Académique Documents
Professionnel Documents
Culture Documents
System
V100R002C01
Product Description
Issue
05
Date
2010-11-19
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website:
http://www.huawei.com
Email:
support@huawei.com
Issue 05 (2010-11-19)
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
iii
iv
Issue 05 (2010-11-19)
Contents
Contents
About This Document...................................................................................................................iii
1 Positioning and Benefits...........................................................................................................1-1
1.1 Network Position.............................................................................................................................................1-2
1.1.1 Network Management Trend.................................................................................................................1-2
1.1.2 Product Orientation................................................................................................................................1-2
1.2 Product Characteristics....................................................................................................................................1-3
1.3 Manageable Equipment...................................................................................................................................1-6
2 System Architecture...................................................................................................................2-1
2.1 Software Structure...........................................................................................................................................2-2
2.1.1 Software Structure of the U2000 Single-Server System........................................................................2-2
2.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby)....................................................2-3
2.2 External Interfaces...........................................................................................................................................2-4
2.2.1 NBI.........................................................................................................................................................2-5
2.2.2 SBI........................................................................................................................................................2-13
3 Configuration Requirements...................................................................................................3-1
3.1 Hardware Configuration of the U2000 Server................................................................................................3-2
3.2 Software Configuration of the U2000 Server.................................................................................................3-3
3.3 Configuration of the U2000 Client..................................................................................................................3-5
Contents
5 Basic Functions...........................................................................................................................5-1
5.1 Overview of Functions and Features...............................................................................................................5-3
5.2 Security Management......................................................................................................................................5-4
5.3 Topology Management................................................................................................................................... 5-9
5.4 Alarm Management.......................................................................................................................................5-15
5.5 Performance Management.............................................................................................................................5-29
5.6 Inventory Management.................................................................................................................................5-34
5.7 Log Management...........................................................................................................................................5-36
5.8 Database Management..................................................................................................................................5-39
5.9 NE Communication Parameter Management................................................................................................5-41
5.10 DCN Management.......................................................................................................................................5-42
5.11 NE Software Management..........................................................................................................................5-42
5.12 Report Management....................................................................................................................................5-43
5.13 System Monitoring......................................................................................................................................5-46
Issue 05 (2010-11-19)
Contents
15 Reliability................................................................................................................................15-1
15.1 Reliability Design........................................................................................................................................15-2
15.2 Reliability Indicator.....................................................................................................................................15-3
15.3 HA System..................................................................................................................................................15-3
15.4 DCN Protection...........................................................................................................................................15-4
15.5 Disk Mirroring.............................................................................................................................................15-5
15.6 Data Backup................................................................................................................................................15-5
16 Performance Indicators.........................................................................................................16-1
17 Management Capability.......................................................................................................17-1
17.1 NE Equivalent Coefficient..........................................................................................................................17-2
17.1.1 Equivalent NEs in the Transport Domain..........................................................................................17-3
17.1.2 Equivalent NEs in the IP Domain......................................................................................................17-6
17.1.3 Equivalent NEs in the Access Domain..............................................................................................17-9
17.2 Management Capabilities of the U2000 on Different Hardware Platforms..............................................17-10
17.3 Manageable Equipment.............................................................................................................................17-14
17.3.1 Manageable MSTP Series Equipment..............................................................................................17-15
Issue 05 (2010-11-19)
vii
Contents
18 Standards Compliance..........................................................................................................18-1
A Glossary and Abbreviations..................................................................................................A-1
viii
Issue 05 (2010-11-19)
Figures
Figures
Figure 1-1 Position of the U2000 in the TMN hierarchy.....................................................................................1-3
Figure 1-2 Centralized network management...................................................................................................... 1-4
Figure 2-1 U2000 software structure....................................................................................................................2-2
Figure 2-2 Veritas hot standby HA system (Solaris) software structure..............................................................2-3
Figure 2-3 Veritas hot standby HA system (Windows) software structure..........................................................2-4
Figure 2-4 Functions of external interfaces..........................................................................................................2-5
Figure 4-1 Centralized deployment of the single-server system..........................................................................4-3
Figure 4-2 Centralized deployment of the HA system.........................................................................................4-4
Figure 4-3 Example network in inband networking mode...................................................................................4-5
Figure 4-4 Example network in outband networking mode.................................................................................4-6
Figure 4-5 Unified management of network products......................................................................................... 4-8
Figure 4-6 Network management solution for a single metro network..............................................................4-10
Figure 4-7 SingleBackhaul solution...................................................................................................................4-13
Figure 4-8 Network management solution for a single backbone network........................................................4-17
Figure 4-9 Networking application of the FTTx access network management.................................................4-19
Figure 4-10 FTTx predeployment flow..............................................................................................................4-20
Figure 4-11 FTTx fault diagnosis (1).................................................................................................................4-22
Figure 4-12 FTTx fault diagnosis (2).................................................................................................................4-22
Figure 4-13 PnP function of the MDU after replacement..................................................................................4-24
Figure 4-14 Implementation of the dual homing protection..............................................................................4-24
Figure 4-15 Implementation of the fast service cutover.....................................................................................4-25
Figure 5-1 Basic functions of the U2000............................................................................................................. 5-1
Figure 5-2 Security management overview..........................................................................................................5-4
Figure 5-3 Right................................................................................................................................................... 5-5
Figure 5-4 RADIUS-based user authentication....................................................................................................5-8
Figure 5-5 LDAP user authentication.................................................................................................................. 5-9
Figure 5-6 Topology view and its functions......................................................................................................5-10
Figure 5-7 Alarm display in the topology view.................................................................................................5-12
Figure 5-8 Illustration of automatic topology discovery....................................................................................5-13
Figure 5-9 Clock view and its functions............................................................................................................5-14
Figure 5-10 Relationships between alarm states................................................................................................5-17
Figure 5-11 Alarm reporting and handling flowchart........................................................................................5-17
Figure 5-12 Alarm panel....................................................................................................................................5-18
Issue 05 (2010-11-19)
ix
Figures
Issue 05 (2010-11-19)
Tables
Tables
Table 2-1 NBI functions supported by transport equipment................................................................................2-6
Table 2-2 NBI functions supported by access equipment....................................................................................2-6
Table 2-3 NBI functions supported by IP equipment...........................................................................................2-7
Table 3-1 Configuration requirements of the U2000 servers that manage networks of different scales ............ 3-2
Table 3-2 Recommended configurations of the disk array...................................................................................3-2
Table 3-3 System software of the U2000.............................................................................................................3-3
Table 3-4 High availability software....................................................................................................................3-4
Table 3-5 Software Configurations of the U2000................................................................................................3-5
Table 3-6 Hardware and software configuration requirements of the U2000 client............................................3-5
Table 4-1 Deployment modes of the U2000........................................................................................................ 4-2
Table 4-2 Relationships between faults and their causes that are identified by means of the alarm-based root cause
identification........................................................................................................................................................4-23
Table 5-1 Overview of functions and features of the U2000............................................................................... 5-3
Table 5-2 Alarm severity....................................................................................................................................5-15
Table 5-3 Alarm display functions.....................................................................................................................5-19
Table 5-4 Alarm function...................................................................................................................................5-20
Table 5-5 Performance monitoring templates....................................................................................................5-31
Table 5-6 Statistical items for resource inventory management........................................................................5-35
Table 5-7 Resource Report.................................................................................................................................5-44
Table 9-1 Types of PTN service interfaces..........................................................................................................9-3
Table 15-1 Reliability indicators of the U2000..................................................................................................15-3
Table 15-2 Data backup......................................................................................................................................15-5
Table 16-1 Performance indicators.....................................................................................................................16-1
Table 16-2 DCN bandwidth requirements..........................................................................................................16-2
Table 17-1 Management capabilities of the U2000 on different OptiX NE Equivalents...................................17-3
Table 17-2 Management capabilities of the U2000 on different IP NE Equivalents.........................................17-6
Table 17-3 Management capabilities of the U2000 on different access NE Equivalents................................17-10
Table 17-4 Management capabilities of the U2000 on different hardware platforms......................................17-11
Table 17-5 Manageable MSTP series equipment.............................................................................................17-15
Table 17-6 Manageable WDM equipment.......................................................................................................17-17
Table 17-7 Manageable NA WDM equipment................................................................................................17-18
Table 17-8 Manageable submarine line equipment..........................................................................................17-19
Table 17-9 Manageable RTN equipment.........................................................................................................17-19
Table 17-10 Manageable PTN series equipment..............................................................................................17-20
Issue 05 (2010-11-19)
xi
Tables
xii
Issue 05 (2010-11-19)
Issue 05 (2010-11-19)
1-1
The development of the all-IP architecture is a leading factor in the transition from the
existing vertical network that is divided by technology and service to the flattened
horizontal network.
To be oriented to the future network development trend, the U2000 combines all-IP and FMC
and manages bearer and access equipment in a centralized manner.
l
The U2000 can perform not only integrated management of multi-domain equipment but
also integrated management at the element and network management layers. The U2000
has revolutionized the layer-based management mode to meet the management
requirements in the transition from the existing vertical network to the flattened horizontal
network.
The U2000 is a unified network management system (NMS) of multiple domains and it
aims to minimize operation and maintenance (O&M) costs for customers and to bring more
network benefits.
Issue 05 (2010-11-19)
Issue 05 (2010-11-19)
1-3
1-4
The loose coupling framework supports the independent upgrade and maintenance of
subsystems.
Issue 05 (2010-11-19)
Visualized Management
l
Service supervision:
Supports service-centered visualized supervision and the function of querying affected
services by alarm.
Provides abundant detection and diagnosis methods based on services to quickly check
service connectivity and locate faults.
Supports service-based performance query, threshold pre-warning, and trend analysis
in the GUI.
Service deployment:
Provides templates to set service-related parameters once instead of setting parameters
repeatedly.
Supports bulk deployment of services, increasing the configuration efficiency.
Calculates static routes and allocates labels automatically, without manual intervention.
Object relationship:
Associates services with tunnels and tunnels with routes. Hierarchical object
relationships represent the bearer relationships explicitly.
Provides bearer relationships to quickly locate and rectify faults.
Network-wide clock:
Supports the automatic discovery of clocks (1588 clock, synchronous Ethernet clock,
and SDH clock) and addition of the clocks to the clock topology view.
Provides the unified topology view of network-wide clocks and refreshes the tracking
relationships and synchronization status of the clocks when faults occur in networks.
Monitors clock status and displays clock alarms, tracking relationships, and protection
status in real time.
Supports E2E TDM service provisioning and management across traditional microwave
and MSTP networks, which speeds up network deployment and service provisioning of a
large number of microwave services.
Supports E2E packet service provisioning and management across IP microwave and PTN/
Hybrid MSTP networks, which accelerates service provisioning in an IP network.
Issue 05 (2010-11-19)
1-5
Supports Ethernet, CES, and ATM service management for PTN, MSTP, RTN, SW, and
NE40 devices, and supports E2E management of MPLS tunnels and PWs, which push the
fixed market towards fixed-mobile convergence (FMC).
Supports E2E service (Ethernet, CES, and ATM) provisioning across PTN and CX
networks, and supports E2E management of MPLS tunnels and PWs, which push the
mobile market towards FMC.
1-6
Issue 05 (2010-11-19)
2 System Architecture
System Architecture
Issue 05 (2010-11-19)
2-1
2 System Architecture
2-2
Issue 05 (2010-11-19)
2 System Architecture
Issue 05 (2010-11-19)
2-3
2 System Architecture
The Veritas volume replicator (VVR) is used to duplicate the U2000 data on the primary
site to the secondary site so that data is synchronized between the primary and secondary
sites in real time.
The Veritas cluster server (VCS) is used to monitor the system and application service in
real time. When a fault occurs in hardware or software, the VCS restarts or stops the
application service.
The Veritas volume manager (VxVM) is used to manage the disks and data volumes of
servers.
2-4
Issue 05 (2010-11-19)
2 System Architecture
2.2.1 NBI
The U2000 offers extensive network monitoring information, such as alarms, performance
statistics, and inventory information, for OSSs through northbound interfaces (NBIs). The NBIs
support network management functions, such as service provisioning and diagnosis test.
Through the NBIs, the U2000 can integrate with different OSSs flexibly.
2.2.2 SBI
Using the southbound interface (SBI), the U2000 can connect to NEs and manage them. The
U2000 supports the following SBIs: SNMP, CLI, Qx, SSH, and Telnet SBIs.
2.2.1 NBI
The U2000 offers extensive network monitoring information, such as alarms, performance
statistics, and inventory information, for OSSs through northbound interfaces (NBIs). The NBIs
support network management functions, such as service provisioning and diagnosis test.
Through the NBIs, the U2000 can integrate with different OSSs flexibly.
NOTE
Supported
Issue 05 (2010-11-19)
2-5
2 System Architecture
Not supported
The equipment of each product domain supports different NBI functions. For details, see the
following tables.
Table 2-1 NBI functions supported by transport equipment
Interfa
ce
Feature
MSTP
Hybir
d
MSTP
WDM
OTN
TDM
RTN
Packet
RTN
Marin
e
XML
Alarm
Performa
nce
Inventory
Service
provisioni
ng
Alarm
Performa
nce
Inventory
Service
provisioni
ng
SNMP
Alarm
FTP
Performa
nce
TL1
Inventory
Service
provisioni
ng
Diagnosis
test
CORB
A
Custom
er OSS
Test
2-6
Interface
Feature
DSLAM
GPON/FTTx
XML
Alarm
Issue 05 (2010-11-19)
Interface
2 System Architecture
Feature
DSLAM
GPON/FTTx
Performance
Inventory
Service provisioning
Alarm
Performance
Inventory
Service provisioning
SNMP
Alarm
FTP
Performance
TL1
Inventory
Service provisioning
Diagnosis test
CORBA
Feature
NE
CX
Switch
PTN
XML
Alarm
Performance
Inventory
Service
provisioning
Alarm
Performance
Inventory
Service
provisioning
SNMP
Alarm
FTP
Performance
TL1
Inventory
Service
provisioning
CORBA
Issue 05 (2010-11-19)
2-7
2 System Architecture
Interface
Feature
NE
CX
Switch
PTN
Customer
OSS Test
Diagnosis
test
Alarm management
Alarm reporting
Synchronization of active alarms
Alarm acknowledgment
Alarm unacknowledgment
Collection of alarm statistics
Performance management
Query of history performance data
Query of current performance data
Reporting of performance threshold-crossing events
Query of performance threshold-crossing events
Inventory management
Query of physical inventory, such as NEs, shelves, slots, boards, and physical ports
Query of logical inventory, such as logical ports, fibers or cables, tunnels, and services
Export of inventory data and reporting of changes in inventory
Alarm management
Alarm reporting
Synchronization of active alarms
Alarm acknowledgment
Alarm unacknowledgment
Collection of alarm statistics
Inventory management
Query of IP DSLAM inventory (ADSL ports, SHDSL ports, and templates)
2-8
Issue 05 (2010-11-19)
2 System Architecture
Alarm management
Alarm reporting
Synchronization of active alarms
Alarm acknowledgment
Alarm unacknowledgment
Collection of alarm statistics
Performance management
Query of history performance data
Query of current performance data
Reporting of performance threshold-crossing events
Query of performance threshold-crossing events
Inventory management
Query of physical inventory, such as NEs, shelves, slots, boards, and physical ports
Query of logical inventory, such as logical ports, fibers or cables, tunnels, and services
Export of inventory data and reporting of changes in inventory
QoS management
Alarm management
Alarm reporting
Synchronization of active alarms
Alarm acknowledgment
Alarm unacknowledgment
Issue 05 (2010-11-19)
2-9
2 System Architecture
Performance management
Query of history performance data
Query of current performance data
Reporting of performance threshold-crossing events
Query of performance threshold-crossing events
Inventory management
Query of physical inventory, such as NEs, shelves, slots, boards, and physical ports
Query of logical inventory, such as logical ports, fibers or cables, and trails
Alarm management
Alarm reporting
Synchronization of active alarms
Alarm acknowledgment
Alarm unacknowledgment
Collection of alarm statistics
Alarm management
Alarm reporting
Synchronization of active alarms
Alarm acknowledgment
2-10
Issue 05 (2010-11-19)
2 System Architecture
Alarm unacknowledgment
Collection of alarm statistics
l
SNMP NBI
Complying with the SNMP v1/v2c/v3 standard, the SNMP NBI enables the U2000 to provide
unified alarm management for OSSs.
The SNMP NBI supports the following functions:
l
Alarm reporting
Alarm acknowledgment
Alarm unacknowledgment
TL1 NBI
Complying with the GR 831 standard, the TL1 NBI enables the U2000 to provide service
provisioning (xDSL, xPON, broadband, and narrowband services), inventory query, and
inventory provisioning in the access domain for OSSs.
The TL1 NBI supports the following functions:
l
Issue 05 (2010-11-19)
2-11
2 System Architecture
2-12
Issue 05 (2010-11-19)
2 System Architecture
Loopback diagnosis test performed at the central office end on the user port
OAM test
2.2.2 SBI
Using the southbound interface (SBI), the U2000 can connect to NEs and manage them. The
U2000 supports the following SBIs: SNMP, CLI, Qx, SSH, and Telnet SBIs.
Qx Interface
Qx interfaces are simplified interfaces based on the Q3 interfaces defined in ITU-T
recommendations. They are used for private communications. Qx interfaces use a protocol based
on standard TCP/IP packets. Qx interfaces support data transmission over media such as in-band
DCCs or ECCs and out-of-band channels, featuring low overheads, standard structures, and high
efficiency. Qx interfaces are classified into Qx4 interfaces and Qx5 interfaces (Qx4 is the earlier
version). Qx4 interfaces are used for managing the OptiX 2500+ and earlier transport equipment;
Qx5 interfaces are used for managing transport equipment later than the OptiX 2500+. The
U2000 can adapt to various protocols.
The U2000 uses Qx interfaces to connect and manage transport equipment, such as MSTP,
WDM, RTN, PTN, and OTN equipment.
SNMP SBI
The SNMP SBI is used to connect and manage SNMP equipment.
The U2000 supports the SNMP SBI that complies with the SNMP v1/v2c/v3 standard. Through
the SNMP SBI, the U2000 can be connected to Huawei routers, switches, and security access
equipment.
SNMP is a TCP/IP-based network management protocol at the application layer. SNMP uses
the UDP protocol at the transmission layer. Through the SNMP SBI, the U2000 can manage the
network equipment that supports proxy processes.
Similar to Telnet, Secure Shell (SSH) is also a TCP/IP-based network management protocol
at the application layer. The SSH protocol, however, transmits encrypted data. Using the
TCP protocol at the transmission layer, the SSH protocol encrypts data at the application
layer. The SSH protocol ensures the security of network communications by means of
authentication, encryption, and authorization. The SSH protocol supports authentication
by password and RSA. In addition, the SSH protocol transmits compressed data, which
speeds up the transmission.
Issue 05 (2010-11-19)
2-13
2 System Architecture
TFTP/FTP/SFTP SBI
The TFTP, FTP, and SFTP SBIs are used for backing up NE data, upgrading NE software, and
loading patches. TFTP, FTP, and SFTP are TCP/IP-based network management protocols at the
application layer and are dependent on the UDP protocol.
l
Trivial File Transfer Protocol (TFTP) is a basic and standard protocol that requires least
extra overheads, as compared with FTP and SFTP, to upload and download files. The TFTP
protocol does not support password configuration and transfers file contents in plain text.
File Transfer Protocol (FTP) is a set of standard protocols used for transferring files on
networks. The FTP protocol transfers passwords and file contents in plain text.
SSH FTP (SFTP) uses the SSH protocol to provide secure file transfer and processing. For
data backup using the SFTP protocol, passwords and data are encrypted during
transmission.
Syslog SBI
The Syslog SBI serves as an interface for the U2000 to receive system logs from NEs. With the
Syslog SBI, the U2000 can manage NE logs.
2-14
Issue 05 (2010-11-19)
3 Configuration Requirements
Configuration Requirements
Issue 05 (2010-11-19)
3-1
3 Configuration Requirements
Configuration Principles
l
If multiple configuration schemes can meet the requirements of the current network scale,
determine the specific hardware configurations according to the requirements of customers.
Configuration Requirements
Table 3-1 Configuration requirements of the U2000 servers that manage networks of different
scales
Network Scale
Small-scale
network: less than
2000 equivalent
NEs
Medium-scale
network:
2000-6000
equivalent NEs
Large-scale
network:
6000-15000
equivalent NEs
PC Server
(Windows)
HP DL380G6 (CPU:
2 x Xeon quatri-core
2.0 GHz or later;
memory: 8 GB; hard
disk: 5 x 146 GB)
HP DL580G5 (CPU:
4 x Xeon quatri-core
2.13 GHz or later;
memory: 16 GB;
hard disk: 4 x 146
GB)
Server (Solaris)
Server Type
Capacity
OceanStor S2600
6 x 300 GB
You need to determine hardware configurations according to the network scales and the
management capacities of the NMSs based on different hardware platforms.
3-2
Issue 05 (2010-11-19)
3 Configuration Requirements
NOTE
If the HA system is applied, you need to multiply the hardware quantity by 2. For example, if the current
large-scale network applies the HA system, the following hardware requirements need to be met:
l
Configuration Principles
The software for the U2000 server is as follows:
l
System software: It includes the operating system software and database software. To select
the required system software, see 3.1 Hardware Configuration of the U2000 Server.
High availability software: It refers to the Veritas software that is applicable to only the
high availability system.
NMS software: It refers to the software developed by Huawei. The NMS software in this
document refers to the U2000 software.
Configuration Requirements
The U2000 can run on multiple OSs, including Windows, Solaris. Table 3-3 lists the
configuration standards of the system software.
Table 3-3 System software of the U2000
Item
Software
Platform
Software
Type
Version
Supported OS
Language
Delivered
software
platform
x86 (Windows
32 bit)
OS
Windows
Server 2003 R2
Enterprise +SP2
Chinese
SPARC (Solaris
64 bit)
Compatible
software
platform
Issue 05 (2010-11-19)
x86 Windows
(32 bit)
Database
SQL Server
2000 Standard +
SP4
OS
Solaris 10
(10/08) +
Huawei Patch
9.0.1
Database
Sybase 15.0.3
with EBF16476
+ EBF16548
OS
Windows
Server 2003
Standard
English
3-3
3 Configuration Requirements
Item
Software
Platform
Software
platform no
longer
supported
Software
Type
Version
Database
SQL Server
2000 Standard
SPARC (Solaris
64 bit)
OS
Solaris 10
Database
Sybase 12.5
x86 Windows
(32 bit)
OS
Windows 2000
Server
Database
MS SQL Server
7.0 or SQL
Server 2000
OS
Solaris 8
Database
Sybase 12.0
SPARC (Solaris
32 bit)
Supported OS
Language
Solaris
Windows
3-4
Issue 05 (2010-11-19)
3 Configuration Requirements
Typical Configuration
U2000
software
Hardware Configuration
Software Configuration
Windows
l Recommended
configuration: Intel E5200
(dual-core) (2.5 GHz or
greater); memory (2 GB or
greater)
Recommended OS:
Sun T5220
Solaris
Issue 05 (2010-11-19)
3-5
Issue 05 (2010-11-19)
4-1
Supporte
d
Platform
Requirem
ent on
Disaster
Recovery
Networki
ng
Complexi
ty
Centralized
deployment
scheme for a
single-server
system
l Windo
ws
Low
Simple
l The Windows-based
system supports a
medium-scale network
(2,000 to 6,000 equivalent
NEs).
l Solaris
l Windo
ws
High
Simple
l Solaris
l The Windows-based
system supports a
medium-scale network
(2000 to 6000 equivalent
NEs).
l The Solaris-based system
supports an ultra-largescale network (15,000 to
20,000 equivalent NEs).
Issue 05 (2010-11-19)
NMS Client
......
......
NMS Server
Issue 05 (2010-11-19)
4-3
Ethernet Port
Secondary Site
Diskarray (Optional)
Diskarray (Optional)
Router
Router
Switch
Ethernet Port
Switch
DCN
GNE
NMS Client
Issue 05 (2010-11-19)
Networking Description
The equipment managed by the U2000 is all connected to the managed network. The U2000
needs to be connected to only the nearby equipment on the managed network. After configuring
the related routes, you can manage all the equipment on the network.
The way of connecting the U2000 with the managed network depends on the distance between
the U2000 and its nearby equipment. If the U2000 and its nearby equipment are in the same
telecommunications room, you can connect them in LAN mode. If the U2000 and its nearby
equipment are far from each other, you can connect them in private line mode. In this case, the
private line mode is similar to the outband networking mode.
l
Networking advantages: The inband networking mode is flexible and cost-effective. It does
not need extra equipment.
Networking disadvantages: When a fault occurs in the network, the communication channel
between the U2000 and its managed network is broken. As a result, you cannot maintain
the managed network on the U2000.
Issue 05 (2010-11-19)
4-5
Networking description
The equipment managed by the U2000 is all connected to the managed network. The U2000
connects with the equipment on the managed network through the DCN that is made up of other
equipment. In this manner, the U2000 manages the network and equipment.
l
Networking advantages: In outband networking mode, the U2000 is not connected to its
managed equipment directly but is connected to its managed equipment through other
equipment. Compared with the inband networking mode, this mode provides more reliable
equipment management channels. When managed equipment is faulty, the U2000 locates
information about the faulty equipment in a timely manner and monitors the equipment in
real time.
Issue 05 (2010-11-19)
The U2000 is the platform for managing access, transport, and datacom equipment. It
supports unified management of equipment across domains and also revolutionizes the
vertical management mode to support unified management at the element and network
management layers. In addition, the U2000 supports right- and domain-based management.
This feature enables the U2000 to manage the equipment in each domain respectively to
meet the requirements for managing different networks and departments without
interference.
The U2000 follows the network convergence trend and provides management solutions for
various networking scenarios. The U2000 has a uniform GUI style, which is simple and
convenient for service provisioning. Highly effective service monitoring and service
assurance ensure good user experience and cut the network O&M cost effectively.
The U2000 provides unified northbound interfaces (NBIs), thereby reducing the workload
of OSS integration.
Issue 05 (2010-11-19)
4-7
Network Deployment
l
Service Provisioning
The U2000 automatically creates a service after you click the source and sink. This function
ensures that new services can be provisioned quickly. Specifically, the time required for
provisioning services decreases from minutes to seconds and the efficiency of the configuration
on a per-NE basis is improved by 90%.
l
4-8
Issue 05 (2010-11-19)
Supports E2E service (Ethernet, CES, and ATM) provisioning across PTN and CX
networks, and supports E2E management of MPLS tunnels and PWs, which push the
mobile market towards FMC.
Service Assurance
The U2000 supports cross-domain fault location, which greatly improves the efficiency of
rectifying faults and ensures normal running of services.
l
Multiple network management systems (NMSs) and teams are combined into one NMS
and one team, thereby greatly improving the efficiency of rectifying faults.
Service-oriented alarm management helps to directly locate the base station that is affected
by an alarm and thus the efficiency of rectifying faults is improved by 50%.
Unified fiber management enables the U2000 to clearly display the fiber connections of
network-wide equipment. You can directly locate the equipment that a fiber is connected
to according to an alarm generated on the fiber.
Networking Diagram
Under the trend of all-service and super-broadband, the integration of mobile broadband and
fixed broadband speeds up, and operators tend to act as all-service operators. An integrated
super-broadband bearer network helps to quickly and flexibly deploy all services and greatly
reduce the TCO of the network. The construction of such a bearer network becomes a challenge
for operators.
Carrying multiple services is one of the most distinctive features of the Metro Ethernet. Services
such as the high-speed internet (HSI), IPTV, and voice over IP (VoIP) services must be
established on logical channels, as shown in Figure 4-6.
Issue 05 (2010-11-19)
4-9
The U2000 provides perfect solutions for single metro networks in terms of network deployment,
service deployment, and service assurance.
Network Deployment
The U2000 must meet the following requirements in the network deployment stage:
l
Service Deployment
The Metro Ethernet often carries heavy service traffic. To adapt to this feature, the U2000
provides the functions of deploying services in batches and quickly creating end-to-end services
to accelerate the deployment process.
4-10
Issue 05 (2010-11-19)
Service Assurance
The U2000 monitors the running status of the network 24 hours a day and 7 days a week in
multiple ways. It can detect network faults or degradation in a timely manner and report end-toend SLA data of the network.
The U2000 provides the following service assurance measures for the broadband bearer network:
l
Reduction of IP alarms
On the U2000, four technologies are used to reduce the great number of IP alarms, and the
number of alarms in typical scenarios is reduced by 85%.
Fault location
The U2000 can display network-wide routes and allows you to accurately diagnose service
faults layer by layer and hop by hop. Service faults can be located to specific NEs and
protocols, and the location duration is reduced from several hours to only several minutes.
Issue 05 (2010-11-19)
4-11
When a fault occurs, you can quickly locate and rectify the fault according to the bearing
relation.
l
4-12
Unified management of many types of devices: Fibers, microwaves, copper cables, and
Ethernet may function as media to carry services of mobile bearer networks. The
maintenance and management of various types of media challenge carriers.
End-to-end (E2E) service provisioning and QoS assurance: The OAM experience of
traditional SDH and MSTP networks must be inherited for the OAM of all-IP bearer
networks. In addition, all-IP networks need to be merged with connectionless bearer
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
networks. Therefore, carriers need to improve their capabilities in E2E service management
and QoS monitoring.
l
As shown in Figure 4-7, in mobile bearer networks, 2G and 3G services on the base station
(BS) side are transmitted through TDM-E1, IMA-E1, or FE ports and then carried over
E2E PWs. In addition, fixed networks and mobile networks are merged. Specifically, the
CX series equipment carries broadband services and the PTN equipment functions as the
mobile access service gateways at the two ends.
The U2000 provides solutions to the Network Deployment, Service Provisioning, and Service
Assurance of mobile bearer networks.
Network Deployment
One visit to site without field software commissioning
l
Issue 05 (2010-11-19)
The data communication network (DCN) becomes available automatically and the
U2000 searches for devices remotely. In this case, software commissioning engineers or
customer engineers do not need to visit sites and only hardware installation engineers need
to visit sites to install devices. That is, the devices do not require field software
commissioning.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4-13
The U2000 automatically searches for all NEs in a specified range and creates the NEs in
the Main Topology.
NEs that are searched out are displayed in a list, which helps you modify and maintain NE
properties in a unified manner.
The U2000 automatically searches for fibers in a specified range and creates the fibers in
the Main Topology.
Fast fiber search and creation. Automatic fiber search helps you create fibers quickly and
correctly and facilitates network construction.
Automatic network-side IP address assignment
l
With an increase in services, packet service cutover can quickly balance the service traffic
load between the RNC and base station controllers (BSCs).
To meet the requirements of frequent network adjustment, packet service cutover can
efficiently and correctly adjust services to reduce errors and service interruption.
Multiple types of fibers are supported, such as G.652, G.653, G.655, and the combination
of G.652 and G.655.
Mainstream WDM equipment from Huawei and many networking modes are supported.
For example, the chains, rings, intersecting rings, and mesh networks are supported.
4-14
Nodes can be added to a ring or link and the link capacity can be expanded.
Issue 05 (2010-11-19)
The entire process of network expansion can be assured. Specifically, network resources
are checked before network expansion, an automatic service rollback is triggered upon an
expansion failure, and a comparison report is generated after a successful network
expansion. This ensures a high reliability in network expansion and facilitates management.
Service Provisioning
E2E management and service provisioning
l
The E2E packet service provisioning and management of the IP microwave and PTN/MSTP
devices speeds up service provisioning on the IP network.
The E2E TDM service provisioning and management of the traditional microwave and
MSTP devices increases the efficiency in the network deployment and service provisioning
of a huge number of microwave devices.
E2E service provisioning on the network of the PTN equipment and CX equipment is
supported.
E2E packet service provisioning on the network of the PTN equipment and MSTP
equipment is supported.
The network of the OptiX RTN 910/950 and PTN equipment is supported and E2E CES
service provisioning can be performed on the mixed network.
Visualized tunnels.
Bulk deployment: The U2000 supports the bulk deployment of Metro Ethernet services to better
meet the requirements of deploying these services in a large number. Bulk deployment speeds
up service deployment.
Fast service provisioning: Configuration is applied to NEs quickly after you specify the source,
sink, and TE constraints. In addition, hops of working and protection trails are displayed in the
topology view.
Quick, accurate, and automatic service restoration. The U2000 provides an automatic service
restoration function that is easy to use. By using this function, only two steps are required to
restore network-side services to the E2E service configuration on the U2000. As a result, services
are quickly provisioned.
l
Services are automatically created after you specify the source and sink and select a routing
policy. In this case, service provisioning is efficient and errors are reduced.
Services can be created in batches, which achieves the fast provisioning of a large number
of services.
The creation and management of E2E services that traverse both microwave and MSTP
equipment are supported, which is unique in the industry.
Service Assurance
Service-based E2E OAM
l
Issue 05 (2010-11-19)
All OAM data are configured based on E2E services and you do not need to configure
OAM data for each node on an E2E trail separately.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4-15
Default parameters are provided and one-touch tunnel configuration is supported. Wizardbased Ethernet OAM is supported and a remote maintenance endpoint point (MEP) is
automatically generated.
E2E service diagnosis is supported and the diagnosis is not required on each node. This
helps to locate a fault quickly.
Fault information is collected during a diagnosis. The fault information helps analyze fault
causes quickly.
Clocks such as IEEE 1588v2 clocks, synchronous Ethernet clocks, and SDH clocks can be
auto-discovered in the topology view. In addition, network-wide clocks are displayed in a
unified topology view. In the topology view, the clock tracing status and clock
synchronization status are refreshed in real time when a network fault occurs.
The clock status is monitored in real time and the clock alarm, clock tracing status, and
clock protection are displayed in real time.
Relevant alarms are displayed in the E2E service management window when the network
is faulty and affects service provisioning.
You can view network-wide alarms on the U2000 client or Web browser after alarms are
generated.
4-16
The core layer uses the dual-plane structure and fully meshed connections are set up
between Ps.
Dual-homing connections are set up between convergence-layer equipment (PEs) and Ps.
The MPLS VPN is planned in a unified manner to perform isolation between users or
services.
Issue 05 (2010-11-19)
Network Deployment
The U2000 meets the following requirements in the network deployment stage:
l
End-to-end reliability
The U2000 supports the abilities to manage mainstream routing protocols such as OSPF,
IS-IS, and BGP, configure IGP (OSPF and IS-IS) fast convergence, and configure BFD,
VRRP, IP FRR, VPN FRR, and MPLS OAM to ensure service reliability.
Service Deployment
The U2000 provides the following functions to effectively and accurately deploy services:
l
Issue 05 (2010-11-19)
4-17
Supports the deployment of mainstream services (for example, L2VPN, L3VPN, and
PWE3 services) that are carried over tunnels, provides multiple service configuration
templates and batch configuration templates, and supports the automatic verification of
parameter settings.
Service Assurance
The U2000 provides the following service assurance measures for the single backbone network:
l
Issue 05 (2010-11-19)
a comprehensive solution for FTTx access devices to manage and maintain the OLT, ONU,
SBU, CBU, and ONT in a centralized manner.
In the FTTx access solution, a single fiber is used to provide voice, data, and video services. The
FTTx access solution meets the networking requirements for the fiber to the curb (FTTC), fiber
to the building (FTTB), fiber to the home (FTTH), base station transmission, IP private line
interconnection, and wholesale services. Figure 4-9 shows the networking application of the
FTTx access network management.
Figure 4-9 Networking application of the FTTx access network management
Network Deployment
In an FTTx network, the U2000 provides the ONU predeployment and remote acceptance
functions. By using the functions, you can improve the ONU deployment efficiency and reduce
the operational expenditure (OPEX).
l
The U2000 provides the ONU predeployment function. Before powering on an ONU, create
a corresponding virtual NE and configure service data on the U2000. After you power on
the ONU, the U2000 automatically applies the preset configuration to the ONU to complete
the service deployment. Therefore, the network predeployment and device installation can
be started at the same time. In this way, the time required for network construction is
reduced by half.
The U2000 provides the function of predeploying NEs by means of a sheet. By using this
function, you can import data of NEs to the U2000 in batches, thus installing the devices
Issue 05 (2010-11-19)
4-19
without software commissioning and performing remote acceptance. Engineers only need
to visit a site once. The plug and display (PnP) feature of the ONU is implemented.
Therefore, the deployment efficiency is greatly improved, and the network construction
cost is reduced.
l
The U2000 provides flexible authentication that works together with the preconfiguration
function to implement the PnP of the ONU. In this way, the installation cost is greatly
reduced. After you replace an ONU with a new one upon a fault, you only need to enter
the authentication information. Then, the U2000 automatically applies the configuration
data of the faulty ONU to the new ONU. You do not need to re-configure the new ONU.
The U2000 provides the remote acceptance function for the ONU. Specifically, the
U2000 automatically applies the preconfiguration data after the ONU goes online and
implement the remote service acceptance, if you create an acceptance task for the ONU
when it is offline.
The U2000 provides a solution to quick ONU deployment. With the solution, engineers only
need to visit a site once and complete the ONU deployment in five steps as follows:
1.
Plan data: With the Excel-based plan tool, you can easily copy and paste data. This function
is applicable to the configuration of a large amount of data.
2.
Perform offline deployment: Import Excel sheets that contain planned data to the U2000
and complete the offline pre-provisioning of services.
3.
4.
Activate services: Power on ONUs. The PnP features of the ONUs take effect.
5.
Perform remote acceptance: Engineers do not need to visit the site. Instead, NEs
automatically report acceptance results without manual intervention.
4-20
Issue 05 (2010-11-19)
Service Provisioning
The U2000 provides the following three convenient and fast service provisioning means. With
these means, you can fast provision the configuration data of FTTx NEs regardless of whether
the OSS is interconnected with the EMS.
l
Service Assurance
l
Issue 05 (2010-11-19)
4-21
4-22
Issue 05 (2010-11-19)
power-off of an ONU. In this way, the orders for useless field jobs are reduced.Table 4-2
shows how to identify the cause of a fault by means of the alarm-based root cause
identification.
Table 4-2 Relationships between faults and their causes that are identified by means of the
alarm-based root cause identification
Cause
Alarm Reported
From the OLT
Alarm Reported
From the ONU
U2000 Alarm
None
None
ONU power-off
Power-off alarm
with the ONU ID
Issue 05 (2010-11-19)
4-23
4-24
Issue 05 (2010-11-19)
Issue 05 (2010-11-19)
4-25
5 Basic Functions
Basic Functions
Security
management policy
Right- and domainbased management
NE user
management
Security of NE
access
NE license
management
Topology
management
Subnet
management
NE management
Card
management
Link
management
Fault
management
Performance
management
Network
management
Alarm severity
and status
Performance
handling process
MSTP network
management
Network-wide
alarm monitoring
Monitoring template
management
WDM network
management
Alarm
statistics
Monitored instance
management
RTN network
management
Alarm handling
Performance
data viewing
PTN network
management
Remote alarm
notification
Data lifecycle
management
Network performance
monitoring
Security network
management
Alarm correlation
analysis
Access network
management
5-1
5 Basic Functions
operations, and running, and supports the HA scheme and data backup to achieve an excellent
security solution.
5.3 Topology Management
In topology management, the managed NEs and their connections are displayed in a topology
view. You can learn the network structure and monitor the operating status of the entire network
in real time by browsing the topology view.
5.4 Alarm Management
When an exception occurs on a network, the U2000 needs to notify maintenance engineers of
the exception in a timely manner, so that the maintenance engineers will recover the network
efficiently.
5.5 Performance Management
The performance of a network may deteriorate because of internal or external problems and
faults may occur. The performance management function enables you to detect the deteriorating
tendency in advance and solve the potential threats so that faults can be prevented.
5.6 Inventory Management
The U2000 supports unified inventory management of physical resources and service resources
on the entire network. On the U2000, you can quickly and clearly view information about various
resources network-wide. The inventory information serves as a reference for service planning
and expansion planning.
5.7 Log Management
Logs record the information about operations performed on the U2000 and important events that
occur in the U2000. The U2000 allows administrators to query and save logs and collect statistics
on logs periodically. This facilitates detection of unauthorized logins and operations and fault
analysis. Specifically, by browsing and collecting statistics on logs, you can query the client
from which a U2000 user logs in to the U2000 server and query the operations performed by
the user after login. You can also dump and print logs. Logs also can record operations that the
OSS performs on NEs through NBIs.
5.8 Database Management
Database management involves the management of NE databases and U2000 databases, and
maintenance of data consistency between the U2000 and NEs.
5.9 NE Communication Parameter Management
The U2000 communicates with managed NEs successfully only after you correctly set the
connection parameters of the U2000 and the managed NEs.
5.10 DCN Management
DCN management is applicable to MSTP, WDM, microwave, submarine cable NEs.
5.11 NE Software Management
The NE software management module (called DC) is an independent subsystem of the U2000
and it is used to manage software and data on NEs. The DC enables you to back up NE data and
upgrade or downgrade NE software.
5.12 Report Management
The U2000 provides reports about alarms, logs, and resources. You can print the required data
or save the data as a file when viewing it. The reports in tabular format can be filtered by
equipment type and saved in XLS, TXT, HTML, or CSV files.
5.13 System Monitoring
The U2000 provides a GUI-based system monitoring tool, which is used to manage the
U2000 and query the system information.
5-2
Issue 05 (2010-11-19)
5 Basic Functions
Issue 05 (2010-11-19)
Function
or
Feature
Description
Unified
network
managem
ent
The U2000 provides the unified GUI-based management of Huawei NEs in the
transport, IP, and access domains. It is a unified network management system
(NMS) that offers comprehensive functions in managing NE alarms, network
alarms, security, performance, topology, logs, inventories, reports, and
databases. This function meets the requirements of network convergence and
rapid development of customer services.
Centraliz
ed task
managem
ent
NE
template
managem
ent
NE data
configura
tion and
managem
ent
License
managem
ent
NE license management allows users to query, apply for, install, and adjust NE
licenses (in case of capacity change and server change). By setting NE licenses,
users can perform functions as required. NE licenses also controls the validity
periods of and functions available to NEs. Users can view the status of NEs and
make adjustment accordingly in license management.
Client
auto
update
(CAU)
The CAU function enables the U2000 client to upgrade automatically through
the Internet provided that the U2000 server functions properly and communicates
successfully with the U2000 client.
Check
after the
upgrade
The U2000 can be upgraded smoothly without service interruption. After the
upgrade, the NE status, basic services, and routing relationships are checked and
a check report is generated. This helps to ensure the normal running of major
services immediately after the upgrade and achieve timely detection of issues
such as data loss.
5-3
5 Basic Functions
Function
or
Feature
Description
Online
Help
The Online Help is displayed if users press F1 when using the U2000. It provides
comprehensive help information and supports fast searches for information. The
help information is also available in offline mode.
5-4
Issue 05 (2010-11-19)
5 Basic Functions
NOTE
User Management
This feature is to assign NMS users the appropriate rights for management and maintenance
functions according to the O&M requirements when NMS users are planned.
l
User management: The U2000 uniquely identifies the login, operation, and management
rights of NMS users according to user names and passwords. Only one default user, user
admin, is provided after the U2000 is installed. User admin is a superuser and has all
operation and management rights. Other users are directly or indirectly created by user
admin.
The U2000 supports the creation, modification, and deletion of users.
The creation of users involves setting detailed information about users, the user group
to which a user belongs, the management domains, the operation rights, and the ACL.
User group management: The U2000 supports the creation, modification, and deletion of
user groups. The U2000 supports the function of creating a user group to manage users that
have the same rights and to bulk manage rights of NMS users, which reduces management
costs. After the management attributes of a user group are set and a user is added to the
user group, the user has all rights of the user group. A user can be added to multiple user
groups. In this case, the user has all the rights of the user groups as well as the rights that
are assigned to the user. The U2000 provides five default user groups: security management
group, operator group, administrator group, monitor group, and maintainer group.
Right Management
A right defines the operations that can be performed on managed objects. Different users have
different operation rights over different managed objects. The right elements include managed
objects and operation rights, as shown in Figure 5-3.
Figure 5-3 Right
Right management
Managed
objects
Operation rights(login,
operation, querying)
After NMS users are planned, the users can perform operations on NEs only after rights are
assigned to them.
l
Issue 05 (2010-11-19)
Management domain rights define the objects that can be managed by users or user groups,
and the range of the configuration data. For example, if user A is not authorized to manage
equipment C and object set D, equipment C and object set D are invisible to user A in the
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5-5
5 Basic Functions
topology view. An object set is a collection of multiple pieces of equipment. The U2000
supports the creation, modification, and deletion of object sets.
l
Operation rights define the operations that a user can perform. When multiple users manage
the same device or object set, they have different operation rights over the device if different
operation rights are assigned to them. An operation set is a collection of multiple rights.
Operation right management is implemented by managing the operation sets or specific
rights. If operation sets are assigned to users or user groups, they have rights that the
operation sets include. The U2000 supports the creation, modification, and deletion of
operation sets.
The U2000 also supports right- and domain-based management. Only the operations within
the rights of a user in a certain domain can be performed on NEs of this domain. Only
system administrator and members of the security management group can assign rights and
domains to other users.
Domain-based management refers to dividing equipment nodes, services, or data to
different domains. The administrators of different domains manage different objects
with the domain rights that are assigned to them. Meanwhile, certain NEs can be
assigned directly to a certain user.
Right-based management refers to domain-based authentication. Users and user groups
have different operation rights if they are assigned these rights. After dividing domains
and then dividing rights, the personnel with different duties or positions in the same
domain have different operation rights over different objects in the domain.
Local authentication: NMS user management, login authentication, and the security
strategy are all implemented by the U2000 server. Local authentication is the management
method of the login authentication by default. For the details, see Local Authentication.
RADIUS authentication: When a user logs into the U2000, the RADIUS server verifies
and authenticates the login request, and the U2000 assign rights to login users according
the rights that their user group has. For the details, see RADIUS-based Authentication.
LDAP authentication: When a user logs into the U2000, the LADP server verifies and
authenticates the login request, and the U2000 assign rights to login users according the
rights that their user group has. The LADP-based authentication is similar to the RADIUSbased authentication, but the authentication protocols are different. For details, see LDAPBased Authentication.
Local Authentication
In the local authentication mode, user security management ensures the secure running of the
U2000 in multiple aspects, including local user management, right management, password
policy, account policy, and login control.
l
5-6
Issue 05 (2010-11-19)
5 Basic Functions
Setting the validity period of the password, including the maximum and minimum
period validity of the password, the number of days warning given before the password
expiry.
Setting the rules for the forms of passwords.
l
The account policy involves the account validity period, minimum length of a user name,
automatic unlocking time, maximum number of login attempts, timeout period for a login
or unlocking failure, and user policy of no login within a period.
Login control involves the login mode, the login period control, and the IP address control.
User login mode specifies whether multiple users are allowed to log into the U2000 at
the same time. Usually, multiuser mode is adopted. If you need to perform special
operations on the U2000 server, you can set the user login mode to single-user mode,
avoiding interferences from the operations of other users.
Users can log in to the U2000 only in the specified login period.
The ACL controls the login IP addresses of clients. Users can log in to the U2000 server
only from certain IP addresses. Therefore, even if the user account and the password
are obtained by unauthorized users, these users cannot log in to the U2000 server, and
thus the U2000 security is improved.
RADIUS-Based Authentication
When the RADIUS authentication is adopted, the administrator does not need to create a user
account on the NMS in advance. The user account for logging in to the U2000 is an existing
account that can pass the authentication of the RADIUS server.
When a user enters the user name and password, the security process of the U2000 server sends
the user name and password to the RADIUS server. If the user passes the RADIUS
authentication, the security process learns the user group to which this user belongs, and then
the security process assigns rights to the user according to the operation set policy of the user
group.
NOTE
Before adopting the RADIUS authentication mode, make sure that the name of the user group defined on
the U2000 is the same as that defined in the account database of carriers. In addition, make sure that the
account to be authorized for logging in to the U2000 is added to the corresponding user group.
Issue 05 (2010-11-19)
5-7
5 Basic Functions
Security
NBI
User group
privilege
AAA agent
Security
server
RADIUS
server
User and
user group datebase
U2000 server
U2000 user
LDAP-Based Authentication
As a distributed client/server system protocol, LDAP is adopted in the VPN and WAN to control
the users' access to the network and prevent unauthorized users from accessing the networks.
The LDAP-based authentication mode is similar to the RADIUS-based authentication mode
except for different authentication protocols. Compared with the RADIUS authentication, the
LDAP authentication supports the following features:
l
Supporting common mode (encryption-free), SSL mode, and TLS mode for the
communication between the U2000 and the LDAP server.
Supporting multiple LDAP authentication servers and being compatible with the HA
scheme of the U2000.
5-8
Issue 05 (2010-11-19)
5 Basic Functions
OSS
Securiyt
NBI
User group
database
AAA agent
Security
server
LDAP server
User and
user group
database
U2000 server
U2000 user
Session Management
l
If a user does not perform operations on the client temporarily, the user can lock the client
manually or set the time for the U2000 to automatically lock the client to prevent
unauthorized operations. To unlock the client, the user must enter the password of the
current login user or use the account of the administrator.
The members of the administrator group can monitor sessions and operations of common
U2000 users, forcibly log out U2000 users, and unlock U2000 users.
Client lockout: If a user does not perform operations on the client temporarily, the user can
lock out the client or set the time to automatically lock the U2000 client to prevent
unauthorized operations. To unlock the client, the user must enter the password of the
current login user or use the account of the administrator.
Issue 05 (2010-11-19)
5-9
5 Basic Functions
The U2000 offers service topology management for various end-to-end services, for example,
VPLS services, PWE3 services, L3VPN services, E-AGGR services, and tunnel services. By
means of the service topology, users can view and configure services easily.
13
5-10
12
11
10
Issue 05 (2010-11-19)
5 Basic Functions
2: Menu bar
Issue 05 (2010-11-19)
5-11
5 Basic Functions
13: Network-wide NE
statistics
The alarm display in the topology view has the following features:
5-12
The color of a topological node indicates the operating status (such as normal, unknown,
or offline) and alarm status of the monitored NE.
When an NE generates multiple alarms of different severities, the color or icon that indicates
the highest alarm severity of these alarms is displayed in the topology view.
When multiple nodes in a subnet generate alarms, the subnet is displayed in the color or
icon that indicates the highest alarm severity of these alarms.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
5 Basic Functions
You can switch to the current alarm window of an NE using the shortcut menu of the NE
node. In addition, you can query the details of current alarms in the NE Panel.
Configuring NEs automatically: The U2000 provides the function of configuring autodiscovered NEs (such as PTN NEs) automatically.
Searching for NEs at a scheduled interval: The U2000 searches for NEs of a specified type
in a specified network segment according to the preset conditions at a scheduled interval.
It automatically adds the new NEs to the topology view. NE types are as follows: the
access router, switch, and security NEs.
Creating fibers/cables or links automatically: The U2000 supports the function of bulk
creating fibers/cables and links. It supports the function of bulk searching and adding new
fibers/cables and links to the topology view automatically after a search.
Issue 05 (2010-11-19)
5-13
5 Basic Functions
1.
The automatic topology discovery is implemented step by step through a wizard. The
wizard instructs you to set the parameters required for the automatic discovery, such as NE
type, SNMP parameters, and the IP address range.
2.
After you set the parameters, the U2000 searches for the required NEs in the specified
network segments according to the preset conditions. All NEs from Huawei and other
vendors that meet the conditions are displayed in the topology view. Meanwhile, the basic
configuration data of the NEs is uploaded, which simplifies the configuration of these NEs.
3.
You can stop the automatic topology discovery at any time. If the discovery fails, the cause
is displayed.
5-14
Discovering the clock topology automatically: The U2000 searches for clock links between
all NEs in the entire network to obtain the clock tracing relationships of all NEs. You can
search for clock links by NE or by clock link type. When the clock source of an NE is
changed, the U2000 performs a search again to renew the clock tracing relationships.
Viewing the clock topology: After the U2000 automatically discovers the clock topology,
you can view the clock tracing relationships in the entire network. To adjust the clock
topology, you can manually create and delete topological nodes and links.
Configuring clocks: In the clock configuration window of the NE Explorer, you can
configure the clocks of the NE. You can configure the following clocks: PON clocks
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
5 Basic Functions
synchronous Ethernet clocks, IEEE 1588 v2 clocks, and SDH clocks. The clock
configuration function varies with NE types.
l
Monitoring the change of clocks: When an NE or a link fails or a switching of clock sources
occurs in a network, the U2000 automatically updates the clock tracing relationships and
the clock synchronization status in the topology view. According to the clock alarms of the
NE whose clock is changed, you can identify the fault.
Switching clocks manually: You can select a clock link and set its clock tracing relationship
as the current clock tracing relationships of the NE.
Network-wide alarm monitoring and remote alarm notification enable the U2000 to notify
maintenance engineers of network exceptions in time so that the engineers will rectify faults
quickly and effectively.
Alarm correlation analysis, alarm association (with NEs, ports, or services), alarm masking,
alarm suppression, and maintenance experience base improve the accuracy and efficiency
of alarm processing.
Custom functions such as alarm filtering, alarm redefinition, and time localization meet
individualized requirements in different scenarios.
Alarm Severity
Table 5-2 shows different alarm severities and the handling methods.
Table 5-2 Alarm severity
Issue 05 (2010-11-19)
Alarm Severity
Definition
Handling Method
Critical
Major
Minor
5-15
5 Basic Functions
Alarm Severity
Definition
Handling Method
Warning
Handle different severities of alarms by using different methods. The U2000 supports the
function of redefining the alarm severity so that you can change the severity of a specific alarm
as required. The severity of an alarm needs to be adjusted when the impact of the alarm becomes
larger or smaller.
Alarm Status
l
Acknowledged and cleared alarms become history alarms after a preset period elapses. All nonhistory alarms are current alarms.
5-16
Issue 05 (2010-11-19)
5 Basic Functions
When the condition triggering an alarm disappears, the NE or the U2000 server recovers.
In this case, the NE or the U2000 server reports a clearance alarm. The alarm state
changes from uncleared to cleared. You can also manually clear an alarm.
Changing the acknowledgment status
If an alarm is acknowledged, it indicates that the alarm will be handled or has been
handled. After the alarm is acknowledged, the alarm state changes from
unacknowledged to acknowledged.
You can unacknowledge an acknowledged alarm if necessary. After the alarm is
unacknowledged, the alarm state changes from acknowledged to unacknowledged.
l
Issue 05 (2010-11-19)
5-17
5 Basic Functions
5-18
Issue 05 (2010-11-19)
5 Basic Functions
Description
Alarm panel
The alarm bar chart shows the real-time alarm statistics. The alarm
bar chart displays the alarm statistics collected by the alarm panel.
l Viewing current alarms: Query the fault alarms that are not
handled, that is, unacknowledged or uncleared alarms.
l Viewing history alarms: Query the fault alarms that are handled,
that is, acknowledged and cleared alarms.
l Viewing alarm logs: Query all fault alarms that are reported by
NEs.
l Viewing event logs: Query current abnormal events.
l Setting an alarm query template: Save common query conditions
as an alarm query template. You can directly use the template to
query alarms based on the same query conditions. This function
helps you to view and monitor the required alarms.
Issue 05 (2010-11-19)
5-19
5 Basic Functions
Alarm browsing consists of operations of viewing current alarms, history alarms, alarm logs,
and event logs, and supports multiple custom functions, as shown in Figure 5-14 and Table
5-4.
Figure 5-14 Viewing alarms
Alarm browsing
Alarm sorting
Alarm details
Alarm color display
Alarm filtering
5-20
Function
Description
Issue 05 (2010-11-19)
5 Basic Functions
Function
Description
Alarm filtering
When a large number of alarms exist, you can filter alarms by alarm
name, alarm severity, status, type, last occurrence time segment
and clearance time segment. The alarm filtering function improves
the efficiency of viewing alarms.
You can filter alarms by attributes of alarm sources, such as the
objects of NEs, object groups, and maintenance areas, and create
the required alarm filter templates by customizing the filter criteria.
In this manner, you can select the required alarm filter template to
filter alarms.
Alarm template
Alarm viewing
You can view the alarms relevant to NEs and services on the
U2000 to learn the operating status of the NEs and networks.
l Viewing current alarms: View current alarms of all severities
on the entire network.
l Viewing all current alarms of a specific severity: You can
quickly learn the critical, major, or minor alarms of the entire
network from the alarm icons on the toolbar.
l Viewing the alarms of a specified NE or U2000: You can select
an NE or a U2000 in the Main Topology and quickly learn the
current alarms of the selected object.
l Viewing the current alarms of a trail: In the trail management
window, you can quickly learn the alarms and events of the
managed trails. This function facilitates trail maintenance.
l Viewing history alarms: By viewing all history alarms of the
U2000, you can learn the faults that occurred on the U2000 and
NEs. The history alarm data can be used for long-term
performance analysis.
Alarm query
You can query alarms by object where the alarms are generated,
function type, alarm status, or alarm severity. The query results
can be saved and printed.
Alarm locating
You can select an alarm and locate the topological object where
this alarm is generated. For a physical alarm, you can locate the
board where the alarm is generated in the NE panel.
Alarm sort
You can sort alarms by field and customize the columns displayed
in the alarm list. Alarms can be saved to a file (.txt, .html, .xls,
or .csv) and can be printed.
Customized display
Issue 05 (2010-11-19)
5-21
5 Basic Functions
Function
Description
Details
You can obtain the details of an alarm, such as the alarm name and
identification information.
Handling suggestion
You can view the information about an alarm in the alarm browsing window, including the
severity, name, alarm source, location information, occurrence time, first occurrence time, last
occurrence time, clearance time, acknowledgment time, clearance user, acknowledgment user,
clearance status, acknowledgment status, location, direction, trail domain, alarm reversion,
protection subnet name, alarm plane, trail name, ASON object name, and affected services.
Alarm Statistics
You can quickly learn alarm information by collecting statistics on alarms and analyzing them.
The U2000 can collect statistics on alarms based on the preset conditions. The conditions can
be the name, severity, function type, generation time, alarm status, source of an alarm, or a
combination of the preceding items.
By using the alarm masking function, you can set the alarm/event masking conditions to
avoid display of a large number of redundant alarms.
While an NE is being repaired, tested, or deployed, the NE may report a large number of
alarms which can be ignored. In this case, you need to mask these alarms so that the
U2000 does not display and save them.
The U2000 provides the following correlation analysis means: alarm/event correlation analysis,
transient alarm analysis, repeated event analysis, alarm/event frequency analysis, and analysis
on duration of acknowledged but uncleared alarms. Figure 5-15 shows the implementation of
alarm correlation analysis.
5-22
Issue 05 (2010-11-19)
5 Basic Functions
Correlation Analysis
The Default Correlation and Correlation Analysis windows are provided for a
correlation analysis. In the Default Correlation window, the predefined rules for the
alarm correlation analysis are displayed. These rules can be enabled if required. In the
Correlation Analysis window, the rules for the alarm correlation analysis can be
customized.
Correlative alarms are the alarms whose causes are relevant to each other. One of the
alarms is the root cause.
Various alarms are generated when a certain fault occurs. If non-root alarms are
reported, the fault locating and analysis are affected. You can set the rules for the
correlation analysis on the U2000 according to certain features of correlative alarms,
such as generation time and physical locations where the alarms are generated. In this
manner, the U2000 directly discards non-root alarms that meet the preset conditions,
labels them as correlative alarms, and saves them to a suppressed alarm database, or
downgrades their severities.
Figure 5-16 shows the relationships between a root alarm and its correlative alarms.
The alarm for high memory usage of a service causes the alarm for high memory usage
and the alarm for high CPU usage. The alarm for high CPU usage causes the alarm for
abnormal exit of the U2000 service. Therefore, the alarm for high memory usage of a
service is the root alarm and the rest are the correlative alarms.
Issue 05 (2010-11-19)
5-23
5 Basic Functions
Figure 5-16 Relationships between a root alarm and its correlative alarms
5-24
Issue 05 (2010-11-19)
5 Basic Functions
acknowledged but uncleared alarms. If a major alarm is not cleared in 30 minutes after
it is handled, the U2000 changes the severity of the alarm to critical.
Enable this analysis function for the acknowledged alarms that are not cleared for a long
time. The U2000 changes severities of the alarms to a higher level to remind
maintenance engineers of handling the alarms in a timely manner.
l
CAUTION
l Alarm correlation analysis depends on alarm correlation rules. The rules will affect the
analysis result. Exercise caution when setting the rules.
l The default correlation analysis rules on the U2000 are recommended.
l By default, the alarm correlation analysis is disabled. Manually enable this function if
necessary.
Alarm dumping: Automatic dumping and manual dumping of alarms are supported.
Automatic dumping is classified into overflow dumping and periodic dumping.
Alarm logs can be saved in various formats, such as TXT, HTML, PDF, CVS, and XLS.
Alarm Synchronization
After communication between the U2000 and an NE recovers from an interruption, or the
U2000 is restarted, some alarms on the NE are not reported to the U2000. The NE alarms on the
U2000 are different from the actual alarms on the NE. In the case, you need to synchronize
Issue 05 (2010-11-19)
5-25
5 Basic Functions
alarms. Manual synchronization of alarms ensures that the U2000 displays the current operating
status of the NE correctly.
The U2000 supports the function of synchronizing NE alarms manually or automatically. You
can set the policy for automatic alarm synchronization. After you enable automatic alarm
synchronization, the U2000 automatically synchronizes alarms to ensure alarm consistency
between the U2000 and NEs after the communication between the U2000 and NEs recovers or
the U2000 is restarted. Figure 5-17 shows the implementation of alarm synchronization.
Alarms are synchronized according to the following rules:
l
If an alarm is cleared from an NE but uncleared on the U2000, the alarm will be cleared
from the U2000.
If an alarm is present on an NE but absent on the U2000, the alarm will be added to the
U2000.
Alarm Redefinition
The U2000 allows you to redefine the severities of alarms on NEs according to the requirements.
This function changes the alarm severity displayed on the U2000, highlighting only the required
alarms.
Alarm Suppression
The U2000 supports the function of suppressing NE alarms. If you set the status of an alarm to
Suppressed, the NE does not report the alarm.
The difference between alarm suppression and alarm masking is as follows: If you enable alarm
masking, an NE still reports the masked alarm but the U2000 does not receive the alarm. If you
enable alarm suppression, the NE does not report the suppressed alarm. For details, see Figure
5-18.
5-26
Issue 05 (2010-11-19)
5 Basic Functions
Different filter criteria can be set to enable the U2000 to notify maintenance engineers of
only the required alarms.
For the alarms that are cleared within a period (a customized delay), the U2000 does not
notify maintenance engineers of these alarms because they do not affect services any more.
Issue 05 (2010-11-19)
5-27
5 Basic Functions
Alarm Association
The U2000 supports the function of locating alarms, that is, associating alarms with the
topological object (NE or NE panel) where the alarms are generated. This function improves
fault locating efficiency. Figure 5-20 shows the alarm association function.
Figure 5-20 Alarm association
Alarm association
Issue 05 (2010-11-19)
5 Basic Functions
Alarm maintenance experience is summarized and recorded on the U2000 by users during
maintenance. If a similar fault occurs, relevant alarm handling information is available in the
base for reference to achieve quick and efficient alarm handling.
By using the function of importing alarm/event maintenance experience, you can import the
previously exported alarm/event maintenance experience to the U2000.
By using the function of exporting alarm/event maintenance experience, you can export alarm/
event maintenance experience on the U2000 to a file. This makes it easier to view alarm/event
maintenance experience in the file.
Figure 5-21 Alarm maintenance experience base
Benefit
NMS provides performance monitoring functions to support performance management at both
the NE level and the network level. By creating a performance instance, you can enable the NMS
to collect performance data from network devices according to a specified period.
l
Issue 05 (2010-11-19)
5-29
5 Basic Functions
Monitoring network traffic. This function is used to collect the traffic statistics of network
ports and is implemented by collecting the statistics of the following performance
indicators:
Inbound traffic
Outbound traffic.
Inbound bandwidth utilization
Outbound bandwidth utilization
Error Packet Rate
Monitoring SLA data. This function supports multiple types of SLA data monitoring and
is implemented by monitoring the following performance indicators:
Delay and loss ratio of ICMP, TCP, UDP, and SNMP packets between network nodes
Delay, jitter, and loss ratio of packets between network devices
Connection delay and download speed of Internet services such as the HTTP and FTP
services
Setting performance thresholds. This function allows you to set the thresholds for specific
performance indicators. The NMS also provides default global settings to facilitate batch
configuration. You can set the following parameters:
Upper and lower thresholds
Trend thresholds
Non-burst peak thresholds
The NMS reports alarms when the values of some indicators are out of the set ranges
Maintaining data. With this function, you can perform the following operations:
Storing performance statistics
Dumping performance statistics
Regularly compressing performance statistics
Process
The U2000 provides a graphical user interface (GUI) to monitor the key indicators of a network
and provide statistics on the collected performance data. This facilitates network performance
management.
5-30
Issue 05 (2010-11-19)
5 Basic Functions
Function Description
The following is a function description of performance module.
Issue 05 (2010-11-19)
Template
Description
5-31
5 Basic Functions
Template
Description
5-32
Create monitoring instances for resources, such as NEs, boards, ports, and links, and
monitor the IP SLA of the PTN and third-party equipment.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
5 Basic Functions
Query TCAs.
Control the management capability, that is, control the number of created monitoring
instances by a license.
l The information displayed in a graph or bar chart can be saved in HTML, CSV, TXT, or PDF format.
l The information displayed in a table can be saved in TXT, CSV, or HTML format.
In addition, you can compare the performance data in different periods in a graph or bar chart
or compare the indicators of different resources in the same diagram.
l The information displayed in a graph or bar chart can be saved in HTML, CSV, TXT, or PDF format.
l The information displayed in a table can be saved in TXT, CSV, or HTML format.
5-33
5 Basic Functions
5-34
Issue 05 (2010-11-19)
5 Basic Functions
The U2000 supports auto-discovery of a new asset (such as a new device, board, etc). If an
existing asset is updated, an NE icon would remind you of that the data on the U2000 is
asynchronous with the data on the NE. With the U2000, you can quickly identify the causes
of the data asynchronization.
Issue 05 (2010-11-19)
Resource
Statistical Item
Telecommunic
ations Room
Rack
Shelf
Shelf Name, Shelf Type, Relevant NE, Shelf ID, Software Version, Alias,
Relevant Telecommunications Room, Relevant Rack, Shelf No.,
Equipment No..
NE
Board
Board Name, Board Type, Relevant NE, NE Type, Shelf ID, Slot ID,
Hardware Version, Software Version, Serial Number, Alias.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5-35
5 Basic Functions
Resource
Statistical Item
Subboard
Port
Optical Module
Port, Logical Card, Physical Card, Serial Number, CLEI Code, Part
Number, Date of Manufacture, User Label.
Slot Used
Statistics
ONU
Fiber/Cable
Name, Level/Capacity, Direction, Source NE, Source Port, Sink NE, Sink
Port, Length, Attenuation, Fiber/Cable Type, Medium Type, Created on,
Creator, Maintainer, Alarm Severity, Disabled Status.
Link
Alarm Severity, Link Name, Type of Borne Network Protocol, Source NE,
Source Port, Source IP, Sink NE, Sink Port, Sink IP, Link Level, Link Rate,
Up Band Width, Down Band Width, User Label.
Router/Switch
Interface
PON Port
Splitting Status
OLT Device Name, Name, Optical Split, Used Optical Split, Idle Optical
Split, Remaining Bandwidth.
5-36
Issue 05 (2010-11-19)
5 Basic Functions
Log Classification
The logs of the U2000 are classified into operation logs, system logs, security logs, and NE logs.
The logs can be saved to TXT, HTML, CSV, PDF, and XLS files.
l
Operation logs record the non-security-related operations that users perform, such as
creating a subnet and enabling or disabling the alarm sound.
System logs record the operations that the U2000 automatically performs, such as scheduled
tasks and system tasks.
Security logs record the security-related operations that users perform, such as login, logout,
lockout, and unlocking.
NE Syslog operation logs record operation results of managed NEs. You can learn the
operation logs of NEs on the U2000 client instead of from each NE.
NE Syslog running logs record the operating information of NEs managed by the U2000.
The U2000 obtains from NEs all Syslog running logs of NEs. You can browse the Syslog
running logs of the managed NEs on the U2000 instead of from each NE.
Issue 05 (2010-11-19)
5-37
5 Basic Functions
Forwarding Logs
l
U2000 log forwarding: The U2000 can forward its operation logs to the Syslog server to
save the operation information, which releases storage space on the U2000 server. The logs
serve as a reference for maintenance.
NE log forwarding: The U2000 can forward the information about various NEs in the format
that complies with the system log protocol to the Syslog server. Then, U2000 administrators
and maintenance engineers can view the status of NEs according to the importance of the
NE information.
Dumping logs
Operation logs, system logs, and security logs can be dumped periodically and
automatically or dumped manually. The logs can also be dumped upon an overflow
when the size of the logs exceeds the preset threshold.
The U2000 provides only one default system task for each type of logs. You cannot
delete the system tasks or create new dumping tasks. You can only modify the
parameters of the system tasks.
Dumped logs are saved to CSV or XML files. You can compress the files into a ZIP
file. By default, logs are dumped to the $IMAP_ROOT/dump/ThresholdExport/
Log (Solaris/Linux) or %IMAP_ROOT%\dump\ThresholdExport\Log (Windows)
path.
5-38
Issue 05 (2010-11-19)
5 Basic Functions
After the logs are dumped, they are deleted from the database to release the database
space.
l
Exporting logs
The U2000 provides only one default system task for each type of logs. You cannot
delete the system tasks or create new exporting tasks. You can only modify the
parameters of the system tasks.
Exported logs are saved to CSV or XML files. You can compress the files into a ZIP
file. By default, logs are exported to the $IMAP_ROOT/dump/fileint/syslogs (Solaris/
Linux) or %IMAP_ROOT%\dump\fileint\syslogs (Windows) path.
After the logs are exported, they are not deleted from the database.
NE Database Management
To ensure NE data security, the U2000 provides the functions of backing up and restoring NE
data.
In NE software management, you can back up and restore NE data on a server.
l
You can use the system control and communication unit (SCC) or CF board on the NE to back
up and restore the NE database for the transport access NEs.
l
Issue 05 (2010-11-19)
5-39
5 Basic Functions
Configuration
Performance
Log
Security
The U2000 provides a database backup and restoration tool. The tool facilitates database
maintenance and ensures the stability and security of the U2000. It provides the following NMS
database management functions:
l
Back up the U2000 database to a local or remote server in the following ways:
Immediate backup
Scheduled backup through task scheduling
Dump data in the U2000 database, including logs (such as operation logs, system logs,
security logs, and alarm/event logs) and other data (such as performance data).
Manual dump
Periodic dump
Import or export script files: Export the configuration data in the U2000 to script files, or
import the configuration data to the U2000 from script files. The configuration upgrade
wizard instructs users to restore the U2000 database by using the configuration data script
that has been backed up. The functions of importing and exporting script files are applicable
to only the PTN MSTP, WDM, and microwave NEs.
Script files can be exported in a scheduled manner through task scheduling.
The U2000 information about the MSTP and WDM NEs can be exported to a TXT file so
that the information can be used by the MDS 6600. In addition, the U2000 can import a
TXT file that contains the MDS 6600 data.
Initialize the U2000 database: Clear and initialize the U2000 database before restoring the
database in the case where the database data is in disorder or damaged.
Issue 05 (2010-11-19)
5 Basic Functions
Uploading: Data on NEs is reported to the U2000 to overwrite the NE data on the U2000.
The data that is present on the U2000 but absent on NEs is not deleted.
Downloading: The NE data on the U2000 is applied to the NEs to overwrite the data on
the NEs.
Consistency check: Check whether the NE data on the U2000 is consistent with the data
on NEs. If it is inconsistent, synchronize or upload the NE configuration data.
Synchronization: Upload the inconsistent data (including the conflicting data, and the data
that is present on NEs but absent on the U2000) to the NE layer on the U2000. The data
that is present both on the U2000 and NEs is not uploaded, and the data that is present on
the U2000 but absent on NEs is not deleted.
Duplication: When NEs are of the same type and of the same software version, if the
configuration data of an NE to be configured is the same as that of a configured NE, you
can configure the new NE by duplicating the data of the configured NE. Duplicating the
NE data only changes the data on the U2000 and does not affect the data on the NE. To
make the duplicated data take effect on the NE, you need to apply the configuration.
Initialization of the NE data on the U2000: The NE data on the U2000 is deleted and the
NE becomes unconfigured after the initialization.
NOTE
The PTN RTN, NA WDM, and NG WDM product series do not support preconfiguration and the
downloading of configuration data. The U2000 provides more reliable functions, that is, the database
package backup and restoration, to resolve the data restoration problem. This is because:
l
The configuration data does not contain complete NE data. The complete data can be obtained by
using the database package restoration function.
During the downloading of configuration data, the U2000 converts the configuration data to the Qx
interface information. Then, the data can be exchanged between the U2000 and the NE, but the
efficiency is relatively low. In the database package restoration mode, databases are directly
downloaded to the NE, which ensures a high efficiency.
On the U2000, only one set of configuration data can be saved, but the database package can have
many backup copies. Select the backup package as required.
DCN management is applicable to PTN NEs. The U2000 communicates with NEs, and manages
and maintains network nodes through a DCN network. In the DCN network, the U2000 and NEs
are considered as nodes. These nodes are connected through Ethernet or data communications
Issue 05 (2010-11-19)
5-41
5 Basic Functions
channel (DCC). In an actual network, the U2000 and NEs may be located at different floors of
the same building or in different buildings or cities. Hence, the U2000 and NEs are usually
connected through an external DCN network that consists of equipment such as switches and
routers. Relatively, the DCN network between NEs is referred to as an internal DCN network.
DCN management involves the following operations:
l
5-42
The DC implements the upgrade and downgrade of NEs in the following ways:
Saving: After the system is configured, the data is saved in the memory of NEs. This feature
saves the system configuration to the flash memory or hard disk of NEs. This prevents the
loss of the configuration file in case of system restart. The DC saves data through:
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
5 Basic Functions
Backup: Backs up the configuration to storage devices other than NEs. The backup data is
used for restoring the NE configuration. If the DC has the rights to manage the NE and no
loading, backup, or restoration operation is being performed on the NE, the NE accepts the
request for backup. The DC then transmits the contents for backup to the specified backup
directory on the FTP/TFTP/SFTP server through FTP/TFTP/SFTP. The DC backs up data
through:
Backup operation (manual)
Backup task (manual)
Backup policy (automatic)
Loading: Loads software for the upgrade to an NE. If the DC has the rights to manage the
NE and no loading, backup, or restoration operation is being performed on the NE, the NE
accepts the request for loading. The DC then transmits the contents for loading to the NE
through FTP/TFTP/SFTP. The DC loads data through:
Loading operation (manual)
Loading task (manual)
Upgrading task (automatic)
Restoration: Restores NE data from the backup to an NE. If the DC has the rights to manage
the NE and no loading, backup, or restoration operation is being performed on the NE, the
NE accepts the request for restoration. The DC then transmits the contents for restoration
to the NE through FTP/TFTP/SFTP. The DC restores data through the manual restoration
operation.
Policy and Task: The DC provides different methods for implementing features. For
example, you can save and back up data through a policy or a task.
A policy is periodic. It is mainly used for the operations that are performed frequently,
such as data saving and data backup.
A task is not periodic. It is mainly used for the operations that are not performed
frequently, such as data upgrading and data loading.
Users can select a method according to the actual situation.
Viewing iWeb reports through the IE browser, including alarm reports, log reports,
performance reports, and resource reports of equipment in the IP domain
Issue 05 (2010-11-19)
5-43
5 Basic Functions
Report
Microwave report
Project document
5-44
Issue 05 (2010-11-19)
5 Basic Functions
Issue 05 (2010-11-19)
5-45
5 Basic Functions
iWeb Report
The iWeb report system provides a complete set of flexible and convenient services. It allows
you to generate, distribute, and manage reports based on the Web. The powerful report system
helps you to monitor, analyze, and improve network performance, and make decisions
accordingly.
The iWeb report system supports the following alarm and log reports:
l
For information on the functions of the iWeb report system, see 10.9 Report Subsystem
Management.
Issue 05 (2010-11-19)
5 Basic Functions
Monitor the processes, databases and server information about the U2000 in real time. For
the running status of the U2000 server, see System Information Monitoring.
Issue 05 (2010-11-19)
5-47
5 Basic Functions
5-48
Issue 05 (2010-11-19)
Issue 05 (2010-11-19)
6-1
Basic NE Configuration
You can perform the following operations on the U2000:
l
For the NE whose ID needs to be set through the DIP switch, modify the NE ID on the U2000.
Synchronize NE time: Align all NEs with the system time of the U2000 server
automatically.
Use the board plug and play function: After a board is inserted into the slot, the NE Panel
automatically displays the board icon and board information.
Replace a board. You can replace a board with a board of another type on the U2000.
Query the actual physical board type of a board that is used as a board of another type.
The user can replace board A with board B whose rate and number of ports is the same
or less as of board A.
Enable the function of automatically disabling the NE: periodically disable some NE
functions that may affect services, such as loopback and automatic laser shutdown (ALS).
When the time expires, these operations will stop automatically.
Virtual NE management
Create a virtual NE.
6-2
Issue 05 (2010-11-19)
Add a board.
Create fibers between the virtual NE and other NEs.
Create SDH services.
Create protection subnets.
Search for and create trails on the virtual NE.
l
Orderwire Configuration
You can perform the following operations on the U2000:
l
Set and query the orderwire phone numbers, call waiting time, and orderwire phone port
availability.
Set and query the length of the subnet ID and the related subnet of the optical interface.
Configure and query the SDH network node interface (NNI) connection for orderwire.
Configure 1:N tributary protection switching (TPS) protection for a tributary board.
Query the data backup status between the active and standby SCC boards.
Interface board management: query and set the SDH interface boards installed on NEs.
Issue 05 (2010-11-19)
6-3
Set and query the TUG structure in the transmit and receive directions.
Query the in service (IS) port status and the out of service (OOS) port status of a line board
or a data board.
6-4
Configure VC12, VC3, or VC4 services and select protection groups for them. In the
platform 4.0 equipment, select protection groups of these services.
Manage Transmux services, including M13/E13 Transmux and M13/E13 Transmux Server
services.
Issue 05 (2010-11-19)
Configure multiple multiplex section protection (MSP) rings at a single optical port.
Configure multiple MSP rings by VC4 at an optical port to increase the usage of network
resources.
Configure REG. After the line board is set as REG, each pair of optical interfaces of the
line board provides a special receive or transmit function. Through the internal switch, the
SDH signals from the receiving optical interface are sent out directly to the corresponding
transmitting optical interface after passing through the regenerator section layer and being
amplified. The REG function is completely implemented by the board without the
cooperation of the SCC board and a cross-connect board.
Query the capacity of higher order and lower order cross-connections on an NE.
Issue 05 (2010-11-19)
6-5
Network attributes
Encapsulation/mapping
Link capacity adjustment scheme (LCAS)
Bound path
Advanced attributes
l
Configure E-Line services, including Ethernet private line (EPL) and Ethernet virtual
private line (EVPL). Create a new service and configure a bound path.
Configure Ethernet private LAN (EPLAN) services. Create a new virtual bridge (VB) and
configure the following parameters: service mount, VLAN filtering table, VLAN unicast,
MAC address disabling, bound path, self-learning MAC address, VB port MAC address
table capacity, and VLAN MAC address table capacity.
Configure QinQ service: QinQ is an embedded technology in VLAN, and tags users with
multi-layer VLAN ID, so that VLAN can be extended. Perform operations such as adding,
stripping and exchanging of tags in different scenarios.
Configure Ethernet link aggregation group (LAG), which contains intra-board LAG and
inter-board LAG.
Create or delete an LAG.
Add or delete LAG ports.
Query LAG ports and aggregation state.
6-6
Issue 05 (2010-11-19)
PW policy
Weighted random early detection (WRED) congestion and discarding policy of services
QinQ policy
Weighted fair queuing (WFQ) schedule policy
CoS queue scheduling priority mapping
l
Test frame receiving and transmitting on Ethernet boards, including the EGT, EFT, EGS,
EFS and EMS boards.
Use QoS template to simplify the QoS configuration for Ethernet services.
Support the ability to manage multi-protocol label switching (MPLS). The MSTP
equipment builds a label switched path (LSP) with a PE router, identifies LSP labels and
service priorities, and encapsulates LSPs into virtual concatenation groups (VCGs) for
transmission.
Configure E-Line services, E-LAN services, E-AGGR services, and clock services.
RPR Management
You can perform the following operations on the U2000:
l
Query the protection status, switching status, and switching position of the RPR that an NE
belongs to.
Configure forced switching, manual switching, or clear switching in the RPR that an NE
belongs to.
Clock Configuration
You can perform the following operations on the U2000:
l
Issue 05 (2010-11-19)
6-7
You can perform the following operations on the U2000 for configuring the 802.3ah Ethernet
OAM:
6-8
Set link monitoring parameters. This function helps to detect the events of frame error,
frame error period, and frame error seconds.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group,
including the switching mode, return mode, wait-to-restore (WTR) time, and hold-off time.
MS PW Configuration
By creating a multi-segment pseudowire (MS-PW) to transmit services, tunnel resources and
transmit services over different networks can be saved.
Create CES services of structure-aware TDM circuit emulation service over packet
switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).
MSTP Configuration
The MSTP can be used to clear loops in a network. The MSTP uses a specific algorithm to block
some redundant trails and change a loop network to a non-loop tree network. This function
prevents packet increase in a loop network and generation of broadcast storms in an endless
cycle. Different from the STP and RSTP, the MSTP can forward data according to VLAN packets
and achieve load balance of VLAN data.
You can perform the following operations on the U2000 for configuring the following MSTP
attributes:
l
Issue 05 (2010-11-19)
6-9
Packet Function
Implement the packet functions, such as the PW OAM, PW APS, MCSP, MC LAG, MS PW,
CES, and bidirectional tunnel.
6-10
Search for a protection subnet according to the information of NEs and fibers or cables, to
form a complete protection subnet.
Start or stop the MSP protocol of the MSP subnet, such as enabling or disabling the MSP
protocols network-wide or the MSP protocol for a single node.
Support the automatic generation of the services on the protection channel according to the
services on the working channel.
Adjust the bandwidth dynamically. To be specific, you can dynamically adjust the MSP
bandwidth according to the service demands and how the network bandwidth is used
currently to improve the utilization of network bandwidth. For example, for an STM-16
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
MSP of an 8 x VC4 bandwidth, if the 6 x VC4 bandwidth is enough, then change the
protection bandwidth from 8 x VC4 to 6 x VC4 bandwidth and save 4 x VC4 for the use
of non-MSP-protected services.
l
Expand the capacity of an MSP ring and a linear MSP chain. To be specific, you can expand
the link capacity by replacing the line boards on both sides of the link without interrupting
active services. For example, upgrade an STM-16 MSP ring to STM-64 smoothly.
Change the revertive mode of linear MSP protection without restarting the protocol.
Expand and add nodes to multiple types of protection subnets, including MSP, SNCP, PP,
NP ring, NP chain and their combinations.
Query and set the switching status, wait-to-restore (WTR) time, and the trigger condition
of the protection subnet.
Manage the entire RPR ring network. To be specific, you can create, delete, and search for
an RPR ring; you can manage the RPR ring protection parameters and link parameters.
RPR ring topology can be displayed through a view.
Generate the MSTP protection subnet report to facilitate the statistics and maintenance of
the protection subnets.
Issue 05 (2010-11-19)
6-11
Manage optical power: Query the input power, output power, and power thresholds for
SDH boards.
Set and query the overhead bytes of all NEs on the trail, such as the trace byte.
The U2000 prompts users to configure trace bytes when timeslot out-of-sequence occurs
to the MS.
Query the status of a lower order service.
Set overhead pass-through or termination for all NEs on the trail.
Insert alarms such as AIS and remote defect indication (RDI) into the trails at the VC4
level.
Set loopback on any nodes on a trail, including VC4 loopback, tributary loopback,
optical interface loopback and cross-connection loopback.
Perform a PRBS test on a trail.
Modify the add/drop ports on a trail and the timeslots occupied by the trail without
interrupting services.
Adjust the original route partially by changing the NE, board or timeslot that the trail
passes through.
Modify the route for concatenated services without interrupting services.
Set SNCP switching on a trail.
Implement the function of automatically generating dually-fed SDH services for 1+1
linear MSP.
Duplicate an SDH trail so that SDH trails can be created in batches.
Duplicate an SDH trail that is configured with DNI protection, so that SDH trails can
be created in batches.
Manage discrete SDH services, such as querying or analyzing discrete services.
Analyze the connectivity of an SDH trail and locate a fault of an SDH trail.
View the usage of VC12 or VC3 trails related to a VC4 server trail in graphical format,
and the information about the VC12 or VC3 trails.
Convert SDH discrete cross-connections to a mono nodal trail.
Manage SDH trails based on permissions and domains.
Search for fibers on an SDH trail.
l
Search for trails. Based on the NE configuration data at the NE layer, and the fiber
connection data and protection subnet information at the network layer, the U2000
generates the network layer information about E2E trails.
6-12
Issue 05 (2010-11-19)
Secondary filter: Filter those trails that are already displayed according to the filter
criteria.
Incremental filter: Filter all trails and display the newly qualified trails together with
the currently displayed ones.
Create trunk links at VC12, VC3, VC4, VC4-4C, VC4-8C and VC4-16C levels.
Create an Ethernet trail. The service includes EPL, EVPL, unterminated EPL, EPLAN,
EVPL based on QinQ, EVPL based on RPR and EVPLAN based on RPR.
Create a protection Ethernet trail that has one source and dual sinks.
For release 4.0 NEs (version 4.bb.cc.dd), the SDH NNI needs to be created on Ethernet line boards.
During search of Ethernet trails, the U2000 retains the attributes of the existing ones as
they are.
l
Issue 05 (2010-11-19)
6-13
Manage tunnels.
Create a tunnel based on the static CR protocol.
Predeploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete tunnels, and filter tunnels to view the desired tunnels.
View the topology of tunnels, including working routes and protection routes.
View the alarms of a tunnel.
View the performance of a tunnel.
View the results of testing and checking a tunnel.
Manage discrete tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Manually switch 1+1 or 1:1 tunnel protection groups.
6-14
Issue 05 (2010-11-19)
Issue 05 (2010-11-19)
6-15
Expand a PTN by adding nodes, deleting nodes, and upgrading or adjusting link capacities.
Prepare a service handover plan by using either the rollback handover policy or the besteffort handover policy.
Hand over, restore, and verify the trails of handover groups in batches.
Create and modify handover groups and handover plans, and delete handover groups and
handover plans in batches.
Supporting the IEEE 1588 V2, SDH, and synchronous Ethernet clocks
6-16
Synchronize NEs in a domain: The U2000 can obtain the topology of the network through
the active NE.
Set an account and a password for NE management, and implement the function of
automatically uploading the configuration data of NEs that are already created.
Manage domains, including creating and deleting domains, and changing the domain name.
Issue 05 (2010-11-19)
Enable or disable the optical virtual private network (OVPN) status of the NE.
Query the current alarm and history alarm about a control link.
Customize whether to display the color of alarms in the SDH Control Link
Management window.
TE Link Management
You can perform the following operations on the U2000:
l
View TE links.
Create fibers.
Issue 05 (2010-11-19)
6-17
6-18
Filter ASON services by actual route, original route or shared mesh restoration trail.
Create an ASON server trail of the diamond, gold, silver, or copper class.
Create an ASON trail of the diamond, gold, silver, copper or iron class.
Delete inactive SDH ASON trails or inactive SDH ASON server trails.
Delete SDH ASON trails or SDH ASON server trails on the NMS side.
Set routing attributes of ASON trails, including rerouting lockout status, revertive lockout
status, rerouting priority, rerouting revertive mode, WTR time, schedule revertive time,
rerouting policy, trigger condition, crankback and rerouting triggered by B3 bit error.
Create the associated trails with a same initial node or different initial nodes.
View the actual route, original route or associated route of an ASON trail.
View the preset restoration trail or shared mesh restoration trail of an ASON trail.
Issue 05 (2010-11-19)
Refresh the original route, actual route or associated route of an ASON trail.
Refresh the preset restoration trail or shared MESH restoration trail for an ASON trail.
Set names for ASON trails in batches according to the naming rules.
Save the attributes of the service after you create an ASON service successfully.
Restore the default attributes of an ASON service when you create the ASON service.
Implement the function of automatically refreshing routes after a diamond trail protection
switching.
Manage a hybrid network composed of an ASON clock subnet and a traditional clock
subnet.
Manage the startup time for the SDH ASON clock recovery.
SRG Management
You can perform the following operations on the U2000:
Issue 05 (2010-11-19)
6-19
Manage SRGs of the pipe type, fiber type, NE type, site type, and customized type.
Create and delete an ASON-SDH trail that contains one-end terminated ASON server trails.
Activate and deactivate an ASON-SDH trail that contains one-end terminated ASON server
trails.
Search for an ASON-SDH trail that contains one-end terminated ASON server trails.
Set association relationships between the ASON trails that have different sources and sinks.
Specify the explicit route for ASON services when creating an ASON-SDH trail. That is,
an ASON-SDH trail includes an SDH trail and an ASON trail.
View SDH and ASON trails at the same time in the SDH Trail Management window.
Set the revertive attributes when an SDH trail is being migrated to an ASON trail.
Create dually fed and selectively received VC4 ASON server trails.
Calculate working and protection routes using the SPC first policy.
The alarm in the ASON section of an ASON-SDH trail supports the alarm statistics
function.
Export the scripts of the simulated network planning information, including the networkwide configuration file, NE configuration file, network layer information file, ASON
information file, TE link information, associated ASON service information, route
calculation policy, component link information, ASON resource reservation information,
WTR time information, preset restoration trails and route calculation policy for nodes.
Issue 05 (2010-11-19)
Manage control plane parameters, including the bandwidth occupancy (%), bandwidth
weight, distance weight, hop weight, and customized cost weight. In addition, the route
selection policy is supported.
Issue 05 (2010-11-19)
6-21
Issue 05 (2010-11-19)
7-1
Basic NE Configuration
You can perform the following operations on the U2000:
l
Synchronize NE time: Send the computer system time, NTP server time, or standard NTP
server time at the U2000 server to all NEs for synchronizing the NE time. You can set the
U2000 to automatically synchronize the NE time by specifying the automatic
synchronization period.
Implement the board plug and play feature: After a board is inserted into a slot, the NE
Panel automatically displays the board and the board information.
Disable NE functions automatically: You can set the time when the U2000 automatically
disables certain NE functions that may affect services. At the time specified, these functions
are automatically disabled.
Manage environment monitoring information: You can set the PMU interface, NE fan
speed, temperature monitoring, and voltage monitoring.
Manage network operator information: You can set the information about the network
operator, including the international identifier, domestic identifier, and user-defined
identifier.
Orderwire Configuration
You can perform the following operations on the U2000:
7-2
Set a board as an orderwire board and query the orderwire board information.
Set and query the orderwire phone numbers, call waiting time, dialing mode, and orderwire
phone port availability.
Issue 05 (2010-11-19)
Set and query the subnet number length and the related subnet of an optical interface.
Set E1 cross-connections.
Configure Ethernet port mirroring. You can monitor packets, perform routine maintenance
and in-service commissioning through a mirrored port in a flexible manner.
Configure E-Line services such as Ethernet private line (EPL), Ethernet virtual private line
(EVPL) (QinQ), and VLAN subnetwork connection protection (SNCP) services.
NOTE
l QinQ is a VLAN embedding technique that employs multi-layer VLAN IDs to identify different users.
In this manner, VLAN resources are expanded. The U2000 supports the function of adding labels.
l A VLAN SNCP service is a VLAN-based E-Line service that is configured with SNCP protection.
You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a
VLAN SNCP service and a common Ethernet service.
Configure Ethernet private LAN (EPLAN) services: You can create a virtual bridge (VB)
and set parameters including service mounting, VLAN filtering, VLAN unicast, MAC
address disablement, bound path, and MAC address automatic learning.
Issue 05 (2010-11-19)
Configure link capacity adjustment scheme (LCAS): LCAS can dynamically adjust the
number of virtual containers for mapping desired services, so as to satisfy different
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
7-3
Configure the multiple spanning tree protocol (MSTP): MSTP is compatible with STP and
RSTP, and it also addresses the defects of STP and RSTP. MSTP supports fast convergence.
In addition, MSTP provides multiple redundancy trails for data forwarding, implementing
load balancing of VLAN data during data forwarding.
Configure MPLS tunnels: On a PSN network, an MPLS tunnel carries pseudo wires (PWs)
where various services are encapsulated. In this manner, data packets can be transparently
transmitted among NEs. You can dynamically adjust the required number of virtual
containers for service mapping so as to adapt to the requirements for different service
bandwidths, at the same time improving bandwidth utilization and robustness of virtual
concatenations.
Configure link-state pass through (LPT): LPT is used to return the remote-end link status
to the near end. The near-end equipment performs operations depending on the remote-end
link status. The Ethernet board periodically monitors the network to learn the Ethernet
status. When the connection status of Ethernet ports changes due to a link fault, you can
use the LPT function to quickly switch services from the working route to the protection
route between the two ends. The LPT feature protects transmission of important data.
Configure Ethernet ring protection switching (ERPS): Based on the traditional Ethernet
mechanism, ERPS uses the ETH OAM function and the ring automatic protection switching
(R-APS) protocol to achieve fast protection switching on the Ethernet ring network.
7-4
Issue 05 (2010-11-19)
Overhead Configuration
You can configure OTN overheads as follows on the U2000:
l
Configure and query fault type and fault location reporting channel (FTFL) overheads.
You can configure SDH overheads for the OptiX OSN 8800 T32 and OptiX OSN 8800 T64 as
follows on the U2000:
l
Configure VC4 higher order path overheads (J1 and C2) and pass-through or termination.
Configure several WDM service boards in specified slots to form a cross-connect unit
group.
Perform the add/drop, pass-through, and loopback operation on GE/FC services in each
cross-connect unit group.
Issue 05 (2010-11-19)
7-5
The U2000 allows you to configure electrical cross-connections to control the service flow
at the electrical layer, and to dynamically groom, converge, and split sub-wavelength
services. In this manner, the network structure and network survivability are enhanced.
The U2000 supports integrated grooming of GE, ODU0, ODU1, ODU2, and ODU3
services implemented by the XCS.
The U2000 supports distributed grooming of GE, ODU0, ODU1, and ODU2 services and
Any services.
The U2000 supports unidirectional and bidirectional SNCP at the ODU3, ODU2, ODU1,
or ODU0 level.
Lock WDM trails and view the lock status of the corresponding trails in the Service
Management window of the NE Explorer.
Perform service package management on the OptiX OSN 1800. The service package module
helps you perform typical service configurations. In this manner, you need not perform onsite
commissioning. This reduces costs in deployment commissioning and product maintenance. In
addition, the equipment can be configured in a one-key manner.
Manage licenses for service types and cross-connect capacities of the OptiX OSN 8800 T32 and
OptiX OSN 8800 T64.
ROADM Configuration
By using the reconfigurable optical add/drop multiplexer (ROADM) function on the U2000,
you can perform add/drop and pass-through configuration for optical channels. The WDM
equipment uses the DWC and wave selective switch (WSS) to implement the ROADM function.
7-6
Configure ROADM boards based on WSS boards: There are two types of network
structures, WSSD+WSSM and WSS+RMU/ROAM. This configuration method is often
used for cross-connect nodes on a ring network.
Issue 05 (2010-11-19)
Clock Configuration
You can perform the following operations on the U2000:
l
Configure optical wavelength share protection (OWSP) with the Metro WDM equipment
and the NG WDM equipment.
Issue 05 (2010-11-19)
7-7
Configure distribute board protect system (DBPS). DBPS protects 10GE and GE ports on
a TBE board. The cross-connection granularity is the GE service.
In 1+1 protection for SCC boards, you can query the data backup status between the active
and standby SCC boards.
Manage the optical power. For example, query the input power, output power, and power
threshold of each WDM board.
Perform intelligent power adjustment (IPA). When a fiber is cut, the optical amplifier board
detects signal loss at the local station. The local station reports an exception event to the
U2000. After the user confirms the event, the optical amplifier boards at the upstream and
downstream stations reduce their output power to a safe value to prevent a fiber maintainer
from being injured by the laser emitted from the cut fiber. After the fiber is reconnected,
the optical signals recover to normal and the optical power of each optical amplifier board
automatically returns to a normal value.
Perform automatic level control (ALC). The U2000 supports adjustment modes including
wavelength count detection, power detection, and link attenuation (gain mode). In
wavelength count detection mode and power detection mode, you can manually control
whether to enable the ALC function.
The wavelength count detection mode applies to a transmission link where no service
is added or dropped or where the number of wavelengths added and dropped are the
same at an OADM station. When the spectrum analyzer unit detects that the total optical
power of the wavelengths greatly differs from the standard power corresponding to the
7-8
Issue 05 (2010-11-19)
wavelength count, an exception event is reported to the U2000. After the user confirms
the event, the user needs to manually issue a command to adjust the attenuation of each
station on the link.
The power detection mode applies to a transmission link where the number of add
wavelengths differs from the number of drop wavelengths at an OADM station. When
the optical amplifier board detects that the output power is abnormal, the station
automatically issues a command to adjust the attenuation of each station on the link.
This mode does not involve a spectrum analyzer unit and is therefore cost-effective.
The link attenuation adjustment mode also applies to a transmission link where the
number of add wavelengths differs from the number of drop wavelengths at an OADM
station. When the optical power is attenuated to the detection threshold, a command is
automatically issued to adjust the attenuation of each station on the link.
NOTE
The link attenuation adjustment mode is also referred to as the gain mode, which compares line attenuation
with amplifier gain, and then compares the difference between line attenuation and amplifier gain with
node gain compensation offset. After the nominal gain of the optical amplifier unit and the attenuation of
the attenuation adjustment unit are adjusted, the attenuation is equal to the gain, ensuring the power budget
of the entire link.
Perform automatic power equilibrium (APE). If the MCA board at the receive end detects
that the optical power of certain channels is abnormal, the station reports an exception event
to the U2000. After the user confirms the event, the U2000 issues a command to the optical
attenuation adjustment board of the upstream station. This board adjusts the optical power
of the abnormal channel so that the optical signal noise ratio (OSNR) of each channel at
the receive end is equalized.
Perform ROADM optical power equalization. After ROADM is enabled for dynamically
configuring wavelength services, the WDM equipment outputs multiplexed wavelengths.
The optical power between each channel, however, may be greatly different, especially for
new add wavelengths. To avoid negative impact on transmission performance, the ROADM
optical power equalization mechanism is provided. The ROADM first distinguishes
between pass-through wavelengths and the add wavelengths. Then the DWC/WSS adjusts
the optical power of the pass-through wavelengths, and the optical attenuation adjustment
board adjusts the add wavelengths based on wavelength flags.
Dispersion Compensation
You can perform the following operations on the U2000:
l
Perform dispersion compensation (with the help of the DCM board) at each band to
implement dispersion equalization.
In the submarine system, use a separate dispersion compensation board, such as the TDC1
or TDC2 board, to perform dispersion compensation for signals on the line side of an OTU
board.
Wavelength Monitoring
By using the U2000, you can perform wavelength monitoring management for the OptiX BWS
1600G, OptiX OSN 6800, OptiX OSN 8800 T32, and OptiX OSN 8800 T64.
Issue 05 (2010-11-19)
7-9
WDM PRBS
By using the U2000, you can perform a pseudo-random binary sequence (PRBS) test on a board
to check the path quality. You can also check whether a WDM link functions properly before a
service is provisioned.
Configure SDH line boards, SDH services, and SDH service protection for the OptiX OSN
8800 T32 and OptiX OSN 8800 T64.
Configure VC12, VC3, or VC4 services and select protection groups for them.
Query the capacities of higher order and lower order cross-connections on an NE.
Configure linear multiplex section protection (MSP). In the MSP protection, bytes K1 and
K2 in the SDH multiplex section overhead (MSOH) are used to transmit protocol
information to control the transmit and receive routes of services on a chain network.
7-10
Configure energy conservation for an NE. You can dynamically adjust NE power
consumption to achieve environment protection and energy conservation.
Issue 05 (2010-11-19)
Perform tests of multiple types: manual test, comparison test in single-test mode, and
comparison test in periodic mode.
PFE Management
By using the U2000, you can manage the PFE 1670. The PFE 1670 is the power supply
equipment for the submarine transmission system.
FC Service Test
The FC service test uses the 12LOM board to replace the FC test equipment (such as the
SmartBits) for running the test. The FC service test verifies whether the FC service line and the
equipment under test are in the normal state. By using the U2000, you can perform FC service
tests.
Basic NE Configuration
By using the U2000, you can perform the following operations:
Issue 05 (2010-11-19)
7-11
Synchronize the NE time: Send the computer system time and NTP server time at the
U2000 server to all NEs for synchronizing the NE time. You can configure the U2000 to
automatically synchronize the NE time by specifying the automatic synchronization period.
Implement the board plug and play feature: After a board is inserted into a slot, the NE
Panel automatically displays the board and the board information.
Disable the NE functions automatically: You can set the time when the U2000
automatically disables certain NE functions that may affect services, such as the loopback
and automatic laser shutdown (ALS) functions. At the time specified, these functions are
disabled automatically.
7-12
Issue 05 (2010-11-19)
Manage environment monitoring information: You can set the fan speed mode and speed
level on an NE.
Dynamically add a port: SFP/XFP client-side colored ports support the new functions of
dynamically add, delete, and modify.
Orderwire Configuration
By using the U2000, you can perform the following operations:
l
Set and query orderwire phone numbers and call waiting time.
Configure Ethernet port mirroring. You can monitor packets, perform routine maintenance,
and in-service commissioning through a mirrored port in a flexible manner.
Issue 05 (2010-11-19)
7-13
Basic attributes
Tag attributes
Network attributes
Advanced attributes
Flow control
l
Configure Ethernet private line (EPL), Ethernet virtual private line (EVPL) (QinQ), and
VLAN subnetwork connection protection (SNCP) services.
NOTE
l QinQ is a VLAN embedding technique that employs multi-layer VLAN IDs to identify different users.
In this manner, VLAN resources are expanded. The U2000 supports the function of adding labels.
l A VLAN SNCP service is a VLAN-based E-Line service with SNCP protection. You can create VLAN
SNCP and QinQ VLAN SNCP services, and perform conversion between a VLAN SNCP service and
a common Ethernet service.
Configure Ethernet private LAN (EPLAN) services: You can create a virtual bridge (VB)
and set parameters including service mounting, VLAN filtering, VLAN unicast, MAC
address disablement, bound path, and MAC address automatic learning.
7-14
Issue 05 (2010-11-19)
Overhead Configuration
By using the U2000, you can configure OTN overheads as follows:
l
Configure and query fault type and fault location reporting channel (FTFL) overheads.
Configure several WDM service boards in specified slots to form a cross-connect unit
group.
Perform the add/drop, pass-through, and loopback operation on GE services in each crossconnect unit group.
Implement unidirectional and bidirectional WXCP protection with working and protection
cross-connections configured on the sink node.
Configure electrical cross-connections: The U2000 allows you to configure electrical crossconnections to control service flows at the electrical layer. In this manner, the network structure
and network survivability are improved. The following two features are supported:
Issue 05 (2010-11-19)
7-15
Integrated grooming of GE, ODU1, ODU2, and ODU3 services implemented by XCS.
Configure ODU3, ODU2, ODU1, ODU0, GE/Any, and OTU1 cross-connections, and
unidirectional and bidirectional SNCP at the ODU0, ODU1, ODU2, and ODU3 levels.
l
Lock WDM trails and view the lock status of the trails in the Service Management window
of the NE Explorer.
ROADM Configuration
By using the ROADM function on the U2000, you can perform add/drop and pass-through
configurations on optical channels. The WDM equipment uses DWC and WSS to implement
the re-configuring of optical add/drop multiplexing.
l
DWC type of ROADM: DWC is applicable to common nodes on a chain or ring network.
WSS type of ROADM: WSS is applicable to cross-connect nodes on a ring. This feature
is applicable to grooming of multi-dimensional optical cross-connections. A maximum of
eight dimensions are supported.
Clock Configuration
By using the U2000, you can perform the following operations:
Configure the master clock.
l
7-16
Issue 05 (2010-11-19)
Configure board protection switching (BPS). The BPS protection uses two boards: the
working and protection boards. BPS protection protects any single port on the two boards
by board-level switching.
In 1+1 protection for SCC boards, you can query the status of data backup between the
active and standby SCC boards.
Manage the optical power. For example, query the input power, output power, and power
threshold of each WDM board.
Perform intelligent power adjustment (IPA). When a fiber is cut, the optical amplifier board
detects signal loss at a station. The station reports an exception event to the U2000. After
the user confirms the event, the optical amplifier boards at the upstream and downstream
stations reduce their output power to a safe value to prevent the fiber maintenance personnel
from being injured by the laser emitted from the cut fiber. After the fiber is reconnected,
Issue 05 (2010-11-19)
7-17
the optical signals recover to normal and the optical power of each optical amplifier board
automatically returns to a normal value.
l
Perform automatic level control (ALC). Link attenuation (gain mode) can be used as the
adjustment mode. The link attenuation adjustment mode applies to a transmission link
where the number of add wavelengths differs from the number of drop wavelengths at an
OADM. When the optical power is attenuated to the detection threshold, a command is
automatically issued to adjust the attenuation of each station on the link.
NOTE
The link attenuation adjustment mode is also referred to as the gain mode, which compares line attenuation
with amplifier gain, and also compares node gain with compensation offset. After the nominal gain of an
optical amplifier unit and the attenuation value of an attenuation adjustment unit are adjusted, the
attenuation value is equal to the gain value, ensuring the power budget of the entire link.
Perform automatic power equilibrium (APE). If an MCA board at the receive end detects
that the optical power of certain channels is abnormal, the station reports an exception event
to the U2000. After the user confirms the event, the U2000 issues a command to the optical
attenuation adjustment board at the upstream station. This board adjusts the optical power
of the abnormal channel so that the optical signal-to-noise ratio (OSNR) of each channel
at the receive end is equalized.
Perform ROADM optical power equalization. After ROADM is enabled for dynamically
configuring wavelength services, the WDM equipment outputs multiplexed wavelengths.
The optical power, however, may deviate greatly on channels, especially on new
wavelength channels. To avoid negative impact on transmission performance, the ROADM
optical power equalization mechanism is provided. The ROADM first distinguishes
between pass-through wavelengths and add wavelengths. Then the DWC/WSS adjusts the
optical power of the pass-through wavelengths, and the optical attenuation adjustment
board adjusts the add wavelengths based on wavelength flags.
Dispersion Compensation
l
The G.652 and G.655 fibers have positive dispersion coefficient and positive dispersion
slope at the 1550 nm window. After an optical signal is transmitted over a certain distance,
accumulation of positive dispersion broadens the optical signal pulse and seriously affects
system transmission performance. To minimize this impact, a negative DCM is used on
the network. The negative DCM uses negative dispersion to compensate the positive
dispersion of the transmission fiber, so as to maintain the original shape of the signal pulse.
The U2000 supports 40G dispersion compensation, which uses the TDC to adjust dispersion
precisely.
Wavelength Monitoring
Wavelength monitoring uses a wavelength supervisory unit to monitor the wavelengths that are
transmitted from a WDM-side optical interface on the OTU board (including the service
convergence unit) and to control wavelength shift. By using the U2000, you can perform
wavelength monitoring. This function ensures wavelength stability.
7-18
Issue 05 (2010-11-19)
WDM PRBS
By using the U2000, you can perform pseudo-random binary sequence (PRBS) on a board to
check the path quality. You can also check whether a WDM link functions properly before a
service is provisioned.
Housekeeping Configuration
By using the U2000, you can perform the following operations:
l
Query the records in the automatic output (AO) buffer. The record information includes:
Time at which the record is generated
Autonomously generated correlation tag (ATAG) of the record
Type of the record
Description of the record
Export the AO buffer information to the browser of the operating system for printing.
EAPE Management
Enhanced automatic power equalization (EAPE) management can reduce the bit error rate (BER)
of a service. By using the U2000, you can query the EAPE function of an OCh trail.
Issue 05 (2010-11-19)
7-19
Configure energy conservation for an NE. You can dynamically adjust NE power
consumption to achieve environment protection and energy conservation.
ASON Management
Topology Management
By using the U2000, you can perform the following operations:
l
Synchronize NEs in a domain: On the U2000, you can obtain the topology of a network
from the active NE.
Manage domains, including creating and deleting domains, and changing domain names.
TE Link Management
By using the U2000, you can perform the following operations:
l
Filter links by domain, link signal type, payload type, or source/sink information.
View TE links.
Create fibers.
7-20
Issue 05 (2010-11-19)
Create a trail.
The U2000 automatically generates an OTS trail after fibers are correctly connected
between specified boards.
Select an NE in the topology and view relevant alarms when creating a trail.
Analyze failure causes when a route fails to be computed at the optical or electrical layer
during trail creation.
Create and manage third-party WDM wavelength trails (OCh trails).
Create ODU0, ODU1, ODU2 or ODU3 trails, and create ODU0, ODU1, ODU2 or
ODU3 cross-connections by using the trail management function.
Search for and manage ODU3 trails.
View detailed information about a route during WDM trail creation.
Create a client trail, and create GE, FC, and FE services based on OCh or ODUk trails
by using the trail management function.
Create SNCP or WXCP by using the trail management function.
Create a WDM trail by double-clicking an NE and select the source and sink nodes.
Select the explicit route for protection when creating a WDM trail.
Use the end-to-end management function for ASON-WDM trails.
Issue 05 (2010-11-19)
7-21
Create multi-layer WDM trails, and create client and ODUk cross-connections by using
the trail management function.
Create trails by means of duplication. That is, create multiple trails by duplicating a
trail. In addition, generate client and ODUk cross-connections in batches by using the
trail management function.
Create WDM trails where fiber jumpers are connected inside a station.
Set port attributes.
View new cross-connections.
l
View trails.
Join trails of the same level.
Split a trail into trails of the same level.
Query the route information about a trail.
Display the signal flow diagram of a trail.
Query the transmission media layer for a trail.
Query the client trail for a trail.
Query the server trail for a trail.
Query detailed information about a trail, including its attributes and channel allocation.
Query the optical power of a trail. That is, query the optical power of a WDM trail, and
the input and output optical power of the source and sink nodes of the trail.
Query DPPS protection for a trail.
Query valid routes for protected WDM trails.
Query the associated working and protection trails for OCh trails.
Display intra-site fibers in solid lines and inter-site fibers in dotted lines in the signal
flow diagram of a trail.
Display working and protection routes in different colors in the signal flow diagram of
a trail.
Switch from the signal flow diagram of a trail to another window to query alarms.
Query the detailed information about a trail group. The information includes the
direction, name, trail status, source and sink nodes, source and sink wavelengths, bearer
rate, rate, and service type.
Enable or disable service alarms.
Switch between the window for viewing WDM trails and the window for viewing
associated SDH trails.
Support lockout of WDM trails.
7-22
Issue 05 (2010-11-19)
Manage trails.
Query 1+1 protection of optical-layer trails and perform 1+1 protection switching for
the optical-layer trails.
Query trails with WXCP and SNCP protection, and perform protection switching for
the trails.
Use the TTI byte to check fiber connection relationships over an OCh trail.
Apply the automatic naming rule for WDM trails.
Modify the source and sink of ODUk (k = 0, 1, 2, 3) trails and client trails.
Support ODU trail end-to-end management.
Search for and end-to-end manage GE trails based on ODUk.
Manage optical-layer alarms and configure optical-layer overheads on a trail.
Analyze connectivity of a WDM trail and identify a fault on a WDM trail.
Enable and disable WXCP or SNCP protection for an ODUk trail or a client trail.
Set the end-to-end optical power mode.
Implement the "save as" and "print" functions for channel allocation of a WDM trail.
Save the signal flow diagram of a WDM trail.
Manage WDM trails base on rights and domains.
Manage WDM discrete services.
Manage WDM platinum trails.
Create WDM trails by using eight clients at the same time.
View relevant fibers based on trails.
Issue 05 (2010-11-19)
7-23
View directly the timeslots and wavelengths that are used by a configured client service
trail in the signal flow diagram.
Add a column in the WDM Trail Management window to indicate whether protection
is configured.
Identify whether an OCh trail is used by a client trail.
l
Delete a trail. You can delete a WDM trail (except an OTS trail) from the NE layer and
network layer of the U2000.
Implement enhanced automatic power equilibrium (EAPE) based on OCh trails. The EAPE
function automatically adjusts the transmitted optical power of each channel according to
the signal quality of each channel monitored by the OTU board at the receive end, to ensure
that the quality of signals in each channel at the receive end satisfies the preset requirements.
In this way, service availability is ensured.
Topology Management
You can perform the following operations on the U2000:
l
Synchronize NEs in a domain: The U2000 can obtain the topology of an ASON domain
from the active NE.
Manage domains, including creating and deleting domains, and changing domain names.
Issue 05 (2010-11-19)
User-define whether to display the color of alarms in the Control Link Management
window.
TE Link Management
You can perform the following operations on the U2000:
l
Filter TE links by domain, link signal type, payload type (optical layer or electrical layer),
OVPN customer, or source/sink information.
View TE links.
Manage TE links whose payload type is OCh, ODUk, ODU1_ODU2, or client (GE/Any).
Filter relevant WDM ASON trails by domain, name, actual route, original route, creation
time, planning time, activation status, protection type, service level, alarm level,
management status, whether the original route is active, and whether inverse multiplexing
is available.
Create WDM ASON trails of the diamond, gold, silver, or copper class.
Issue 05 (2010-11-19)
7-25
7-26
Create WDM ASON trails of the OCh, ODU0, ODU1, ODU2, ODU3, or client level.
Create associated WDM ASON trails with the same source node or different source nodes.
Set routing attributes, including rerouting lockout status, reversion lockout status, rerouting
priorities, revertive mode, WTR time, scheduled revertive time, rerouting policy, trigger
condition, crankback times, rerouting triggered by SD, and rerouting hold-off time.
Enable or disable optical parameters verify of WDM ASON OCh trails, including OSNR,
PMD, and dispersion.
Refresh the actual route, original route, associated routes, or signal flow diagram of a WDM
ASON trail.
Set one or two preset restoration trails for a WDM ASON trail.
View the actual route, original route, or associated routes of a WDM ASON trail.
View the control-plane alarm suppression information about WDM ASON trails.
Issue 05 (2010-11-19)
Set names for WDM ASON trails in batches according to the naming rules.
Save the attributes of a service after creating a WDM ASON service successfully.
Restore the default attributes of a service when creating a WDM ASON service.
Implement sharing of wavelengths in the working and protection diamond ASON trails at
the optical layer.
Set the route attributes of associated ASON trails, including trigger condition for rerouting
associated routes and shared policy of associated services.
SRG Management
You can perform the following operations on the U2000:
l
Simplify the layers where multi-layer services are provisioned. To be specific, when you
create a client trail, its server-layer ASON-WDM trail is automatically created.
View both WDM trails and managed ASON trails in the WDM Trail Management
window.
Collect the alarm statistics of the ASON section, which is added to the alarm statistics of
the ASON-WDM trail.
Exchange of Scripts
You can perform the following operations on the U2000:
Issue 05 (2010-11-19)
7-27
By using the U2000, you can configure SDH ASON feature for the OptiX OSN 8800 I and OptiX
OSN 8800 II as follows:
7-28
Issue 05 (2010-11-19)
Issue 05 (2010-11-19)
7-29
Issue 05 (2010-11-19)
8-1
Basic NE Configuration
You can perform the following operations on the U2000:
l
Support the ability to manage the connections between back-to-back RTN NEs. On the
Main Topology of the U2000, the connections between back-to-back RTN NEs indicate
the relationships between the RTN NEs on the same station that are connected in a backto-back manner through network interfaces.
Synchronize NE time: Align all NEs with the system time of the U2000 server. The user
can configure the U2000 to automatically synchronize the NE time by specifying the
automatic synchronization period.
Support the plug and play feature for boards: After a board is inserted into a slot, the NE
Panel automatically displays the board and board information.
Automatically disable the NE functions: Some NE functions that may affect services, such
as loopback and automatic laser shutdown (ALS), can be periodically disabled. When the
time expires, these operations automatically stop.
Orderwire Configuration
You can perform the following operations on the U2000:
8-2
Issue 05 (2010-11-19)
Set and query the orderwire phone numbers, call waiting time, and orderwire phone port
availability.
Interface Configuration
You can perform the following operations on the U2000:
l
Support PRBS.
Support the features of packet radio. You can configure a microwave interface in terms of
basic and advanced attributes, IF attributes, and Layer-2 and Layer-3 attributes.
Support the ability to configure the long and short serial numbers for an MP group.
Issue 05 (2010-11-19)
8-3
Support Hybrid radio and the AM feature, carrying hybrid E1 and Ethernet services and
enhancing the availability of radio links.
Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge
(VB) and configure the following: service mount, VLAN filtering, VLAN unicast, disable
MAC address, bound path, self-learning MAC address, and VLAN MAC address table
capacity.
8-4
Issue 05 (2010-11-19)
Configure the RMON performance functions such as browsing history groups of Ethernet
ports, collecting performance statistics of a group, setting an alarm group of Ethernet ports,
and setting a history control group.
Clock Configuration
You can perform the following operations on the U2000:
l
Support maintenance domain (MD), maintenance association (MA), maintenance end point
(MEP), and maintenance intermediate point (MIP).
Perform CC check.
Perform LB check.
Perform LT check.
You can configure the 802.3ah Ethernet OAM as follows on the U2000:
l
Issue 05 (2010-11-19)
8-5
Support link event notification and the adjustment of the OAM error frame monitoring
threshold.
Import routes.
Import routes.
LDP protocol: Label distribution protocol (LDP) is a control and signaling protocol of
multi-protocol label switching (MPLS).
RTN equipment supports using the RSVP-TE protocol to create dynamic LSP connection and
using the LDP protocol to create PW connection.
8-6
Issue 05 (2010-11-19)
LAG Configuration
Link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logical link
of faster rate for transmitting data. This function improves the link availability and increases
link capacity.
The U2000 supports the configuration of the following LAG attributes:
l
BFD Configuration
Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status.
BFD is a simple Hello protocol. It is similar to the neighbor detection of those famous protocols
in many aspects. A pair of systems periodically sends detection packets on the channel on which
session between the two systems was created. If a system does not receive any detection packet
from the opposite end within a specific time, the system assumes that a failure occurred in some
part of the bidirectional channel of the adjacent system.
QoS Configuration
Quality of service (QoS) indicates the performance of the data flow that travels through a
network. The QoS is used to ensure end-to-end service quality. The QoS cannot increase the
bandwidth, but it can minimize the delay and jitter in the network by reasonably allocating and
monitoring network resources. In this way, the quality of important services is ensured.
The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ
function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision policy
to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS nodes
and internal DS nodes. The edge DS nodes usually perform complex flow classification on the
traffic that enters the DS domain. Traffic of different types is marked with different PHB service
types. For internal DS nodes, you need to perform only simple flow classification based on PHB
service type.
The U2000 supports the following QoS operations:
l
Issue 05 (2010-11-19)
8-7
To simplify the operation and share some common QoS configuration parameters, the
U2000 supports creating QoS function point policy. The function point policies are as
follows: port policy, ATM policy, and V-UNI ingress policy. Use these function point
policies to bind the CAR configuration attribute, shaping configuration attribute, flow
classification configuration attributes, WFQ schedule policy and WRED policy attributes.
Manage PWs.
Create a 1+1 MPLS tunnel protection group and a 1:1 MPLS tunnel protection group,
containing the switching mode, revertive mode, wait-to-restore (WTR) time, and hold-off
time.
Issue 05 (2010-11-19)
Create CES services of structure-aware TDM circuit emulation service over packet
switched network (CESoPSN) and of a structure-agnostic TDM over packet (SAToP).
Configure the service and the QoS of the corresponding PW when creating an L2VPN
service.
8-9
The U2000 supports the following functions for configuring E-AGGR services on a per-NE
basis:
l
Configure the service and the QoS of the corresponding PW when creating an E-AGGR
service.
8-10
Issue 05 (2010-11-19)
Issue 05 (2010-11-19)
8-11
Tunnel Management
Create static CR, RSVP, LDP, and IP tunnels.
Create RSVP and LDP tunnels in batches.
Predeploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels, including the working and protection routes.
View the alarm of a tunnel.
View the performance of a tunnel.
Manage discrete tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Switch services in a 1+1 or 1:1 tunnel protection group manually.
Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.
8-12
Support the IEEE 1588 V2, SDH, and synchronous Ethernet clocks.
Issue 05 (2010-11-19)
Issue 05 (2010-11-19)
9-1
Basic NE Configuration
l
Synchronizing NE time: NE time can be synchronized by delivering the system time of the
U2000 server to all NEs. In addition, you can specify automatic synchronization time and
automatic synchronization period on the U2000.
Plug and play feature of boards: After a board is inserted into a correct slot, the NE Panel
displays the board and board information.
Environment monitoring
Board replacement
Fan management
9-2
Issue 05 (2010-11-19)
Supported
Port Mode/
Encapsulation
Type
Port Type
MP Group
Supported or
Not
Function
SDH interface
General
attributes
Physical port
Not supported
The general
attributes of an
SDH interface
can be
configured
according to its
Layer 3
attributes or be
set to a
channelized
STM service
interface.
Layer 2
attributes
Physical port
Not supported
Carrying ATM
services
Layer 3
attributes
Physical port
Not supported
Carrying
tunnels after the
PPP protocol is
enabled
General
attributes
Physical port
Not supported
Carrying TDM
services
Layer 2
attributes
Physical port
Not supported
Carrying IMA
signals
Layer 3
attributes
Physical port
Supported
Added to a
multi-link PPP
(MP) group
after the PPP
protocol is
enabled
General
attributes
N/A
The general
attributes of an
Ethernet
interface can be
configured
according to the
Layer 2
attributes and
Layer 3
attributes of the
interface.
PDH interface
Ethernet
interface
Issue 05 (2010-11-19)
9-3
Service
Interface
Ethernet virtual
interface
Supported
Port Mode/
Encapsulation
Type
Port Type
MP Group
Supported or
Not
Function
Layer 2
attributes
Physical port
Not supported
Layer 3
attributes
Physical port
Not supported
Carrying
tunnels
General
attributes
Logical port
Not supported
The general
attributes of an
Ethernet
interface can be
configured
according to
Layer 2
attributes and
Layer 3
attributes.
Layer 2
attributes
Logical port
Not supported
VLAN Sub
Interface:
carrying
Ethernet
services
Layer 3
attributes
Logical port
Not supported
l EOA
Virtual
Interface:
carrying IP
tunnels or
GRE tunnels
l VLAN Sub
Interface:
used for
BFD,
L3VPN or
carrying
tunnels
l L3 Virtual
Interface:
carrying IPLINE
services
9-4
Issue 05 (2010-11-19)
Service
Interface
ADSL interface
G.SHDSL
interface
Serial interface
Issue 05 (2010-11-19)
Supported
Port Mode/
Encapsulation
Type
Port Type
MP Group
Supported or
Not
Function
Advanced
attributes
Logical port
Not supported
The advanced
attributes of an
Ethernet virtual
interface can be
configured
according to
attributes of an
ADLS2+
interface.
General
attributes
Physical port
Carrying ADSL
signals
DSLTRUNK
attributes
Logical port
Carrying ADSL
signals
General
attributes
Physical port
Carrying
G.SHDSL
signals
Bound mode
N/A
Carrying
G.SHDSL
signals
EFM bound
group
Logical port
Set according to
the bound mode
ATM bound
group
Logical port
Set according to
the bound mode
IMA bound
group
Logical port
Carrying
G.SHDSL
signals
General
attributes
The general
attributes of a
serial interface
can be
configured
according to the
Layer 3
attributes of the
interface.
Layer 3
attributes
Logical port
Supported
A serial
interface can be
added to an MP
group after the
PPP protocol is
enabled.
9-5
Service
Interface
Supported
Port Mode/
Encapsulation
Type
Port Type
MP Group
Supported or
Not
Function
MP Group
General
attributes
The general
attributes of an
MP group can
be configured
according to the
IP attributes of
the group.
IP attributes
Logical port
Carrying
tunnels
Configure a radio link, including IF 1+1 protection, IF boards, and ODU boards.
Import routes
Configure GR sessions
9-6
Import routes
Issue 05 (2010-11-19)
Clock Configuration
The U2000 supports the configuration of various clock modes, and provides the following
functions:
l
Issue 05 (2010-11-19)
9-7
Configure board 1+1 protection for the SCC and cross-connect boards.
9-8
Issue 05 (2010-11-19)
MSTP Configuration
The multiple spanning tree protocol (MSTP) can be used to clear loops in a network. The MSTP
uses a specific algorithm to block some redundant trails and change a loop network to a nonloop tree network. This function prevents packet increase in a loop network and generation of
broadcast storms in an endless cycle. Different from the STP and RSTP, the MSTP can forward
data according to VLAN packets, achieving load balance of VLAN data.
The U2000 provides the following functions:
l
Issue 05 (2010-11-19)
9-9
Manage routes
BFD Configuration
The bidirectional forwarding detection (BFD) protocol can be used to check the Ethernet link
status.
BFD is a simple Hello protocol. It is similar to the neighbor detection of those famous protocols
in many aspects. A pair of systems periodically send detection packets on the bidirectional
channel where a session between the two systems is created. If a system does not receive any
detection packet from the opposite end in a specific time, the system regards that a failure occurs
on the channel.
The U2000 supports the BFD detection on IP/GRE tunnels and the interior gateway protocol
(IGP).
LPT Configuration
The link state pass through (LPT) protocol is used to return the remote-end link status to the
near end. The near-end equipment performs operations according to the remote-end link status.
When the intermediate transmission network is faulty, the LPT immediately informs the access
equipment at both ends of the transmission network to activate the backup network. In this
manner, the normal transmission of important data is ensured.
QoS Configuration
The quality of service (QoS) indicates the performance of the data flow that travels through a
network. The QoS is used to ensure end-to-end service quality. The QoS cannot increase the
bandwidth, but it can minimize the delay and jitter in the network by properly allocating and
monitoring network resources. In this manner, the quality of important services is ensured.
The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ
function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision policy
to achieve the same per-hop behavior (PHB). DS nodes are classified into edge DS nodes and
internal DS nodes. Edge DS nodes usually perform complex flow classification on the traffic
that enters the DS domain. Different types of traffic are marked with different PHB service types.
Internal DS nodes only need to perform simple flow classification based on PHB service types.
The U2000 supports the following QoS functions:
9-10
Issue 05 (2010-11-19)
To simplify operations and share common QoS configuration parameters, the U2000
supports the creation of QoS function point policies, including port policy, ATM policy,
V-UNI ingress policy, V-UNI egress policy, PW policy, and QinQ policy. By using these
function point policies, you can bind CAR configuration, shaping configuration, flow
classification configuration, WFQ schedule policy, WRED policy, and color blindness
mode.
Configure the QoS profile for applying the same QoS policies to multiple NEs.
The U2000 provides the following functions associated with MPLS tunnels on a per-NE basis:
l
Issue 05 (2010-11-19)
9-11
Manage PWs
Create MPLS tunnel 1+1 protection groups and MPLS tunnel 1:1 protection groups and
configuring switching mode, revertive mode, wait-to-restore (WTR) time, and hold-off
time for the groups
MS PW Configuration
By creating multi-segment pseudowire (MS-PW) to transmit services, you can save tunnel
resources and transmit services over different networks.
9-12
Issue 05 (2010-11-19)
The following types of dual-homing protection can be configured for E-line services.
l
The U2000 provides the following functions associated with CES services:
l
Create CES services of structure-aware TDM circuit emulation service over packet
switched network (CESoPSN) and CES services of structure-agnostic TDM over packet
(SAToP)
Issue 05 (2010-11-19)
9-13
The U2000 provides the following functions associated with ATM services:
l
Issue 05 (2010-11-19)
The U2000 supports the following functions associated with E-line services on a per-NE basis:
l
Configure QoS policies for L2VPN services and corresponding PWs during the creation
of L2VPN services
Issue 05 (2010-11-19)
9-15
The U2000 supports the following functions associated with E-AGGR services on a per-NE
basis:
9-16
Configure QoS policies for L2VPN services and corresponding PWs during the creation
of L2VPN services
Issue 05 (2010-11-19)
E-LAN services use different VLAN IDs to identify service data of different branches. In this
way, data is shared within a branch and is isolated from the data for other branches. The Internet
data of the HQ is also isolated from the internal service data by using the VLAN.
The U2000 supports the following functions associated with E-LAN services on a per-NE basis:
l
Configure QoS policies for L2VPN services and corresponding PWs during the creation
of L2VPN services
Issue 05 (2010-11-19)
9-17
9-18
Perform a CC check
Perform an LB check
Perform an LT check
Issue 05 (2010-11-19)
Create PWE3 services of multiple types, such as ATM, CES, and Ethernet services.
Modify and delete PWE3 services, and view PWE3 services by using the filtering function.
Issue 05 (2010-11-19)
9-19
Implement the function of automatically generating Ethernet OAM for PWE3 services.
Set and view the status of port loopback at the node of PWE3 services.
Modify and delete VPLS services, and view VPLS services by using the filtering function.
Implement the function of automatically generating Ethernet OAM for VPLS services.
Set and view the status of port loopback at the node of VPLS services.
9-20
Modify and delete L3VPN services, and view L3VPN services by using the filtering
function.
Issue 05 (2010-11-19)
Set and view the status of port loopback at the node of L3VPN services.
Configure OAM.
Tunnel Management
You can perform the following operations on the U2000:
l
Predeploy a tunnel.
Modify and delete a tunnel, and view tunnels by using the filtering function.
View the topology of tunnels, including the working and protection routes.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the function
of automatically discovering 1+1 or 1:1 tunnel protection groups.
Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection groups.
Set and view the status of port loopback at the node of tunnel.
Configure OAM.
Issue 05 (2010-11-19)
9-21
Modify and delete IP line services, and view IP line services by using the filtering function.
Set and view the status of port loopback at the node of IP line services.
Manage PWE3 access into PWE3 and PWE3 access into E-AGGR services.
Modify and delete composite services, and view composite services by using the filtering
function.
View the topology of composite services, including the internal connections between the
services.
9-22
Expand a PTN by adding nodes, deleting nodes, and upgrading or adjusting link capacities.
Prepare a service cutover plan by using either the rollback cutover policy or the best-effort
cutover policy.
Hand over, restore, and verify the trails of cutover groups in batches.
Create and modify cutover groups and cutover plans, and delete cutover groups and cutover
plans in batches.
Issue 05 (2010-11-19)
10
10-1
equipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS, VLL,
or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links between
the CE and PEs.
10.9 Report Subsystem Management
The report subsystem allows you to generate, distribute, and manage reports based on the Web
and helps you to monitor, analyze, and optimize network performance.
10.10 VPN Service Management
The U2000 provides centralized and unified management, including service deployment, service
monitoring, and service diagnosis, on VPN services, namely, BGP/MPLS VPN service, VPLS
service, and PWE3 service.
10.11 Tunnel Service Management
Tunnel service management is used to plan and deploy services on the entire MPLS network.
Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel service
management, thus reducing the costs of operating and maintaining MPLS networks.
10-2
Issue 05 (2010-11-19)
Device Management
Device types and software versions can be automatically identified and differentiated
management can be performed accordingly.
Component Management
l
Information about components, including frames, boards, power supplies, fans, and ports
can be automatically obtained.
Information about components can be refreshed and component status can be monitored.
Panel Management
Information about components on panels, including frames, boards, power supplies, fans, and
ports, can be displayed.
Clock Management
Physical clocks and PTP clocks can be configured and managed.
Interface Management
The following interfaces can be configured:
l
Ethernet interfaces
POS interfaces
Virtual interfaces such as subinterfaces, trunk interfaces, loopback interfaces, and virtual
template (VT) interfaces
LLDP Management
LLDP can be globally configured or on interfaces.
VLAN functions, including global VLAN, port VLAN, VLAN stacking, and VLAN
mapping, can be configured.
MAC address forwarding can be managed by configuring static MAC addresses, MAC
address learning rules, and MAC address aging.
10-3
Supports IEEE 802.1ag-related functions, such as the configurations of the MD, MA, local
MEP, remote MEP, and MIP, and diagnostic operations (including loopback, link trace,
MAC ping, and MAC trace).
Channel Management
The following channels can be configured and managed:
l
VTYs
Syslog parameters
Alarms
SSH services
NAP services
QoS Management
The following QoS functions are supported:
l
DS domain policies
HQoS, including the discard policy, HQoS flow queue policy, HQoS flow queue mapping,
HQoS scheduler, and HQoS user scheduling
Route Management
Static routes, routing information, routing policies, OSPF routes, and BGP/IS-IS public network
and private network routes can be configured.
MPLS Management
The following NE-level MPLS configurations are supported:
l
MPLS-related protocols
MPLS TE tunnel
Static LSPs
ACL Management
ACLs-based access control is supported.
10-4
Issue 05 (2010-11-19)
BRAS Management
The following broadband remote access service (BRAS) features of multi-service gateways are
supported:
l
VLAN management
User management
VPDN Management
The Layer-2 Tunneling Protocol (L2TP) can be configured on multi-service gateways and L2TP
tunnels can be managed.
BFD Management
The following BFD functions are supported:
l
BFD attributes
BFD sessions
BFD alarms
VRRP/VGMP Management
l
VPN Management
The following VPN management functions are supported:
l
Tunnel policies
PWs
PW templates
VSIs
VRFs
MSE Management
MSE functions, including global MSE, AAA, user management, and interface services, are
supported.
Issue 05 (2010-11-19)
10-5
Manage routers
Manage IGMP
Manage PIM
Manage MSDP
Manage L3VPN RP
IGMP snooping
SSM mapping
Multicast CAC
Multicast groups
E-Trunk Management
The E-trunk search and discovery, E-trunk configuration, E-trunk member management, and
trunk member monitoring are supported.
ANCP Management
The following ANCP features are supported for routers:
l
ANCP management
Line management
Neighbor management
Device Management
NE software versions can be automatically identified.
10-6
Issue 05 (2010-11-19)
Panel Management
l
Information about components such as frames, boards, power supplies, fans, subboards,
and ports on the NE panel can be displayed.
NE Management
The following functions can be configured and information about these functions can be
displayed:
l
MPLS
QoS
Upgrades NE versions.
Automatic NE configuration management uses the C/S model, in which the NEs serve as the
DHCP clients and the U2000 serves as the DHCP server to remotely deploy and commission
NEs.
Function
The detailed functions are as follows:
l
Issue 05 (2010-11-19)
10-7
Manages scripts
The function of managing device scripts on the U2000 is provided for automatically
deploying device configurations.
Device Management
Device types and software versions can be automatically identified and differentiated
management can be performed accordingly.
Component Management
l
Information about components, including frames, boards, power supplies, fans, and ports
can be automatically obtained.
Information about components can be refreshed and component status can be monitored.
Panel Management
Information about components on panels, including frames, boards, power supplies, fans, and
ports, can be displayed.
LLDP Management
LLDP can be globally configured or on interfaces.
Interface Management
The following interfaces can be configured:
10-8
Ethernet interfaces
POS interfaces
Virtual interfaces such as subinterfaces, trunk interfaces, loopback interfaces, and Tunnel
interfaces
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
OAM Management
OAM is implemented on the basis of two standards: IEEE 802.1ag and IEEE 802.3ah. The
U2000 can continuously monitor user services, and identify and locate faults by means of IEEE
802.1ag; the U2000 can monitor user services of the last mile and report faults by means of IEEE
802.3ah.
Ethernet OAM management supports the following functions:
l
Supports IEEE 802.1ag-related functions, such as the configurations of the MD, MA, local
MEP, remote MEP, and MIP, and diagnostic operations (including loopback, link trace,
MAC ping, and MAC trace).
Route Management
Static routes, routing policies, OSPF routes, IS-IS routes, and BGP routes can be configured.
MPLS Management
The following NE-level MPLS configurations are supported:
l
MPLS-related protocols
MPLS TE tunnel
Static LSPs
BFD Management
The following BFD functions are supported:
l
BFD attributes
BFD sessions
BFD alarms
VRRP/VGMP Management
l
Issue 05 (2010-11-19)
10-9
VPN Management
The following VPN functions are supported:
l
Tunnel policies
PWs
PW templates
VSIs
VRFs
EPON Management
PON interface management and ONU management are supported.
Channel Management
The following channels can be configured and managed:
l
VTYs
FTP services
Local users
Syslog parameters
Alarm services
SSH services
SNMP parameters
DLDP Management
The Device Link Detection Protocol (DLDP), packet authentication mode, and statistics
collection are supported.
MSTP Management
MSTP domains, MSTP protection, and statistics collection are supported.
DHCP Management
DHCP servers, DHCP relay, client addresses, and DHCP statistics are supported.
Mirroring Management
Local/remote interface mirroring, VLAN mirroring, MAC address mirroring, flow mirroring,
CPU mirroring, and CPU buffer statistics are supported.
10-10
Issue 05 (2010-11-19)
PPPoE+ Management
PPPoE+ functions are supported.
MFF Management
Static gateways, MFF servers, and MFF network-side interfaces are supported.
ARP Management
Proxy ARP and ARP Ping-IP are supported.
Firewall Management
Firewall functions are supported.
NAT
Network address translation (NAT) is supported.
Anti-attack Management
Whitelists, blacklists, user-defined flow, and CAR are supported.
10-11
MBGP Management
Route advertisement policies, route exchange policies, and route attributes are supported.
RRPP Management
RRPP, RRPP instances, RRPP rings, and working mode are supported.
MSDP Management
MSDP peers and SA messages are supported.
PIM-DM Management
Multicast sources, multicast neighbors, multicast forwarding, and assertion management are
supported.
PIM-SM Management
Multicast sources, multicast neighbors, dynamic RP, and SPT switching are supported.
IGMP Management
IGMP groups, IGMP group policies, and IGMP features are supported.
802.1x Management
802.1x management is supported.
Issue 05 (2010-11-19)
PoE Configuration
PoE is supported.
Stack Configuration
Stack functions are supported.
QoS Management
The following QoS functions are supported:
l
DS domain policies
VLANIF Configuration
VLAN interfaces are supported.
Ethernet Configuration
LDT, MAC tables, BPDU tunnels, and SEP are supported.
Security Configuration
The ACL, firewall, NAT, and ARP features are supported.
Basic Configuration
NAP remote deployment is supported.
Template Features
Default templates are available. When a template is referenced, the attribute settings on the
template automatically apply to the configured resource.
A template has the following features:
l
Issue 05 (2010-11-19)
Offline configuration
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
10-13
Global templates are created in advance and saved on the U2000. They are not created on
devices. The creation of global templates is irrelevant to the equipment status.
l
Global validity
A global template can be referenced by all the devices managed by the U2000.
A global template can be referenced by a large number of devices of the same type. The
number of global templates, therefore, is small. Consequently, global templates are easy to
manage.
Main Templates
The main templates are as follows:
l
ACL template
An ACL template allows you to configure ACLs on multiple interfaces of different routers
at the same time, simplifying attack defense configurations on the network access side.
QoS template
Routers support the following QoS templates, which can be applied to NE interfaces in
batches:
CBQoS templates
DS domain templates
HQoS templates
PQ templates
Interface CAR templates
IP multicast template
Routers support the following IP multicast templates:
Layer 2 CAC templates, which can be applied to VSIs, PWs, and NE interfaces to adjust
and configure multicast CAC configurations in batches
Layer 2 static multicast group templates, which can be applied to PWs and NE interfaces
to adjust and configure static multicast groups in batches
Issue 05 (2010-11-19)
The U2000 provides test cases, such as VPLS MAC ping/traceroute, ICMP ping/traceroute,
PWE3 ping/traceroute, LSP ping/traceroute, and ICMP VRF ping/traceroute, which can
help you to test network connectivity at each protocol layer.
The U2000 allows you to combine several test cases into a test suite, so that you can perform
test cases in batches. By diagnosing services layer by layer, the U2000 can rapidly locate
the network layer where a fault occurs.
Application layer
DNS, DHCP, FTP, HTTP, SNMP, and VoIP
Transport layer
TCP and UDP
Network layer
ICMP ping/traceroute, ICMP VRF ping/traceroute, ICMP jitter, multicast ping/trace,
multicast VRF trace, and MTU ping
Data link layer
8021.ag MAC ping and CE ping
MPLS service
PWE3 ping, PWE3 trace, LSP ping, LSP trace, VPLS MAC ping, VPLS MAC trace,
MAC study, MFIB ping, and service ping
The U2000 supports intelligent diagnostic result analysis. A result analysis template can
be customized to include diagnostic indicators such as delay, jitter, and packet loss ratio
and a result analysis policy based on service levels. Diagnostic result analysis can help you
rapidly determine network status.
Test suite
A test suite consists of multiple test cases. Test cases are implemented on different
layers: the application layer, transport layer, network layer, and data link layer. Test
cases for MPLS services can also be created.
You can choose to perform all test cases or only some cases in a test suite at the same
time. QoS can be determined based on the parameters shown in the test results, such as
delay, jitter, and packet loss ratio.
Diagnostic policy
Test suites can be performed at a specified interval, such as daily, weekly, or monthly.
Network scanning
Network information is collected and virtual link connectivity and side-by-side link
connectivity are tested. The U2000 displays scanning progress in real time and allows you
to stop the scanning. It also provides the traceroute function to locate faults.
l
Issue 05 (2010-11-19)
Historical data
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
10-15
The U2000 records historical data of test suite operations. It supports filtering and querying
historical data based on test suite names, test results, or test time.
l
Configuring clusters
10-16
Issue 05 (2010-11-19)
Setting the parameters, such as the management VLAN, IP address pool, and multicast
MAC address, for the switches of a cluster
Supporting the plug-and-play feature of protocols such as NDP, NTDP, and HGMP
Supporting the access to command or member switches through Telnet based on the nodes
in the cluster view
Creat an E-Trunk, bind Eth-Trunks, and configure the attributes of the E-Trunk and the
Eth-Trunks.
Display the automatically discovered E-Trunk information in the database of the NMS to
the interface of the NMS.
Automatically discover the E-Trunk by user specify the equipment range, the configuration
of the equipment and the E-Trunk group can be automatically discovered.
Issue 05 (2010-11-19)
10-17
Service Deployment
The U2000 provides a user-friendly service configuration GUI on which you can complete all
configuration operations. The parameters of multiple sets of equipment can be automatically
generated through related service templates. User configuration results can be previewed through
the topology before being delivered.
l
Customer management
The U2000 supports the operations of adding, deleting, and modifying customers, and
binding customers to VPN services.
In service wholesale mode, the ME60 forwards all the user service packets of a certain ISP
to the access server of the ISP through VPNs.
In this mode, the ME60 does not forward packets according to the destination IP
addresses of the packets as it usually does. Instead, the ME60 forwards packets
according to the ISP information of the users and forwards all the packets from the users
to the access server of the ISP. The access server of the ISP then implements the related
services or performs service accounting.
With the service wholesale feature, the U2000 can support the multi-ISP service. The
multi-ISP service is also called the virtual ISP service. For a multi-ISP service, multiple
ISPs exist on a physical network. These ISPs lease the physical network of the physical
network provider to operate services. Generally, the providers who construct physical
networks are called network service providers (NSPs) and the providers who lease
physical networks to operate services are called ISPs.
10-18
Issue 05 (2010-11-19)
The ME60 supports the multi-ISP service by wholesaling the user service packets of
different ISPs to related ISPs.
l
Service Monitoring
l
The U2000 provides the visual topology display function for MPLS VPN, VPLS, and
PWE3 services. The running status of the resources used by the current service, such as an
interface, a VRF, or a VSI, can be displayed in the related topology view, thus helping you
to quickly locate faults. Moreover, the U2000 also allows you to customize topology views.
For example, you can place the services of key customers in one topology view for
monitoring.
You can quickly locate a faulty service based on the alarm generated by the related NE.
Service Diagnosis
l
The diagnosis tools are used to detect the connectivity of networks and locate faults.
Through the service diagnosis function, you can generate diagnosis tasks according to the
selected services and directly operate equipment nodes in topology views. The diagnosis
results can be directly displayed.
Service connectivity test: testing the service connectivity through the ping and tracert tests,
and locating the fault equipment
Protocol status test: checking the service protocol status and the forwarding table, and
displaying the error information, thereby helping you to locate faults
Issue 05 (2010-11-19)
10-19
Tunnel Deployment
l
Enabling MPLS, LDP, and MPLS TE on the network equipment and interfaces in batches
Implement the planning of traffic on MPLS core networks by supporting the deployment
of end-to-end MPLS TE tunnel services
Facilitating the implementation of the MPLS access scheme by supporting the deployment
of static LSP services
Tunnel Monitoring
l
Supporting the networkwide tunnel view and displaying multiple types of tunnels, such as
static, RSVP, LDP, and IP tunnels, and their alarms in the topology view
Tunnel Diagnosis
The U2000 supports LSP ping and LSP tracert functions through which you can diagnose
deployed MPLS TE tunnels and static tunnel services.
10-20
Issue 05 (2010-11-19)
11
Issue 05 (2010-11-19)
11-1
Device management
Identifies software versions and adapt to different types of devices automatically.
Supports channel management, including local users using Telnet and STelnet, SNMP
parameters, and trap parameters.
Component management
Information about device components, including frames, boards, power supplies, fans,
and ports can be automatically obtained.
Information about device components can be refreshed and device component status
can be monitored.
Panel management
Information about components on the panel, including frames, boards, power supplies, fans,
and ports, can be displayed.
Interface management
General interface information and Ethernet interfaces can be configured.
GTP management
Security devices can filter GTP packets according to GTP policies to protect GPRS
networks from attacks such as GTP overbilling attacks.
Automatic registration
The U2000 can automatically update the IP address of a receiving device based on
registration messages sent by the receiving device.
11-2
Users can open the Web management window of a device on a U2000 client.
Issue 05 (2010-11-19)
Users can access security devices by means of the Hyper Text Transfer Protocol (HTTP)
or the Hyper Text Transfer Protocol Secure (HTTPS) protocol.
Multiple Web protocols, such as Java script, Hyper Text Marked Language (HTML), CSS,
and Applet, and technologies related to Web 2.0 are supported.
Policy recovery
During network security management and maintenance, the data consistency between
the U2000 and devices must be ensured so that the actual network configurations can
be accurately displayed on the U2000.
Policy recovery can restore the security policies and attack defense configurations
deployed on devices and the used resources of devices to the U2000, achieving the data
consistency between the NMS and devices.
Policy audit
Auditing the configuration data difference between the U2000 and devices helps to ensure
data consistency between the NEs and the U2000.
l
Issue 05 (2010-11-19)
2.
11-3
Whether a policy is deployed, whether the deployment is successful, and whether the
deployment status is the same as that on the device can be displayed. This helps to prevent
duplicate deployment of a policy.
l
11-4
Issue 05 (2010-11-19)
After a rule is created and deployed to a device, the device filters device information according
to this rule.
The U2000 allows you to modify the device rule, including:
l
The U2000 also allows you to delete a rule, or the value of a certain configuration item of a rule.
Issue 05 (2010-11-19)
11-5
As flexible support for the IP protocol, security services can be classified into TCP
services, UDP services, ICMP services, and other services. The U2000 provides some
basic services by default. You can create different services by adding different
parameter settings to the same protocol. Different types of services can form a service
group. A rule corresponds to one or multiple services. In the case where a rule
corresponds to multiple services, these services can be in a service group or map to these
services. When you log in to the U2000 for the first time, the U2000 provides some
services by default.
Address set
When setting source and destination addresses on the U2000, you can either set single
IP addresses or set address sets.
Time range
Time ranges are classified into two types: continuous time ranges and periodic time
ranges. A continuous time range starts from one time point and ends at another time
point. Rules are valid only within the time range. A period time range is on a weekly
cycle. You need to set the start time and end time of a day and specify on which days
of a week the rules are valid. Then the rules will take effect on a weekly cycle.
Port set
A port set is a collection of single, continuous, or discontinuous port numbers, specifying
the ports through which the server can provide services. The value of a port set ranges
from 0 to 65535.
l
Issue 05 (2010-11-19)
Service deployment
This feature provides both the single service deployment function and the service batch
deployment function. Service deployment is used to make services take effect on devices.
You can view the deployment results through the auditing function.
Service discovery
This feature supports the function of automatically discovering services. With this function,
you can discover running IPSec VPN services on the network and then restore the
discovered services to the U2000 for unified management and monitoring.
Service monitoring
By monitoring the status of managed services in real time, the performance management
module allows you to view the service status in the topology view. The performance
management module monitors the service status and performance indicators and displays
collected performance data in graphs or reports.
Service audit
This feature supports to audit the differences of service configuration between the NMS
and device.
Service deployment
The remote access service management supports the deployment of a single service and
the deployment of services in batches. In addition, you can view deployment results in the
service topology view. Remote access services include L2TP service, L2TP over IPSec
service and IPSec (IKEv2) service three types.
Service monitoring
The L2TP service, L2TP over IPSec service and IPSec (IKEv2) service management can
manage and monitor the online users of remote access services. It also provides the
functions of displaying the statuses of online users in real time, restricting the number of
online users, and forcing users to log out.
l
Issue 05 (2010-11-19)
11-7
The remote access service management provides the function of visualizing the service
topology. In the topology view, you can view service alarms, service statuses, and servicerelated device alarms.
l
Service audit
The remote access service management supports to audit the differences of service
configuration between the NMS and device.
11-8
Issue 05 (2010-11-19)
12
Issue 05 (2010-11-19)
12-1
Device Management
Device management includes the management of NE panels, basic and common device
attributes, clock sources, security, protocols, and device templates.
NE Panel Management
You can perform the following operations on the U2000:
l
Query the CPU usage and memory usage of boards in real time.
Query the license information about the functions and resources of devices.
Configure the system time, IP address of a device, and the binding between a Layer 3
interface and an IP address.
Issue 05 (2010-11-19)
Security Management
You can perform the following operations on the U2000:
l
Enable and disable anti-ICMP attack, anti-IP attack, anti-IP spoofing, anti-MAC spoofing,
and anti-DoS attack.
Protocol Management
You can perform the following operations on the U2000:
l
Manage the Link Aggregation Control Protocol (LACP), Spanning Tree Protocol (STP)/
Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP),
Bidirectional Forwarding Detection (BFD), and Internet Group Management Protocol
(IGMP).
Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option
(RAIO) customized format.
12-3
On IMA E1/T1 ports, you can query real-time performance statistics of the ports, and manage
IMA groups and IMA links, such as adding, deleting, modifying, resetting, blocking, and
unblocking an IMA group or link.
Management of Ethernet Ports
Ethernet port management includes the management of ports and aggregation groups. You can
perform the following operations on the U2000:
l
Configure the PPPoE, DHCP option 82, 802.3ah ETH OAM loopback, and port rate limit
functions.
Connection Management
Connection management includes the management of service virtual ports and E1 connections.
Service Virtual Port Management
A service virtual port enables user equipment to access the OLT. The service virtual port provides
service streams between the user equipment and the OLT for carrying user services. You can
perform the following operations on the U2000:
12-4
Query, add, delete, modify, activate, and deactivate a service virtual port.
Collect the real-time performance statistics and clear the performance statistics.
Configure the extended attributes of a service virtual port. Extended attributes allow for
greater flexibility of addressing customer requirements. Extended attributes include the
maximum number of learnable MAC addresses, the PPPoE session, the encapsulation type,
and the maximum number of MAC addresses that can be bound.
Configure the connection attributes of a service virtual port, including the alias, VPI/VCI,
transmit traffic profile, and receive traffic profile.
Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtual
port. After successful shifting, the service port assumes the new VLAN ID.
Bind IP addresses to a service virtual port and query the bound IP addresses. To specify
that only the users with certain IP addresses can access the service virtual port, perform the
binding operation. After successful binding, the service forwarding module checks the
source IP address of user packets. If the source IP address does not match any of the IP
addresses bound to the service virtual port, the user packets are dropped. Otherwise, the
user packets are forwarded. This ensures the security of user access.
Bind static MAC addresses to a service virtual port. To specify that only the users with
certain static MAC addresses can access the service virtual port, perform this operation.
After successful binding, the service forwarding module checks the source MAC address
of user packets. If the source MAC address does not match any of the MAC addresses
bound to the service virtual port, the user packets are dropped. Otherwise, the user packets
are forwarded. This ensures the security of user access.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
Configure service bundles. If several service virtual ports carry the same service, a service
bundle can be configured to bundle the service streams over the service virtual ports.
E1 Connection Management
In the FTTx scenario, an E1 connection is used for transmitting the TDM service over the GPON
network by encapsulating the TDM packets directly into a GPON GEM frame. In E1 connection
management, you can query, add, modify, and delete an E1 connection on the U2000.
Layer 2 Management
Layer 2 management includes the management of the VLAN, the Rapid Spanning Tree Protocol
(RSTP), Multiple Spanning Tree Protocol (MSTP), Access Node Control Protocol (ANCP), and
Rapid Ring Protection Protocol (RRPP).
VLAN Service Management
VLAN service management includes the management of the standard VLAN, MUX VLAN,
smart VLAN, and super VLAN. You can perform the following operations on the U2000:
l
RSTP Management
You can perform the following operations on the U2000:
l
Modify and restore the default value of the trail overheads of a port.
MSTP Management
MSTP management includes the management of domains, instances, and ports. You can perform
the following operations on the U2000:
l
Modify a port.
ANCP Management
You can perform the following operations on the U2000:
l
RRPP Management
For RRPP management, you can perform the query, add, delete, and modify operations.
Issue 05 (2010-11-19)
12-5
Layer 3 Management
Layer 3 management includes the management of the Dynamic Host Configuration Protocol
(DHCP), Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge
(PWE3), and Layer 3 routes.
DHCP Management
DHCP management includes the management of the DHCP server group, MAC address
segment, standard mode, DHCP domain, and VLAN L3 interface. You can perform the
following operations on the U2000:
l
MPLS/PWE3 Management
The MPLS is a transmission technology. It implements transparent transmission of data packets
between users. The MPLS tunnel is defined in the MPLS protocol. Independent of a service, an
MPLS tunnel implements end-to-end transmission and carries service-related PWs.
You can perform the following operations on the MPLS tunnel on a per-NE basis on the U2000:
l
Create an E-LSP.
Manage PWs.
12-6
Configure one or more time segments, and associate a time segment with an ACL by
specifying the name of the time segment in the ACL.
Query, modify, create, and delete the ACL of the standard, extended, Layer 2, and userdefined types.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
QoS management includes filtering packets based on ACL, tagging priorities, limiting traffic
and port rate, collecting statistics on traffic, redirecting, and mirroring. On the U2000, you can
query, add, modify, and delete a QoS policy.
HQoS stands for the hierarchical QoS. It not only controls user traffic but also schedules packets
according to the priorities of user services. On the U2000, you can query, add, modify, and delete
an HQoS policy.
BFD Management
The BFD can quickly check the link status between two devices.
To mitigate the impact of device faults on services and to improve the network availability, a
network device needs to quickly detect any fault occurring between the device and its adjacent
devices. Actions can then be taken to ensure service continuity. The BFD enables the device to
check the connectivity of a type of data protocol of the same trail between two systems. The trail
can be a physical or a logical link, including a tunnel. The BFD mechanism is a remedy for the
weakness of the existing detection mechanism.
Manage maintenance domains (MDs). Ethernet CFM divides a network into up to eight
levels. A bridge can span multiple levels to manage different MDs. A CFM MD is
constituted by bridges. An MD is the combination of bridges and maintenance levels. MDs
can be classified into three layers: user domain (levels 7-5), service provider domain (levels
4-3), and carrier domain (levels 2-0). Different MDs are maintained by different
management entities.
Manage maintenance associations (MAs). An MD can be divided into multiple MAs. Each
MA maps a service instance (SI) that belongs to an MD and is identified by a VLAN. An
MA can be regarded as a combination of an MD and a VLAN. According to the standards,
multiple VLANs can map one SI, and one SI maps one MA.
Manage maintenance points (MPs). An MA consists of MPs defined on the ports of bridges.
An MP is a combination of a bridge port, a VLAN, and a maintenance level. MPs are
classified into maintenance association end points (MEPs) and maintenance association
Issue 05 (2010-11-19)
12-7
intermediate points (MIPs). MEPs initiate and respond to CFM messages; MIPs
transparently transmit or respond to CFM messages but do not initiate the messages.
12-8
Modify the port attributes, such as the minimum reach, maximum reach, configuration
status of the ONU auto-discovery function, configuration status of the downstream FEC
function, status of the laser switch, and update cycle of the encryption key of the GPON
UNI port.
Enable and disable the ONU auto-discovery function for a GPON UNI port. After the ONU
auto-discovery function is enabled, the OLT regularly checks whether any ONUs newly
connected to the GPON UNI port are online.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
Cut over services to implement GPON port backup on the OLT. If the active GPON port
on the OLT is faulty, you can switch over the ONU services from the faulty GPON port to
the specified standby GPON port on the OLT.
Query the alarms of GPON UNI ports. This function allows you to maintain and manage
GPON UNI ports according to the details about and suggested solutions for active alarms.
Enable and disable the laser of a GPON UNI port. By default, the laser of a GPON UNI
port is enabled so that the ONUs connected to the GPON UNI port can go online.
Query the real-time performance statistics and clear the performance statistics.
A GEM port identifies the virtual service channel that carries service streams between the
MA5600T or MA5603T and an ONU. An ONU can provision services only after the mapping
between the GEM port, T-CONT, and service stream is configured on the ONU. For GEM port
management, you can perform the following operations on the U2000:
l
Enable and disable the encryption function. When the encryption function is enabled, the
device encrypts the service stream carried on the GEM port. This feature enhances the
security of user data.
Bind a GEM port to an ONU to establish the mapping between the GEM port on the OLT
and the T-CONT on the ONU.
Limit the rate of packets of a specified priority on a GEM port according to the specified
traffic profile.
Query the real-time performance statistics and clear the performance statistics of a GEM
port.
An ONU provides user interfaces. A GPON UNI port can be connected to a maximum of 128
ONUs. For GPON ONU management, you can perform the following operations on the U2000:
l
Generate topological nodes. Perform this operation to generate topological nodes for ONT
management in the topology view.
Locate directly an ONU in the topology view through the topological node.
Re-register an ONU. After an online ONU is reset by force, the ONU re-registers with the
OLT to update the registration information about the ONU.
Re-discover an ONU. ONU re-discovery is applicable only to the ONU that adopts the
once-on authentication mode.
Configure the parameters of value-added service (VAS). The VAS feature of the GPON
ONU is used for provisioning VAS, such as the VoIP service.
Upgrade ONUs.
Query the real-time performance statistics of ONUs and clear the performance statistics.
12-9
The EPON uses the wavelength division multiplexing (WDM) technology for concurrent
bidirectional signal transmission. Upstream and downstream signals are transmitted over
different wavelengths: upstream uses a 1310 nm wavelength and downstream uses a 1490 nm
wavelength. The EPON provisions the voice, data, and video services for users over a single
optical fiber.
Currently, the EPON supports a maximum symmetric transmission rate of 1.25 Gbit/s in
upstream and downstream, and a maximum transmission reach of 20 km. In downstream
direction, the EPON broadcasts encrypted data to different users; in upstream direction, the
EPON employs the time division multiplexing (TDM) technology. In this way, the EPON
implements bandwidth sharing in upstream and downstream directions and accommodates the
bandwidth requirements of access users.
EPON service management includes the management of EPON UNI ports and ONUs.
The EPON UNI port is the downstream port for the EPON access. The OLT is connected to
various types of ONUs, including MDUs, through the UNI port to provision high-speed Internet
service for users. For EPON UNI port management, you can perform the following operations
on the U2000:
l
Modify the attributes of an EPON UNI port, including the alias, ONU auto-discovery
function, the maximum distance between an ONU and the OLT, and the tag attribute of
packets.
Display the topology of the optical distribution node (ODN). The EPON UNI port, as an
ODN, is connected to a remote MDU. With this feature, you can enter the ODN+MDU
Layer 2 topology view, and view the ODN-centered star topology. In addition, you can
add, delete, and modify the MDU, and configure relevant services.
Enable and disable an EPON UNI port. The laser of an EPON UNI port is enabled by default
so that the ONUs connected to the EPON UNI port can go online.
Enable and disable the ONU auto-discovery function for an EPON UNI port. After the
ONU auto-discovery function is enabled, the OLT regularly checks whether any ONUs
newly connected to the EPON UNI port go online.
Cut over services to implement EPON port backup on the OLT. If the active EPON port
on the OLT is faulty, you can switch over the ONU services from the faulty EPON port to
a specified standby EPON port on the OLT.
Query the alarms of EPON UNI ports. This function allows you to maintain and manage
EPON UNI ports according to the details about and suggested solutions for active alarms.
Query the real-time performance statistics and clear the performance statistics.
An ONU provides user interfaces. For EPON ONU management, you can perform the following
operations on the U2000:
12-10
Generate topological nodes. Perform this operation to generate topological nodes for ONT
management in the topology view.
Locate directly an ONU in the topology view through the topological node.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
Re-register an ONU. After an online ONU is reset by force, the ONU re-registers with the
OLT to update the registration information about the ONU.
Re-discover an ONU. ONU re-discovery is applicable only to the ONU that adopts the
once-on authentication mode.
Configure the parameters of value-added service (VAS). The VAS feature of the EPON
ONU is used for provisioning VAS, such as the VoIP service.
Upgrade ONUs.
Query the real-time performance statistics of ONUs and clear the performance statistics.
IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer.
It is used to manage and control multicast services.
IGMP proxy: In a tree topology, the OLT does not set up routes for forwarding multicast
packets; the OLT only relays and forwards multicast protocol packets. To multicast users,
the OLT is a multicast router that implements the router functions defined in the IGMP
protocol. To multicast routers, the OLT is a multicast user.
You can perform the following operations on the U2000 to manage multicast services:
l
12-11
Device Management
Device management includes the management of NE panels, basic and common device
attributes, clock sources, security, protocols, global configuration of services, and device
templates.
NE Panel Management
You can perform the following operations on the U2000:
l
Query the real-time performance statistics on the CPU usage and memory of boards.
Query the license information about the functions and resources of devices.
Configure the system time, IP address of a device, and the binding between a Layer 3
interface and an IP address.
Issue 05 (2010-11-19)
Security Management
You can perform the following operations on the U2000:
l
Enable and disable anti-ICMP attack, anti-IP attack, anti-IP spoofing, anti-MAC spoofing,
and anti-DoS attack.
Protocol Management
You can perform the following operations on the U2000:
l
Manage the Link Aggregation Control Protocol (LACP), Spanning Tree Protocol (STP)/
Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP),
Bidirectional Forwarding Detection (BFD), and Internet Group Management Protocol
(IGMP).
Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option
(RAIO) custom format.
Configure the suppression level of the broadcast, multicast, and unknown unicast packet
traffic.
Collect the real-time performance statistics on the number of discarded Ethernet frames,
transmitted Ethernet frames, received Ethernet frames, transmitted GEM frames, received
GEM frames, transmitted PLOAM messages, received PLOAM messages, transmitted
OMC messages, and received OMC messages.
12-13
EPON NNI is the upstream port provided by the ONU. You can perform the following operations
on the U2000:
l
Configure the PPPoE, DHCP option 82, 802.3ah ETH OAM loopback, and port rate limit
functions.
Connection Management
ONU connection management includes the management of service virtual ports.
Service Virtual Port Management
A service virtual port enables user equipment to access the ONU. The service virtual port
provides service streams between the user equipment and the ONU for carrying user services.
You can perform the following operations on the U2000:
12-14
Query, add, delete, modify, activate, and deactivate a service virtual port.
Collect the real-time performance statistics and clear the performance statistics.
Configure the extended attributes of a service virtual port. Extended attributes allow for
greater flexibility of addressing customer requirements. Extended attributes include the
maximum number of learnable MAC addresses, the PPPoE session, the encapsulation type,
and the maximum number of MAC addresses that can be bound.
Configure the connection attributes of a service virtual port, including the alias, VPI/VCI,
transmit traffic profile, and receive traffic profile.
Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtual
port. After successful shifting, the service port assumes the new VLAN ID.
Bind IP addresses to a service virtual port and query the bound IP addresses. To specify
that only the users with certain IP addresses can access the service virtual port, perform the
binding operation. After successful binding, the service forwarding module checks the
source IP address of user packets. If the source IP address does not match any of the IP
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
addresses bound to the service virtual port, the user packets are dropped. Otherwise, the
user packets are forwarded. This ensures the security of user access.
l
Bind static MAC addresses to a service virtual port. To specify that only the users with
certain static MAC addresses can access the service virtual port, perform the binding
operation. After successful binding, the service forwarding module checks the source MAC
address of user packets. If the source MAC address does not match any of the MAC
addresses bound to the service virtual port, the user packets are dropped. Otherwise, the
user packets are forwarded. This ensures the security of user access.
Configure service bundles. If several service virtual ports carry the same service, a service
bundle can be configured to bundle the service streams over the service virtual ports.
Layer 2 Management
Layer 2 management includes the management of the VLAN, the Rapid Spanning Tree Protocol
(RSTP), the Multiple Spanning Tree Protocol (MSTP), and the Access Node Control Protocol
(ANCP).
VLAN Service Management
VLAN service management includes the management of the standard VLAN, MUX VLAN,
smart VLAN, and super VLAN. You can perform the following operations on the U2000:
l
RSTP Management
You can perform the following operations on the U2000:
l
Modify and restore the default value of the trail overheads of a port.
MSTP Management
MSTP management includes the management of domains, instances, and ports. You can perform
the following operations on the U2000:
l
Modify a port.
ANCP Management
You can perform the following operations on the U2000:
l
Issue 05 (2010-11-19)
12-15
Layer 3 Management
Layer 3 management includes the management of the Dynamic Host Configuration Protocol
(DHCP), Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge
(PWE3), and Layer 3 routes.
DHCP Management
DHCP management includes the management of the DHCP server group, MAC address
segment, standard mode, DHCP domain, and VLAN L3 interface. You can perform the
following operations on the U2000:
l
MPLS/PWE3 Management
The MPLS is a transmission technology. It implements transparent transmission of data packets
between users. The MPLS tunnel is defined in the MPLS protocol. Independent of a service, an
MPLS tunnel implements end-to-end transmission and carries service-related PWs.
You can perform the following operations on the MPLS tunnel on a per-NE basis on the U2000:
l
Create an E-LSP.
Manage PWs.
12-16
Configure one or more time segments, and associate a time segment with an ACL by
specifying the name of the time segment in the ACL.
Query, modify, create, and delete the ACL of the standard, extended, Layer 2, and userdefined types.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
QoS management includes filtering packets based on ACL, tagging priorities, limiting traffic
and port rate, collecting statistics on traffic, redirecting, and mirroring. On the U2000, you can
query, add, modify, and delete a QoS policy.
BFD Management
The BFD mechanism can quickly check the link status between two devices.
To mitigate the impact of device faults on services and to improve the network availability, a
network device needs to quickly detect any fault occurring between the device and its adjacent
devices. Actions can then be taken to ensure service continuity. The BFD enables the device to
check the connectivity of a type of data protocol of the same trail between two systems. The trail
can be a physical or a logical link, including a tunnel. The BFD mechanism is a remedy for the
weakness of the existing detection mechanism.
Manage maintenance domains (MDs). Ethernet CFM divides a network into up to eight
levels. A bridge can span multiple levels to manage different MDs. A CFM MD is
constituted by bridges. An MD is the combination of bridges and maintenance levels. MDs
can be classified into three layers: user domain (levels 7-5), service provider domain (levels
4-3), and carrier domain (levels 2-0). Different MDs are maintained by different
management entities.
Manage maintenance associations (MAs). An MD can be divided into multiple MAs. Each
MA maps a service instance (SI) that belongs to an MD and is identified by a VLAN. An
MA can be regarded as a combination of an MD and a VLAN. According to the standards,
multiple VLANs can map one SI, and one SI maps one MA.
Manage maintenance points (MPs). An MA consists of MPs defined on the ports of bridges.
An MP is a combination of a bridge port, a VLAN, and a maintenance level. MPs are
classified into maintenance association end points (MEPs) and maintenance association
intermediate points (MIPs). MEPs initiate and respond to CFM messages; MIPs
transparently transmit or respond to CFM messages but do not initiate the messages.
Issue 05 (2010-11-19)
12-17
Configure the port attributes, such as the associated line template, alarm template, extended
template, and monitoring thresholds. These attributes are used to activate the ADSL port.
Maintain a port.
Bind and unbind a port. You can bind multiple ATM G.SHDSL ports. This increases the
bandwidth at the physical layer and improves the rate of the ATM G.SHDSL port.
Configure port attributes, such as the associated line profile and alarm profile. These
attributes are used to activate the ATM G.SHDSL port.
12-18
Issue 05 (2010-11-19)
Configure the port attributes, such as the associated line profile, alarm profile, extended
profile, and monitoring thresholds of a VDSL2 port. These attributes are used to activate
the VDSL2 port.
Control the PPPoE, DHCP Option 82, 802.3ah ETH OAM loopback, and port rate limit
functions.
IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer.
It is used to manage and control multicast services.
IGMP proxy: In a tree topology, the OLT does not set up routes for forwarding multicast
packets; the OLT only relays and forwards multicast protocol packets. To multicast users,
the OLT is a multicast router that implements the router functions defined in the IGMP
protocol. To multicast routers, the OLT is a multicast user.
You can perform the following operations on the U2000 to manage multicast services:
l
Issue 05 (2010-11-19)
12-19
Manage MGs
Manage MGCs
SG Management
Signaling gateway (SG) management includes the management of signaling gateways and
associations. An SG is a part for signaling interaction. An SG is a signaling proxy for receiving
and transmitting signaling messages between the No.7 signaling network and the IP network.
An SCTP association provides data transmission for the transfer of the protocol data unit of one
or more ports.
VoIP PSTN Port Management
The public switched telephone network (PSTN) is a communication network that provides
telephone services for public users over analog subscriber lines. It is also called plain old
telephone service (POTS).
Voice over IP (VoIP) is a communication mode for delivery of voice and data over Internet
Protocol (IP) networks. In the VoIP technology, voice information is transmitted in digital form
in discrete packets rather than through the traditional circuit-oriented protocols of PSTN.
The VoIP PSTN service is provided through the VoIP PSTN ports on the voice service board
of an ONU. A gateway is established on the ONU between the PSTN network and the IP network.
You can perform the following operations on the U2000:
l
Reset a port.
Issue 05 (2010-11-19)
Reset a port.
Query the statistics on the usage of MG ports and collect the number of VoIP ISDN BRA
ports by port status.
Query the statistics on the usage of MG ports and collect the number of VoIP ISDN PRA
ports by port status.
Query the timeslots that are occupied by a specified VoIP ISDN PRA port.
The versions of the MDUs of the same type in the entire network must be the same.
The configuration data of the MDUs must be backed up periodically to safeguard the data.
Issue 05 (2010-11-19)
12-21
Only one MDU can go offline and one MDU be automatically discovered during automatic
replacement.
3. The hardware installation engineer replaces the faulty MDU with a new MDU and
furnishes the maintenance engineer with the identification information about the new
MDU.
4. The maintenance engineer modifies the authentication information about the MDU on
the U2000, starts the automatic upgrade of the NE software by using the DC component,
and loads the configuration file to the MDU.
Solution benefit:
l
Remote Acceptance
To achieve one site visit and reduce the O&M cost in FTTx network construction, the deployed
ONUs must support remote acceptance. With the FTTx PnP solution, you can perform the
following acceptance operations:
l
Narrowband emulation acceptance, to check whether the voice links are in the normal state
by using the call emulation test.
PPPoE dialup emulation acceptance, to check whether the links for Internet access are in
the normal state.
The range of ONTs to be upgraded cannot be determined when ONTs are added to the
network during service provisioning.
l
l
The U2000 provides the automatic offline bulk upgrade solution for ONTs. You can perform
the following operations on the U2000:
12-22
Issue 05 (2010-11-19)
13
Issue 05 (2010-11-19)
13-1
Device Management
Device management includes the management of NE panels, basic and common device
attributes, clock sources, security, protocols, global configuration of services, and device
templates.
NE Panel Management
You can perform the following operations on the U2000:
l
Query the real-time performance statistics on the CPU usage and memory of boards.
Query the license information about the functions and resources of devices.
Configure the system time, IP address of a device, and the binding between a Layer 3
interface and an IP address.
Issue 05 (2010-11-19)
Security Management
You can perform the following operations on the U2000:
l
Enable and disable anti-ICMP attack, anti-IP attack, anti-IP spoofing, anti-MAC spoofing,
and anti-DoS attack.
Protocol Management
You can perform the following operations on the U2000:
l
Manage the Link Aggregation Control Protocol (LACP), Spanning Tree Protocol (STP)/
Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP),
Bidirectional Forwarding Detection (BFD), and Internet Group Management Protocol
(IGMP).
Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option
(RAIO) custom format.
13-3
On IMA E1/T1 ports, you can query real-time performance statistics of the ports, and manage
IMA groups and IMA links, including adding, deleting, modifying, resetting, blocking, and
unblocking an IMA group or link.
Management of Ethernet Ports
Ethernet port management includes the management of ports and aggregation groups. You can
perform the following operations on the U2000:
l
Configure the PPPoE, DHCP option 82, 802.3ah ETH OAM loopback, and port rate limit
functions.
Connection Management
Connection management includes the management of service virtual ports and CESoP
connections.
Service Virtual Port Management
A service virtual port enables user equipment to access the OLT. The service virtual port provides
service streams between the user equipment and the OLT for carrying user services. You can
perform the following operations on the U2000:
13-4
Query, add, delete, modify, activate, and deactivate a service virtual port.
Collect the real-time performance statistics and clear the performance statistics.
Configure the extended attributes of a service virtual port. Extended attributes allow for
greater flexibility of addressing customer requirements. Extended attributes include the
maximum number of learnable MAC addresses, the PPPoE session, the encapsulation type,
and the maximum number of MAC addresses that can be bound.
Configure the connection attributes of a service virtual port, including the alias, VPI/VCI,
transmit traffic profile, and receive traffic profile.
Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtual
port. After successful shifting, the service port assumes the new VLAN ID.
Bind IP addresses to a service virtual port and query the bound IP addresses. To specify
that only the users with certain IP addresses can access the service virtual port, perform the
binding operation. After successful binding, the service forwarding module checks the
source IP address of user packets. If the source IP address does not match any of the IP
addresses bound to the service virtual port, the user packets are dropped. Otherwise, the
user packets are forwarded. This ensures the security of user access.
Bind static MAC addresses to a service virtual port. To specify that only the users with
certain static MAC addresses can access the service virtual port, perform the binding
operation. After successful binding, the service forwarding module checks the source MAC
address of user packets. If the source MAC address does not match any of the MAC
addresses bound to the service virtual port, the user packets are dropped. Otherwise, the
user packets are forwarded. This ensures the security of user access.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
Configure service bundles. If several service virtual ports carry the same service, a service
bundle can be configured to bundle the service streams over the service virtual ports.
Layer 2 Management
Layer 2 management includes the management of the VLAN, the Rapid Spanning Tree Protocol
(RSTP), Multiple Spanning Tree Protocol (MSTP), Access Node Control Protocol (ANCP), and
Rapid Ring Protection Protocol (RRPP).
VLAN Service Management
VLAN service management includes the management of the standard VLAN, MUX VLAN,
smart VLAN, and super VLAN. You can perform the following operations on the U2000:
l
RSTP Management
You can perform the following operations on the U2000:
l
Modify and restore the default value of the trail overheads of a port.
MSTP Management
MSTP management includes the management of domains, instances, and ports. You can perform
the following operations on the U2000:
l
Modify a port.
ANCP Management
You can perform the following operations on the U2000:
l
RRPP Management
For RRPP management, you can perform the query, add, delete, and modify operations.
Issue 05 (2010-11-19)
13-5
Layer 3 Management
Layer 3 management includes the management of the Dynamic Host Configuration Protocol
(DHCP), Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge
(PWE3), and Layer 3 routes.
DHCP Management
DHCP management includes the management of the DHCP server group, MAC address
segment, standard mode, DHCP domain, and VLAN L3 interface. You can perform the
following operations on the U2000:
l
Create an E-LSP.
Manage PWs.
13-6
Configure one or more time segments, and associate a time segment with an ACL by
specifying the name of the time segment in the ACL.
Query, modify, create, and delete the ACL of the standard, extended, Layer 2, and userdefined types.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
QoS management includes filtering packets based on ACL, tagging priorities, limiting traffic
and port rate, collecting statistics on traffic, redirecting, and mirroring. On the U2000, you can
query, add, modify, and delete a QoS policy.
HQoS stands for the hierarchical QoS. It not only controls user traffic but also schedules packets
according to the priorities of user services. On the U2000, you can query, add, modify, and delete
an HQoS policy.
Manage maintenance domains (MDs). Ethernet CFM divides a network into up to eight
levels. A bridge can span multiple levels to manage different MDs. A CFM MD is
constituted by bridges. An MD is the combination of bridges and maintenance levels. MDs
can be classified into three layers: user domain (levels 7-5), service provider domain (levels
4-3), and carrier domain (levels 2-0). Different MDs are maintained by different
management entities.
Manage maintenance associations (MAs). An MD can be divided into multiple MAs. Each
MA maps a service instance (SI) that belongs to an MD and is identified by a VLAN. An
MA can be regarded as a combination of an MD and a VLAN. According to the standards,
multiple VLANs can map one SI, and one SI maps one MA.
Manage maintenance points (MPs). An MA consists of MPs defined on the ports of bridges.
An MP is a combination of a bridge port, a VLAN, and a maintenance level. MPs are
classified into maintenance association end points (MEPs) and maintenance association
intermediate points (MIPs). MEPs initiate and respond to CFM messages; MIPs
transparently transmit or respond to CFM messages but do not initiate the messages.
13-7
Protection group: You can manage the working member and the protection member in the
protection group. In a protection group, you can manage the relationship between the members
involved in the protection switchover, record the status of members, and manage the
configuration data and status that are involved by the protection relationship between the
members.
With the protection group feature, you can protect the following objects on the U2000:
l
Configure the port attributes, such as the associated line template, alarm template, extended
template, and monitoring thresholds. These attributes are used to activate the ADSL port.
13-8
Bind and unbind a port. You can bind multiple ATM G.SHDSL ports. This increases the
bandwidth at the physical layer and improves the rate of the ATM G.SHDSL port.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
Configure port attributes, such as the associated line profile and alarm profile. These
attributes are used to activate the ATM G.SHDSL port.
Configure the port attributes, such as the associated line profile, alarm profile, extended
profile, and monitoring thresholds of a VDSL2 port. These attributes are used to activate
the VDSL2 port.
IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer.
It is used to manage and control multicast services.
IGMP proxy: In a tree topology, the OLT does not set up routes for forwarding multicast
packets; the OLT only relays and forwards multicast protocol packets. To multicast users,
the OLT is a multicast router that implements the router functions defined in the IGMP
protocol. To multicast routers, the OLT is a multicast user.
You can perform the following operations on the U2000 to manage multicast services:
l
Issue 05 (2010-11-19)
13-9
MG Management
In the next generation network (NGN), the media gateway (MG) and the media gateway
controller (MGC) are separated. That is, the functions of the user plane are separated from the
functions of the control plane. The messages of the user plane interact with each other by using
the MG and the messages of the control plane interact with each other by using the MGC. An
MG device consists of the MG, MGC, digital signal processor (DSP) management, and ringing
mapping. You can perform the following operations on the U2000:
l
Manage MGs.
Manage MGCs.
SG Management
Signaling gateway (SG) management includes the management of signaling gateways and
associations. An SG is a part for signaling interaction. AN SG is a signaling proxy for receiving
and transmitting signaling messages between the No.7 signaling network and the IP network.
An SCTP association provides data transmission for the transfer of the protocol data unit of one
or more ports.
Reset a port.
Issue 05 (2010-11-19)
network in IP networking mode. The ISDN service is called the VoIP ISDN BRA service. You
can perform the following operations on the U2000:
l
Reset a port.
Query the statistics on the usage of MG ports and collect the number of VoIP ISDN BRA
ports by port status.
Query the statistics on the usage of MG ports and collect the number of VoIP ISDN PRA
ports by port status.
Query the timeslots that are occupied by a specified VoIP ISDN PRA port.
Switch over the logical communication channels of a specified V5 interface for protection.
Manage 2M links.
13-11
Service ports are classified into V5 PSTN ports, V5 ISDN BRA ports, and V5 ISDN PRA ports.
You can perform the following operations to manage V5 PSTN ports on the U2000:
l
Reset a port.
You can perform the following operations to manage V5 ISDN BRA ports on the U2000:
l
Reset a port.
Query the statistics on the usage of MG ports and collect the number of V5 ISDN BRA
ports by port status.
You can perform the following operations to manage V5 ISDN PRA ports on the U2000:
l
Query the statistics on the usage of MG ports and collect the number of V5 ISDN PRA
ports by port status.
SPC Management
SPC can connect, release, check, and protect one or more 64 kbit/s channels of different ports
of the same board or different boards. SPCs occupy dedicated and fixed voice channels to meet
the communication requirements of special and VIP access subscribers and ensure the
communication quality. You can perform the following operations on the U2000:
l
Set up V5 SPCs.
Set up V5 pre-SPCs.
Issue 05 (2010-11-19)
interface board and supports the VF dedicated line services. The VFB board provides the function
of adjusting the 2/4-wire port through software. It provides sixteen 2-wire port or eight 4-wire
ports. You can perform the following operations on the U2000:
l
Add SPCs.
Certain dedicated networks access LEs or interwork with remote dedicated networks over the
access network. In dedicated networks, many users adopt the E&M trunk ports. To access these
users over the access network, ONUs must provide the E&M trunk ports.
ATI Board Management
The ATI board, inserted in a service shelf, transparently transmits E/M signaling and 2-wire/4wire VF signals by using SPCs. This helps the HONET system access certain dedicated
networks. The ATI board provides six 2-wire/4-wire E&M trunk ports. Each port provides the
2-wire/4-wire VF line and the 1E1M signaling line. If the 1E1M signaling line is not in use, the
2-wire/4-wire VF line can be used independently to transmit VF signals. You can perform the
following operations on the U2000:
l
Add SPCs.
HSL Management
The HSL board of the UA5000 (PVMV1) provides two V.35 ports and two FE1 ports to access
N x 64k (n ranges from 1 to 31) data services. You can perform the following operations on the
U2000:
Issue 05 (2010-11-19)
13-13
Add SPCs.
13-14
Issue 05 (2010-11-19)
14
Issue 05 (2010-11-19)
14-1
Device Management
Device management includes the management of NE panels, basic and common device
attributes, clock sources, security, protocols, global configuration of services, and device
templates.
NE Panel Management
You can perform the following operations on the U2000:
l
Query the real-time performance statistics on the CPU usage and memory of boards.
Query the license information about the functions and resources of devices.
Configure the system time, IP address of a device, and the binding between a Layer 3
interface and an IP address.
Issue 05 (2010-11-19)
Security Management
You can perform the following operations on the U2000:
l
Enable and disable anti-ICMP attack, anti-IP attack, anti-IP spoofing, anti-MAC spoofing,
and anti-DoS attack.
Protocol Management
You can perform the following operations on the U2000:
l
Manage the Link Aggregation Control Protocol (LACP), Spanning Tree Protocol (STP)/
Rapid Spanning Tree Protocol (RSTP)/Multiple Spanning Tree Protocol (MSTP),
Bidirectional Forwarding Detection (BFD), and Internet Group Management Protocol
(IGMP).
Configure the Policy Information Transfer Protocol (PITP) mode/Relay Agent Info Option
(RAIO) custom format.
14-3
On IMA E1/T1 ports, you can query real-time performance statistics of the ports, and manage
IMA groups and IMA links, including adding, deleting, modifying, resetting, blocking, and
unblocking an IMA group or link.
Management of Ethernet Ports
Ethernet port management includes the management of ports and aggregation groups. You can
perform the following operations on the U2000:
l
Configure the PPPoE, DHCP option 82, 802.3ah ETH OAM loopback, and port rate limit
functions.
Connection Management
ONU connection management includes the management of service virtual ports.
Service Virtual Port Management
A service virtual port enables user equipment to access the ONU. The service virtual port
provides service streams between the user equipment and the ONU for carrying user services.
You can perform the following operations on the U2000:
14-4
Query, add, delete, modify, activate, and deactivate a service virtual port.
Collect the real-time performance statistics and clear the performance statistics.
Configure the extended attributes of a service virtual port. Extended attributes allow for
greater flexibility of addressing customer requirements. Extended attributes include the
maximum number of learnable MAC addresses, the PPPoE session, the encapsulation type,
and the maximum number of MAC addresses that can be bound.
Configure the connection attributes of a service virtual port, including the alias, VPI/VCI,
transmit traffic profile, and receive traffic profile.
Shift the VLAN ID of a service virtual port to change the VLAN ID of the service virtual
port. After successful shifting, the service port assumes the new VLAN ID.
Bind IP addresses to a service virtual port and query the bound IP addresses. To specify
that only the users with certain IP addresses can access the service virtual port, perform the
binding operation. After successful binding, the service forwarding module checks the
source IP address of user packets. If the source IP address does not match any of the IP
addresses bound to the service virtual port, the user packets are dropped. Otherwise, the
user packets are forwarded. This ensures the security of user access.
Bind static MAC addresses to a service virtual port. To specify that only the users with
certain static MAC addresses can access the service virtual port, perform the binding
operation. After successful binding, the service forwarding module checks the source MAC
address of user packets. If the source MAC address does not match any of the MAC
addresses bound to the service virtual port, the user packets are dropped. Otherwise, the
user packets are forwarded. This ensures the security of user access.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
Configure service bundles. If several service virtual ports carry the same service, a service
bundle can be configured to bundle the service streams over the service virtual ports.
Layer 2 Management
Layer 2 management includes the management of the VLAN, the Rapid Spanning Tree Protocol
(RSTP), Multiple Spanning Tree Protocol (MSTP), Access Node Control Protocol (ANCP), and
Rapid Ring Protection Protocol (RRPP).
VLAN Service Management
VLAN management includes the management of the standard VLAN, MUX VLAN, smart
VLAN, and super VLAN. You can perform the following operations on the U2000:
l
RSTP Management
You can perform the following operations on the U2000:
l
Modify and restore the default value of the trail overheads of a port.
MSTP Management
MSTP management includes the management of domains, instances, and ports. You can perform
the following operations on the U2000:
l
Modify a port.
ANCP Management
You can perform the following operations on the U2000:
l
RRPP Management
For RRPP management, you can perform the query, add, delete, and modify operations.
Layer 3 Management
Layer 3 management includes the management of the Dynamic Host Configuration Protocol
(DHCP), Multi-protocol Label Switching (MPLS)/pseudo wire emulation edge-to-edge
(PWE3), and Layer 3 routes.
DHCP Management
Issue 05 (2010-11-19)
14-5
DHCP management includes the management of the DHCP server group, MAC address
segment, standard mode, DHCP domain, and VLAN L3 interface. You can perform the
following operations on the U2000:
l
Create an E-LSP.
Manage PWs.
Configure one or more time segments, and associate a time segment with an ACL by
specifying the name of the time segment in the ACL.
Query, modify, create, and delete the ACL of the standard, extended, Layer 2, and userdefined types.
QoS management includes filtering packets based on ACL, tagging priorities, limiting traffic
and port rate, collecting statistics on traffic, redirecting, and mirroring. On the U2000, you can
query, add, modify, and delete a QoS policy.
HQoS stands for the hierarchical QoS. It not only controls user traffic but also schedules packets
according to the priorities of user services. On the U2000, you can query, add, modify, and delete
an HQoS policy.
14-6
Issue 05 (2010-11-19)
BFD Management
The BFD mechanism is used for quickly checking the link status between two devices.
To mitigate the impact of device faults on services and to improve the network availability, a
network device needs to quickly detect any fault occurring between the device and its adjacent
devices. Actions can then be taken to ensure service continuity. The BFD enables the device to
check the connectivity of a type of data protocol of the same trail between two systems. The trail
can be a physical or a logical link, including a tunnel. The BFD mechanism is a remedy for the
weakness of the existing detection mechanism.
Manage maintenance domains (MDs). Ethernet CFM divides a network into up to eight
levels. A bridge can span multiple levels to manage different MDs. A CFM MD is
constituted by bridges. An MD is the combination of bridges and maintenance levels. MDs
can be classified into three layers: user domain (levels 7-5), service provider domain (levels
4-3), and carrier domain (levels 2-0). Different MDs are maintained by different
management entities.
Manage maintenance associations (MAs). An MD can be divided into multiple MAs. Each
MA maps a service instance (SI) that belongs to an MD and is identified by a VLAN. An
MA can be regarded as a combination of an MD and a VLAN. According to the standards,
multiple VLANs can map one SI, and one SI maps one MA.
Manage maintenance points (MPs). An MA consists of MPs defined on the ports of bridges.
An MP is a combination of a bridge port, a VLAN, and a maintenance level. MPs are
classified into maintenance association end points (MEPs) and maintenance association
intermediate points (MIPs). MEPs initiate and respond to CFM messages; MIPs
transparently transmit or respond to CFM messages but do not initiate the messages.
14-7
be triggered to transfer services to the protection member that will continue to handle the
services.
Protection group: You can manage the working member and the protection member in the
protection group. In a protection group, you can manage the relationship between the members
involved in the protection switchover, record the status of members, and manage the
configuration data and status that are involved by the protection relationship between the
members.
With the protection group feature, you can protect the following objects on the U2000:
l
Configure the port attributes, such as the associated line template, alarm template, extended
template, and monitoring thresholds. These attributes are used to activate the ADSL port.
14-8
Issue 05 (2010-11-19)
Bind and unbind a port. You can bind multiple ATM G.SHDSL ports. This increases the
bandwidth at the physical layer and improves the rate of the ATM G.SHDSL port.
Configure port attributes, such as the associated line profile and alarm profile. These
attributes are used to activate the ATM G.SHDSL port.
Configure the port attributes, such as the associated line profile, alarm profile, extended
profile, and monitoring thresholds of a VDSL2 port. These attributes are used to activate
the VDSL2 port.
IGMP snooping: IGMP snooping is a multicast control mechanism at the data link layer.
It is used to manage and control multicast services.
IGMP proxy: In a tree topology, the OLT does not set up routes for forwarding multicast
packets; the OLT only relays and forwards multicast protocol packets. To multicast users,
the OLT is a multicast router that implements the router functions defined in the IGMP
protocol. To multicast routers, the OLT is a multicast user.
You can perform the following operations on the U2000 to manage multicast services:
l
Issue 05 (2010-11-19)
14-9
14-10
Issue 05 (2010-11-19)
15 Reliability
15
Reliability
Issue 05 (2010-11-19)
15-1
15 Reliability
Hardware Reliability
U2000Hardware reliability is improved by disk redundancy, equipment redundancy, and HA
system.
l
Disk redundancy: The U2000 supports disk redundancy. For example, RAID1, RAID10,
hot standby, or disk array can be used for different hardware platforms.
Software Reliability
Software reliability mechanism of the U2000 enables the U2000 to withstand software failures
such as software application failure or database damage.
The U2000 supports the automatic protection mechanism so that it can monitor and check the
running status of its processes. When the U2000 detects that a process stops abnormally or is
faulty, it records system logs. Then, the system restarts the process automatically and ensures
that the process runs in the normal state. The system can also generate an alarm that urges a user
to manually resolve the problem.
In the case of an HA system, when the active server is faulty (for example, software applications
fail or the database quits unexpectedly), switchover is performed between the active server and
the standby server and the standby server starts to monitor networks.
Periodic and effective backup of the U2000 data ensures that the system runs stably and recovers
promptly from faults. The U2000 provides various data backup methods. For details, see 15.6
Data Backup.
15-2
OS enhancement: The U2000 provides the SetSolaris to enhance the security of Solaris OS.
Antivirus scheme: The U2000 uses the OfficeScan of Trend Micro as the antivirus software
on Windows OS.
Operation security: The U2000 supports user management, right management, user security
management, ACL, AAA, and a series of security policies to ensure the security of
operations that are performed on the U2000.
Communication security and reliability: The U2000 client and server communicate with
each other in SSH mode, which ensures security of communication between them. In
addition, DCN protection ensures the reliability of communication connections between
the U2000 and NEs.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
15 Reliability
Indicator
Remarks
MTBF
HA system
HA system
15 minutes
10 minutes
10 minutes
15.3 HA System
The high availability (HA) system helps you improve the running reliability of the U2000 server.
The non-distributed U2000 server works in 1+1 backup mode. If the active site is faulty,
applications on the U2000 are automatically switched to the standby site so that the U2000
application is not interrupted. See Figure 15-1.
Issue 05 (2010-11-19)
15-3
15 Reliability
Application
When a fault occurs, the NMS application is switched to the standby site.
Applicaton
Database synchronization and backup between the active and standby sites
HA system (Veritas 1+1 hot standby): Applicable to remote hot standby of the nondistributed system, featuring automatic switching.
The recommended number of non-gateway NEs (including non-gateway NEs that connects to the GNE by using
the extended ECC) that connect to each GNE is fewer than 50. Once the limit is exceeded, the number of GNEs
should be increased.
15-4
Issue 05 (2010-11-19)
15 Reliability
Issue 05 (2010-11-19)
Data to Be Backed Up
Solution
Operation
Dump logs.
Configuration data
15-5
15 Reliability
Data to Be Backed Up
Solution
Database
Operation
15-6
Issue 05 (2010-11-19)
16
16 Performance Indicators
Performance Indicators
Issue 05 (2010-11-19)
Item
Subitem
Indicator
Storage capacity
Resources occupied
CPU usage
Processing capability
16-1
16 Performance Indicators
Item
Subitem
Indicator
In a normal circumstance,
100 (400 at maximum) pieces
of alarms can be handled per
second by a full-domain
U2000. When managing only
access equipment, the U2000
can handle 50 pieces of
alarms per second.
User
Maximum: 500
User group
Maximum: 50
Object set
Maximum: 100
Operation Set
Maximum: 255
HA switchover time
Stability
Maximum: 15,000
Number of managed
equivalent NEs
Maximum: 20,000
Maximum: 5,000,000
Number of tunnels
Maximum: 100,000
Number of manageable
GNEs
Management capability
Service capability
16-2
Item
Bandwidth
2 Mbit/s
Issue 05 (2010-11-19)
16 Performance Indicators
Item
Bandwidth
Issue 05 (2010-11-19)
2 Mbit/s
2 Mbit/s
NOTE
A minimum of 2 Mbit/s is required.
NOTE
A minimum of 2 Mbit/s is required. A bandwidth
of 2 Mbit/s is enough if you do not synchronize all
performance data by using PMS. If you want to
synchronize the performance data, more
bandwidth is required.
16-3
17
17 Management Capability
Management Capability
The management capability refers to the maximum number of equivalent NEs that can be
managed by the U2000 on certain hardware configuration conditions. The management
capability depends on the hardware and varies with the hardware configuration.
If a client also runs on the computer where the server is running, the management capability
is reduced by 50%. Hence, it is recommended that you run the client and server on different
computers.
The system limits the number of physical nodes. Hence, the number of physical nodes is a
restriction for the management capability.
Virtual NEs are not included in the management capability. A pre-configured NE is equal
to a real NE. One third-party NE is equal to one equivalent NE. The equivalent coefficient
of the OEM equipment is calculated in the way similar to Huawei equipment.
Issue 05 (2010-11-19)
17-1
17 Management Capability
Equivalent NE: The functional features, cross-connect capacity, and number of cards, ports,
or channels are specific to NEs of different types. As these NEs require different resources
of the NMS, the number of NEs that can be managed by the NMS depends on the NE types.
For easy description and calculation of the management capability, the concept of
equivalent NE is defined so that NEs of different types or a number of ports can be converted
to equivalent NEs by a uniform criteria according to the system resources required by
them. The system resources required by an equivalent NE is equal to the resources for
managing an STM-1 transport NE.
Currently, a set of U2000 can manage a maximum of 15,000 physical NEs, 15,000 equivalent
NEs, and 100 clients. This conclusion is drawn after the tests under a certain environment and
objectively reflects the actual management capability of the U2000.
The management scales of the U2000 are defined as follows:
l
It is recommended that you enable no more than 100,000 performance collection instances at the same time to
ensure the running efficiency of the U2000.
The preceding rules are not fixed. For more details, see the Management Capability Instructions.
Issue 05 (2010-11-19)
17 Management Capability
For example, there are 5 OptiX OSN 9500 (equivalent coefficient: 10), 10 OptiX OSN 7500 (equivalent
coefficient: 6.5), and 100 OptiX OSN 3500 (equivalent coefficient: 4.5). Then, you can calculate the number
of equivalent NEs in the transport domain as follows:
Number of equivalent NEs in the transport domain = 5 x 10 + 10 x 6.5 + 100 x 4.5 = 565
The management capability of the U2000 varies with OptiX NE Equivalents, as shown in Table
17-1.
Table 17-1 Management capabilities of the U2000 on different OptiX NE Equivalents
NE Series
NE Type
OSN series
10 (With ASON)
6.5 (Without ASON)
15 (With ASON)
10 (Without ASON)
MSTP series
Issue 05 (2010-11-19)
0.5
0.5
17-3
17 Management Capability
NE Series
SDH series
LH WDM series
Marine series
17-4
NE Type
1.5
1.5
OptiX 155C
OptiX 155S
OptiX 155/622B_I
OptiX 155/622B_II
OptiX 2500
1.5
1.5
1.5
1.5
1.5
1.5
OptiX OTU40000
1.5
Issue 05 (2010-11-19)
17 Management Capability
NE Series
NE Type
NG WDM series
NA WDM series
1.5
1.5
RTN series
Issue 05 (2010-11-19)
0.4
0.4
0.5
17-5
17 Management Capability
NE Series
NE Type
0.5
For example, there are 5 NE5000E (equivalent coefficient: 10), 200 S5300 (equivalent coefficient: 1.25),
and 1000 CX200 (equivalent coefficient: 0.625). Then, you can calculate the number of equivalent NEs in
the IP domain as follows:
Number of equivalent NEs in the IP domain = 5 x 10 + 200 x 1.25 + 1000 x 0.625 = 925
The management capability of the U2000 varies with IP NE Equivalents, as shown in Table
17-2.
Table 17-2 Management capabilities of the U2000 on different IP NE Equivalents
NE Series
NE Type
Router
NE05/NE08(E)/NE16(E)
0.75
NE20/NE20E
1.25
NE40/NE80
NE40E-X3
1.25
NE40E-4
1.25
NE40E-X8
2.5
NE40E-8
2.5
NE40E-X16
NE40E-16
NE5000E
R-series router
AR-series router
0.25
SSP
10
NSE
10
Issue 05 (2010-11-19)
NE Series
NE Type
Switch
S2000 series
0.125
S2300 series
0.625
S2700 series
0.625
S3000 series
0.125
S3300 series
0.75
S3700 series
0.75
S5000 series
0.25
S5300 series
1.25
S5700 series
1.25
S6500 series
0.75
S7800 series
1.25
S8016 series
1.25
S8500 series
1.25
S9303 series
2.0
S9306 series
3.5
S9312 series
6.0
2.5
4.5
OptiX PTN3900-8
4.0
0.5
0.5
CX200 series
0.625
CX300 series
1.25
CX600-X1
0.5
CX600-X2
CX600-X3
1.25
CX600-4
1.25
CX600-X8
2.5
PTN series
Issue 05 (2010-11-19)
17 Management Capability
17-7
17 Management Capability
NE Series
Firewall
USG
SRG
17-8
NE Type
CX600-8
2.5
CX600-X16
CX600-16
Eudomen 300/500/1000
0.5
0.25
0.75
Eudomen 8040
Eudomen 8080
Eudomen 8080E
Eudomen 8160E
USG9110
USG9120
USG9210
USG9220
USG9310
USG9320
USG5000 series
0.75
USG3030
0.25
USG3040
0.25
USG2100 series
0.25
USG2200 series
0.25
USG50
0.25
SRG1200
0.25
SRG20-10
0.25
SRG20-11
0.25
SRG20-12
0.25
SRG20-15
0.25
SRG20-20
0.25
SRG20-21
0.25
Issue 05 (2010-11-19)
NE Series
17 Management Capability
NE Type
SRG20-30
0.25
SRG20-31
0.25
SRG20-31-D
0.25
SIG9810
SIG9820
SIG9800 Server
SVN
SVN3000
0.25
Broadband access
MA5200E/F series
1.5
MA5200G series
10
ME60 series
10
Voice gateway
VG1040/1041 series
0.25
WLAN AP
AP
0.25
SIG
l Number of FTTx OLT equivalent NEs = (Number of ONTs x Equivalent coefficient) + (Number of
MDUs x Equivalent coefficient) + (Number of P2P ports x Equivalent coefficient)
l Number of FTTx MDU equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +
(Number of ports of type n x Equivalent coefficient)
l Number of MSAN equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +
(Number of ports of type n x Equivalent coefficient)
l Number of DSLAM equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +
(Number of ports of type_n x Equivalent coefficient)
l Number of equivalent NEs of other access equipment = (Number of NEs of type_I x Equivalent
coefficient) + ... + (Number of NEs of type_n x Equivalent coefficient)
The management capability of the U2000 varies with access NE Equivalents, as shown in Table
17-3.
Issue 05 (2010-11-19)
17-9
17 Management Capability
Type
FTTx OLT
(calculation based on
the managed ONT,
MDU, and P2P
resources in the case
of OLT)
ONT
1/64
MDU
1/32
P2P port
1/64
FTTx MDU
(calculation based on
the managed user
ports in the case of
MDU)
xDSL port
1/128
E1 port
1/128
ETH port
1/128
PSTN/ISDN/HSL port
1/160
xDSL port
1/128
E1 port
1/128
ETH port
1/128
PSTN/ISDN/HSL port
1/160
MSAN (calculation
based on the number
of managed ports)
Other NEs
(calculation based on
the NE types)
1/128
1/128
ETH port
1/128
MD5500
1.5
8850
18
8825
18
8750
18
MA5200V1R2/R9
17-10
Issue 05 (2010-11-19)
17 Management Capability
Short Name
of Computer
Managem
ent
Capability
Number of
Clients
Support
Unified
Network
Manageme
nt
Number of
Physical
NEs
Sun Server
T5220-4C*1.2
G-16G
2000
32
No
T5220-8C*1.4
G-32G
6000
64
Yes
M4000-4P*2.
53G-32G
15000
100
Yes
HP
DL380G6-2P
*2.0G-8G
2000
32
Yes
HP
DL580G5-4P
*2.13G-16G
6000
64
Yes
Array:
6*300G Array
PC Server
Fujitsu
Server
Issue 05 (2010-11-19)
M4000-2P*2.
15G-16G
6000
64
No
SUN
V890-4P*1.5
G-16G
3000
48
No
SUN
V890-2P*1.5
G-8G
1500
32
No
SUN
V445-4P*1.6
GHz-8G
1500
32
No
SUN
E2900-8P*1.5
GHz-32G
5000
80
Yes
SUN
E2900-12P*1.
5GHz-48G
5000
100
Yes
PW650-4P*1.
8GHz-16G
2000
48
No
Maximum
number of
physical
NEs: 15000
Maximum
number of
SDH paths:
300000
Maximum
number of
WDM paths:
50000
17-11
17 Management Capability
Server
PC Server
Short Name
of Computer
Managem
ent
Capability
Number of
Clients
Support
Unified
Network
Manageme
nt
PW650-2P*1.
8GHz-8G
1500
32
No
IBM
X3650-2P*2.0
G-8G
2000
32
No
IBM
X3850M2-4P
*2.13G-16G
6000
64
No
Number of
Physical
NEs
17-12
SUN
Netra240-2P*
1.5GHz-2G
600
16
No
SUN
Netra240
does not
support the
management
of PTN
devices. If
T2000 is
installed on
Netra240,
after
upgraded to
the U2000,
the U2000
cannot have
the
management
functions of
the PTN
devices. If
must to
manage the
PTN
devices, the
Netra240
must be
changed.
Issue 05 (2010-11-19)
Server
PC Server
Issue 05 (2010-11-19)
17 Management Capability
Short Name
of Computer
Managem
ent
Capability
Number of
Clients
Support
Unified
Network
Manageme
nt
SUN
V490-2P*1.6
GHz-4G
800
24
No
SUN
V440-2P*1.6
GHz-4G
800
24
No
SUN
V240-2P*1.5
GHz-4G
600
16
No
SUN
V245-2P*1.5
GHz-4G
600
16
No
IBM
X3500-2P*2.0
G-4G
2000
64
No
IBM
X3200-1P*2.4
G-2G
600
14
No
HP
ML350-2P*2.
0G-4G
2000
64
No
HP
ML110-1P*2.
4G-2G
600
24
No
HP
ML570-4P*2.
0G-4G
2000
48
No
DELL
R900-4P*2.13
G-4G
2000
48
No
DELL
PE6800-4P*2.
0G-4G
2000
48
No
DELL
PE2900-2P*2.
0G-4G
1500
32
No
Number of
Physical
NEs
17-13
17 Management Capability
Server
Short Name
of Computer
Managem
ent
Capability
Number of
Clients
Support
Unified
Network
Manageme
nt
DELL
PE840-1P*2.4
G-2G
600
24
No
HP
DL380G5-2P
*2.0G-8G
6000
64
No
HP
DL580G5-4P
*2.13G-16G
10000
100
No
IBM
X3650-2P*2.0
G-8G
6000
64
No
IBM
X3850M2-4P
*2.13G-16G
10000
100
No
Number of
Physical
NEs
Issue 05 (2010-11-19)
17 Management Capability
Equipment
Description
SDH series
OptiX 155C
OptiX 155S
OptiX 1556/622B_I
OptiX 1556/622B_II
MSTP series
Issue 05 (2010-11-19)
OptiX 2500
17-15
17 Management Capability
Category
OSN series
Equipment
Description
OptiX 10G(Metro5000)STM-64
MADM optical transmission system
17-16
Issue 05 (2010-11-19)
17 Management Capability
Equipment
Description
OptiX OTU40000
LH WDM series
NG WDM series
Issue 05 (2010-11-19)
17-17
17 Management Capability
Category
Equipment
Description
NOTE
The OptiX BWS 1600G OLA is an independent power supply subrack. It is supported by the OptiX BWS
1600G backbone DWDM optical transmission system V100R004 and higher versions.
Equipment
Description
LH WDM series
NG WDM series
17-18
Issue 05 (2010-11-19)
17 Management Capability
Equipment
Description
Equipment
Description
RTN series
Issue 05 (2010-11-19)
17-19
17 Management Capability
Equipment
Description
PTN series
OLT series
17-20
Equipment
Description
MA5600T
MA5603T
MA5680T
MA5683T
MA5606T
MA5603U
Issue 05 (2010-11-19)
Category
MDU series
ONT series
Issue 05 (2010-11-19)
17 Management Capability
Equipment
Description
MA5606T
MA5620
MA5626
MA5628
MA5620E
MA5626E
MA5620G
MA5626G
MA5610
MA5612
MA5616
MA5651
MA5651G
MA5652G
MA5635
MA5662
SRG2220
EchoLife:OT550
EchoLife:HG850
EchoLife:HG850a
EchoLife:HG851
17-21
17 Management Capability
Category
Equipment
Description
EchoLife:HG852
EchoLife:HG853
EchoLife OT925
SmartAX OT928
EchoLife:HG810
EchoLife:HG811
EchoLife:HG813
EchoLife:HG860
EchoLife:HG861
EchoLife:HG863
EchoLife:HG865
EchoLife:HG810a
EchoLife:HG866
EchoLife:HG866e
U5KG
810e
813e
850e
925e
U5KE
HG8240
HG8245
HG8247
17-22
Category
Equipment
Description
UA5000 series
UA5000
Issue 05 (2010-11-19)
Category
MD5500 series
17 Management Capability
Equipment
Description
UA5000(PVU)
UA5000(IPMB)
UA5000(PVMV1)
MD5500
MD5500 Multi-service
Distribution Module
MA5100 series
MA5300 series
MA5600 series
MA5600V8 series
Equipment
Description
MA5100V2
MA5105
MA5300
MA5600V3
MA5605
MA5615
MA5600T
MA5603T
MA5606T
Issue 05 (2010-11-19)
17-23
17 Management Capability
Device
Description
NE series routers
NE05
NE08
NE16
NE08E
NE16E
NE20
NE20E
NE40
NE80
NE40E/NE80E
NE5000E
R series routers
R series routers
AR18
AR28
AR46
AR19
AR29
AR49
17-24
Category
Device
Description
S8505
S8505E
S8508
Issue 05 (2010-11-19)
Category
Device
Description
S8512
S7800
S6502
S6503
S6506R
S6506
S2300
S2700
S3300
S3700
S5300
Issue 05 (2010-11-19)
17 Management Capability
17-25
17 Management Capability
Category
Device
Description
S5700
S9300
Device
Description
CX series devices
CX200
CX200C
CX200D
CX300
CX380
CX600
Device
Description
Multi-service
gateways
MA5200E
MA5200F
MA5200G
ME60 series
17-26
Issue 05 (2010-11-19)
17 Management Capability
Device
Description
VoIP Gateway
VG10
VoIP gateways 10
VG20
VoIP gateways 20
VG80
VoIP gateways 80
XE series
Device
Description
WLAN
WA10 AP
WLAN 10
WA12 AP
WLAN 12
Issue 05 (2010-11-19)
Category
Device
Description
Eudemon
E8080E
E8160E
NE40E-FW
NE80E-FW
E8040
E8080
E1000E U2
E1000E U3
E1000E U5
E1000E U6
Eudemon1000E-D
17-27
17 Management Capability
Category
USG
17-28
Device
Description
Eudemon1000E-I
E300
E500
E1000
E200
E100E
E200S
USG9310
USG9320
USG9210
USG9220
USG5320
USG5330
USG5350
USG5360
USG5310
USG5300ADD
USG5300ADI
USG2130
USG2130W
USG2160
USG2160W
E200E-B
USG2160
USG2160W
USG2160BSR
USG2160BSR-W
USG2130BSR
USG2130BSR-W
USG2120BSR
Issue 05 (2010-11-19)
Category
Issue 05 (2010-11-19)
17 Management Capability
Device
Description
USG2160HSR
USG2160HSR-W
USG2130HSR
USG2130HSR-W
Eudemon200E-B
Eudemon200E-BW
USG2130HSR-P
USG2130HSR-WP
USG2160HSR-P
USG2160HSR-WP
USG2110-F
USG2110-F-W
USG2110-A-W
USG2110-A-GW-W
USG2110-A-GW-C
USG2110-A-GW-T
USG50
USG2110
USG2210
USG2220
USG2230
USG2250
USG2250-D
USG2205BSR
USG2220BSR
USG2220BSR-D
E200E_C
E200E_F
E200E-F-D
USG2220BSR
17-29
17 Management Capability
Category
SRG
17-30
Device
Description
USG2205BSR
USG2220HSR
USG2205HSR
USG5150
USG5120
USG5150BSR
USG5120BSR
USG5150HSR
USG5120HSR
USG2205HSR
USG2220HSR-D
USG2220TSM
USG2250TSM
USG5120-D
USG5120BSR-D
USG3040
USG3030
SRG2220
SRG2220-D
SRG2210
SRG3230
SRG3240
SRG3240-D
SRG3250
SRG3260
SRG20-20
SRG20-21
SRG20-30
SRG20-31
SRG20-31-D
Issue 05 (2010-11-19)
Category
EGW
17 Management Capability
Device
Description
SRG2220
SRG2220-D
SRG20-10
SRG1210
SRG1210W
SRG1220
SRG1220W
SRG1210-S
SRG1210-S
SRG20-11
SRG20-12
SRG20-15
SRG20-15W
SRG20-12W
EGW2160
EGW2160W
EGW2130
EGW2130W
EGW2220
EGW2220-D
EGW2210
EGW3260
EGW3250
EGW3240
EGW3240-D
EGW3230
EGW2112GW
17-31
17 Management Capability
Device
Description
SIG
SIG9810
SIG9820
NE40E-DPI
NE80E-DPI
SIG Server
DPI Server
RADIUS Server
Device
Description
SVN
SVN3000
SVN3000
17-32
Category
Device
Description
OP-Bypass
OP-Bypass
OP-Bypass
Issue 05 (2010-11-19)
18
18 Standards Compliance
Standards Compliance
This topic describes the standards that the U2000 is compliant with.
The U2000 is developed according to the network management system model that the ITU-T
TMN series standards define. The information model is constructed based on the object-oriented
concept. Complying with multiple standards, the U2000 has good expandability and reusability.
The U2000 complies with the following international standards and protocols:
l
RFC 1155, RFC 1157, RFC 1212, RFC 1213 and RFC 1215 SNMP V1 series standards
RFC 1905, RFC 1906, RFC 1907, RFC 1908, RFC 2011, RFC 2012, RFC 2013, RFC 2571,
RFC 2572, RFC 2573, RFC 2574, RFC 2576, RFC 2578, RFC 2579, and RFC 2580 SNMP
V2 series standards
RFC 3411, RFC 3412, RFC 3413, RFC 3414, RFC 3415, RFC 3416, RFC 3417, and RFC
3418 SNMP V3 series standards
The XML service delivery and inventory query are based on the MTOSI standards as
follows: TMF 518, TMF 612, and TMF 864
The CORBA alarm northbound interface complies with the MTNM standards as follows:
TMF 513, TMF 608, and TMF 814
Issue 05 (2010-11-19)
18-1
18 Standards Compliance
18-2
Description
RFC 793
RFC 1155
RFC 1212
RFC 1213
RFC 1215
RFC 1905
RFC 1906
RFC 1907
RFC 1908
RFC 2011
RFC 2012
RFC 2013
RFC 2571
RFC 2572
RFC 2573
SNMP Applications
RFC 2574
RFC 2576
Coexistence between Version 1, Version 2, and Version 3 of the Internetstandard Network Management Framework
RFC 2578
RFC 2579
RFC 2580
Issue 05 (2010-11-19)
Standards
and
Protocols
Issue 05 (2010-11-19)
18 Standards Compliance
Description
RFC 3411
RFC 3412
RFC 3413
RFC 3414
RFC 3415
RFC 3416
RFC 3417
RFC 3418
RFC 3164
ISO
8824-4-200
0
ISO
8825-2-199
8
ITU-T M.
3000
ITU-T M.
3010
ITU-T M.
3013
ITU-T M.
3017
ITU-T M.
3020
ITU-T M.
3100
ITU-T M.
3101
18-3
18 Standards Compliance
Standards
and
Protocols
18-4
Description
ITU-T M.
3180
ITU-T M.
3200
ITU-T M.
3300
ITU-T M.
3400
ITU-T X.
720
ITU-T X.
721
ITU-T X.
722
ITU-T X.
733
ITU-T X.
903
ITU-T G.
707
ITU-T G.
773
ITU-T G.
774 (01, 02,
03, 04)
ITU-T G.
783
ITU-T G.
784
ITU-T G.
803
ITU-T G.
831
ITU-T G.
851.1
ITU-T G.
852.1
Issue 05 (2010-11-19)
Standards
and
Protocols
Issue 05 (2010-11-19)
18 Standards Compliance
Description
ITU-T G.
852.2
ITU-T G.
852.3
ITU-T G.
852.6
ITU-T G.
853.1
ITU-T G.
853.2
ITU-T G.
853.3
ITU-T G.
853.6
ITU-T G.
854.1
ITU-T G.
854.3
ITU-T G.
854.6
Rational
Unified
Process 5.5
Sif99025
TMF513
V2.0
TMF608
V2.0
TMF814
V2.0
TMF814
V2.0
18-5
A
Abnormal Resource
When the NMS carries out the operation of device resource polling on the device
management module or the module is refreshed manually, the physical resources of some
devices, such as the card, sub-card and port, cannot be accessed because they have been
deleted or have some faults. So, after the NMS carries out the operation of device resource
polling on the device management module or the module is refreshed manually again,
the result of polling the physical resources differ from the first time. The physical
resources that cannot be polled in the second time are called the abnormal resource.
AIS insertion
If there are excessive errors in a channel, AIS can be inserted in this channel to indicate
it is unavailable. For a line board, you can set whether to insert AIS when there are
excessive errors in the B1, B2 and B3 bytes. For a tributary board at the E1 or T1 level,
you can set whether to insert AIS when there are excessive errors in BIP-2. For a tributary
board at the E3 level or higher, you can set whether to insert AIS when there are excessive
errors in the B3 byte.
AIS
Alarm correlation
analysis
In the case alarm2 is raised within five seconds after alarm1 is raised, and alarm2
complies with the conditions defined in the alarm correlation analysis rule, you can either
suppress the alarm2 or raise its severity level according to the behavior defined in the
alarm correlation rule. Such a process is called alarm correlation analysis.
Alarm Level
Alarm level is to identify the severity of an alarm or event. It is divided up into four
levels: critical, major, minor, warning alarm.
Alarm Status
Device reports the trap information to NMS. NMS displays the received information on
the alarm start on the topological view.
The alarm state contains four types: urgent alarm, important alarm, subordinate alarm
and prompt alarm.
Auto Discovery
Issue 05 (2010-11-19)
NMS tests the remote device by using PING or the SNMP parameter module configured
in advanced to discover the IP device or the device that supports SNMP and to add the
discovered devices automatically.
A-1
Alarm reversion
For the port that has already been configured but not actually loaded with services, this
function can be used to avoid generating relevant alarm information, thus preventing
alarm interference.
Alarm severity
Alarm suppression
The suppressed alarm of a specific object is not reported. The object here may be the
networkwide equipment, a specific NE, a specific board and even a specific function
module of a specific board.
Alarm
ATM protection group An ATM protection group refers to the logically bound ATM VP network or subnetwork
connections that share the same physical transmission channel. In the VP group (VPG),
a pair of VP connections (working connection and its protection connection) is used for
monitoring the automatic protection switching, called monitoring connections (APS
VPCs). If the monitoring connections switch over, the whole VPG will switch over to
quicken the ATM protection switching (as quick as the protection switching of the SDH
layer.
ALS
Automatic Laser Shutdown. ALS is turned on when the optical interface board does not
carry services or the optical fibre is faulty. Its service life can be prolonged by decreasing
the duration during which laser is on.
Attribute
Property of an object.
Automatic switching
When the active board or path fails, the standby one can automatically take over the job
of the active one.
B
Band Width
In the data communication area, bandwidth specifies the maximum value of the rate
when the data passes through some data channel.
Baseline
Select the test result when the line is in good condition as the line test baseline, to provide
a basis of comparison and analysis for the following line test result.
Baseline collection test One of the test types for submarine line. In the case of deployment or fault restoration,
or when updating the baseline is required, you need to collect the baseline, to provide
reference for comparison tests, and alerts or alarms.
Binding
When the bit error reaches a specific limit, the equipment will report an alarm. This limit
is the bit error alarm threshold. The threshold can be divided into crossing threshold and
defect threshold.
C
Comparison test in
periodic mode
A-2
One of the test types for submarine line. Carry out polling tests for multiple lines on the
same LMU board periodically, compare the test result with the baseline data in in-service
mode, and provide alerts or alarms for the line.
Issue 05 (2010-11-19)
Comparison test in
single-test mode
One of the test types for submarine line. Test a line by using test parameters of the
baseline collection test in in-service mode, compare the test result with the baseline data,
and provide alerts or alarms for the line.
Check alarms
The check feature compares one (or more) uncleared alarm on the NMS with that on the
NE. If an alarm is included in the current alarms on the NE, it is kept on the NMS. If
not, it will be removed from the NMS.
Client
A kind of terminal (PC or workstation) connected to a network that can send instructions
to a server and get results through a user interface. See also server.
Clock View
Configuration data
The data that configures the NE hardware for coordination between this NE and other
NEs in the entire network and operation of specified services. Configuration data is the
instruction file of NEs, and it is the key for efficient network running. The typical
configuration data includes board configuration, clock configuration and protection
relationship.
Configuration
management
Configure
Connection point
A reference point where the output of a trail termination source or a connection is bound
to the input of another connection, or where the output of a connection is bound to the
input of a trail termination sink or another connection. The connection point is
characterized by the information which passes across it. A bidirectional connection point
is formed by the association of a contradirectional pair.
Connection
Current alarms
Current performance
data
The performance data stored in the current register is called current performance data.
The current 15-minute or 24-hour register (only one for each) is applied to collect the
performance data in the current monitoring period. It changed within the monitor period.
Change Audit Service is developed to record the change on the network device, including
the changes on the information about the device, the configuration and the mapping. It
provides one integrated database. Every application program records these changes in
the database and ensures that these changes in the database are reflected on other
applications.
Cluster
Configuration File
Issue 05 (2010-11-19)
A-3
D
DCC
Within an STM-N signal there are two DCC channels, one is the 192 kbit/s DCC-R
channel composed of bytes D1-D3, and the other is the 576 kbit/s DCC- channel
composed of bytes D4-D12. All NEs can communicate with one another through the
DCC-R. The DCC-M is not the regenerator section overhead and does not support
communications among regenerators, and it is used to support communication channels
of more universal purpose.
DNI
Domain
The domain of the NMS specifies the scope of address or functions which are available
to a certain user.
Dump
Dump is a process of exporting alarm data from the database to the customized file and
meanwhile the exported data is cleared in the database.
E
ECC
EMU
Environment Monitoring Unit. As one type of power and environment monitoring unit,
EMU is installed on the top of the OptiX 155/622H equipment cabinet to monitor the
environment variables, such as the power supply and temperature. With external signal
input through the relay, fire alarm, smoke alarm, burglary alarm, and so on can be
monitored as well. Displayed on the NMS, the change of environment can be monitored
timely and accurately.
Equipment set
F
Failure
The fault cause persisted long enough to consider the ability of an item to perform a
required function to be terminated. The item may be considered as failed; a fault has now
been detected.
Fault
A fault is the inability of a function to perform a required action. This does not include
an inability due to preventive maintenance, lack of external resources, or planned actions.
Filter
The filter is used to filter the matched logs and have the unmatched one left.
Forced switch
This command performs the ring switch from working channels to the protection
channels. This switch occurs regardless of the state of the protection channels, unless
the protection channels are satisfying a higher priority bridge request.
A-4
Issue 05 (2010-11-19)
H
History alarms
History performance
data
The performance data stored in the history register and the auto-report performance data
stored on the NMS are called history performance data in a unified way.
I
Intermediate office
It refers to the equipment used for optical fibre management and dispatch in the
metropolitan area. It has multiple pairs of interfaces for the optical fibre connection.
Every two interfaces in a pair are connected with each other to form a longer physical
optical fibre path. The physical optical fibre path connecting the transmission equipment
can comprise two or more sections of optical fibre cascaded via the intermediate office.
There is an intermediate office information list for some fibre & cable connections, which
shows the section information about the fibre & cable.
In-Service Mode
One of the test modes for submarine line. By using the in-service test mode , you can
test submarine cables and repeaters without damaging the existing services of the
submarine system.
Image (OS)
Binary file, equivalent to the OS of the device and a part of the device version.
IP address
In the TCP/IP protocol, it is used to uniquely identify the address of the communication
port, which consists of four bytes in decimal digits, for example, 129.9.161.55.
J
Jitter
This index shows the delay stability of many Ping operations with the unit of ms.
L
Label
Layer
LCT
Local Craft Terminal. The LCT provides the user with single-layer management network
solutions to the transmission network of up to five NEs to realise integrated management
of multi-service transmission network. Usually it uses the cross-over cable or serial port
cable to connect one NE, so as to configure and maintain a single NE. See also U2000
LCT.
Licence
Link
The link is responsible to transmit the data from one station to next neighbour station
correctly.
Lock NE login
This function prohibits the users at lower levels from logging in NE and forces logged
NE users with lower level to log out.
Issue 05 (2010-11-19)
A-5
M
Main Topology
The default NMS client interface and all topology management functions are accessed
here.
Management
information
Manual switch
When the protection channel is efficient and there is no higher-level switching request,
this mode switches the service from the working channel to the protection channel, thus
testing whether network still has the protection capability.
Manual test
One of the test types for submarine line. You need to set test parameters manually, start
the test, and save the test result as the baseline of the in-service mode.
MO
MS
Multiplex Section. A multiplex section is the trail between and including two multiplex
section trail termination functions.
MSP
Multiplex section protection. The nodes online achieve protection switching through the
K1 and K2 bytes in the multiplex section, including linear 1+1 MS protection switching
link, linear 1:n MS protection switching link, dedicated MS protection ring and shared
MS protection ring.
N
NE database
There are three types of database on NE SCC board as following: (1) DRDB: a dynamic
database in a dynamic RAM, powered by battery; (2) SDB: a static database in a powerdown RAM; (3) FDB0, FDB0: permanently saved databases in a Flash ROM. In efficient
operation, the NE configuration data is saved in DRDB and SDB at the same time.
Backing up an NE database means backing up the NE configuration data from SDB to
FDB0 and FDB1.
NE Explorer
NE Explorer is the main operation interface of the NMS. For easy navigation, the NE
Explorer window presents an expandable directory tree (Function Tree) in the lower left
pane. The configuration, management and maintenance of the equipment are accessed
here.
NE
Network Element. NE includes the hardware unit and the software running on it. Usually,
one NE has at least an SCC (system control and communication) board which responsible
for the management and monitoring of the NE. The NE software runs on the SCC board.
NM
NNI
Network Node Interface. NNI identifies the interface between the ATM network nodes.
See also SDH NNI.
Node
Node is one of the topology objects and the minimum unit that represents the device
displayed on the topological view. The device is displayed with the node icon on the
topological view. The type of the node includes the router, the switch and the 3rd-party
device and the virtual node.
A-6
Issue 05 (2010-11-19)
O
Online help
An indexed collection of information on all aspects of the NMS. They can be accessed
at any time from the Help menu or by pressing the F1 key.
OTDR is an optical fault locator and analysis tool for optical fiber networks. The OTDR
features a light, compact, hand-held design with an intelligent user interface that is easy
and quick to use. The color LCD display and backlight design makes testing work more
comfortable and convenient, whether during daylight or at night.
Out-of-Service Mode
One of the test modes for submarine line. By transmitting detection light with high power,
the out-of-service test can detect the fiber status and repeater status, to realize the status
detection and fault point location after fiber cut. In general, when detecting that a line is
abnormal during a test in in-service mode, you can carry out a test in out-of-service mode
to locate the fault.
OWSP
Optical Wavelength Shared Protection. OWSP is a bidirectional ring, where each node
is equipped with an OWSP. There are two channels (1 and 2) in the main optical path
on the internal and external rings in each span on a ring. The fibre and the OWSP on the
main optical path are connected with the optical ports inputting 1 and 2 on the mux/
demux board (unnecessary to be connected with the OTU), and thus 1 and 2 can be
added and dropped at every node.
P
Path protection
The working principle of path protection: When the system works in path protection
mode, the PDH path uses the dual-fed and signal selection mode. Through the tributary
unit and cross-connect unit, the tributary signal is sent simultaneously to the east and
west lines. Meanwhile, the cross-connect matrix sends the signal dually sent from the
opposite end to the tributary board through the active and standby buses, and the
hardware of the tributary board will selectively receive the signal from the two groups
of buses automatically according to the AIS number of the lower order path.
Path
Performance register
Performance register is the memory space for performance event counts, including 15min current performance register, 24-hour current performance register, 15-min history
performance register, 24-hour history performance register, UAT register and CSES
register.
Performance threshold Performance events usually have upper and lower thresholds. When the performance
event count value exceeds the upper threshold, a performance threshold-crossing event
is generated; when the performance event count value is below the upper threshold for
a period of time, the performance threshold-crossing event is ended. In this way,
performance jitter caused by some sudden events can be shielded.
PMU
Private line
Procedure
Process
Protection path
Issue 05 (2010-11-19)
A-7
Protection strategy
In case the service route provides multiple service protections, different protection
strategies can be selected as required. Protection strategy refers to the protection mode
given the priority in use for the trail: protection, no protection, and extra traffic. Of the
above, the protection preference is divided into trail protection and sub-network
connection protection.
Protection subnet
The resources that form a protection subnetwork include NEs and fiber cables. The
creation of the protection subnetwork actually means that corresponding logical system
is configured for each NE by means of creating the protection subnetwork, the optical
interfaces (or VC4) of each board are mapped into the logical system, and then these
independent logical systems are connected with one another to form a complete network
structure.
This index shows the packet loss ratio after many Ping operations with the unit of %.
Poll Status
The NMS polls the device status and other configuration data periodically and displays
the polling results on the topology view.
The polling status contains normal, unknown, off-line, light fault, subordinate fault,
important fault and urgent fault.
R
ROADM
Route
The IP route selection is in table driving mode. In each host and each router of the Internet,
there is a routing table that contains information about how the service is transmitted
from the source to the sink, providing a basis for route selection. Ethernet static routing
in ET1 refers to the mapping relationship between the Ethernet port and the bound path.
Its routing type includes port routing and VLAN routing. Port routing: It means
configuring a route between the Ethernet port and the bound path port, which is usually
used for point-to-point networking communication; VLAN routing: It means configuring
a route between the Ethernet port and the bound path port based on the VLAN service.
It can be used flexibly in point-to-point, point-to-multipoint or multipoint-to-multipoint
communication. The implementation is to divide and converge the data stream according
to the VLAN flag of the packet. As a VLAN flag can be added to the Ethernet port, the
equipment can be applied more flexibly.
Report
RTT
RTT is the round trip time, which is the time delay of the ping task.
S
Script file
A-8
It is the text file describing the physical information and configuration information of
the entire network, including the NE configuration file, port naming file, end-to-end
configuration file, NE physical view script file, NM information file and service
implementation data script file.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-11-19)
Schedule Task
The report on schedule task that is generated at a interval along with the periodical
running of the schedule tasks.
Script
SDH NNI
Section
Settings
Severity
Subnet mask
Also referred to as the network mask off code, it is used to define network segments, so
that only the computers in the same network segment can communicate with one another,
thus suppressing broadcast storm between different network segments.
Subnet number
Subnetwork number is used to differentiate the different network sections in the subnetwork conference. Actually it is the first several digits (one or two) of the user phone
number. An orderwire phone number is composed of the sub-network number and the
user number.
Subnet
Sub-network is the logical entity in the transmission network and comprises a group of
network management objects. A sub-network can contain NEs and other sub-networks.
A sub-network planning can better the organisation of a network view.
Support
The frame on the bottom of a cabinet, when installing the cabinet on the antistatic floor.
Synchronise NE time
Send the system time of the NMS server to NEs so as to synchronise all NEs with the
server.
T
T2000
The T2000 is a subnetwork management system (SNMS). In the TMN architecture, the
T2000 is located between the NE level and network level, which can supports all function
of NE-level and part of the network-level management functions. See also NM.
T2100
The T2100 is a network level management system for the optical transmission network,
and is located in the network management layer (NML) in the telecommunication
management network (TMN) architecture.
TDA is short for Tone Data Access. For the 2500+ NE equipment, it can be installed
with the external TDA board for which the clock source must be set so that the TDA
board can switch according to the set clock source sequence when clock source switching
occurs.
TMN
Telecommunications Management Network. The entity which provides the means used
to transport and process information related to management functions for the
telecommunications network.
Topology
The NMS topology is a basic component of the man-machine interactive interface. The
topology clearly shows the structure of the network, the alarms of different NEs, subnetworks in the network, the communication status as well as the basic network operation
status.
Issue 05 (2010-11-19)
A-9
Trail management
function
A network level management function of the NMS. Through trail management, you can
configure end-to-end services, view graphic interface and visual routes of a trail, query
detailed information of a trail, filter, search and locate a trail quickly, manage and
maintain trails in a centralised manner, manage alarms and performance data by trail,
and print a trail report.
Trail
A trail is a kind of transport entity, mainly engaged in transferring signal from the input
of the trail source to the output of the trail sink, and monitoring the integrality of the
transferred signal. According to the different levels of the trail, the trail includes various
types (OTS, OCH, OMS, SPI, RS, MS, VC4 server trail, VC4, VC3 and VC12). Among
them, OTS, OCH and OMS represent the trails in a DWDM layer network. For the ADM
and TM equipment in the SDH network, each optical fibre connection corresponds to an
SPI, RS or MS trail, and a trail is the general name for service carriers, including SDH
and PDH services.
Tributary loopback
A fault can be located for each service path by performing loopback to each path of the
tributary board. There are three kinds of loopback modes: No loopback, Outloop and
Inloop.
Threshold
The alarm range will be defined after the performance data is collected. The threshold
contains the upper and lower one, related with the unit and index.
U
U2000
To be oriented to the future network trend, the iManager U2000 that is the unifed network
management system (NMS) combines all-IP and FMC, and manages carrier equipment
and access equipment in a centralized manner.
UAT
Unavailable Time. A UAT event is reported when the monitored object generates 10
consecutive severely errored seconds (SES) and the SESs begin to be included in the
unavailable time. The event will end when the bit error ratio per second is better than
10-3 within 10 consecutive seconds.
UNI
UNI is the abbreviation for User Network Interface. It identifies the interface between
the user and the ATM network node.
Unprotected
Services transmitted through an ordinary way, once a failure or interruption occurs, the
data cannot be restored for lack of protection mechanism.
Upload
Report all or part of the configuration data of the NE to the NM and overwrite the
configuration data saved in the NE layer on the NM side.
User group
User set refers to the set of NMS users with the same management authorities. The default
user group includes: system administrator, system maintainer, system operator and
system supervisor. The attributes of user set include name and detailed description.
User
The user of the NMS client, and the user and his/her password define the corresponding
authority of operation and management of the NMS.
V
VC4 loopback
A-10
The fault of each VC4 path on the optical fibre can be located by setting loopback for
each VC4 path of the line. There are three kinds of loopback modes: No loopback,
Outloop, Inloop.
Issue 05 (2010-11-19)
The path rate of the VC4 server trail is 150.336Mbit/s. The VC4 server trail provides
transparent channels (that is, circuit group) for circuit-layer network nodes (for example,
a switch) in a path-layer network, and acts as the basic unit of inter-office communication
path. When the VC4 server trail is configured, only the higher order cross-connection of
VC4 is generated in the intermediate NE, but no cross-connection is generated at the two
ends, that is, no service is added/dropped. Therefore, the VC4 server trail is not a
traditional service. It is only the basis for VC3 and VC12 trail creation.
VCI
The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in both NNI cell or
UNI cell. It indicates the virtual channel in the path. The VPI and VCI together indicate
a virtual connection.
View
Organize and display rules and filter conditions of the topology data. Customize the view
according to requirements of every product and organize the data in the view displayed
by the topology module, such as the layer 2 view, VPN view and IP view. By default,
the platform provides the physical view. The topology view can be planned according
to the domain, maintenance relationship and so on.
Edits and displays the rule of the topology data or the filter conditions. It can be tailored
according to the requirements
Virtual fibre
A virtual fibre is created between SDH equipment that has WDM equipment in between.
From SDH equipment perspective, creation of virtual fibres disassociates its fibre
connection with WDM equipment and prevents impact on the auto fibre search function,
ensuring independence of SDH trail management.From WDM equipment perspective,
its service bearer layer is a virtual fibre instead of a true one after the virtual fibre is
created. Deletion of the true fibre does not affect trail management.
Virtual NE
Like a common NE, a virtual NE is also displayed with an icon on a view, but it is only
an NE simulated according to the practical situation, which does not represents an actual
NE. Therefore, the actual status of this NE cannot be queried and its alarm status cannot
be displayed with colours. Usually, when the trail management function is used for the
NEs or sub-networks the NMS cannot manage, or the equipment is interconnected with
other vendors NEs for service configuration, the end-to-end service configuration
method and the trail management capability are provided.
VLAN ID
Namely, it is the virtual LAN identifier. One Ethernet port can support 4K VLAN routes,
and one NE can support up to 8K VLAN routes.
VPI
The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the NNI cell, and 8 bits
in the UNI cell.
W
Wavelength protection The wavelength protection group is important to describe the wavelength protection
group
structure. Its function is similar to that of the protection sub-network in the SDH NE.
The wavelength path protection can only work with the correct configuration of the
wavelength protection group.
WDM service
The WDM service is accessed at the client side of the OTU board that can access SAN
services.
Web LCT
In the TMN architecture, the Web LCT is located in the NE management level, which
can manage the RTN series and NG WDM series equipment.
Working path
Issue 05 (2010-11-19)
A-11
WTR time
A period of time that must elapse before a - from a fault recovered - trail/connection can
be used again to transport the normal traffic signal and/or to select the normal traffic
signal from.
WTR
Wait to Restore. This command is issued when working channels meet the restoral
threshold after an SD or SF condition. It is used to maintain the state during the WTR
period unless it is pre-empted by a higher priority bridge request.
WXCP
A-12
Issue 05 (2010-11-19)