock type
The selected clocks are based on assigned priorities. Unselected clocks
are not used.
Channel
For the OMD1 card, you should select the optical port as the clock
source.
Priority
The higher the priority value, the higher the priority.
Override SSM
The S1 byte has two statuses: Automatic and Forced. Automatic status
obtains the S1 byte from the line automatically. Forced status sets the
S1 byte manually. 2 MHz tributaries, 2 Mbps tributaries, and
Synchronous Equipment Timing Sources (SETSs) can only work in
Forced status, while others can work in both statuses.
Quality
Quality values are:
PRC (G.811 clock)
SSU-T (G.812 transit office clock)
SSU-L (G.812 local office clock)
SEC (synchronous equipment timing source clock)
DNU (not used as synchronous clock)
UNK (synchronization quality unknown)
This window displays the timing work mode and current external
references for the clock.
In this chapter:
Overview ......................................................................................................... 9-1
Managing Current Alarms ............................................................................... 9-2
Managing Historical Alarms ........................................................................... 9-8
Masking Alarms ............................................................................................ 9-11
Using the NE Alarm Log............................................................................... 9-13
Configuring Alarm Attributes ....................................................................... 9-16
Correcting Alarms ......................................................................................... 9-20
Managing External Alarms............................................................................ 9-20
Overview
The equipment enters the normal running and maintenance phase immediately
after service trail configuration is completed. Therefore, you can view various
equipment alarms and performance data through the LCT-BGF, in order to
monitor the running status of the equipment.
Alarm data provides comprehensive service fault information. Alarm
processing is the major maintenance task for SDH equipment.
Alarms include alarm generation, alarm clearance, and time interval
information.
An event indicates that the equipment generated a certain action or process
under some condition, but that the action or process itself does not influence
the traffic. The equipment reports this action or process to the LCT-BGF as an
event. The event reflects the running status of the equipment. The occurrence
of many events may result in the generation of alarms. Although the event itself
does not influence the running of the equipment, the hidden causes are likely to
trigger alarms.
The display of the equipment alarm status needs no user intervention. The
LCT-BGF will update the colors of indicators on the NE layer, card layer, and
functional unit layer according to the reported alarms. The alarm source and
level are denoted by colored indicators at all three operation layers. The alarms
at each layer represent the highest level of all alarms for the layer and the
objects belonging to it.
The LCT-BGF also provides an audio alarm.
Masking Alarms
In some cases, the alarms of some ports and functional blocks are irrelevant to
the service. In this case, alarms can be masked to avoid confusing them with
the alarms caused by actual faults. Alarms that are masked (shielded) are not
monitored and do not affect card and equipment alarm indications (namely, the
card-level alarm status and NE-level alarm status). No alarm data is reported or
recorded for shielded alarms.
Generally, the following cases use alarm masks:
| Many service routes are open but you are only currently using part of them.
Unused service ports will send LOS alarms. In this case, you can mask the
alarms of the service ports not used, but configured with routes. Unmask
the alarms when necessary to use these service ports.
| For some ADM NEs, fiber connections at both optical interfaces are
planned. However, in actual engineering, one of the following may apply:
The fiber in one direction is not laid as planned, and only fibers at one
optical interface can be provided.
A protection network is planned, but the actual network has no
protection due to lack of fiber resources.
In these cases, the fibers at some optical interfaces need to be removed
because the signals at some optical interfaces are lost. In such situations,
the alarms at the unused optical interface can be masked.
In the LCT-BGF, alarms can be masked for the optical interface, electrical
interface, and SDH functional block. Generally, to mask optical interface
alarms, all SPI, RS, MS, AU-4, and VC-4 alarms are masked. To mask
electrical interface alarms, all VC and PPI alarms are masked.
When the alarms of a certain object are masked, the alarms related to this
object in the current alarm database are cleared. After the alarm mask is
released, the equipment reports the current alarm. Therefore, the NE equipment
for which the alarms have been masked should have no alarm indication.
2. To view alarm mask information for a managed object, select one or more
managed objects belonging to the same card in the NE tree and click
Query. The alarm mask information is displayed in the Data Display area
of the window. Operation results are displayed at the bottom of the
window.
3. To retrieve alarm mask information for an object, select one or more
objects belonging to the same card in the NE and click Get. Alarm mask
information is displayed in the Data Display area of the window. Operation
results are displayed at the bottom of the window.
4. Modify alarm mask parameters, as required.
Click Apply to send the settings information to the NE equipment.
Operation results are displayed at the bottom of the window.
Delete
Save
Open
Refresh
4. Click Query to obtain the information from the database. The alarm switch
configuration for the selected NE is displayed in the Alarm Switch area of
the window.
5. Click Get to obtain information from the NEs. The alarm switch
configuration for the selected NEs is displayed in the window.
6. Set the Alarm Switch as Close or Open by selecting the relevant radio
button.
7. Click Apply to send the settings information to the NE equipment.
Operation results are displayed at the bottom of the window.
5. To retrieve alarm hold-off time settings from the NE equipment, select one
or more NEs in the NE tree or select the All NEs checkbox.
6. Click Get. If successful, alarm hold-off setting information is displayed in
the Alarm Hold Off Time area of the window.
7. Modify alarm hold-off settings, as required.
8. Click Apply to send settings information to the NE equipment.
Correcting Alarms
If LCT-BGF alarms and equipment alarms cannot be acknowledged as
consistent, alarm correction can be used to ensure consistency between them.
This operation refreshes the current alarm on the LCT-BGF side, based on the
current alarm on the equipment side.
Alarm correction is not affected by the Autoreport attribute.
Two types of alarm correction are available:
| NE alarm correction
| Card alarm correction
The left side of this window shows the NE tree. The right side contains port
information, and consists of two tabs: Input Port and Output Port.
The Input Port tab displays the configuration for the four input ports of the
NE. You can assign a name to the port in the Name field and specify the
upper TTL level representing the alarm status or normal status in the
Contacts Status field.
The Output Port tab displays configuration for the three output ports. These
ports are: major alarm, minor alarm, and audio alarm. You can set the
alarm output switch as on or off.
In this chapter:
Overview ....................................................................................................... 10-1
Viewing Current Performance....................................................................... 10-5
Viewing Recent Performance ........................................................................ 10-7
Setting Performance Thresholds.................................................................... 10-8
Using the Performance Monitoring Switch Operation ................................ 10-10
Resetting Performance Counters ................................................................. 10-13
Overview
Performance data reflects the network running quality. The LCT-BGF monitors
the bit errors for each section, the SDH layers, and the path.
Performance data can be viewed for different monitored objects, as follows:
| RS - reflects a B1 error and an RS failure
| MS - reflects a B2 error and an MS failure
| VC-4 - reflects a B3 error and a high-order path failure
| VC-12 - reflects a V5 error and a low-order path failure
| VC-3 - reflects a B3 error and a VC-3 path failure
| Ethernet over SDH (EOS) - reflects GFP errors, and the number of sent
packets and errored packages
| Port - reflects Ethernet MAC layer statistics, including the number of
received frames of varying length and type, and their error packets
Performance-related Operations
LCT-BGF performance functions provide instant monitoring of and regular
statistics for the error codes of various SDH section layers and paths. Such data
is essential to ensure optimal network performance.
The following performance-related operations can be performed:
| Get current performance
| Set the performance threshold
| Set the performance monitoring task
| Reset performance counters
| Reset card performance counters
Before performing operations in this window, you must first select the
object whose performance data you want to view in the window's
navigation tree, as well as select the relevant Performance Type radio
button (15-minute or 24-hour).
Before you can perform operations in this window, you must first select an
object in the NE tree and then select the relevant Performance Type radio
button.
2. Click Query to display the performance threshold value obtained from the
LCT-BGF database.
3. Click Get to display the performance threshold value obtained from an NE.
4. Click Apply to send performance threshold values to the NE, and save
them to the LCT-BGF database.
5. To set the Laser Threshold, select Performance > Threshold > Laser
Threshold in the main menu.
6. To set the SD/Exc Threshold, select Performance > Threshold > SD and
Exc Threshold in the main menu.
This window consists of two tabs: the Collecting Schedule tab, which is
used to set an NE's monitoring switch parameters, and the Object Attribute
tab, which is used to set the performance object monitoring switch
parameters.
In this chapter:
Overview ....................................................................................................... 11-1
Configuring the LCT Work Mode................................................................. 11-2
Overview
Only one EMS-BGF and one LCT-BGF are allowed to log in to the same NE
simultaneously. Both the EMS-BGF and the LCT-BGF can be in Master mode
to configure the NE.
When the LCT-BGF applies for Master mode, the embedded software on the
NE checks the LCT configuration of the EMS-BGF, as follows:
| If the EMS-BGF is not managing the NE, the LCT-BGF switches to Master
mode successfully.
| If the EMS-BGF is logged into the NE and the LCT-BGF configuration of
the EMS-BGF is approved, the LCT-BGF switches to Master mode
successfully.
| If the EMS-BGF is logged into the NE and the LCT-BGF configuration of
the EMS-BGF is not approved, the LCT-BGF does not switch to Master
mode, but remains in the Monitor mode.
| If the EMS-BGF is logged into the NE and the LCT-BGF configuration of
the EMS-BGF is waiting for approval, the LCT-BGF embedded software
on the NE sends an Apply Master notification to the EMS-BGF. If the
EMS-BGF returns approval, the LCT-BGF switches to Master mode. If the
EMS-BGF returns no approval, the LCT-BGF remains in Monitor mode.
Figure 11-2: Task window for setting the LCT work mode as master
Figure 11-3: Information window for setting the LCT work mode as monitor
In this chapter:
Using the Maintenance List ........................................................................... 12-1
Performing Loopback Operations.................................................................. 12-2
Performing AIS/PRBS/RDI Operations ........................................................ 12-5
Saving NE Configuration Data...................................................................... 12-9
Clearing the NE Configuration...................................................................... 12-9
Downloading NE Database Files................................................................. 12-10
Performing a Software Upgrade .................................................................. 12-11
Performing Activation Time/Version Activate Operations ......................... 12-13
Performing Other Maintenance Operations................................................. 12-17
2. In the NE tree, select the card that needs a loopback and click Query to
query the LCT-BGF database the about the loopback status of the timeslots
belonging to this card. Operation results are displayed at the bottom of the
window.
If a timeslot in the NE tree is in loopback status (near-end loopback or
far-end loopback), its card and NE node display the icon. Otherwise,
they display the icon.
3. Click Get to obtain from the NE side, the loopback status of the timeslots
belonging to this card. Operation results are displayed at the bottom of the
window.
4. Modify loopback parameters as required.
5. Click Apply to send the loopback configuration to the NE, and then to the
LCT-BGF database. If successful, operation results are displayed at the
bottom of the window.
Performing AIS/PRBS/RDI
Operations
The AIS/PRBS/RDI operations obtain the EoS bit error statistics of the VC-12
bit errors for the ME1_8 card, and the VC-3 and VC-12 bit errors for the
P345_3 and ME1_8 cards by inserting different sequences of pseudo-random
codes, in order to judge the path quality of service (QoS).
P345_3
ME1_21/42
M345_2
SAM1/4
2. In the Insert area, select the Add or Drop radio button in the Direction field.
3. Set the Insert value to On.
4. Specify the Insert Pattern.
5. Set the Inverted field value.
6. Click Apply to insert the PRBS.
7. Click Add Single Bit Error to insert an additional error bit.
NOTES:
If the source and sink are set as AIS insertion, all buttons
on the EC Monitor and Get EC tabs are disabled.
If there is no AIS insertion for the source and sink, bit
errors can be acquired for the E100M card. For the
P345_3 and the ME1_8 cards, all buttons on the latter two
tabs are enabled.
2. Select an NE in the list and click Get. The Select Directory window opens.
3. Select the file directory where the NE database file should be saved and
click OK.
Performing Activation
Time/Version Activate
Operations
This section describes the procedure to set the activation time. For BG-40 NEs,
this operation is called Activation Time. For BG-20 NEs, this operation is
called Version Activate.
For BG-20 NEs, click Version Activate in the Software Upgrade and
Maintenance window. The Version Activate window opens.
2. Click Get to display the Activation Time retrieved from the NE. A Task
window opens, displaying the status of the operation.
3. Click Close. The Upgrade Confirmation window opens, in which you can
verify the current version and new version of the NE.
Logging in a Remote NE
Use the following procedure to log in a remote NE.
2. Check the NE IP address and click Login. The Telnet window opens and
displays the NE connection status.
In this chapter:
Overview ....................................................................................................... 13-1
Enabling the BG-40 NE Proxy ARP ............................................................. 13-2
Configuring the BG-40 NE ARP List............................................................ 13-3
Displaying DCC MIB Counters .................................................................... 13-5
Configuring the BG-40 NE Serial Port.......................................................... 13-6
Clearing the Flash.......................................................................................... 13-7
Configuring the BG-20 NE Trap Manager Table.......................................... 13-7
Configuring BG-20 NE SNMP Agent Mode................................................. 13-9
Overview
This chapter introduces the advanced configuration of the LCT, which provides
enhanced configuration options for advanced users.
As shown in this figure, when the router R attempts to connect or send a packet
to a remote NE (for example, NE2), the router sees that this NE has the same
subnet (N1.N2) as the Ethernet that is attached to it and to the GNE. Therefore,
the router incorrectly assumes that the NE is sitting on the same subnet (the
same wire). As a result, the router sends an ARP request to determine the
physical address of the NE. The GNE receives this ARP request and sends its
own physical (MAC) address to the router. The router then makes the
connection or sends the IP packet to the GNE.
2. Click Get to retrieve the proxy ARP setting from the equipment.
3. Set the proxy ARP property and click Apply to send the proxy ARP to the
BG-40 NE.
2. Click Get to obtain the serial port from the BG-40 NE in this mode.
3. Enter the Serial Port property by selecting the relevant radio button.
4. Click Apply to send the property to the BG-40 NE.
2. Click OK to confirm.
2. To add a new trap manager, enter values for the Manager IP, Trap port
number, and Administrator attributes at the top of the window, and click
Add. The new trap manager is added to the list of trap managers at the
bottom of the window.
3. To delete a trap manager, select it in the list and click Delete.
4. Click Get to retrieve the trap managers from the equipment and display
their details in the list of trap managers.
5. Click Apply to send the trap managers to the equipment.
2. Click Get to obtain the mode option and IP address for SNMP traps. In
Monitoring mode, the SNMP agent only responds to GET, GET-NEXT,
and GET-BULK operations. In Full-control mode, the SNMP agent
responds to all operations.
3. Enter the mode option and IP address for the SNMP Traps property by
selecting the relevant radio button. Select Ethernet IP when the NE is a
gateway. Otherwise, select DCC IP.
4. Click Apply to send the property to the BG-20 NE.
In this chapter:
Overview ....................................................................................................... 14-1
Assigning a PCM Card .................................................................................. 14-4
PCM Configuration Management ................................................................. 14-7
Managing SM10 XCs .................................................................................. 14-35
Managing SM_10E XCs.............................................................................. 14-41
Managing PCM Faults................................................................................. 14-47
Performing PCM Maintenance .................................................................... 14-59
Overview
This chapter describes how to access, assign, and configure the SM10 and
SM_10E cards, as well as manage PCM alarms and perform PCM management
and maintenance operations.
SM10 Card
The SM10 card is an external BG-40 PCM card that comprises eight E1
interfaces with LIU and framing, and a 512 x 512 DS-0 cross-connection
matrix with full capacity hardware-based CAS processing, timing, and control
and communication functions of the system. In addition, it supports three
common traffic module slots and a special small traffic module slot for
Ethernet interfaces.
Name Description
SM_FXO_8 Eight FXO or RD channels
SM_FXS_8 Eight FXS or FXD channels
SM_EM_24W6 Six 2W or 4W E&M channels
SM_V24 Can be configured with one synchronous, two asynchronous,
or eight transparent V.24 channels
SM_V35_2 Two V.35 channels
SM_Omnicentor Supports the central side of an Omnibus type of service
(OW on PDH)
SM_Codir_4 Quad port 64 K codirectional, G.703 interface module for the
SM10 card
SM_FE_A Two 10/100BaseT channels (the bandwidth of each channel
can be E1 or N x 64 Kbps)
SM_10E Card
The SM_10E card is a PCM card for BG-20 and BG-30 NEs. The card has the
following features:
| Multiservice access through multiple daughter modules
| Nonblocking DS-0 1280 x 1280 crossing matrix
| 44 E1s mapper/demapper
| 32 E1s framer
| 12 Mbps traffic bandwidth for each module slot; traffic add-and-drop
capacity up to 24 Mbps
| 622 Mbps ESSI bus access to MXC20
| Fully loaded 40 W power consumption
| Dimensions:
Base card:
Size (height) 25.4 mm
Size (width) 265 mm
Size (depth) 210 mm
Module:
Size (height) 20.0 mm
Size (width) 67.4 mm
Size (depth) 154 mm
| Front-access connectors
Three module sots in the SM_10E, each with a capacity of 12 Mbps, can
accommodate the interface modules described in the following table.
Name Description
SM_FXO_8E Eight-channel foreign exchange office access module
SM_FXS_8E Eight-channel foreign exchange station access module
SM_EM_24W6E Six channels E&M signaling; six-channel 2/4 VF access module
SM_V24E Configurable V.24 data access module that supports the
following three modes:
| Eight transparent-only V.24
| Four Async with full controls V.24
| Two Sync with full controls V.24 that supports
point-to-multipoint
SM_V35E Two-channel V.35 data access module
SM_Omni_E Omnibus central unit with external 4W interfaces
SM_Codir_4E Four-channel 64 K codirectional data access module
SM_EOP Two channels of FE over E1 with a total WAN bandwidth of
8 x E1s
SM_V_COMBO Four channels of FXS and two channels of 2/4W E&M combo
module
SM_D_COMBO One channel of V.35 and 1/2 channels of V.24 combo module
Figure 14-6: Set Subcard Attributes window showing frame attribute for
SM10
| SM_V35_2:
The SM_V35_2 card provides two V.35 channels. You can view the
interface type in the Set Subcard Attributes window.
Figure 14-13: Set Subcard Attributes window for SM_V24 card - 1 channel
Figure 14-15: Set Subcard Attributes window for SM_V24 card - 8 channels
| SM_EM_24W_6E card:
Interface Type:
2W with EM: 2-wire VF and 1E1M; E&M is the signaling channel.
4W with EM: 4-wire VF and 1E1M; E&M is the signaling channel.
2W without EM: two-wire VF.
4W without EM: four-wire VF.
Input/output Gain - the LCT-BGF can view and set the input/output
gain for each user interface. Ranges for input/output gain are:
Input: -13 to +1 dB
Output: -1 to +13 dB
Interval: 0.5 dB
| FXO/RD card (SM_FXO_8E):
Use State: Idle, Busy
| SM_V35E - the SM_V35E card provides two V.35 channels. You can view
the interface type in the Set Subcard Attributes window.
| SM_Omni_E card:
To upload XCs:
1. In the Upload/Download PCM Configuration Data window, click XCs
Upload. The XCs Upload window opens.
2. Select the XCs Upload tab and click Upload to upload the XCs from the
equipment.
3. Click Overwrite to save the XCs to the database.
4. Select the Compare Result tab.
5. Click XCs in NE But Not In Local Database to display the XCs that exist
in the equipment, but not in the LCT-BGF database, as shown in the
following figure.
6. Click XCs In Local Database But Not In NE to display the XCs that exist
in the LCT-BGF database, but not in the equipment.
7. Click Different Active State to display the XCs with an inconsistent active
state.
8. Click Delete remotely to delete XCs in the equipment.
9. Click Save to DB to save the uploaded XCs from the equipment to the
LCT-BGF database.
Creating an SM10 XC
Creating a client trail manually configures cross-connections in a single NE. A
client trail is complete only after all of its client trail cross-connections have
been configured.
6. Click Add XC to add the selected source/sink slots to the send list. If the
number of selected source/sink timeslots is inconsistent or the timeslot
selection does not comply with cross-connection principles, an error
message is displayed.
7. Select the Send List tab to display the configured cross-connections.
To activate XCs:
1. In the XC Management window, select the XCs to be activated.
2. Click Activate to activate the XCs. When a client trail is successfully
activated, it status changes from Inactive to Active.
To deactivate XCs:
1. In the XC Management window, select the XCs to be deactivated.
2. Click Deactivate to deactivate the XCs.
To filter XCs:
1. In the XC Management window, set the filter options.
2. Click Filter to filter XCs.
To upload XCs:
1. Click Trail > XC Upload in the main menu. The Upload XCs window
opens.
2. Click Upload to upload the XCs. If the operation succeeds, the trail data
uploaded from the equipment is displayed in the list and NE XC
consistency information is displayed at the bottom of the window.
3. Click Overwrite to overwrite the XC data in the LCT-BGF database with
the XC data uploaded from the equipment.
If the compare results are consistent, the three Compare pages are null and
the operation buttons in this tab are grayed out. If results are inconsistent,
one of the following is displayed, depending on the type of inconsistency
found:
Figure 14-41: XCs Upload window - XCs In Local Database But Not In NE
page
7. Select the Send List tab to display the configured cross connections.
To activate XCs:
1. In the XC Management window, select the XCs to be activated.
2. Click Activate to activate the XCs. When a client trail is successfully
activated, it status changes from Inactive to Active.
To deactivate XCs:
1. In the XC Management window, select the XCs to be deactivated.
2. Click Deactivate to deactivate the XCs.
To filter XCs:
1. In the XC Management window, set the filter options.
2. Click Filter to filter XCs.
To upload XCs:
1. Click XC > Upload XCs in the main menu. The Upload XCs window
opens.
2. Click Upload to upload the XCs. If the operation succeeds, the trail data
uploaded from the equipment is displayed in the list and NE XC
consistency information is displayed at the bottom of the window.
3. Click Overwrite to overwrite the XC data in the LCT-BGF database with
the XC data uploaded from the equipment.
4. Select the Compare Result tab.
If the compare results are consistent, the three Compare pages are null and
the operation buttons in this tab are grayed out. If results are inconsistent,
one of the following is displayed, depending on the type of inconsistency
found:
Figure 14-47: Upload XCs window - Compare Result tab - XCs in Local
Database but Not in NE page - SM_10E
Monitoring Events
The event recorder provides a convenient, real-time mechanism for viewing
alarms and events. It faithfully records all notices from the equipment,
including alarms, alarm clearing actions, and events.
To monitor events:
1. In the PCM NE Shelf View window, select Fault > Event Monitor in the
main menu. The PCM Event window opens.
To acknowledge alarms:
| Select one or several alarms in the PCM Alarm window - Current Alarm
tab and then click Acknowledge to acknowledge them.
To clear alarms:
| Select one or several alarms in the PCM Alarm window - Current Alarm
tab and then click Clear Manually to clear the alarms.
2. Input the file name and click Save to save the alarms to a file.
Masking Alarms
In some cases, the alarms of some ports and functional blocks are irrelevant to
the service. In this case, alarms can be masked to avoid confusing them with
the alarms caused by actual faults. Alarms that are masked (shielded) are not
monitored and do not affect card and equipment alarm indications (namely, the
card-level alarm status and NE-level alarm status). No alarm data is reported or
recorded for shielded alarms.
In the LCT-BGF, PCM alarms can be masked for the E1 port, Ethernet port,
and 64 Kbps port.
When the alarms of a certain object are masked, the alarms related to this
object in the current alarm database are cleared. After the alarm mask is
released, the equipment reports the current alarm. Therefore, the NE equipment
for which the alarms have been masked should have no alarm indication.
2. To view alarm mask information for a managed object, select one or more
managed objects and click Query. The alarm mask information is
displayed.
3. To retrieve alarm mask information for an object, select one or more
objects and click Get. Alarm mask information is displayed.
4. Modify alarm mask parameters, as required.
5. Click Apply to send the settings information to the equipment and
database.
Correcting Alarms
Alarm correction can be used to ensure alarm consistency between the
LCT-BGF and the SM10 card. This operation refreshes the current alarm on the
LCT-BGF side, based on the current alarm on the SM10 side.
Figure 14-59: Run Command window displaying the SM10 card electronic
label
2. Click Query to obtain the loopback status from the LCT-BGF database.
3. Click Get to obtain the loopback status from the equipment.
4. Set the loopback attributes and click Apply to send the loopback attributes
to the LCT-BGF database and the equipment.
2. Click Query to obtain the loopback status from the LCT-BGF database.
To upgrade software:
1. In the PCM NE Shelf View window, select Maintenance > PCM NE
Software Upgrade. The PCMNE Software Upgrade window opens.
Figure 14-68: PCMNE Software Upgrade window after starting the upgrade
In this chapter:
Overview ....................................................................................................... 15-1
License Control Mechanism .......................................................................... 15-2
License Control Workflow ............................................................................ 15-3
License Format .............................................................................................. 15-4
Managing Licenses in the LCT-BGF ............................................................ 15-6
Overview
In the BG-20, the LCT-BGF uses a license-control mechanism for the
following cards and modules:
| STM-4 on the SAM module
| Ethernet ports on the L1B_6F card
The default configuration of the BG-20 NE is STM-1 with no Ethernet ports. If
you want to upgrade to STM-4 or use the Ethernet ports, licenses must be
purchased from ECI Telecom. These licenses include the serial number of the
BG-20 NEs, the ADM rate, and the number of ports. Use the license-control
feature of the LCT-BGF to download the licenses to BG-20 NEs and activate
them. STM-4 or Ethernet ports can only be used on BG-20 with the appropriate
license.
You should install the BG-20 NEs first and then generate the purchase order
using the LCT-BGF. ECI Telecom generates the license file according to the
purchase order and delivers it to you. Once received, you should import the
license file to the LCT-BGF and download the license key to the BG-20 NEs.
The BG-20 NEs check the license and activate it if all criteria match. Ports are
then available for use.
If the license file is not provided, you can manually input the license code in
the LCT-BGF. The license code is printed on a sticker on the NE packing box.
For more details, refer to the "To activate the license in the BG-20 Shelf View
window" procedure in Managing Licenses in the LCT-BGF (on page 15-6).
The following figure shows the workflow for inputting a license code
manually.
License Format
The license purchase order format is described in the following table.
The license purchase order is composed of license records, where each record
contains the following values:
| SN
| Current ADM Rate
| Expected ADM Rate
| Current Qty of E. Ports
| Expected Qty of E. Ports
License purchase order values are described in the following table.
Attribute Description
SN Serial number of the BG-20 NE
Current ADM Rate Current rate of the SAM module
Expected ADM Rate Expected rate of the SAM module
Current Qty of E. Ports Current number of Ethernet ports
Expected Qty of E. Ports Expected number of Ethernet ports
The license file is composed of license records, where each record contains the
following fields:
| SN
| ADM Rate
| Eth Ports
| Key
Attribute Value
SN Serial number of the BG-20 NE
ADM Rate STM-4 or STM-1
Eth Ports Number of Ethernet ports
Key License key
2. Select the license file and click Open. The LCT-BGF imports the license
file. If the license file is corrupted, the LCT-BGF displays a warning
message.
2. Browse to the required folder and click Save. The LCT-BGF exports the
license file.
If the ports number or service type is less than the current configuration, a
warning message appears.
The NE validates the license key by the NE serial number. Ports and
services are enabled if all criteria match.
10Base-T
Ethernet LAN transmitting data over twisted pair wiring at 10 Mbps baseband.
1U
One unit rack height = 1.75 inches or 44.4 mm.
A
AC_CONV-20B
AC power-supply module for the BG-20B
ACO
Alarm Cut Off
ADM
Add/Drop Multiplexer
System adding and dropping lower level signals to and from a higher level carrier
signal.
AIS
Alarm Indication Signal
ANSI
American National Standards Institute
ARP
Address Resolution Protocol
AWG
Array Waveguide Grating
Device used for wavelength demultiplexing in WDM applications.
B
BBE
Background Block Error
BER
Bit Error Ratio
Number of bit errors detected in a unit of time, usually 1 second.
C
CAPEX
Capital Expenditure
CBS
Committed Burst Size
CE RS
Customer's edge RS
CECC
CENELEC Electronic Components Committee
CIR
Committed Information Rate
CIST
Common and Internal Spanning Tree
CMS
Central Monitoring Station
CORBA
Common Object Request Broker Architecture
CoS
Class of Service
CWDM
Coarse Wavelength Division Multiplexing
Form of optical wavelength division multiplexing (see WDM) with wider spacings
between channels leading to considerable savings in laser transponder costs, power
requirements, and footprints. Latest standards specify a channel separation of 20 nm
(2500 GHz), as compared with the 0.8 nm (100 GHz) separation in DWDM.
D
DB
Daughter Board
or
Database
DBMS
Database Management System
DCC
Digital Communications Channel
or
Digital Control Channel
or
Data Communications Channel
Data channels in SDH/SONET overhead used for internode communications and
OAM&P communications between intelligent controllers and individual network
nodes.
DDF
Digital Distribution Frame
DeMux
Demultiplex, Demultiplexer
DIN
German Institute for Standardization
DMM
Digital Multimeter
DS
Digital Signal (bit stream)
or
Defect Second
DS-0
Digital Signal level 0
North American digital telephony signal format for transmission at 64 kbps.
DS-1
Digital Signal level 1 (= T1)
North American primary digital telephony signal format for transmission at 1.544
Mbps; carries 24 DS-0 signals.
DS-3
Digital Signal level 3
North American digital hierarchy signal format for transmission at 44.736 Mbps;
carries 28 DS-1 signals.
Dslot
Daughter Board Slot
DWDM
Dense Wavelength Division Multiplexing
Transmission of multiple optical signals over closely spaced wavelengths, usually in
the 1550 nm region, on a single strand of fiber. See also WDM.
DXC
Digital Cross Connect
DXS
Digital Cross-Connect Switch
E
E0
ITU-1 Standard Digital Signal level 0 (64 Kbps).
E1
European PDH digital signal level 1 (2.048 Mbps).
E3
European PDH digital signal level 3 (34.368 Mbps).
ECC
Embedded Control Channel
or
Embedded Communications Channel
or
Error Correcting Code
EM
Ear and Mouth
EMC
Electromagnetic Compatibility
EMF
Equipment Management Function
EML
Element Management Layer
Situated between the NEL and NML; controls many individual NEs.
or
Transmitter source type interface for STM-64/OC-192 I/O modules.
EML
Element Management Layer
Situated between the NEL and NML; controls many individual NEs.
or
Transmitter source type interface for STM-64/OC-192 I/O modules.
EMS
Element Management System
EMS-BGF
BG-40 and BG-20 Element Management System
eNM
ECI Telecom's Network Manager
EOC
End Of Chain
or
Embedded Overhead Channel
EoS
Ethernet over SDH/SONET
EPA
ESD Protected Area
or
US Environmental Protection Agency
EPL
Ethernet Private Line
ES
Errored Second
or
Electrical Section
ESD
Electrostatic Discharge
ESDS
Electrostatic Discharge Sensitive
ESW_2G_8F
Ethernet-over-SDH processing and Ethernet L2 switching card with 8 x 10/100BaseT
LAN interfaces , 2 x GBE LAN interfaces, and 16 Ethernet-over-SDH interfaces
Ethernet
Most widely used LAN transmission protocol, open, simple, and decentralized, for
connecting computers, printers, workstations, terminals, and so on, within the same
building/campus. Operates over twisted wire and coaxial cable at speeds beginning at
10 Mbps. Uses CSMA/CD techniques. See 10BaseT.
ETSI
European Telecommunications Standards Institute
EVPLAN
Ethernet Virtual Private Local Area Network
F
Fast Ethernet
100BaseT, Ethernet at 100 Mbps.
FC
Fiber Channel
FCU
Fan Control Unit
FDB
Filtering Database
or
Forwarding Database
FE
Fast Ethernet (see 100BaseT)
or
Far End
FE_L12
Ethernet-over-SDH processing and Ethernet L2 switching card with 8 x 10/100BaseT
L1 interfaces and 8 x 10/100BaseT L2 switching interfaces
FID
Filtering Identifier
FIFO
First In, First Out
FST
Fiber Storage Tray
FXO
Foreign eXchange Office
FXS
Foreign eXchange Station
G
GbE
Gigabit Ethernet
Ethernet running at one thousand million bits per second (1 Gbps) available as shared
or switched.
GCT
GUI Cut-through
GFP
Generic Framing Procedure
GNE
Gateway Network Element
GPRS
General Packet Radio Service
First implementation of packet switching within GSM.
GUI
Graphical User Interface
GVRP
Garp VLAN Registration Protocol
GW
Gateway
H
Half duplex
Two-way transmission where data can only travel in one direction at a time.
I
I/O
Input/Output
ICP
Interconnection panel
IEC
International Electrotechnical Commission
or
Incoming Error Count
IEC 825
International Electrotechnical Commission Laser Products Safety Standard
IEEE
Institute of Electrical and Electronics Engineers, Inc.
IETF
Internet Engineering Task Force
Committee concerned with short and medium term standards regarding the Internet.
IM
Installation Manual
INF_20B
Input Filter Module for BG-20B
IP
Internet Protocol
Network layer protocol in the TCP/IP stack originally defined in RFC 791, offering a
connectionless interhost service.
ITU-T
International Telecommunications Union Telecommunication
L
LACP
Link Aggregation Control Protocol
LAG
Link Aggregation Group
Lambda
WDM system channel assigned to a specific wavelength; sometimes used
interchangeably with wavelength.
LAN
Local Area Network
Communications network consisting of servers, workstations, network operating
system, and communications link serving users within a confined geographical area.
Widely used LAN technologies include Ethernet, FDDI, and Token Ring.
LAPS
Link Access Procedure for SDH
LCAS
Link Capacity Adjustment Scheme
Equivalent to IMA in ATM.
LCT
Local Craft Terminal
LCT-BGF
PC-based BG-40/BG-20 installation, maintenance, commissioning, and configuration
tool for field technicians
LightSoft
ECI Telecom's Network Management System.
Loopback
Diagnostic test returning the transmitted signal to the transmitting device after it has
passed through a network or across a particular link. The returned signal can then be
compared to the transmitted one. The discrepancy between the two helps trace the fault.
LOS
Loss Of Signal
Condition at the receiver/maintenance signal transmitted in the physical layer overhead,
indicating the receiving equipment has lost the signal.
M
M345_3
3 x E3/DS-3 Dslot module
MAC
Media Access Control
Sublayer of data link layer responsible for accessing a LAN.
or
Message Authentication Code
ME1_21
Electrical traffic daughter boards with 21 x E1 (2 Mbps) electrical interfaces
ME1_42
Electrical traffic daughter boards with 42 x E1 (2 Mbps) electrical interfaces
MET_L1
Ethernet L1 processing module with four 10/100BaseT interfaces
MIB
Management Information Base
Formal description of a set of network objects that can be managed by using SNMP.
MS
Main Slot
or
Manual Switch
or
Multiplex/Multiplexer Section - trail between and including two multiplex section trail
termination functions
MSP
Multiplex/Multiplexer Section Protection
MSPP
MultiService Provisioning Platform
MSTI
Multiple Spanning Tree Instance
MSTP
Multi Spanning Tree Protocol
MTTR
Mean Time To Repair
Mux
Multiplexer
Device merging several low-speed transmissions into one high-speed transmission, and
vice versa.
MXC20
Cross-connect Timing and Control Card for BG-20
MXC4X
Cross-connect, Timing, and Control Card
N
NE
Network Element
or
Near End
NEBS
Network Equipment Building System
NM
Network Management
NML
Network Management Layer
Highest management layer, over NEL and EML. Controls all main network
management functions (M.3010).
NMS
Network Management System
Between TMN and EMS in the management hierarchy.
NVM
Nonvolatile Memory
O
OADM
Optical Add/Drop Multiplexer
Receives simultaneous signals at different wavelengths sent down an optical fiber,
drops one, and adds a new signal at the same wavelength.
ODF
Optical Distribution Frame
OMD1
SDH daughter board with two STM-1 (155 Mbps) interfaces (either optical or
electrical)
OMS4
Optical SDH daughter board with one STM-4o (622 Mbps) interface (a pair of LC
optical connectors)
OPEX
Operational Expenditure
OPM
Optical Power Meter
or
Optical Performance Monitor
Orderwire
Dedicated voice channel for maintenance supported by overhead bytes E1/E2.
OW
Orderwire
P
P RS
Provider's core RS
P345_3
Electrical traffic card with 3 x E3/DS-3 (34 Mbps/45 Mbps) electrical interfaces
PCM
Pulse Code Modulation
PDH
Plesiochronous Digital Hierarchy
PE RS
Provider's edge RS
PE1
Electrical traffic cards with 16/32 x E1 (2 Mbps) electrical interfaces
PPI
PDH Physical Interface
PRBS
Pseudo Random Binary Sequence
PS
Path Selector
Selects the path of signals arriving from primary and secondary nodes in two-node
interworking rings. One applies to MS-SPRing and the other to SNPC (G.842).
Q
QoS
Quality of Service
Ability to define a level of performance in a communications system.
R
RAP
Rack Alarm Panel
RDI
Remote Defect Indication
Formerly FERF.
RDR
Remote Data Replicator
RFI
Remote Failure Indication
or
Radiofrequency Interference
Ring
Collection of nodes forming a closed loop whereby each node is connected to two
adjacent nodes via a duplex communications facility.
Ring topology
Layout scheme in which the network forms a closed loop with the devices attached into
the ring.
RS
Regenerator Section
RSTP
Rapid Spanning Tree Protocol
Rx
Receive, Receiver, Reception
S
SC
Subscriber Connection
SCSI
Small Computer System Interface
SDH
Synchronous Digital Hierarchy
Hierarchical set of digital transport structures standardized for the transport of suitably
adapted payloads over physical transmission networks.
SES
Severely Errored Second
SFP
Small Form Factor Pluggable
SLA
Service Level Agreement
SM10
Intelligent PCM card with high flexibility composed of a base card supporting eight E1
interfaces and the main 1/0 cross connect, three common slots for interface modules,
and one special slot for an Ethernet-over-PDH interface module
SNCP
Subnetwork Connection Protection
SOH
Section Overhead
SQL
Structured Query Language
ST
Spanning Tree
STA
STP Algorithm
STM
Synchronous Transfer Mode
or
Synchronous Transport Module
Structure in SDH transmission hierarchy. STM-1 is the SDH base level transmission
rate, 155.52 Mbps. Higher rates include STM-4, STM-16, STM-64, and STM-256.
STM-1
Synchronous Transport Module 1, 155.52 Mbps
STM-16
Synchronous Transport Module 16, 2488.32 Mbps
STM-256
Synchronous Transport Module 256, 39813.12 Mbps
STM-4
Synchronous Transport Module 4, 622.08 Mbps
STM-64
Synchronous Transport Module 64, 9953.28 Mbps
STP
Spanning Tree Protocol
T
TCP/IP
Transmission Control Protocol/Internet Protocol
Common name for the suite of protocols developed by the US Department of Defense
in the 1970s to support the construction of worldwide internetworks. TCP and IP are
two of the best-known protocols in the suite. TCP corresponds to Layer 4 (transport) of
the OSI reference model and provides reliable transmission of data. IP corresponds to
Layer 3 (network) of the OSI reference model and provides connectionless datagram
service.
TM
Terminal Multiplexer
or
Transverse Magnetic
or
Transmission Matrix
TMN
Telecommunications Management Network
Management network interfacing with a telecommunications network at several points
in order to receive information and control its operation.
TRP
Transponder
TTL
Transistor-Transistor Logic
or
Time To Live
Number of NEs DCC packets can pass through before being terminated.
Twisted pair
Two insulated copper wires twisted together, with twists/lays of varying length to
reduce potential signal interference between the pairs. The most common medium for
electrically connecting phones, computers, and terminals.
Tx
Transmission/Transmitter/Transmit
U
Unidirectional
Operating in one direction only.
V
VC
Virtual Container
SDH defines a number of containers, each corresponding to an existing plesiochronous
rate. Information from a plesiochronous signal is mapped into the relevant container
along with control information known as the path overhead.
VC-12
Virtual Container 12, 2.048 Mbps (used on low-order path)
VC-3
Virtual Container 3 (used on low-order path)
VC-4
Virtual Container 4 (used on high-order path)
VCG
VC Group
VDF
Voice-frequency Distribution Frame
Virtual Machine
Used to support Cross-EMS functionality for LightSoft clients
VLAN
Virtual Local Area Network
VPN
Virtual Private Network
W
WAN
Wide Area Network
Physical or logical network enabling independent devices to communicate with each
other over a common transmission interconnected topology in geographic areas larger
than those served by local area networks.
X
XC
Cross Connect
xDDF-21
21 E1s DDF with balanced-to-unbalanced conversion
I M
IDPROM Data 3-8 Maintaining
Importing Client Trail XCs 7-13
Importing Trails from a File 7-24 Server Trail XCs 7-4
Installation Overview 2-1, 3-1 Maintenance
Installing AIS/PRBS/RDI Operations 12-5
LCT-BGF 2-1, 2-2 Clearing NE Configuration 12-9
L Connectivity Test 14-64
Fan 12-20
LACP 6-93, 6-95
Laser 12-19
Laser Maintenance 12-19
Loopbacks 12-2, 14-62
LCT-BGF
Maintenance List 12-1
Boot Configuration Tool 3-1
Other 12-17
Configuring Parameters 3-4, 4-4
Power 12-21
Getting Started Overview 4-1
Remotely Logging in to NE 12-17
Hardware and Software Requirements
1-2 Saving NE Configuration Data 12-9
Installation Overview 2-1 Software Upgrades and Maintenance
12-11, 14-66
Installing 2-1, 2-2
Viewing the Run Time 14-59
Logging In 3-2, 12-17
Managing
Master Mode 11-1, 11-2
BG-20 Special Cards 6-6
Monitor Mode 11-1, 11-2
Current Alarms 9-1, 14-47
Overview 1-1
Ethernet 6-10, 6-37, 6-56, 6-96
Starting the GUI 4-2
External Alarms 9-20
System Components 1-2
FE_L12 Attributes 6-10
Work Mode 11-1, 11-2
FE_L12 Ethernet Layer 2 Attributes
Licenses 6-37
Control Mechanism 15-2 Historical Alarms 9-8, 14-47, 14-52
Control Workflow 15-3 SAM1/4 Interface 6-8
Format 15-4 SM_10E XCs 14-41, 14-44
Managing 15-1, 15-6 SM10 XCs 14-35, 14-37
Overview 15-1 VPN Services 6-67
Link Aggregation 6-90, 6-93, 6-95 Masking Alarms 9-11, 14-54
Logging In Master Mode 11-1, 11-2
Remotely to NE 12-17 Monitor Mode 11-1, 11-2
To LCT GUI 3-2
Loopbacks 12-2, 14-62
S T
SAM1/4 Interface 6-8 Timing
Saving Calibrating the Clock Card Frequency
NE Configuration Data 12-9, 14-31 8-6
Security 11-1 Configuring 8-1, 14-28
Serial Port Close Flag 3-10 Configuring Synchronous Timing
8-2, 8-3
Server Trails
Overview 8-1
Configuring 7-1
Viewing the Clock Work Mode 8-5,
Creating Manually 7-1 14-30
Deactivating 7-7 Trace MAC Address 6-84
Deleting 7-8 Trails
Filtering 7-9 Deleting 7-8, 7-16
Maintaining Cross Connections 7-4 Exporting as a File 7-22
Setting Filtering 7-9, 7-17
Alarm Preset Switch 9-17 Importing from a File 7-24
Card Maximum Traffic 5-6 Trap Manager Table 13-7
NE Attributes 5-3
U
NE Time 5-2
Performance Thresholds 10-8 Uploading
SM_10E Card Attributes 14-17, SM10 Configuration Data 14-31
14-22, 14-25 XCs 7-25, 14-31, 14-38, 14-45
SM10 Card Attributes 14-7, 14-14
V
SM_10E Card 14-2
V.35 5-18
SM10 Card 14-1, 14-2, 14-4, 14-59
vFIB
SNCP 7-20
Configuring 6-46, 6-81
SNMP 13-9
Configuring Aging Time 6-46
Software Requirements 1-2
Configuring Static vFIB Table 6-47
Software Upgrade 12-11, 14-66
Configuring the Port Lock 6-48,
Starting
6-88
LCT GUI 4-2
Flushing 6-47, 6-83
Static IP Routes 4-6
Viewing
Static vFIB Table 6-47
Alarm Severity 14-56
System Components 1-2
Card Information 6-5, 14-7
System Maintenance 14-59
Clock Mode 8-5, 14-30