Vous êtes sur la page 1sur 224

Volume

B
User Interface Guide 104-DOC000027-E
TJ100CPr4 Version 1.0
Revision history
Revision Date Comments
1.0 11/03/2008 Standard Release

© 2000-2008 Tejas Networks India Ltd., All Rights Reserved.

To the best of Tejas Networks's knowledge, at the time of its preparation, the information in this document is accurate.
However, Tejas Networks makes no warranty or representation with respect to its accuracy and disclaims all liability
which may result from inaccuracies, or third-party use, or third-party reliance. This information is subject to change
without notice.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means,
electronic, mechanical, photocopy, or otherwise, without the prior written consent of Tejas Networks. Tejas Networks
assumes no responsibility for its use, nor for infringements of patents or other rights of third parties. This document
implies no license under patents or copyrights. Trademarks in this document belong to their respective companies.
Table of contents iii

Table of contents 0

About this Document 1


1.1 Audience 1
1.2 References 1
1.3 Software Support 1
Technical Support Information 3
Browser Based User Interface 5
3.1 Introduction 5
3.2 System Requirements 5
3.3 User Interface Layout 6
3.3.1 Title area 8
3.3.2 Alarm Banner 8
3.3.3 Navigation menu 9
3.3.4 Input/Output area 9
3.4 Working with the Network Element User Interface 9
3.5 Logging In 10
3.6 Logging Out 12
NE Information 13
4.1 Introduction 13
4.2 Network Element Information 14
4.2.1 Configuring the network element 14
Node Slot View 17
5.1 Viewing card parameters 18
System Time 21
6.1 Introduction 21
6.2 Managing Date and Time 21
6.2.1 Setting date and time on a network element 21
6.2.2 Setting time zone on a network element 22
6.2.3 Setting network time server 25
Inventory 29
7.1 Introduction 29
7.2 Node Inventory 29
7.2.1 Deleting pluggable modules 30
7.3 Shelf 32
Protection 33
8.1 Introduction 33

User Interface Guide Version 1.0


iv Table of contents

8.2 Connections 33
8.3 Timing Manager 38
8.3.1 Viewing timing manager protection request 39
8.3.2 Giving external commands to synchronization sources 40
Configuration 41
9.1 Introduction 41
9.2 Cross-connects 41
9.2.1 Filtering cross-connects 42
9.2.2 Adding cross-connects 44
9.2.3 Editing Cross-connects 47
9.2.4 Deleting Cross-connects 48
9.3 Overhead Tunnel 48
9.3.1 Viewing Overhead tunnel 49
9.3.2 Provisioning overhead tunnel 50
9.3.3 Deleting overhead tunnel 51
9.4 Environmental Alarm Inputs 51
9.4.1 Provisioning environmental alarms 51
9.5 SNMP traps 52
9.5.1 Configuring network element to send SNMP traps 52
9.5.2 Deleting SNMP traps 53
9.6 Facilities 53
9.6.1 Provisioning STM ports 56
9.6.2 Setting TCA for 15-min interval/1-day duration 59
9.6.3 Provisioning AUG 61
9.6.4 Provisioning AU4 62
9.6.5 Editing AU4 performance monitoring parameters 66
9.6.6 Provisioning TU 67
9.6.7 Configuring TU performance monitoring parameters 72
9.7 PDH Ports 74
9.7.1 Configuring E1/E3 ports 75
9.7.2 Viewing TCA profiles for PDH ports 76
9.7.3 Provisioning a new TCA profile for PDH ports 78
9.7.4 Deleting TCA profile of a PDH port 81
9.8 Ethernet 81
9.8.1 Configuring Ethernet ports 84
9.8.2 Viewing the TCA settings for Ethernet ports 86
9.8.3 Configuring TCA profiles for Ethernet ports 86
9.9 VCG 87
9.9.1 Provisioning the VCG interface 87
9.9.2 Viewing VC group 90
9.9.3 Provisioning LCAS 91
9.9.4 Adding a VC to VCG 93
9.9.5 Deleting a VC from VCG 95
9.10 Network (NE) Adjacency 95
9.10.1 Enabling auto-discovery for an STM port 96

TJ100CPr4
Table of contents v

9.10.2 Viewing neighbour information 96


9.10.3 Provisioning trunks manually 97
9.11 DCN 98
9.11.1 Viewing the network interfaces 100
9.11.2 Editing network interfaces 101
9.11.3 Provisioning a Embedded Communication Channel 103
9.11.4 Provisioning Management Channel 104
9.12 OSPF 106
9.12.1 Configuring OSPF area 107
9.12.2 Disabling OSPF area 107
9.13 Static Route 108
9.13.1 Viewing static routes 108
9.13.2 Adding static routes 109
9.13.3 Deleting a static route 110
9.14 Proxy ARP Neighbour 111
9.14.1 Viewing Proxy ARP neighbours configuration 111
9.14.2 Adding a Proxy ARP neighbour 112
9.14.3 Deleting a proxy ARP neighbour 113
9.15 Serial Port 114
9.15.1 Viewing serial port information 114
9.15.2 Editing serial port 115
9.16 Synchronization 117
9.16.1 Viewing and editing the synchronization status 117
9.16.2 Viewing the selected timing references 120
9.16.3 Editing selected timing reference 122
9.16.4 Deleting a nominated timing reference 123
9.16.5 Nominating a timing reference 124
Faults 127
10.1 Introduction 127
10.2 Active Alarms 127
10.2.1 Viewing active alarms 128
10.3 Suppressed Alarms 129
10.3.1 Viewing suppressed alarms 129
10.4 Alarm Filters 130
10.4.1 Viewing alarm filters 130
10.4.2 Provisioning a new alarm filter 130
10.4.3 Deleting an alarm filter 131
10.5 Event History 132
10.5.1 Viewing event history 132
10.6 Alarm Severity 133
10.6.1 Setting alarm severity 133
Profiles 135
11.1 Introduction 135

User Interface Guide Version 1.0


vi Table of contents

11.2 STM Port Profiles 136


11.2.1 Viewing STM port profiles 136
11.2.2 Editing STM port profiles 137
11.3 Path Alarm Profiles 139
11.3.1 Viewing path alarm profiles 139
11.3.2 Provisioning path alarm profile 141
11.3.3 Deleting a path alarm profile 143
Performance 145
12.1 Introduction 145
12.2 STM Performance Statistics 147
12.2.1 Viewing Regenerator Section - Multiplex section performance statistics 147
12.2.2 Viewing performance statistics of path 150
12.2.3 Viewing performance statistics of the tributary unit 152
12.2.4 Viewing the performance statistics of the transceiver 153
12.3 PDH Performance Statistics 155
12.3.1 Viewing PDH performance statistics 155
12.4 Ethernet-Performance Statistics 158
12.4.1 Viewing the performance statistics of ethernet interface 158
12.5 VCG Interface 160
12.5.1 Viewing the performance statistics of a VCG interface 160
Security 163
13.1 Introduction 163
13.2 Managing User Accounts 165
13.2.1 Creating a new user account 165
13.2.2 Modifying an existing user account 166
13.2.3 Modifying password of a logged in user 167
13.2.4 Deleting user account 168
Maintenance Operations 169
14.1 Introduction 169
14.2 System Settings 169
14.2.1 Viewing and editing the system settings 170
14.3 Rebooting cards 170
14.4 Restart and download software 171
14.4.1 Warm/Cold restarting the network element 171
14.4.2 Upgrading software 172
14.4.3 Downgrading software 173
14.5 Loop-Backs 174
14.5.1 Performing loopback on STM ports 176
14.6 Database Changes 178
14.7 Diagnostics 179
14.7.1 Accessing OSPF diagnostics 179
14.7.2 Accessing System diagnostics data 187

TJ100CPr4
Table of contents vii

14.8 Configuration Management 188


14.8.1 Taking backup of configuration data 189
14.8.2 Restoring configuration 190
14.8.3 Restoring factory default settings 192
Acronyms 193
Appendix A 195
16.1 Cross Connect Support 195
Appendix B 197
17.1 List of Alarms 197
Appendix C 205
18.1 Installing 3Com server 205
18.2 Configuring user in the 3Com server 209
Index 213

User Interface Guide Version 1.0


viii Table of contents

TJ100CPr4
1
About this Document 1-

This document provides general information on features provided by


the craft application which is a web user interface for Tejas products.
The topics covered are:

• Accessing the user interface


• Screen layout of the user interface
• user interface menus
1.1 Audience
This document is intended for the following personnels:

• Planners
• Provisioners
• Network Administrators
• Maintenance Personnels
1.2 References
This document has references to the following documents:

• Installation Procedure for TJ100CPr4—104-DOC000026-E


• Hardware Description for TJ100CPr4—104-DOC000025-E
1.3 Software Support
This document conforms to the software release 4_6.

Note : Some of the features are licensed. If you do not find the following options in
the navigation menu, please contact your sales co-ordinator.
• Terminal Server

User Interface Guide Version 1.0


2 About this Document

TJ100CPr4
2
Technical Support Information 1-

Table 2-1
Technical Assistance Center
For problems that affect service 91-99019-71880
For 24 hours emergency recover or software upgrade 91-93438- 31565
support, that is for:
Restoration of service for equipment that has been
carrying traffic
Issues that prevent traffic protection switching
Issues that prevent completion of software upgrades
For problems that affect and do not affect the service 91-80-4179-4700
For assistance on technical support and upgrade
notification
You can also mail to tac@india.tejasnetworks.com

For queries regarding the document, mail to docs@india.tejasnetworks.com

User Interface Guide Version 1.0


4 Technical Support Information

TJ100CPr4
Browser Based User Interface
3 1-

3.1 Introduction
This chapter describes the procedures for logging in and logging out
of the Tejas Network Element (NE). It also provides the structure
and functionality of the craft application or Web User Interface
(WUI) for the Tejas Network Element Software (TejNES).

3.2 System Requirements


The system used as the craft application should have a minimum of
256 Mb RAM. The operating systems that can run the craft
application are:

• Windows XP
• Windows 2000
• Windows NT
• Linux 2.4, 2.6
The browsers that can be used for accessing the WUI are:

• Mozilla v1.6, v1.7 on Red Hat Linux and HP-UX.


• FireFox 1.0 on Red Hat Linux 7.x
• IE 6.x on WinXp or Win2K

To ensure proper operation of the alarm monitoring pages, the


caching mechanism in the user’s web browser should to be set to
search for a newer versions of alarm monitoring page.

User Interface Guide Version 1.0


6 Browser Based User Interface

The following procedure describes the steps to set the caching


mechanism to search for newer pages in Internet Explorer.

Step Action

1 Click Tools on the menu bar of Internet Explorer.


2 In the drop-down menu click Internet Options. The Internet
Options dialog box is displayed.
3 In the Temporary Internet files section of the Internet
Options dialog box, click Settings. The Settings dialog box is
displayed.
4 In the Settings dialog box, select Automatically for “Check
for newer versions of stored pages” and click OK. The
Settings dialog box is closed.
5 Click OK in the Internet Options dialog box to close it. the
browser is now set to display the latest versions of all the web
pages.

3.3 User Interface Layout


The WUI provides access to the following functionality:

• System Operation
• System Configuration
• Diagnostics
• Maintenance Operations
• Software and Configuration Management
• User Administration

TJ100CPr4
Browser Based User Interface 7

The default view of the WUI is divided into four separate areas. The
four areas are as follows:

• Alarm Banner
• Title area
• Navigation menu
• Input/Output area
Figure 3-1 shows the default view of the TejNES web user interface.
Figure 3-1
Sample User Interface Layout - Page 1

User Interface Guide Version 1.0


8 Browser Based User Interface

3.3.1 Title area


The Title area occupies the top frame in the WUI. It displays the
following:

• IP address of the NMS port of the network element


• Logout option
• Tejas logo
• Name of the network element
Figure 3-2 shows the elements of the Title area.
Figure 3-2
Title area

3.3.2 Alarm Banner


The Alarm Banner displays the active alarms on the network element
along with their severity levels.

Alarm Banner displays a check box, which provides the option to


enable/disable auto refresh. The auto-refresh is enabled by default.
Auto-refresh is disabled on selecting the check box. The Alarm
banner also displays the last refresh time of the network element.

When automatic refresh is disabled, the counters are not updated and
count change due to declaration of new alarms or clearing of existing
alarms are not reflected on the banner. Disabling the automatic
refresh will affect only the current WUI and will not affect the refresh
functionality for other users or alarm notification to NMS
applications.

TJ100CPr4
Browser Based User Interface 9

The question mark above the alarm banner indicates the order in
which the alarms are displayed (Critical Major Minor Deferred
Warning) when mouse is brought over it.

The color code for the alarms are as follows:

• Red - Critical, Major


• Orange - Minor
• Yellow - Deferred, Warning

3.3.3 Navigation menu


The Navigation menu displays the menu items for accessing the
various network element WUI applications.

3.3.4 Input/Output area


The Input/Output area displays the respective pages when the
menu items in the navigation menu is clicked. The pages displayed in
the Input/Output area displays the parameters to configure the
network element as desired.

3.4 Working with the Network Element User Interface


The main menu in the navigation tree can be expanded to access the
submenus. The submenus launch a specific application, when clicked.
Each application provides access to different operations depending
on the access privileges of the user.

The WUI prompts for a confirmation when a user deletes, modifies


or provisions any feature. The changes are applied only after a
confirmation from the user. During confirmation, the Cancel button
is selected by default to avoid inadvertent submission of changes as
some web browsers automatically submit the form when Enter key is
pressed on the key board.

On confirming a change, you will be indicated about initiating a


reboot and traffic disruption. The software reboots without affecting
the commissioned traffic (warm reboot). Reboot is necessary when
the IP address or the Router ID of the network element is changed.
Connectivity to the network element software is lost while rebooting.

User Interface Guide Version 1.0


10 Browser Based User Interface

A Reset button is provided in each provisioning and editing page,


which when clicked, restores the original values for the modified
parameters.

3.5 Logging In
The craft application or the WUI of a network element can be
accessed remotely using DCC. To access a network element in a
network remotely, you need to add the IP address of the gateway
network element in the network as route in your system.

To access the WUI, connect an Ethernet interface of the craft


PC/terminal to the Network Management System (NMS) port on the
Processor, Cross-connect, Aggregate and Tributary card (PXAT).

Note 1: An Ethernet cross cable is used for direct connectivity between the Ethernet
interface of the PC and the NMS port on the PXAT card of the network element.

Note 2: An Ethernet straight cable is used to connect the network element and the PC
terminal, when connected through an Ethernet hub/switch.
To log into the network element, open a web browser session and
enter the following Universal Resource Locator (URL):
http://192.168.1.254:20080/

Note 3: The URL http://192.168.1.254 is the default factory setting. After the system
is commissioned the network element is assigned the element specific URL.

TJ100CPr4
Browser Based User Interface 11

Note 4: If the URL is not accessible, the following can be a possible reason:
• Ethernet connectivity to the network element is improper.
• Type of cable used is different (straight/cross).
• Ethernet interface on the PC/terminal is not provisioned.
• Incorrect URL entered to access the network element.
• Malfunction of the network element software.
• Route to the subnet IP, http://192.168.1.254:20080, is not present
on the terminal.

Note 5: Ensure that the computer has Netscape Navigator, version 4.75 onwards or
Internet Explorer, version 5.0 onwards for setting up the network element
software.

If the URL is accessible, login to the WUI with the User Name as
tejas and Password as j72e#05t. On successful log in, the NE
Information page is displayed.

The user authentication screen is shown in Figure 3-3.


Figure 3-3
TejNES user login screen

User Interface Guide Version 1.0


12 Browser Based User Interface

Note 6: Change the initial password of the default user account on the network
element. The default user accounts and passwords are widely known.

Note 7: The performance of the craft application is reduced with the increase in the
number of sessions.

Note 8: The “Save this password in your password list” should not be checked if the
craft application is used from a shared PC. Also after finishing the work, the
user should logout of the application and close the browser.

CAUTION
Multiple administrative and diagnostic logins
During multiple administrative and diagnostic logins, ensure that
actions performed do not affect the work of other users. The
command implementations are on first-come-first-serve basis.

3.6 Logging Out


A LOGOUT link is provided on the right side of the Title Area (refer
to Figure 3-1). On clicking LOGOUT, the user exits from the
application and a logout page is displayed. To login again, the user has
to enter the password and login. To login as a different user, click the
Change User button and retype the user name and password.

TJ100CPr4
4
NE Information 1-

4.1 Introduction
This chapter explains the Network Element (NE) information page.
The NE information page is the default page displayed after logging
into the network element. The basic configuration information of a
network element can be accessed and managed in this page.

Table 4-1 describes the fields displayed on the NE Information


page.
Table 4-1
Parameters on the NE information page
Field Description
Name Enter the identification label for the network element.
Node Configuration Displays the configuration of the network element as either
Add-Drop Multiplexer (ADM), Terminal Multiplexer (TM) etc.
Node Product Code Displays the product type.
AU Mode Displays the operating granularity of the network element.
Router ID Enter the IP address of the network element for in-band
communication. The Router ID is unique in a network and is used
by the Network Management System (NMS) to identify the
network element
Ethernet IP Enter the IP address and the subnet mask for the network element
for LAN port communication.
MAC Address Displays the MAC (Media Access Control) address of the network
element.
Contact Enter the contact details and contact number of the person
maintaining the network element.

User Interface Guide Version 1.0


14 NE Information

Table 4-1 (continued)


Parameters on the NE information page
Field Description
Location Enter the location or site information where the network element
is physically installed.
Software Version Displays the version of the software installed on the network
element.
SDH/SONET Mode Displays the mode in which the network element has been
configured.

4.2 Network Element Information


In the NE Information page displays the basic information such as
the node name, node configuration, operating mode and granularity,
location of the node and the name of the person maintaining the
node. Name, Router ID, Ethernet IP, contact and location fields are
configurable.

4.2.1 Configuring the network element


The following are the steps to view and set up the network element.

Step Action

1 Log into the network element. The NE information page is


displayed.
2 Enter values referring to Table 4-2 and click Submit. A
confirmation page is displayed. (For details regarding the
parameters, refer Table 4-1)
3 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

Note : Editing the fields on the NE information page is service non-disruptive. The
software reboots without affecting the commissioned traffic (warm reset) when
Router ID or Ethernet IP are changed. The network element does not reboot
for any changes made in name, location, etc. Connectivity to the Network
element software is lost while rebooting.

TJ100CPr4
NE Information 15

Table 4-2 gives the default and acceptable values for the configurable
network element parameters.
Table 4-2
Default and acceptable values for configurable network element parameters
Parameter Default value Acceptable value
Name Default 0 - 20 character string
(see Note)
Router ID 192.168.1.254 0.0.0.0 - 254.254.254.254
Ethernet IP 192.168.1.254/24 0.0.0.0 - 254.254.254.254. The mask
can take a value of 0, 8, 16, or 24
Contact - 0 - 255 character string
(see Note)
Location - 0 - 255 character string
(see Note)
Note: This field supports all alphanumeric and special characters.

User Interface Guide Version 1.0


16 NE Information

TJ100CPr4
5
Node Slot View 1-

This chapter describes the Node slot view menu.

The Node slot view application displays graphical representation of


the cards present in allotted slots of the chassis. Three visual
indicators are present on the card representing the status, alarm and
active conditions respectively. The color of the Status Light Emitting
Diode (LED) indicates the status of the module or card.

Clicking the graphical image of the card displays the details of the card
in a new page. The lower portion of the page displays the status of
active alarms present on the card.

The Node slot view page is refreshed for every two seconds. The Stop
Refresh button, when clicked stops the automatic refresh of the page.
Clicking the Stop Refresh button again will resume the automatic
refresh of the page.

User Interface Guide Version 1.0


18 Node Slot View

Table 5-1 lists the visual indicators on the Node Slot View page.
Table 5-1
Visual Indicators on the Node Slot View page
Status of the LED Indication
Status
Red Card failure
Green Normal working
Amber • Power cycle
• Mismatch
Alarm
Red Major/Critical alarms present on the network element
Green Normal working
Amber Minor alarms present on the network element
Blue Deferred alarms present on the network element
Active
Red Card failure
Green Normal working
Amber • Power cycle
• Mismatch

5.1 Viewing card parameters


The following are the steps to view card parameters.

Step Action

1 Click Node Slot View in the main menu. The Node slot view
page is displayed.
2 Click the card to view its parameters. The card page is
displayed.

TJ100CPr4
Node Slot View 19

Table 5-2 gives general information about the card parameters.


Table 5-2
Card parameters
Field Description Applicable to
Shelf Displays the shelf number in which the network • PXAT
element is present. The value is always 1 in this • TETH02EX
release.
• APSU01, DPSU01
Slot Displays the slot number in which the card is • PXAT
present. • TETH02EX
• APSU01, DPSU01
Equipment • Present indicates that the card is present in the • PXAT
node • TETH02EX
• NotPresent indicates that the card is not present • APSU01, DPSU01
in the node
Product Code Displays the product code. • PXAT
• TETH02EX
• APSU01, DPSU01
Serial Number Displays the unique serial number of a specific • PXAT
module. • TETH02EX
• APSU01, DPSU01
Software Displays the version of the software installed in PXAT
Version the node.
Redundancy Displays the Redundancy Status of the card as PXAT
Status primary or secondary.

Note : The slot view shows all the cards physically present in the network element.
The view of the cards may or may not match with the physical orientation of
the cards.

User Interface Guide Version 1.0


20 Node Slot View

TJ100CPr4
6
System Time 1-

6.1 Introduction
This chapter describes the System Time menu in the WUI.

In the System Time menu you can,

• Set the date and time of the network element


• Set the required time zone
• Set a time server for the network element

6.2 Managing Date and Time


6.2.1 Setting date and time on a network element
The Set Time menu enables you to set the date, month, year, hour,
minutes and seconds for the network element. The time is displayed
in the Input/Output area of the WUI.

Note : You can change the network element time settings by editing values in the WUI.
But for changes to take place in the OS and logs, a service non-disruptive reset
has to be applied.

User Interface Guide Version 1.0


22 System Time

The following are the steps to set the system date and time:

Step Action

1 Click System Time in the navigation menu. The sub menu


items are listed.
2 Click Set time. The Set Node Time page is displayed.
3 Select month, date, year, hour, minute and seconds from the
respective drop-down menu.
4 Click Submit. A “Successfully Modified” message is displayed.
Table 6-1 gives the acceptable values for the date and time settings for
the network element.
Table 6-1
Default and acceptable values for the configurable date and time parameters
Parameter Default value Acceptable value
Date and Time Current date and time, • Month—January to December
relevant to the configured • Date—1 to 31
time zone.
• Year—2001 to 2036
• Hour—00 to 23
• Minutes—00 to 59
• Seconds—00 to 59

6.2.2 Setting time zone on a network element


In the Set time zone menu, you can set the time zone relevant to the
location of the network element. The Other Time Zone option for
Zone allows you to set time zone other than the listed time zones.
You can also set Day Light Saving, if applicable for a particular time
zone.

Note : The network element must be warm rebooted for the changes made for time
zone to take effect.

TJ100CPr4
System Time 23

The following are the steps to set time zone on a network element.

Step Action

1 Click System Time in the navigation menu. The sub menu


items are listed.
2 Click Set time zone. The Set Time Zone page is displayed.
3 Select the desired time zone from the Zone drop-down menu.
If the desired time zone is not listed in the Zone drop-down
menu, click Other Time Zones.
4 Click Submit. The Other time zone page is displayed.
5 Enter/Select values in the Other time zone page referring to
Table 6-2.
6 Click Submit to submit the entered values. A confirmation
page is displayed.
7 Click Yes. A message indicating the successful setting of the
time zone is displayed.
8 Warm reboot the network element.

User Interface Guide Version 1.0


24 System Time

Table 6-2 lists the configurable parameters for setting other time
zones with default and acceptable values.
Table 6-2
Default and acceptable values for configurable Other time zone parameters
Parameter Default value Acceptable value
Zone IST Any time zone available in the time zones list
Offset Hours -5 -12 to 11
Offset Minutes 30 0 - 59
Daylight saving Disable • Enable
• Disable
DST String - Enter an identifier for the DST period. The
identifier can be a set of alphanumeric
characters.(see Note)
DST Start - • Month—January to December
(Month: Week: Day: Hour: • Week—1st Week to 4th Week, Last week
Minute) • Day—Sunday to Saturday
• Hour—0 to 23
• Minutes—0 to 59
(see Note)
DST Stop - • Month—January to December
(Month: Week: Day: Hour: • Week—1st Week to 4rth Week, Last week
Minute) • Day—Sunday to Saturday
• Hour—0 to 23
• Minutes—0 to 59
(see Note)
Note: The DST String, DST Start and DST Stop parameters can be provisioned only if Daylight
savings is enabled.

TJ100CPr4
System Time 25

6.2.3 Setting network time server


The Set time server menu enables you to set a server or network
element as master clock source in order to have a uniform clock in the
network. All the network elements connected to the same server in a
network function synchronously. The network element periodically
synchronizes itself with the server to avoid an asynchronous state.

In case a network element has to be synchronized with a NTP server


for date and time, the NTP server address and synchronization
interval for the network element should be set. Usually, the NMS
server is nominated as the NTP server.

CAUTION
In case the network elements in a network are synchronized to more
than one NTP server, ensure that the NTP servers are synchronized
to a common wall clock. Non-synchronous NTP servers may result in
frequent reset of internal clock in the network elements, which may
lead to incorrect performance bining.

Note 1: Upto 5 NTP servers can be nominated on the network element.

Note 2: Timing server nominated must be of stratum level of 14 or less than 14. The
network element will not synchronize to the server if the stratum level is not
within the range.
Table 6-3 describes the fields on the Set Time Server page.
Table 6-3
Fields on the Set Time Server page
Field Description
NTP Client Enable Enable Allows an NTP server to be nominated as
synchronization source for date and time.
Disable Nomination of an NTP server as
synchronization source for date and time is
not allowed.
NTP Server-0 Enter the IP Address of the first time server.
NTP Server-1 Enter the IP Address of the second time server.

User Interface Guide Version 1.0


26 System Time

Table 6-3 (continued)


Fields on the Set Time Server page
Field Description
NTP Server-2 Enter the IP Address of the third time server.
NTP Server-3 Enter the IP Address of the fourth server.
NTP Server-4 Enter the IP Address of the fifth server.
Synchronization Interval Select the synchronization interval. Once the node synchronizes
with the time server, the synchronization interval specifies (in
seconds) how often the network element should poll the time
server.
Current NTP Server Displays the current NTP server.
Current Time Offset Displays the current time offset.
Last Update Time Displays the last time when the network element was synchronized
to the time server.
Note: There is no check for IP addresses entered for NTP servers. So enter only correct IP
addresses for the NTP servers.

The following are the steps to set the network time server.

Step Action

1 Click System Time in the navigation menu. The sub menu


items are listed.
2 Click Set time server. The Set Time Server page is displayed.
3 Enter the IP address of the network element or the timing
server to which the network element is to be referenced.

Note : The IP address referenced must be reachable by the Network Element.


4 Select Enable or Disable in the NTP Client Enable drop
down menu.
5 Select a Synchronization interval from the drop down menu.
6 Click Submit. A “Successfully Modified” message is displayed.

TJ100CPr4
System Time 27

Table 6-4 gives the default and acceptable values for the configurable
time server parameters.
Table 6-4
Default and acceptable values for configurable time server settings
Parameter Default value Acceptable value
NTP client Enable Disable • Enable
• Disable
NTP Server-0 - 0.0.0.0 - 255.255.255.255
NTP Server-1 - 0.0.0.0 - 255.255.255.255
NTP Server-2 - 0.0.0.0 - 255.255.255.255
NTP Server-3 - 0.0.0.0 - 255.255.255.255
NTP Server-4 - 0.0.0.0 - 255.255.255.255
Synchronization interval 1024 • 16
(seconds) • 32
• 64
• 128
• 256
• 512
• 1024
• 2048
• 4096
• 8192
• 16384

User Interface Guide Version 1.0


28 System Time

TJ100CPr4
7
Inventory 1-

7.1 Introduction
The Inventory menu in the WUI provides the inventory of the
modules, circuit packs and SFPs in the network element and its details
such as physical presence, operation status, product code and serial
number.

7.2 Node Inventory


In the Node inventory menu, you can:

• view details of the network element


• view details about the individual card present in the network
element
• delete cards
• view SFP details
• delete SFPs
.

Table 7-1 describes the fields on the Node Inventory page


Table 7-1
Fields on the Node Inventory page
Field Description
Slot Displays the slot number in which the card is present. On clicking
the slot hyperlink, the attributes such as shelf, product code, serial
number, etc of the card present in the slot are displayed.
Card Type Displays the type of the card. For example–PSM, MFC, etc.
Operational Status Displays the operating status of the card. For example–UP,
DOWN.

User Interface Guide Version 1.0


30 Inventory

Table 7-1 (continued)


Fields on the Node Inventory page (continued)
Field Description
Equipment Displays whether card is currently jacked in or not.
Product Code Displays the Product code of the card.
Serial Number Displays the identification number of a specific card.

Note : The Node inventory does not refresh automatically. You need to manually
refresh the page or the pane to view any change made to the inventory of the
node.
7.2.1 Deleting pluggable modules
Pluggable Modules describes the SFP parameters. The SFPs are
associated with the STM ports on the cross-connect card. The SFPs
can be deleted without having to actually remove the SFP. The SFP
will autoprovision with the slotted SFP values.

Table 7-2 describes the SFP parameters.


Table 7-2
SFP parameters
Field Description
Name Displays the name of the SFP.
Port Displays the STM port of the SFP in the network element.
Operational Status Indicates the operational status of the SFP.
Is present Present Indicates the SFP is present.
Not Present Indicates the SFP is not present.
Laser type Displays the laser type. Also specifies the capacity and range of the
laser used in the particular interface.
Product Code Displays the product equipment code of the SFP.
Serial number Displays the Serial number of the SFP.

TJ100CPr4
Inventory 31

Note 1: Lasers are specific to the interfaces. For example, a STM laser can be
inserted only into an STM interface. The ranges that a Laser can have are
Long Reach, Short Reach and Intermediate Reach.

Note 2: The Delete button allows you to delete the SFP. You do not require to
physically remove the SFP before deleting. The SFP will autoprovision with
the slotted SFP values. The Node inventory page displays modules pluggable
status along with the chassis information.
The following are the steps to delete the configuration of pluggable
modules from the network element.

Step Action

1 Click Inventory in the navigation menu. The sub menu items


are listed.
2 Click Node Inventory. The Node inventory page is
displayed.
3 Click the Delete button in the Name column in the SFP
section. A confirmation page is displayed.
4 Click Confirm Delete. A “Successfully Deleted” message is
displayed.

User Interface Guide Version 1.0


32 Inventory

7.3 Shelf
The shelf submenu lists all the cards present in the network element.
Each individual card link, when clicked, displays the physical
parameters of the card.

Table 7-3 gives the general information about the physical attributes
of the cards present in the network element.
Table 7-3
Physical attributes of the cards present in the network element
Attribute Description Applicable to
Shelf Displays the shelf number in which the network • PXAT
element is present. This value is always 1 in this • TETH02EX
release.
• APSU01, DPSU01
Slot Displays the slot number in which the card is • PXAT
present • TETH02EX
• APSU01, DPSU01
Equipment • Present indicates that the card is present in the • PXAT
node • TETH02EX
• NotPresent indicates that the card is not present • APSU01, DPSU01
in the node
Product Code Displays the product code of the module • PXAT
• TETH02EX
• APSU01, DPSU01
Serial Number Displays the unique serial number of a specific • PXAT
module • TETH02EX
• APSU01, DPSU01
Software Displays the version of the software installed in PXAT
Version the node
Redundancy Displays the Redundancy Status of the card as PXAT
Status primary or secondary.

TJ100CPr4
8
Protection 1-

8.1 Introduction
This chapter describes the protection feature for a network element.
The linear protection switching mechanism is coordinated by the K1
and K2 bytes in the Line Overhead. Protection switching comes into
effect in case of:

• Signal failure
• Signal degradation
• User initiated request

In the Protection menu, you can view information on the following:

• Connections
• Timing Manager

8.2 Connections
Sub-Network Connection Protection (SNCP) is path protection
switching that is initiated in the path terminating equipment when the
network element is in SDH mode.

In SNCP, protection is initiated on a failure in the path. It is required


to create two paths for each circuit—one work and one protection.
Traffic in the source network element is bridged on both the working
and the protection paths, so that the destination network element
selects the best of the signals from the working or protection paths.

User Interface Guide Version 1.0


34 Protection

SNCP is a dedicated protection mechanism and operates in a


unidirectional protection switching manner. SNCP is a protection
scheme, which can be applied on an individual basis to VC-n (both
HOVC and LOVC) signals. The entry and the exit network elements
are designated at connection provisioning time. A network element
can be both entry and exit network element in case of bidirectional
SNCP ring connection. SNCP ring groups are formed from
unprotected facilities. When SNCP ring connections are provisioned
on these facilities, all intermediate nodes have pass-through
connections.

SNCP can be provisioned only if there is availability of minimum


bandwidth on both the working and protection port. For example, to
provision SNCP for add/drop E1 cross-connect, there should be at
least one TU12 available on the working and protection ports.

SNCP configuration is supported on STM-1 interfaces. SNCP can be


provisioned in revertive and non-revertive mode. In revertive mode,
traffic switches back to the work path once the fault condition has
cleared, after the WTR period has elapsed. In non-revertive mode,
traffic remains on the protect path until switched back to the work
path manually, after the fault is cleared. Table 8-1 lists the maximum
number of connections supported in the SNCP configuration for
STM-1 interfaces.
Table 8-1
Maximum number of connections supported in SNCP configuration
Capacity Maximum number of
connections for STM-1
VC12 63
VC3 3
VC4 1

Note : In Tejas systems, SNCP is provisioned while configuring protection for


cross-connects. See “Cross-connects” on page 41 for information on
creating/editing cross-connects.

TJ100CPr4
Protection 35

Figure 8-1 shows switching in the case of single and dual fiber cuts.
Figure 8-1
SNCP configuration

Normal Operation

A B

C D

Switching in case of single fiber cut

A B

C D

Switching in case of dual fiber cut

A B

C D

Working Path
Protection Path
Bridging

Bolder line indicates the currently active path


(the path carrying traffic )

User Interface Guide Version 1.0


36 Protection

The Connections menu allows you to execute external commands on


SNCP provisioned cross-connections.

In the Connection menu, you can,

• prevent the traffic from switching to the protection port (Lockout


Protection)
• force switch the traffic to the protection path
• force switch the traffic to the working path
• manual switch the traffic to the protection path
• manual switch the traffic to the working path
• clear active switch requests on the protection path

Note 1: When there is a signal fail on the protect path, then a manual switch to the
protect path will fail.

Note 2: You cannot perform a protection switch if a higher-priority switch is already


active on the protection path.

Note 3: The manual switch command is successfully executed only if the working or
the protection path to which the traffic is being switched is error or alarm free.

Note 4: The Source Protection, Source Revertive, Source Protection Status,


Provisioned Source External Command, Source Switch Status fields are not
applicable for VCG port.

Note 5: SNCP protection for card failure can be provided by provisioning work and
protect port/time slot on different card packs in the network element.
In the Connection Protection Requests page, you can

• view protected connections


• access external commands

TJ100CPr4
Protection 37

Table 8-2 describes the fields on the Connections protection


requests page.
Table 8-2
Fields on the Connections protection requests page
Field Description
Working port Lists all the ports having protected cross-connects. Select the port
for which you need to view the protected connections. By default
‘All’ is selected.
Select all Select the check box to select all the listed connections.
Connection Displays the name of the connection.
End Displays the end type.
Working path Displays the work port.
Protection path Displays the protect port.
Protection status Displays the protection status.
Provisioned protection Displays any protection request provisioned on the connection.
request
Switch status Displays the switch status.

Table 8-3 describes the fields on the Protection Request page.


Table 8-3
Fields on the Protection Request page
Field Description
Source Source Channel name
Destination Destination Channel name
Protection
Source Protection If source protection is enabled, it displays the Source protection
channel name.
Source Revertive Displays the reversion mode of the source channel as
• Revertive
• Non Revertive
Source WTR Time For revertive mode, displays the wait to restore time in minutes,
after which the traffic must revert to the work path after failure
clears.

User Interface Guide Version 1.0


38 Protection

Table 8-3 (continued)


Fields on the Protection Request page
Source Protection Status Displays the status of the source channel either as work or protect.
Provisioned Source Displays the external command provisioned for both source and
Protection request destination. Depending on whether source or destination
protection is provisioned, this field may be applicable.
Source Switch Status Displays the status of the protection switch in a source channel.
Note: The details for the destination protection are displayed if the destination protection is
enabled in the Edit Cross-Connect page.

Table 8-4 describes the external commands executable on SNCP


provisioned cross-connections.
Table 8-4
External Commands
Field Description
Release Clears previously set commands.
Lockout Protection Prevents traffic from switching to protect path.
Forced Switch to Protect Forces traffic to switch to the protect path regardless of signal
fail/degrade condition existing on protect path.
Forced Switch to Working Forces traffic to switch to the work path regardless of signal
fail/degrade condition existing.
Manual Switch to Protect Switches traffic to protect path only when it does not have signal
fail/degrade condition existing.on it.
Manual Switch to working Switches traffic to protect path when it does not have signal fail/
degrade condition existing on it. Manual Switch to working is
applicable in the case of non-revertive connections only.

8.3 Timing Manager


In the Timing manager menu, you can view the synchronization
source details such as the synchronization source, priority, protection
request, etc. You can also give external commands to the
synchronization sources.

TJ100CPr4
Protection 39

8.3.1 Viewing timing manager protection request


The following are the steps to view timing manager protection
request.

Step Action

1 Click Protection in the navigation menu. The sub menu items


are listed.
2 Click Timing Manager. The Timing manager protection
request page is displayed.
Table 8-5 describes the fields on the Timing manager protection
request page.
Table 8-5
Fields on the Timing manager protection request page
Field Description
Select Select the check box for the clock source on which external
commands are to be executed.
Clock Source Displays the name of the clock source.
Priority Displays the priority set for the clock source.
Quality Level Defines quality of the timing reference to which the node is locked
to. By default, Quality Level is set to INVALID.
Clock status Displays the status of the clock source.
Lockout Request Displays the lockout request.
Protection request Displays the protection request.

User Interface Guide Version 1.0


40 Protection

8.3.2 Giving external commands to synchronization sources


Table 8-6 describes the commands on the Timing manager
protection request page.
Table 8-6
Commands on the Timing manager protection request page
Field Description
Release Clears the previous external requests.
Forced Switch The network element switches to the selected clock source on an
external request for forced switch. The network element cannot be
switched to other clock sources unless the external request is
cleared. Forced switch has a higher priority over manual switch.
Manual Switch The network element switches to the selected clock source on an
external manual switch request.
Lockout source Locks the clock source so that the network element is not
synchronized to the clock source.
Clear Lockout Clears the lock on the clock source so that the network element can
be synchronized to the clock source.

The following are the steps to give external commands to


synchronization sources.

Step Action

1 Click Protection in the navigation menu. The sub menu items


are listed.
2 Click Timing Manger. The Timing manager protection
request page is displayed.
3 Click the command you wish to execute after selecting the
clock source. Refer to Table 8-6 for information on the
executable commands.

TJ100CPr4
9
Configuration 1-

9.1 Introduction
This chapter describes the Configuration menu in the WUI. In the
Configuration menu, you can configure the following:

• Cross-connect
• Overhead Tunnel
• Environmental Alarm Input
• SNMP Traps
• Facilities
• NE Adjacency
• DCN
• Synchronization
9.2 Cross-connects
The Cross-connect menu enables you to create cross-connects in a
network element. You can provision 1WAY, 2WAY, protected or
unprotected cross-connects of different capacities. The numbering
scheme used is

VC capacity-Chassis-Slot-Port-TUG3 (K) - TUG2(L) - VC12(M).

TU capacity Chassis-Slot-Port-AU # - TU-Group- TU#.

The different type of cross-connects that can be configured are—add,


drop, add-drop, pass-through and hairpin. These can be created on
E1, E3/DS3, Ethernet and STM-1 interfaces. The cross-connect can
be 1WAY or 2WAY.

User Interface Guide Version 1.0


42 Configuration

In the Cross-connect menu, you can:

• filter cross-connects
• add cross-connects
• edit a cross-connect
• delete a cross-connect
• edit VCG
9.2.1 Filtering cross-connects
The Filter button when clicked, filters cross-connect based on the
selected criteria for capacity, card, port number, etc. The filtered
results are displayed in the Cross-connects section.of the Configure
Cross-connects page.

The Select all button when clicked selects all the filtered
cross-connects. The Deselect all button when clicked deselects all
the selected cross-connects.

The following are the steps to filter cross-connects.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Cross-connect. The Configure Cross-connects page
is displayed. In this page you can view, filter and delete
cross-connects.

TJ100CPr4
Configuration 43

Table 9-1 describes the fields on the Configure Cross-Connects


page.
Table 9-1
Fields on the Configure Cross-connects page
Field Description
Filter Cross-connects
Capacity Select the capacity of the cross-connect.
Card Lists all the cross-connect card in the network element. Select the
card for which you want to see the provisioned cross-connects.
Port Number Select the interface number.
STM # Select the AU4 number.
K# Select the TUG3 number.
L (Group) # TUG2 number
M (VC number)# TU number
(Filtered) Cross-connects
Delete All Select the check boxes in the rows you want to delete.
Connection ID Displays the name of the cross-connect or of the corresponding
VCG.
Traffic status Displays the status of the traffic on cross-connect.
Capacity Displays the capacity of the cross-connect.
Source Displays the Source channel.
Source protection Displays the protection Channel to which the source switches on
failure.
Active Source Displays if the source path is functioning in work mode or protect
mode.
Dir Displays the directionality of the cross-connect.
Destination Displays the Destination channel.
Destination Protection Displays the Protection Channel to which the destination switches
on failure.
Active Destination Displays if the destination path is functioning in work mode or
protect mode.

User Interface Guide Version 1.0


44 Configuration

9.2.2 Adding cross-connects


Table 9-2 describes the fields on the Add Cross-connects page.
Table 9-2
Fields on the Add Cross-connects page
Field Description
Number of Connections Enter the number of cross-connects that you want to create.
Cross-connect Parameters
Capacity Select the capacity of the cross-connect.
Circuit Identifier Enter the Identity of the cross-connect.
Directionality Set the direction of data flow in cross-connect.
Port Select the port number of the cross-connect for Working Source
and Working Destination.
STM # Select the STM number.
K (TUG3) Select the STMn time slot for the cross-connect.
L (TUG2)-group • K specifies TUG3
M (VC number) • L specifies TUG2
• M specifies VC number of the crossconnect
Source Protection Select Enable or Disable to enable or disable the protection path for
source.
Destination Protection Select Enable or Disable to enable or disable the protection path for
destination.
Port select the interface number for Source and Destination.
STM # Select STM number for Source and Destination.
K (TUG3) Select the STMn time slot for the cross-connect.
L (TUG2)-group • K specifies TUG3
M (VC number) • L specifies TUG2
• M specifies VC number of the crossconnect
Reversion Mode Parameters
Source Port Revertive Select the protection mode for the source.
Source WTR Time If Revertive mode is selected for the source, select the wait to
restore time from the drop down box.
The WTR time indicates the time duration in minutes after which
the traffic reverts to the work path after fault is rectified.

TJ100CPr4
Configuration 45

Table 9-2 (continued)


Fields on the Add Cross-connects page
Field Description
Destination Port Revertive Select protection mode for the destination.
Destination WTR Time If revertive mode is selected for the destination, select the wait to
restore time from the drop down box.
The WTR time indicates the time duration in minutes after which
the traffic reverts to the work path after fault is rectified.
Note: The Source and Destination protection ports and TUG values are configurable only when
the Source Protection and Destination Protection are enabled.

The following are the steps to add cross-connects to the network


element.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Cross-connect. The Configure Cross-connects page
is displayed.
3 Click Add Cross-connect link. The Add Cross-connects
page is displayed. Enter/Select values referring to Table 9-3.
4 Click Submit. A confirmation page is displayed.
5 Click Yes. A “Successfully Created” message is displayed.

User Interface Guide Version 1.0


46 Configuration

Table 9-3 gives the default and acceptable values for configurable
cross-connect parameters.
Table 9-3
Default and acceptable values for the configurable cross-connect parameters
Parameter Default value Acceptable value
Number of connections 1 The number of cross-connects is limited
by the uplink bandwidth of the
cross-connect card.
Capacity VC12 • VC12
• VC3
• VC4
Circuit Identifier Tejas Networks Any alphanumeric character string (see
Note 1)
Directionality 2WAY • 1WAY
• 2WAY
Working Source and - Valid Source and Destination port from
Destination port the drop down menu
STM No. 1 1 - 16
K 1 1-3
L 1 1-7
M 1 1 - 3 in case of VC12
Source Protection Disable • Enable
• Disable
Destination Protection Disable • Enable
• Disable
Reversion mode parameters
Source Port Revertive Non-revertive • Non-revertive
• Revertive
Source WTR Time 5 1 to 12 minutes
(see Note 2)

TJ100CPr4
Configuration 47

Table 9-3 (continued)


Default and acceptable values for the configurable cross-connect parameters
Parameter Default value Acceptable value
Destination Port Non-revertive • Non-revertive
Revertive • Revertive
Destination WTR Time 5 1 to 12 minutes
(see Note 2)
Note 1: The Circuit Identifier can take 0 to 40 characters.(alphabetical, numeric, space and special
characters such as ‘-’ or ‘_’).
Note 2: WTR time can only be provisioned in revertive mode.

Note 1: Traffic reverts back to work path when the conditions that diverted it to the
protect path are set right in case of revertive mode. In case of Non-revertive
mode, traffic remains in protect path even when the conditions that diverted it
to the protect path are set right.

Note 2: Source Protection and Destination Protection must be enabled in the Edit
CrossConnect page for Source WTR Time, Destination WTR Time and for
fields under protection to be available for editing.

9.2.3 Editing Cross-connects


The following are the steps to edit a cross-connect in the network
element.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Cross-connect. The Configure Cross-connects page
is displayed. This page gives details of the existing
cross-connects (if any).
3 Click Edit link below the cross-connect that has to be edited.
The Edit CrossConnect page is displayed.

User Interface Guide Version 1.0


48 Configuration

4 Edit fields referring to Table 9-3.


5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.
9.2.4 Deleting Cross-connects

Note : A maximum of 63 cross-connections can be deleted at once.


The following are the steps to delete a cross-connect provisioned on
a network element.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Cross-connect. The Configure Cross-connects page
is displayed. This page gives details of the existing Cross-
Connects.
3 Select the check box in the Delete all field for cross-connect
that is to be deleted.
4 Click Delete Selected Connection(s). A confirmation page is
displayed.
5 Click Confirm Delete. A “Successfully Deleted” message is
displayed.

9.3 Overhead Tunnel


Overhead Tunnel is a feature to pass through overhead bytes
transparently between east and west fibers. Overhead tunneling
between two STM ports of a Tejas Node (sandwiched between two
non- Tejas Nodes) can be created to bypass the management
information carried between those non- Tejas Nodes using
DCC_R/DCC_M bytes, without processing these bytes.

TJ100CPr4
Configuration 49

In the Overhead tunnel menu, you can

• view configured overhead tunnels


• create new overhead tunnel
• delete overhead tunnels

9.3.1 Viewing Overhead tunnel


The following are the steps to view an overhead tunnel.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Overhead Tunnel. The Configure overhead tunnels
page is displayed. This page gives details of the existing
Overhead tunnels.

Note : The user can provision a maximum of 30 overhead bytes for overhead
tunneling.
Table 9-4 describes the fields on the Configure Overhead Tunnels
page.
Table 9-4
Fields on the Configure Overhead Tunnels page
Field Description
Tunnel Name Displays the Tunnel name. The Tunnel name is a combination of
the source and destination ports.
Source Port Displays the Source STM port.
Destination Port Displays the Destination STM port.
Overhead Byte Displays the overhead byte that is tunneled.
delete Select the check box for the overhead tunnel to be deleted.

User Interface Guide Version 1.0


50 Configuration

9.3.2 Provisioning overhead tunnel


The following are the steps for provisioning an overhead tunnel.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Overhead Tunnel. The Configure overhead tunnels
page is displayed. This page gives details of the existing
Overhead tunnels.
3 Click Create Overhead tunnel link. The Add Overhead
Tunnel page is displayed.
4 Enter values referring to Table 9-5.
5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.
Table 9-5 gives the default and acceptable values for the configurable
overhead tunnel parameters.
Table 9-5
Default and acceptable values for overhead tunnel parameters
Parameter Default value Acceptable value
Source Port Name STM1-1-5-1 • STM1-1-5-1
• STM1-1-5-2
Destination Port Name STM1-1-5-1 • STM1-1-5-1
• STM1-1-5-2
Overhead Byte E1 • E1
• E2
• F1
• DCC_R
• DCC_M

TJ100CPr4
Configuration 51

9.3.3 Deleting overhead tunnel


The following are the steps to delete an overhead tunnel.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Overhead Tunnel. The Configure overhead tunnels
page is displayed. This page displays details of the existing
Overhead tunnels.
3 Select the check box(s) in the Delete column for the overhead
tunnel(s) to be deleted.
4 Click Submit. A confirmation page is displayed.
5 Click Confirm Delete. A “Successfully Deleted” message is
displayed.
9.4 Environmental Alarm Inputs
The network element can be configured for customized
environmental conditions such as power/air conditioning failure,
equipment room door open and so on. The strings entered in the
Environmental Alarm field defines the alarm. The alarm is reported
when the defined environmental condition is detected. A maximum
of two external alarms can be configured on a TJ100CPr4 network
element.

9.4.1 Provisioning environmental alarms


The following are the steps to provision environmental alarms.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Environmental alarm input. The Configure
environmental alarms page is displayed.
3 Enter the string with which the alarms have to be identified in
the Environmental Alarm fields.

User Interface Guide Version 1.0


52 Configuration

Note : The Environmental alarm can be a set of alphanumeric characters. The


maximum number of characters allowed is 40.
4 Click Submit. A confirmation page is displayed.
5 Click Yes. A “Successfully Created” message is displayed.

9.5 SNMP traps


Simple Network Management Protocol (SNMP) is a set of protocols
for managing complex networks. SNMP is an application-layer
protocol that allows network devices to exchange management
information. SNMP allows network administrator to find and
interpret network problems and plan network growth. The TejNES
SNMP is designed to provide asynchronous event notification to a
Network Management System (NMS). SNMP trap is an SNMP
application that uses the SNMP trap operation to send information to
a network manager. Traps are sent when errors or specific events
occur on the network.

9.5.1 Configuring network element to send SNMP traps


The following are the steps to configure a network element to send
SNMP traps.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click SNMP traps. The SNMP trap destination IP
addresses page is displayed.
3 Enter values referring to Table 9-6.
4 Click Submit. A “Successfully Created” message is displayed.

TJ100CPr4
Configuration 53

Table 9-6 gives the default and acceptable values for SNMP trap
parameters.
Table 9-6
Default and acceptable values for the SNMP trap parameters
Parameter Default values Acceptable values
IP Address - 0.0.0.0 - 225.225.225.254
Port 162 -
SNMP Version SNMP_V1 SNMP_V1
SNMP_V2

9.5.2 Deleting SNMP traps


The following are the steps to delete SNMP traps.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click SNMP traps. The SNMP trap destination IP
addresses page is displayed.
3 Select the check box under the Delete column for the SNMP
traps to be deleted.
4 Click Submit. A “Successfully Deleted” message is displayed.

9.6 Facilities
The Facilities menu should be used for checking, viewing or editing
the attributes of optical ports, PDH ports, Ethernet and VCG ports.

User Interface Guide Version 1.0


54 Configuration

Table 9-7 describes the fields on the Provision interface page for
STM ports.
Table 9-7
Field on the Provision interface page for STM port
Field Description
Admin Status Up Sets the interfaces in service.
Down Sets the interfaces out of service.
Alarm Reporting Status Report Enables reporting of alarms on STM port.
No-Report Disables reporting of alarms on STM port.
STM Port Profile Select an STM port profile.
Line Coding Displays the type of line coding being used—NRZ coding
Laser Displays as a link, the Laser being used. Click the link to view the
Laser provisioning page.
ECC Byte Selection Displays the established Embedded Communication Channel:
• ecc_DCC_M
• ecc_DCC_R
• ecc_F1
• ecc_F2
• ecc_F3
• ecc_F2F3
Transmit J0 Enter the section trace message to be transmitted. Maximum length
is as specified by Transmit J0 Length, padded with spaces for
strings less than specified length.
Transmit J0 Length Select the length of the section trace to be transmitted.
Expected J0 Enter the expected received section trace value.
Expected J0 Length Allows you to select the length of expected received section trace.
Received J0 Displays the received Section trace message. TIM Action settings
control handling of mismatches between received and expected
trace messages.

TJ100CPr4
Configuration 55

Table 9-7 (continued)


Field on the Provision interface page for STM port
Field Description
TIM Action Tim_report Reports alarm traffic affecting, on trace
identifier mismatch.
Tim_ignore No action on trace identifier mismatch.
Tim_downstream Sends alarm indication signal (AIS)
_ais downstream (traffic affecting), on trace
identifier mismatch.
Signal Fail BER Threshold Enable Allows you to select the threshold, on crossing
(B1) which Signal Fail alarm is raised for errors
detected by B1. Threshold range is 10e-3 to
10e-5.
Disable Signal Fail BER Thresholds are disabled.
Signal Degrade BER Enable Threshold on crossing which Signal Degrade
Threshold (B1) alarm is raised for errors detected by B1.
Threshold can be set in the range 10e-5 to
10e-9.
Disable Signal Degrade BER Thresholds are disabled.
Note: Alarms are not reported by enabling B1 thresholds.
Signal Fail BER Threshold Enable Threshold on crossing which Signal Fail alarm
(B2) is raised for errors detected by B2. Threshold
range is 10e-3 to 10e-5.
Disable Signal Fail BER Thresholds are disabled.
Signal Degrade BER Enable Threshold on crossing which Signal Degrade
Threshold (B2) alarm is raised for errors detected B2.
Threshold can be set in the range 10e-5 to
10e-9.
Disable Signal Degrade BER Thresholds are disabled.

User Interface Guide Version 1.0


56 Configuration

Table 9-7 (continued)


Field on the Provision interface page for STM port
Field Description
Threshold (for TCA-15 Enable Threshold Crossing Alerts (TCA) can be user
min) configured for 15 minutes interval. If this field
is enabled, an alert/event is raised on
Performance Monitoring counts crossing the
threshold value. The thresholds can be
changed from the TCA Settings link on the
same page.
Disable Threshold Crossing Alerts (TCA) are disabled.
Default Default values for the thresholds are used.
Threshold (for TCA-1 day) Enable Threshold Crossing Alerts (TCA) can be user
configured for 1 day interval. If this field is
enabled, an alert/event is raised on
Performance Monitoring counts crossing the
threshold value. The thresholds can be
changed from the TCA Settings link on the
same page.
Disable Threshold Crossing Alerts (TCA) are disabled.
Default Default values for the thresholds are used.
Identifier Enter a name for the STM port. The name can be a set of
alphanumeric characters.

9.6.1 Provisioning STM ports


The following are the steps to provision a STM port.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. The STM Port interface configuration page
is displayed.
3 Click the desired STM port. The Provision interface page for
that STM port is displayed.

TJ100CPr4
Configuration 57

4 Select/Enter values referring to Table 9-8 .


5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modification. A “Successfully Modified”
message is displayed.
Table 9-8 gives the default and acceptable values for the parameters
on the Provision interface page for STM ports.
Table 9-8
Default and acceptable values for provisioning the STM interface parameters
Parameter Default value Acceptable values
Admin Status Up • Up
• Down
Alarm Reporting Status Report • Report
• No-Report
STM Port Profile Internal-NNI • Internal-NNI
• External-NNI
Transmit J0 - Enter the section trace
message to be transmitted.
Maximum length is as specified
by Transmit J0 Length, padded
with spaces for strings less than
specified length.
Transmit J0 Length 16 •1
• 16
Expected J0 - Enter the expected section
trace value to be received.
Expected J0 Length 16 Select the length of expected
received section trace.
Received J0 Displays the received Section trace message. TIM Action
settings control handling of mismatches between received and
expected trace messages.
TIM Action tim_ignore • tim_report
• tim_ignore
• tim_downstream_ais

User Interface Guide Version 1.0


58 Configuration

Table 9-8 (continued)


Default and acceptable values for provisioning the STM interface parameters
Parameter Default value Acceptable values
Signal Fail BER Threshold Disable • 10e-3
(B1) • 10e-4
• 10e-5
• Disable
Signal Degrade BER Disable • 10e-5
Threshold (B1) • 10e-6
• 10e-7
• 10e-8
• 10e-9
• Disable
Note: Alarms are not reported by enabling B1 thresholds.
Signal Fail BER Threshold Disable • 10e-3
(B2) • 10e-4
• 10e-5
• Disable
Signal Degrade BER Disable • 10e-5
Threshold (B2) • 10e-6
• 10e-7
• 10e-8
• 10e-9
• Disable
Threshold (for TCA-15 min) Disable • Enable
• Default
• Disable
Threshold (for TCA-1 day) Disable • Enable
• Default
• Disable
Identifier - Enter a name for the STM
port. The name should be a set
of alphanumeric characters.

TJ100CPr4
Configuration 59

9.6.2 Setting TCA for 15-min interval/1-day duration


By default, the Threshold Crossing Alert (TCA) settings are not
editable. To edit them, you should enable the TCA settings.

Table 9-9 describes the fields on the TCA Settings for


15-min/1-Day duration page for an STM port
.

Table 9-9
TCA Settings for 15-min and 1-Day duration
Field Description
Threshold RS-ES Threshold for Errored Seconds-Regenerator Section
Threshold RS-SES Threshold for Severely Errored Seconds-Regenerator Section
Threshold RS-BBE/RS-CV Threshold for Background Block Errors/Code
Violations-Regenerator Section
Threshold MS-ES Threshold for Errored Seconds-Multiplex Section
Threshold MS-SES Threshold for Severely Errored Seconds-Multiplex Section
Threshold Threshold for Background Block Errors/Code
MS-BBE/MS-CV Violations-Multiplex Section

Enabling TCA settings


The following are the steps to enable the TCA settings for 15 minute
interval or 1 day duration

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click STM in the sub menu. The STM Port
interface configuration page is displayed.
3 Click the desired STM port. The Provisioning interface page
for that STM port is displayed.

User Interface Guide Version 1.0


60 Configuration

4
If you want to Then
enable
Threshold for select Enable for Threshold (for TCA-15min)
15-min
Threshold for select Enable for Threshold (for TCA-1Day)
1-day

5 Click Submit. A confirmation page is displayed.


6 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.
Setting TCA profiles
The following are the steps to set the TCA settings for 15 minute
interval or 1 day duration.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click STM in the sub menu. The STM Port
interface configuration page is displayed.
3 Click the desired STM port. The Provisioning interface page
for that STM port is displayed.
4
If you want to Then click
Set TCA for TCA Settings for 15-min duration link.
15-min duration The TCA Settings for 15-minute duration page is
displayed.
Set TCA for 1-day TCA Settings for 1-day duration link.
duration The TCA Settings for 1-day duration page is
displayed.

TJ100CPr4
Configuration 61

5 Enter the threshold values in the respective text fields. Refer to


Table 9-10 for acceptable values.
6 Click Submit. A confirmation page is displayed.
7 Click Accept Valid Modifications. A “Successfully Modified”
displayed.
Table 9-10 gives the default and acceptable value for 15 minutes and
1 day TCA threshold parameters.

Table 9-10
Default and acceptable values for TCA threshold parameters
Parameter Default value Acceptable value
15 min 1 day 15 min 1 day
Threshold ES-S 114 10944 0 - 900 0 - 86400
Threshold SES-S 10 960 0 - 900 0 - 86400
Threshold 27000 2592000 0 - 16777215 0 - 1610612640
BBE-S/CV-S
Threshold ES-L 114 10944 0 - 900 0 - 86400
Threshold SES-L 10 960 0 - 900 0 - 86400
Threshold 27000 2592000 0 - 16777215 0 - 1610612640
BBE-L/CV-L

9.6.3 Provisioning AUG

Note 1: The signal label field is provisionable, but should not be edited as it will be
automatically assigned a value depending on the type of cross-connect
provisioned.

Note 2: AU can be provisioned only if all the cross-connects associated with that AUG
are unprovisioned or deleted.

User Interface Guide Version 1.0


62 Configuration

The following are the steps to provision AUG:

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click STM in the sub menu. The STM Port
interface configuration page is displayed.
3 Click the desired AUG link. The Provision AUG page is
displayed.
4 Select the Mapping Structure for the AUG from the drop
down menu.
Selecting Disable for Mapping structure will disable mapping
on the AUG.
5 Click Submit. A “Successfully Modified” message is displayed.

Note : Options available in the Mapping structure depend on the mapping selected
while initializing the network element. Refer to the Installation and
Commissioning Procedures manual, 104-DOC000026-E for more information.
9.6.4 Provisioning AU4
Table 9-11 describes the fields displayed on the Provision AU4 page.
Table 9-11
Fields on the Provision AU4 page
Field Description
Signal Label Select a payload signal label from the drop-down menu.
Received Signal Label Displays the payload type or the Signal label received on the AU
path. For example, tug_structure, asynchronous_container3,
unequipped and so on
Transmit Trace Enter the path transmitted in the AU on J1 byte
Transmit Trace Length Select the length of the section path trace to be sent. The length
can be 16 or 64.
Expected Trace Enter the path trace that is expected to be received on AU path.

TJ100CPr4
Configuration 63

Table 9-11 (continued)


Fields on the Provision AU4 page
Expected Trace Length Select the length of the section path trace that is expected to be
received. The length can be 16 or 64.
Received Trace Displays the AU path trace that is received
Signal Fail BER Threshold Enable Allows you to select the threshold, exceeding
which signal fail alarm is raised for errors.
Threshold range is 1e-3 to 1e-5.
Disable Signal Fail BER Thresholds are disabled
Signal Degrade BER Enable Allows you to select the threshold, exceeding
Threshold which signal fail alarm is raised for errors.
Threshold range is 1e-5 to 1e-9.
Disable Signal Degrade BER Thresholds are disabled.
Alarm reporting status Select Report or No-Report to enable or disable the alarm
reporting status
Connection Type Select the connection that can be created in the cross-connects.
Path alarm profile Select the alarm path profile for the particular port.

Note : Only the first AU4 can be configured as VC-4.


The following are the steps to provision AU4

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click STM in the sub menu. The STM Port
interface configuration page is displayed.
3 Click the desired AU4 link The corresponding Provision page
is displayed.
4 Select/Enter values referring to Table 9-12.
5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modification. A “Successfully Modified”
message is displayed.

User Interface Guide Version 1.0


64 Configuration

Table 9-12 gives the default and acceptable values for the configurable
AU4 parameters when the network element is configured in SDH
mode.
Table 9-12
Default and acceptable values for configurable AU4/AU3 parameters
Parameter Default value Acceptable value
Signal Label • Unequipped if there are no • unequipped
cross-connects provisioned • equipped_non_specific
• Tug_structure if the lower order • tug_structure
path (VC-3, VC-12) is AU4
• locked_tu_n
mapped
• asynchronous_container3
• Asynchronous_container4 if the
higher order path (VC-4) is AU4 • asynchronous_container4
mapped • atm_mapping
• Asynchronous_container3 if the • dqdb_mapping
higher order path (VC-3) is AU4 • fddi_mapping
mapped
• hdlc_ppp
• sdl_sss
• hdlc_laps
• sdl_srs
• eth_10g
• gfp
• test_O181
• vc_ais
(see Note 1)
Transmit Trace Tx_Unallocated Trace message of 16 or 64 characters
Transmit Trace 16 16 or 64
Length (see Note 2)
Expected Trace Rx_Unallocated Trace message of 16 or 64 characters
Expected Trace 16 16 or 64
Length (see Note 2)

TJ100CPr4
Configuration 65

Table 9-12 (continued)


Default and acceptable values for configurable AU4/AU3 parameters
Parameter Default value Acceptable value
Signal Fail BER 1e-3 • Disable
Threshold • 1e-3
• 1e-4
• 1e-5
Signal Degrade BER 1e-6 • Disable
Threshold • 1e-3
• 1e-4
• 1e-5
• 1e-6
• 1e-7
• 1e-8
• 1e-9
Alarm Reporting Report • No-Report
Status • Report
Connection Type Allow both lower order and • Allow Both Lower Order And
higher order connection Higher Order Connection
• Allow Only Lower Order
Connections
• In Use Higher Order Connection
Path Alarm Profile Mask TIM • mask TIM
• suppress TIM
• mask all except LOP
• mask all
Note 1: The signal Label field will be automatically assigned a value depending on the type of
cross-connect provisioned.
Note 2: The Transmit Trace Length and Expected Trace Length must be the same.

User Interface Guide Version 1.0


66 Configuration

9.6.5 Editing AU4 performance monitoring parameters

Note : To edit the Performance monitoring thresholds, set the corresponding


Threshold (for 15-min and 1-Day) enabled in the Provision Interface STM port
page.
You can configure the following performance monitoring parameters:

• Errored Seconds
• Severely Errored Seconds
• Background Block Errors
The following are the steps to configure the AU-4 performance
monitoring parameters for 15-min duration and 1-day duration.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities and click the desired AU link. The Provision
AU4 page is displayed.
3 Click the TCA Settings for 15-min duration link. The TCA
Settings for 15-minute duration page is displayed.
Click the TCA Settings for 1-day duration link to edit TCA
settings for 1-day duration. The TCA Settings for 1-day
duration page is displayed.
4 Enter values referring to Table 9-13.
5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

TJ100CPr4
Configuration 67

Table 9-13 gives the default and acceptable values for 15 min and
1-day duration performance monitoring threshold parameters.
Table 9-13
Default and acceptable values for 15 min and 1 day performance monitoring threshold
parameters
Parameter Default value Acceptable value
15 min 1 day 15 min 1 day
Threshold ES 180 17280 0 - 900 0 - 86400
Threshold SES 15 1440 0 - 900 0 - 86400
Threshold BBE/CV 1100 105600 0 - 65535 0 - 6291360

9.6.6 Provisioning TU
Table 9-14 describes the fields on the Provision TU page.
Table 9-14
Fields on the Provision TU page
Field Description
Signal Label Select a label for the payload content from the drop down menu.
Extended Signal Label Select the signal label for type of Ethernet traffic from the drop
down menu.
Received Signal label Displays the payload type or signal label received on the TU path.
For example, tug structured, asynchronous_container3.
Transmit Trace Enter the path transmitted in the AU on J1 byte.
Transmit Trace Length Select the length of the section path trace to be sent. The length can
be 16 or 64.
Expected trace Enter the path trace that is expected on the TU path.
Expected Trace Length Select the length of the expected section path trace. The Length can
be 16 or 64.
Received Trace Displays the TU path trace that is received.
Signal Fail BER Threshold Enable Allows you to select the threshold, exceeding
which signal fail alarm is raised for errors.
Threshold range is 1e-3 to 1e-5.
Disable Signal Fail BER Thresholds are disabled.

User Interface Guide Version 1.0


68 Configuration

Table 9-14 (continued)


Fields on the Provision TU page
Field Description
Signal Degrade BER Enable Allows you to select the threshold, exceeding
Threshold which signal degrade alarm is raised for errors.
Threshold range is 1e-3 to 1e-9.
Disable Signal Fail BER Thresholds are disabled.
Alarm Reporting Status Enable Alarms are reported.
Disable Alarms are not reported.
Path Alarm Profile Select the alarm path profile for the AU.
• mask TIM
• suppress TIM
• mask all except LOP
• mask all

Note 1: Tributary Units (TU) can be provisioned only after TU cross-connects are
created.

Note 2: It is possible to retrieve or view the TU parameters only when TU is acting as


a protecting member for a connection.

Note 3: The Transmit Trace and Expected Trace field are editable only for add/drop
cross-connects. The Expected trace field is not editable for pass through
cross-connects.

TJ100CPr4
Configuration 69

The following are the steps for provisioning TU.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. and click STM. The STM Port interface
configuration page is displayed.
3 Click the desired AU4. The Provision AU4 page is displayed.
4 Click on the desired TU link. The Provision TU page is
displayed.
5 Select/Enter referring to Table 9-15.
6 Click Submit. A confirmation page is displayed.
7 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

Note : Presence of unprovisioned TU on the far end network element leads to no


VCAT overhead transmission. The alarm raised due to the above consequence
is Loss of VCAT multiframe on TU

User Interface Guide Version 1.0


70 Configuration

Table 9-15 gives the default and acceptable values for provisioning
TU.
Table 9-15
Default and acceptable values for provisioning TU
Parameter Default value Acceptable value
Signal Label Unequipped when there are no • unequipped
(See Note 1 and Note 2) cross-connects provisioned • equipped_non_specific
• asynchronous
• bit_synchronous
• byte_synchronous
• test_O181
• vc_ais
• extended
Extended Signal Label GFP for add drop Ethernet • ATM
(See Note 1 and Note 3) cross-connects • HDLC_PPP
• HDLC_LAPS
• VCAT_TEST
• GFP
Received Signal Label Read-only
Transmit Trace TX_Unallocated Trace message of 16 or 64
characters
Transmit Trace Length 16 16 or 64
Expected Trace RX_Unallocated Trace message of 16 or 64
characters
Expected Trace Length 16 16 or 64
Received Trace Read-only
Signal Fail BER Threshold 1e-3 • Disable
• 1e-3
• 1e-4
• 1e-5

TJ100CPr4
Configuration 71

Table 9-15 (continued)


Default and acceptable values for provisioning TU
Parameter Default value Acceptable value
Signal Degrade BER 1e-6 • Disable
Threshold • 1e-3
• 1e-4
• 1e-5
• 1e-6
• 1e-7
• 1e-8
• 1e-9
Alarm Reporting Status Report • No-Report
• Report
Path Alarm Profile Mask TIM • Mask TIM
• Suppress TIM
• Mask all except LOP
• Mask all
Note 1: The Signal Label, Extended Signal Label and Signal Label Mismatch action fields will be
assigned a value depending on the type of cross-connect provisioned.
Note 2: The Signal Label field is made user provisionable to avoid the Signal Label Mismatch in
case of connectivity between network elements of multi vendor networks.
Note 3: The Extended Signal Label option is ignored for TU-3 and TU-12 pass through
cross-connects.

User Interface Guide Version 1.0


72 Configuration

9.6.7 Configuring TU performance monitoring parameters


Table 9-16 describes the fields of TCA settings of Lower Order Path
for TU
Table 9-16
TCA Settings of Lower Order Path for V5
Field Description
Threshold ES If the Errored Seconds (ES) count crosses the set value, then TCA
is raised.
Threshold SES If the Severely Errored Seconds (SES) count crosses the set value,
then TCA is raised.
Threshold BBE/CV If the BBE/CV count crosses the set value, then TCA is raised.

Note : To configure the TU Performance monitoring thresholds, set the corresponding


Threshold (for 15-min and 1-Day) enabled in the Provision Interface STM port
page.
The following TU Performance Monitoring thresholds can be edited:

• Errored Seconds
• Severely Errored Seconds
• Background Blocked Errors
The following are the steps to edit the TU performance monitoring
thresholds for 15-minutes and 1-day duration.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities and click STM. The STM Port interface
configuration page is displayed.
3 Click the desired AU4. The corresponding provisioning page is
displayed.
4 Click on the desired TU link.The Provision TU page is
displayed.

TJ100CPr4
Configuration 73

5
If you want to Then
Set TCA settings Click TCA Settings for 15-min duration
for 15-minute link.
duration The TCA Settings for 15-minute duration
page is displayed.
Set TCA settings Click TCA Settings for 1-day duration link.
for 1-day duration The TCA Settings for 1-day duration page
is displayed.
6 Enter values referring to Table 9-17.
7 Click Submit. A confirmation page is displayed.
8 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.
Table 9-17 gives the default and acceptable values for 15 minute and
1 day duration.
Table 9-17
Default and acceptable values for 15 min and 1 day duration TCA thresholds for TU
Parameter Default value Acceptable value
15 min 1 day 15 min 1 day
Threshold ES 120 11520 0 - 900 0 - 86400
Threshold SES 15 1440 0 - 900 0 - 86400
Threshold BBE/CV 300 28800 0 - 65536 0 - 6291360

User Interface Guide Version 1.0


74 Configuration

9.7 PDH Ports


Table 9-18 describes the fields on the E1/E3 ports page.
Table 9-18
Fields on the E1/E3 ports page
Field Description
Admin Status Up Sets the port in service.
Down Sets the port out of service.
Alarm Reporting Status Report Reports alarms raised at the port.
No-Report Alarms raised at the port are not reported.
Threshold (for Enable Enables threshold level (for TCA-15min /
TCA-15min/24-hour) 1-day).
Disable Disables threshold level for TCA-15 min /
1-day.
Identifier Displays the traffic source.
Line build out type Displays the line build out type.
(see Note 1)
Line coding Select the Line code to be used for clock recovery and error
(see Note 1) detection .
Retiming Enable The E1 signal is reconstituted to the primary
(see Note 2) reference source performance specifications.
Disable The E1 signal is not reconstituted to the
primary reference source performance
specifications and hence the synchronization
information is lost.
Note 1: Line Build Out Type and Line coding is applicable for DS3 ports only.
Note 2: Retiming is applicable for E1 ports only.

TJ100CPr4
Configuration 75

9.7.1 Configuring E1/E3 ports


The following are the steps to configure E1/E3 ports.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click E1/E3 in the sub menu. The E1/E3
Interface configuration page is displayed.
3 Click the desired E1/E3 port. The corresponding Provision
interface page is displayed.
4 Select/Enter values referring to Table 9-19.
5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

Table 9-19 gives the default and acceptable values for the configurable
E1/E3 parameters.
Table 9-19
Default and acceptable values for the configurable E1/E3 parameters
Parameter Default value Acceptable value
Admin Status Down • Up
• Down
Alarm Reporting Status Report • No-Report
• Report
Threshold Disable • Disable
(for TCA-15min/24-hour) • Default TCA Profile
Identifier - Any alphanumeric string identifier that the
user may like to associate with a E1/E3/DS3
port. This string can be used to search on list
of port.
Framing Type Unframed • Unframed
• Framed

User Interface Guide Version 1.0


76 Configuration

Table 9-19 (continued)


Default and acceptable values for the configurable E1/E3 parameters
Parameter Default value Acceptable value
Line Build Out Type DS3_0_225ft For DS3:
(see Note 1) (for DS3) • DS3_0_225ft
• DS3_225_450ft
Line coding B8ZS • B8ZS
(see Note 1)
Retiming Disable • Enable
(see Note 2) • Disable
Note 1: Line Build Out Type is not applicable for DS3 ports only.
Note 2: Retiming is applicable for E1 ports only.

9.7.2 Viewing TCA profiles for PDH ports


The following are the steps to view TCA profiles for PDH ports.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click E1/E3 in the sub menu. The E1/E3
Interface configuration page is displayed.
3 Click the desired E1/E3 port. The Provision interface page
for E1/E3 port is displayed.
4 Click the View TCA Profiles link. The View TCA Profile
page is displayed.

TJ100CPr4
Configuration 77

Table 9-20 describes the fields on the View TCA Profile page.
Table 9-20
Fields on the View TCA Profile page
Field Description
Profile Name Displays the profile name.
Threshold ES-L(15 mins) Displays the threshold value of the ES-Line. If the Errored
Seconds-Line (ES-L) count crosses the set value, then TCA is
raised.
Threshold SES-L(15 mins) Displays the threshold value of the SES-Line. If the Severely
Errored Seconds-line (SES) count crosses the set value, then TCA
is raised.
Threshold CV-L(15 mins) Displays the threshold value of the CV-L. If the background
Coding Violation (CV) count crosses the set value, then TCA is
raised.
Threshold ES-P(15 mins) Displays the threshold value of the ES-Path. If the Errored
Seconds-Path (ES-P) count crosses the set value, then TCA is
raised.
Threshold SES-P(15 mins) Displays the threshold value of the SES-Path. If the Severely
Errored Seconds-line (SES) count crosses the set value, then TCA
is raised.
Threshold CV-P(15 mins) Displays the threshold value of the CV-Path. If the background
Coding Violation (CV) count crosses the set value, then TCA is
raised.
Threshold UAS-P(15 mins) Displays the unavailable seconds in the regenerator section.
Threshold ES-L(24 hr) Displays the threshold value of the ES-Line. If the Errored
Seconds-Line (ES-L) count crosses the set value, then TCA is
raised.
Threshold SES-L(24 hr) Displays the threshold value of the SES-Line. If the Severely
Errored Seconds-Line (SES) count crosses the set value, then TCA
is raised.
Threshold CV-L(24 hr) Displays the threshold value of the CV-Line. If the background
Coding Violation (CV) count crosses the set value, then TCA is
raised.

User Interface Guide Version 1.0


78 Configuration

Table 9-20 (continued)


Fields on the View TCA Profile page
Field Description
Threshold ES-P(24 hr) Displays the threshold value of the ES-Path. If the Errored
Seconds-Path (ES-P) count crosses the set value, then TCA is
raised.
Threshold SES-P(24 hr) Displays the threshold value of the SES-Path. If the Severely
Errored Seconds-Path (SES) count crosses the set value, then TCA
is raised.
Threshold CV-P(24 hr) Displays the threshold value of the CV-Path. If the background
Coding Violation (CV) count crosses the set value, then TCA is
raised.
Threshold UAS-P(24 hr) Displays the unavailable seconds in the regenerator section.
Delete Select the check box in a row(s) to delete the row(s).

9.7.3 Provisioning a new TCA profile for PDH ports


The following are the steps to provision a new TCA profile for PDH
ports.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click E1/E3 in the sub menu. The E1/E3
Interface configuration page is displayed.
3 Click the desired E1/E3 port. The Provision interface page
for E1/E3 port is displayed.
4 Click the View TCA Profiles link. The View TCA Profile
page is displayed.
5 Click the Provision a new TCA Profile link. The Provision
New TCA Profile page is displayed.
6 Enter values referring to Table 9-22.
7 Click Create. A confirmation page is displayed.
8 Click Yes. A “Successfully Created” message is displayed.

TJ100CPr4
Configuration 79

Table 9-21 gives the default and acceptable values for the configurable
TCA profile parameters.
Table 9-21
Default and acceptable values for the configurable E1/E3 TCA profile parameters
Field Default value Acceptable values
Profile Name - Enter a name for the profile. The
name can be a set of alphanumeric
characters.
Threshold ES-L(15 mins) 65 0 - 900
Threshold SES-L(15 mins) 10 0 - 900
Threshold CV-L(15 mins) 13340 0 - 16383
Threshold ES-P(15 mins) 65 0 - 900
Threshold SES-P(15 mins) 10 0 - 900
Threshold CV-P(15 mins) 72 0 - 16383
Threshold UAS-P(15 mins) 10 0 - 900
Threshold ES-L(24 hr) 648 0 - 65535
Threshold SES-L(24 hr) 100 0 - 65535
Threshold CV-L(24 hr) 133400 0 - 133315200
Threshold ES-P(24 hr) 648 0 - 65535
Threshold SES-P(24 hr) 100 0 - 65535
Threshold CV-P(24 hr) 691 0 - 27561600
Threshold UAS-P(24 hr) 10 0 - 65535

User Interface Guide Version 1.0


80 Configuration

Table 9-22 gives the default and acceptable values for the configurable
TCA profile parameters.
Table 9-22
Default and acceptable values for the configurable E1/E3 TCA profile parameters
Field Default value Acceptable values
Profile Name - Enter a name for the profile. The
name can be a set of alphanumeric
characters.
Threshold ES-L(15 mins) 65 0 - 900
Threshold SES-L(15 mins) 10 0 - 900
Threshold CV-L(15 mins) 13340 0 - 16383
Threshold ES-P(15 mins) 65 0 - 900
Threshold SES-P(15 mins) 10 0 - 900
Threshold CV-P(15 mins) 72 0 - 16383
Threshold UAS-P(15 mins) 10 0 - 900
Threshold ES-L(24 hr) 648 0 - 65535
Threshold SES-L(24 hr) 100 0 - 65535
Threshold CV-L(24 hr) 133400 0 - 133315200
Threshold ES-P(24 hr) 648 0 - 65535
Threshold SES-P(24 hr) 100 0 - 65535
Threshold CV-P(24 hr) 691 0 - 27561600
Threshold UAS-P(24 hr) 10 0 - 65535

TJ100CPr4
Configuration 81

9.7.4 Deleting TCA profile of a PDH port


The following are the steps to delete TCA profiles of a PDH port.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click E1/E3 in the sub menu. The E1/E3
Interface configuration port page is displayed.
3 Click the desired E1/E3 port. The Provision interface page
for E1/E3 is displayed.
4 Click the View TCA Profiles link. The View TCA Profile
page is displayed.
5 Select the check box in the Delete column for the TCA Profile
to be deleted.
6 Click Delete. A confirmation page is displayed.
7 Click Confirm Delete. A “Successfully Deleted” message is
displayed.
9.8 Ethernet
Ethernet ports/process carry Ethernet traffic on configuring
corresponding VCG. The capacity (Operating Granularity) of the
container can be selected in Ethernet Card Configuration page.
The Ethernet ports can be accessed by clicking the corresponding
card links in the slot view area.

Note : If Ethernet port is ETH-x-y-z then the corresponding VCG mapping is


VCG-x-y-10z.

User Interface Guide Version 1.0


82 Configuration

Table 9-23 describes the fields on the Provision ethernet interface


port page.
Table 9-23
Fields on the Provision ethernet interface port page
Field Description
Admin Status Up Indicates the interface is in service.
Down Indicates the interface is out of service.
Alarm Reporting Report Reports alarms raised at the port
Status No Report Alarms raised at the port are not reported.
Link Status Displays the link status of the Ethernet interface.
Link Integrity Enable Enables the ethernet port to be forced down on
the occurrence of alarms on VCG side.
Disable Disables the Ethernet port to be forced down on
occurrence of alarms.
MTU Enter the Maximum Transmission Unit (MTU) size for Ethernet frame
in bytes.
AutoNegotiation Enable The connected network elements exchange
information on their speed and duplex
capabilities and automatically configure
themselves to take maximum advantage of their
abilities
Disable The connected network elements do not
exchange information on their speed and duplex
capabilities. Hence, the network elements do not
operate to their maximum ability and the
connection is slow.

TJ100CPr4
Configuration 83

Table 9-23 (continued)


Fields on the Provision ethernet interface port page
Field Description
Flow Control Manual Disable The port does not act on the pause frames
received and also does not transmit any pause
frames.
Manual Tx-Rx The port acts on flow control frames received
and also transmits flow control frames.
Manual Tx-only The port does not act on the pause frames
received, but transmits pause frames.
Manual Rx-only The port acts on the pause frames received, but
does not transmit any pause frames.
Advertize None The port advertizes that it will neither transmit
pause frame nor act on received pause frames.
Advertize Both The port advertizes both sym and asym
capabilities.
Advertize Sym The port advertizes that it will transmit pause
frames and act on received pause frames based
on IEEE 802.1 standard.
Advertize Asym The port advertizes that it can only transmit
pause frames but not act on received pause
frames based on IEEE 802.1 standard.
AutoNegotiation Displays the Auto Negotiation status of the Ethernet port (see Note).
Status
Link Partner Displays the speed and duplex mode of the link partner (see Note).
Capabilities
Link Partner Flow Displays the flow control capability of the link partner (see Note).
Control
Link Integrity Status Displays the state of the link whether it is forced down due to alarms on
the STM interfaces on near end network element or an Ethernet port on
the far end network element. If the local Ethernet is forced down then
Link Integrity status will be displayed as On, else it will be Off.

User Interface Guide Version 1.0


84 Configuration

Table 9-23 (continued)


Fields on the Provision ethernet interface port page
Field Description
Threshold Enable for Enable Threshold Crossing Alerts (TCA) can be user
15 min interval configured for 15 minutes interval. If this field is
enabled, TCA alarm is raised on performance
monitoring counts crossing the threshold value.
The thresholds can be edited.
Disable The thresholds for the TCA cannot be edited.
Medium Type Displays the type of ethernet medium i.e, 10/100 Tx or 10/100 Fx.
LAN Circuit Identifier Displays the name of the Ethernet port.
Note: AutoNegotiation Status, Link Partner Capabilities and Link Partner Flow Control
parameters are available only if AutoNegotiation is set to enable.

9.8.1 Configuring Ethernet ports


The following are the steps to configure Ethernet ports.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click Ethernet in the sub menu. The
Ethernet interface configuration page is displayed.
3 Click the desired port. The corresponding Provisioning
ethernet interface port page is displayed.
4 Select/Enter values referring to Table 9-24.
5 Click Submit. A confirmation page is displayed.
6 Click Yes. A “Successfully Modified” message is displayed.

TJ100CPr4
Configuration 85

Table 9-24 gives the default and acceptable values for the configurable
Ethernet port parameters.
Table 9-24
Default and acceptable value for the configurable Ethernet port parameters
Parameter Default value Acceptable value
Admin Status Down • Up
• Down
Alarm Reporting Status Report • No-Report
• Report
Link Integrity Enable Disable or Enable
MTU 9600 64 - 9600
AutoNegotiation Enable Disable or Enable
Flow Control Manual Tx-Rx • Manual Disable
• Manual Tx-Rx
• Manual Tx-only
• Manual Rx-only
• Advertize None
• Advertize Both
• Advertize Sym
• Advertize Asym (see Note 1)
Threshold Enable for Disable • Enable
15-min interval • Disable
LAN Circuit Identifier Ethernet 1-32 characters string
Supports space character also.
Note 1: The Advertise None, Advertize Both, Advertize Sym, Advertize Asym values for the Flow
Control field are available only when autonegotiation is enabled.
Note 2: The speed and duplex mode of the ethernet port can be manually provisioned only if
autonegotiation is set to disable. Speed and Mode settings are applicable only to 10/100 Mbps
ports.
Note 3: The MTU size may differ for different cards across different software versions. MTU size
of 64 - 9600 bytes can be set only when the software supports jumbo frames over 1518 bytes.

User Interface Guide Version 1.0


86 Configuration

9.8.2 Viewing the TCA settings for Ethernet ports


The following are the steps to view TCA setting for an Ethernet port.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click Ethernet in the sub menu. The
Ethernet interface configuration page is displayed.
3 Click the desired port. The corresponding Provisioning
ethernet interface port page is displayed.
4 Click TCA Settings link. The TCA settings of the Ethernet
port is displayed.

9.8.3 Configuring TCA profiles for Ethernet ports


The following are the steps to configure TCA profiles for Ethernet
ports.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click Ethernet in the sub menu. The
Ethernet interface configuration page is displayed.
3 Click the desired port. The corresponding Provisioning
ethernet interface port page is displayed.
4 Click TCA Settings. The TCA Settings page is displayed.
5 Enter a value for the Threshold for CRC Errors parameter.

Note : The default value for Threshold for CRC Errors is 73146 and the acceptable
value ranges between 0 - 133928568.
6 Click Submit. A confirmation page is displayed.

TJ100CPr4
Configuration 87

7 Click Accept Valid Modifications. A “Successfully Modified”


message is displayed.
9.9 VCG
The Virtual Concatenation Group (VCG) is a logical entity/group of
Virtual Containers (VCs). Each Ethernet card has eight Ethernet
ports and eight VCG ports, such that each VCG logically corresponds
to one Ethernet port. The number of Ethernet and VCG port is
dependent on the card configuration.

9.9.1 Provisioning the VCG interface


Table 9-25 describes the fields on the Provisioning VCG interface
page.
Table 9-25
Fields on the Provisioning VCG interface page
Field Description
Admin Status Up Indicates ports are in service.
Down Indicates ports are out of service.
Alarm Reporting Status Report Reports alarms raised at the port
No Report Alarms raised at the port are not
reported.
LCAS Support Enable Traffic is not disrupted when a
cross-connect in one of the node is not
functional.
Disable The entire VCG port goes down when a
single cross-connect in the port is not
functional.
Framing Type Displays the framing standards for Ethernet over SDH as chosen
while configuring the ETH card.
Max Diff Delay allowed Displays the maximum diff delay allowed.
CRC Type CRC-32 Configures VCG for CRC-32 type.
VCAT Displays if the VC Group is provisioned to enable or disable
VCAT.
Operating Granularity Select the granularity of the signals as chosen while configuring the
ETH card.

User Interface Guide Version 1.0


88 Configuration

Table 9-25 (continued)


Fields on the Provisioning VCG interface page
Field Description
Payload FCS Enable Allows the addition of the payload FCS
as specified in GFP.
Disable Does not allow the addition of payload
FCS as specified in GFP.
Remove channels with SD Enable Channels are removed from a VCAT
group when there is a signal degrade on
any of the TUs related to the channels.
Disable Channels are not removed from a VCAT
group when there is a signal degrade on
any of the TUs related to the channels.
VCG Circuit Identifier Enter the name (Identity) for the VCG port. The name can be a set
of alphanumeric characters of maximum 40 characters including
space.
No of Channels Indicates the number of channels configured for the group.

The following are the steps to provision VCGinterfaces.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click VCG in the sub menu. The VCG
interface configuration page is displayed.
3 Click the desired port. The corresponding Provisioning VCG
interface page is displayed.
4 Select/Enter values referring to Table 9-26.
5 Click Submit. A confirmation page is displayed.
6 Click Yes. A “Successfully Created” message is displayed.

TJ100CPr4
Configuration 89

Table 9-26 gives the default and acceptable values for the configurable
VCG parameters.
Table 9-26
Default and acceptable values for the configurable VCG parameters
Parameter Default value Acceptable value
Admin Status Up • Up
• Down
Alarm Reporting Status Report • Report
• No-Report
LCAS Support Enable • Enable
• Disable
VCAT Enable • Disable
• Enable
Operating Granularity VC-12 • VC-12
• VC-3
• VC-4
Payload FCS Enable • Disable
• Enable (see Note 1)
VCG Circuit Identifier Tejas Networks An alphanumeric string of maximum 32
characters. Space is allowed.
Note 1: It is recommended to keep the Payload FCS enabled.

User Interface Guide Version 1.0


90 Configuration

9.9.2 Viewing VC group


The following are the steps to view VC group in a VCG

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click VCG in the sub menu. The VCG
interface configuration page is displayed.
3 Click the desired VCG The corresponding Provisioning VCG
interface page is displayed.
4 Click View VC Group. The View VC Group page is displayed.

Table 9-27 describes the fields on the View VC Group page.


Table 9-27
Fields on the View VC Group page
Field Description
Circuit Identifier Displays the name of the VCG
Source Displays the VCG port selected as the source.
Destination Displays the STM channel (i.e., VCG, TU values selected for the
STM port) selected as the destination.
Capacity Displays the rate of the VCG association.
Directionality Displays the direction (2WAY or 1WAY) of data flow in the VCG
association.
Operational Status Displays the operating status (working/down) of the channel.
Destination Protection Displays the STM channel (i.e., VCG, TU values selected for the
Status STM port) to which the destination switches on failure.
Destination Protection Displays the STM channel (i.e., VCG, TU values selected for the
STM port) to which the destination switches on failure.
Revertive Displays the reversion mode for the channel (revertive or
Non-revertive).
WTR Displays the WTR value for the channel. Only provisionable in
revertive mode.

TJ100CPr4
Configuration 91

Table 9-27 (continued)


Fields on the View VC Group page
Field Description
Tx Control Displays transmitted LCAS control value on the associated Tx
channel.
Tx Channel MST Displays the transmitting member channel status.
Tx Seq Displays the transmitting member sequence number.
Rx Control Displays received LCAS control value on the associated Rx
channel.
Rx Channel MST Displays the receiving member channel status.
Rx Seq Displays the receiving member sequence number.
Edit LCAS Launches new page to edit LCAS related parameters.
Edit Protection Click the link to add, edit or remove protection for a channel.
Delete Select the check box to delete VCG association.

9.9.3 Provisioning LCAS


LCAS is a technology that allows the adjustment of data capacity in
real time without loss of data. It can be defined as an adjustment
scheme that hitlessly increases or decreases the capacity of a container
that is transported SDH network using VC. LCAS offers the ability to
automatically fine tune the bandwidth based on Quality of Service
(QoS), Bandwidth on demand, Load Balancing and Fault recovery
mechanism.

Note : LCAS support needs to be enabled or disabled at both the transmitter and
receiver.

User Interface Guide Version 1.0


92 Configuration

The following are the steps to provision LCAS.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click VCG in the sub menu. The VCG
interface configuration page is displayed.
3 Click the desired VCG port. The Provisioning VCG
interface page is displayed.
4 Click View VC Group link. The View VC Group page is
displayed.
5 Click the lcas link in the edit LCAS column for the VC you
want to edit. The corresponding Provisioning VCG
Association page is displayed.
6 Select Add for Transmit LCAS provision to enable the LCAS
support. Select Remove for Transmit LCAS provision to
disable LCAS support.
7 Click Submit. A confirmation page is displayed.
8 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

TJ100CPr4
Configuration 93

Table 9-28 describes the fields displayed on the Provision VCG


Association page.
Table 9-28
Fields on the Provision VCG Association page
Field Description
VCG Displays the name of the VC Group to which the channel is
associated.
Status Displays the status of the channel as either up or down.
Direction (100ms) Displays the direction of VC on VCG.
Transmit LCAS Provision Add Allows sending the data on a particular
(Milliseconds) channel which is already part of the VCG
Remove Disables sending the data on a particular
channel which is already part of the VCG.
Tx CTRL (Tx Channel) Displays the Transmitted LCAS control value on the associated Tx
channel.
Rx CTRL (Rx Channel) Displays the Received LCAS control value on the associated Rx
(minutes) channel.

9.9.4 Adding a VC to VCG


The following are the steps to add a VC to a VCG.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click VCG in the sub menu. The VCG
interface configuration page is displayed.
3 Click the desired VCG. The corresponding Provisioning
VCG Interface page is displayed.
4 Click Add new VC link. The Add VC to VCG page is
displayed.
5 Select values as described in Table 9-29.
6 Click Submit. A confirmation page is displayed.

User Interface Guide Version 1.0


94 Configuration

7 Click Yes. A “Successfully Created” message is displayed.


Table 9-29 describes the fields on the Add VC to VCG page.
Table 9-29
Fields on the Add VC to VCG page
Field Description
Number of Connections Enter the number of VCs to be added to the VCG. The number of
VCs are created in the VCG.
CrossConnect Parameters
Circuit Identifier Displays the name given for the circuit identifier.
Working Port Select the work port
Protection Port Select the protect port
STM # Select the Work and Protection STM number.
K (TUG 3) Specify the STM time slot of cross connect. Value of K specifies
L (TUG 2) TUG3, L specifies TUG2 and M specifies VC number of the
cross-connect (see Note).
M (VC number)
Reversion Mode Revertive This mode enables switching back to work
path from protect path once the fault on
work path is fixed.
Non-Revertive In this mode, switching from Protect to
work path does not occur automatically.
Until traffic is manually switched back to
work path, traffic is carried on protect
path.
WTR Displays the WTR value for the channel. Provisionable in revertive
mode only.
Note: K, L, M values are not applicable for VC4 cross-connects.

Note : The protection feature can be configured to function in the revertive mode, to
enable reversion of traffic from the protect fiber to the working fiber. This
happens after a specified time (wait to restore time).

TJ100CPr4
Configuration 95

9.9.5 Deleting a VC from VCG


The following are the steps to delete a VC from a VCG.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Facilities. Click VCG in the sub menu. The VCG
interface configuration page is displayed.
3 Click the desired VCG. The corresponding Provisioning
VCG interface page is displayed.
4 Click View VC Group. The View VC Group page is
displayed.
5 Select the check box in the Delete column, for the VCG to be
deleted.
6 Click Submit. A confirmation page is displayed.
7 Click Confirm Delete. A “Successfully Deleted” message is
displayed.
9.10 Network (NE) Adjacency
The NE Adjacency feature gives the information of neighbours
immediate to the network element.

Auto-discovery when enabled on a port of a network element, helps


to discover the next hop neighbors. This feature eliminates the need
to manually create trunks on the nodes.

The Neighbour information provides the name of the physical


device, address, router ID and the state of the neighboring network
elements.

Note : The NE Adjacency feature is available only when the Autodiscovery and
PNCP_Enable parameters are enabled in the license file.

User Interface Guide Version 1.0


96 Configuration

9.10.1 Enabling auto-discovery for an STM port


The following are the steps to access the auto-discovery feature.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click NE Adjacency. Click Auto-Discovery in the sub menu.
The Auto-Discovery configuration page is displayed.
3 Click on the desired STM port. Select to enable or disable the
Auto Discovery Status for the port and its containers.
4 Click Submit. A confirmation page is displayed.
5 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.
9.10.2 Viewing neighbour information
The following are the steps to view neighbour information.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click NE Adjacency. Click Neighbour information in the
sub menu. The Neighbor Information page is displayed.
Table 9-30 describes the fields listed on the Neighbour information
page.
Table 9-30
Fields on the Neighbour information page
Field Description
Trunk Name Displays the trunk name.
Operational Status Displays the operational status of the trunk.
Local IP Address Displays the IP address of the neighbouring network element.
Local Endpoint Enter a STM port number on the network element.
AUG-AU Enter values for the Aggregate units at the STM level.

TJ100CPr4
Configuration 97

Table 9-30 (continued)


Fields on the Neighbour information page
Field Description
Remote IP Address Enter the IP address of the remote network element.
Remote Endpoint Enter the STM port number on the remote network element
AUG-AU Enter values for the Aggregate units at the STM level at the remote
network element.
Capacity Displays the trunk capacity.
Command Select to add or delete a trunk.

9.10.3 Provisioning trunks manually


Trunks are automatically created when Auto-Discovery is enabled on
the port. Trunks can be created manually in the Neighbour
information page.

The following are the steps to create a trunk manually.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click NE Adjacency. Click Neighbour Information in the
sub menu. The Neighbour information page is displayed.
3 Enter values referring to Table 9-31.
4 Click Submit. A confirmation page is displayed.
5 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

User Interface Guide Version 1.0


98 Configuration

Table 9-31 gives the default and acceptable values for configuring
trunks.
Table 9-31
Default and acceptable values for configurable Trunk parameters
Parameter Default value Acceptable value
General
Local End point - Any STM port at the network element.
AUG-AU 0-0 Values of Aggregate units at the STM level..
Remote IP Address - 0.0.0.0 - 255.255.255.254
Remote End point - Any STM port at the remote end.
AUG-AU 0-0 Values of Aggregate units at the STM level.
Command - --
Add Trunk/Delete
Note 1: Add Trunk is displayed in the Command drop down menu when no trunks are created.
Delete is displayed when there is atleast one trunk provisioned in the network element.
Note 2: It is not advisable to change the Remote IP address as the trunk automatically discovers
the neighbours.

9.11 DCN
DCN is an ECC (Embedded Communication Channel) on the Tejas
network element. The TejNES can be provisioned to act as an OSPF
router for ECC in remote management. It can exchange and maintain
the routing information on both the ECC and LAN to which it is
connected using the NMS port. The network element processes the
router information on the NMS port, if the OSPF Ethernet
parameter is enabled. Similarly, the routing information on the Data
Communication channel is processed.

The network element has the capability to use either IP or OSI as


Layer 3 protocol for routing the data communication packets from
the element management system.

DCN also supports overhead tunneling. Using overhead tunneling


you can transfer transparently the overhead data belonging to a
different network element across the STM-1 ports.

TJ100CPr4
Configuration 99

The network elements also support the remote management using the
embedded communication channel (ECC) to allow the remote
EMS/NMS to communicate to the network element for OAM&P
applications.

TejNES supports provisioning of ECC over the following bytes/sets


of bytes:

• DCC-R/SDCC
• DCC-M/LDCC
• F1
• F2
• F3
• F2F3
Each SDH frame includes two Embedded Communication Channels
(ECC) called Regenerator Section and Multiplex Section ECC for
transporting management messages between network elements and
management systems. These in-band data communication channels
enable service providers Operation Support Systems (OSS) to
manage SDH network elements without the need for an expensive
out-of-band data communication network.

E1/VC12 management channel can be used to transport


management communications between network elements and
management systems. These management channels enable service
providers to manage SDH network elements without the need of
expensive out-of-band data communications network.

Note : If the ECC_bytes are enabled on the STM-1 port, then the corresponding bytes
cannot be used for tunneling.
The Network interface feature gives a list of all the active Network
Interfaces with their attributes.

User Interface Guide Version 1.0


100 Configuration

In the Network interface menu, you can

• view network interface configuration


• edit network interface configuration
• provision ECC
• delete network interface configuration

9.11.1 Viewing the network interfaces


The following are the steps to view the network interface.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Network interface. The Network
interface configuration page is displayed. This page gives
details of the existing network interfaces.
Table 9-32 describes the fields displayed on the Network interface
configuration page.
Table 9-32
Fields on the Network interface configuration page
Field Description
Edit Click the link to edit the network interface configuration.
Association Displays the label of the interface.
Network interface short Displays the network interface name in short as used by the
name operating system.
Admin status Displays the admin status of the network interface.
The interface is available to carry traffic only when the Admin status
is Up.
Layer3 protocol Displays the network layer protocol used for this interface.
Layer2 protocol Displays the type of interface distinguished according to the
physical link protocol immediately below the network layer in the
protocol suite.
Routing protocol Displays the routing protocol used for the interface.

TJ100CPr4
Configuration 101

Table 9-32 (continued)


Fields on the Network interface configuration page
Field Description
IP Address Displays the IP address of the network interface.
MTU Displays the maximum size of the packet that can be sent through
the interface.
Delete Click the button to delete the interface.
Note: The LAN interface cannot be deleted.

9.11.2 Editing network interfaces


The following are the steps to edit network interfaces.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Network Interface. The Network
interface configuration page is displayed. This page gives
details of the existing Network Interfaces.
3 Click the Edit link for the interface you want to edit. The Edit
Network interface provisioning page is displayed.
4 Edit the fields referring to Table 9-33.
5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

User Interface Guide Version 1.0


102 Configuration

Table 9-33 gives the default and acceptable values for the configurable
parameters on the Edit Network Interface Provisioning page.
Table 9-33
Default and acceptable values for the network interface parameters
Parameter Default value Acceptable value
Admin Status Up • Up
• Down
Layer 3
MTU 1518 248 - 1518
Layer 2
Layer 2 protocol Standard PPP, • Standard PPP, RFC 1661
RFC 1661 • PPP, HDLC Framing
(see Note 2)
Magic number Enable • Enable
• Disable
(see Note 1)
Proxy ARP
Proxy ARP Disable • Enable
• Disable
OSPF
OSPF Disable • Disable
• Enable
Hello Interval 10 1 - 65535 sec (see Note 4)
Router Dead Interval 40 1 - 65535 sec (see Note 4)

TJ100CPr4
Configuration 103

Table 9-33 (continued)


Default and acceptable values for the network interface parameters
Parameter Default value Acceptable value
OSPF Authentication Disable • Disable Authentication
Mode Authentication: • Simple Password
OSPF Authentication - Applicable only when Simple password is
Password/key selected for OSPF Authentication mode. The
password can be a set of alphanumeric
characters having a maximum length of 8
characters. (see Note 3)
Note 1: Magic number is editable only when Standard PPP, RFC 1661 is selected for Layer 2
Protocol. Magic number is not applicable for LAN.
Note 2: For a LAN, the Layer 2 Protocol is MAC and is not editable.
Note 3: The password entered by user will be visible.
Note 4: The Router Dead Interval should be an integral multiple of Hello Interval.

9.11.3 Provisioning a Embedded Communication Channel


The following are the steps to provision an ECC.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Network Interface. The Network
Interface Configuration page is displayed.
3 Click Provision ECC link. The Provision ECC page is
displayed.
4 Select values referring to Table 9-34.
5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

Note : Only two DCN/Management channel can be provisioned at a time

User Interface Guide Version 1.0


104 Configuration

Table 9-34 gives the default and acceptable values for the configurable
ECC parameters.
Table 9-34
Default and acceptable values for configurable ECC parameters
Parameter Default Value Acceptable Value
Port STM1-1-5-1 • STM1-1-5-1
• STM1-1-5-2
ECC Byte Selection ecc_disable • ecc_disable
• ecc_F1
• ecc_F2
• ecc_F3
• ecc_F2F3
• ecc_DCC_R
• ecc_DCC_M
ECC Path - AU-n over which ECC is carried.

9.11.4 Provisioning Management Channel


The following are the steps to provision a management channel.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Network Interface. The Network
Interface Configuration page is displayed.
3 Click Provision Management Channel-1 or Provision
Management Channel-2. The Management channel
configuration page is displayed.
4 Select values referring to Table 9-35.
5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

TJ100CPr4
Configuration 105

Table 9-35 gives the default and acceptable values for the
Management Channel parameters.
Table 9-35
Default and acceptable values for Management Channel parameters
Parameter Default value Acceptable value
Management Channel E1 • E1
Type • VC12
• Unprovisioned
E1 Port E1-1-N-1 E1-1-5-M
where M is the E1 port number (see Note).
Port STM1-1-5-1 • STM1-1-5-1
• STM1-1-5-2
STM No 1 1
K 1 1-3
L 1 1-7
M 1 1-3
Note: When E1 is selected for Management Channel Type, E1 port is the only configurable
parameter. The SDH Path parameters are configurable when VC12 is selected for Management
Channel Type.

User Interface Guide Version 1.0


106 Configuration

9.12 OSPF
The Open Shortest Path First (OSPF) is an interior gateway routing
protocol based on the shortest path first or link-state algorithm.
Routers use link-state algorithms to send routing information to all
nodes in an internetwork by calculating the shortest path to each node
based on a topography of the internet constructed by each node.

Each router sends that portion of the routing table (keeps track of
routes to particular network destinations) that describes the state of
its own links, and the complete routing structure (topography). The
advantage of shortest path first algorithms is that it results in smaller
and more frequent updates everywhere. The converge is quick, thus
preventing problems like routing loops and count-to-infinity (when
routers continuously increment the hop count to a particular network)
which results in a stable network.

The OSPF feature enables monitoring neighbors of a network


element and debugging the routing information for In Band
Communication (IBC). The OSPF parameters can be configured for
all embedded control channel interfaces and for the LAN port to
enable routing between these interfaces.

OSPF as a routing algorithm is used to route IP packets through the


shortest path. For this to happen, the routers need to properly
establish the adjacency and then exchange their routing database with
each other.

OSPF authentication is used to avoid any malicious intentions of


establishing adjacency, thereby avoiding any malicious intentions of
knowing routing database of a network. The password configured in
OSPF authentication mode is sent in OSPF packets. This is used to
establish adjacency where the same password needs to be configured
on both interfaces connected to each other.

OSPF network can be divided into sub-sections called areas. An area


is a group of OSPF networks, routers and links that have the same
area identification. It helps in reducing the size of the router database,
as router only possess information about network topology that is
within the area. The default area parameter is 0.0.0.1. Any valid IP
address is an acceptable area parameter.

TJ100CPr4
Configuration 107

9.12.1 Configuring OSPF area


The following are the steps to configure OSPF area in the network
element.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click OSPF. The OSPF parameters
configuration page is displayed.
3 Enter the relevant value in the Area text field.
The default OSPF area 0.0.0.1 is the area address of the
backbone.
.

CAUTION
Loss of communication
Changing the OSPF area may cause a loss of communication to the
network element.

4 Click Submit. A confirmation page is displayed.


5 Click Yes. A “Successfully Created” message is displayed.
9.12.2 Disabling OSPF area
The following are the steps to disable OSPF area for a port on the
network element.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Network Interface. The Network
interface configuration page is displayed. This page gives
details of the existing network interfaces.
3 Click the Edit link for the interface you want to edit. The Edit
Network interface provisioning page is displayed.

User Interface Guide Version 1.0


108 Configuration

4 Select Disable for OSPF.


5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modification. A “Successfully Modified”
message is displayed.
9.13 Static Route
Static route is an entry in network element routing table that specifies
how to reach an IP address through a particular gateway (network
element or Interface). Static routes are used to provide static
connectivity between routers, meaning the routes do not change
automatically unlike routing protocols. A static route allows the user
to access a network element in any network. The user can do this by
adding a destination network IP address and the IP address of next
hop network element. Thus a user can establish a link.

In the Static Route menu, you can

• view all the configured static routes


• add a new static route
• delete static routes

9.13.1 Viewing static routes


The following are the steps to view static routes in a network element.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Static Route. The Static routes
configuration page is displayed.

TJ100CPr4
Configuration 109

Table 9-36 describes the fields on the Static routes configuration


page.
Table 9-36
Fields on the Static route configuration page
Field Description
Destination network IP Displays the IP Address of the destination.
address
Destination network Displays the Netmask (in number of bits) to be applied to
address Mask Length Destination Network IP Address to determine the network for
which this route is added.
Next hop Displays the IP address of the next hop element.
Advertise route Displays the advertise route is enabled or disabled.
NetworkInterface Ref Displays the name of the network interface for which the static
route is added.
Operational Status Displays the operational status of the route.
delete Select the check box in a row(s) to delete the row(s).

9.13.2 Adding static routes


The following are the steps to add a static route in a network element.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Static Route. The Static routes
configuration page is displayed.
3 Click Add a new Static Route link. The Creating Static
Route page is displayed.
4 Enter values referring to Table 9-37.
5 Click Submit. A “Successfully Created” message is displayed.

User Interface Guide Version 1.0


110 Configuration

Table 9-37 gives the configurable static route parameters with their
default and acceptable values.
Table 9-37
Default and acceptable values for the configurable static route parameters
Parameter Default value Acceptable value
Destination Network IP - 0.0.0.0 - 255.255.255.254
Address
Destination Network Address - 0 - 32
Mask Length
Next hop IP Address - 0.0.0.0 - 255.255.255.254
Advertise Route Disable • Disable
• Enable
Network Interface LAN-1-6 (eth0) • LAN-1-6 (eth0)
• STM1-1-5-1
• STM1-1-5-2
Note 1: Any invalid static route added on a point to point interface is added in the WUI but is not
added in the Kernel routing table.
Note 2: Any invalid static route added on a broadcast interface (eth) is blocked.
Note 3: The Next Hop IP Address has to be specified only when the static route is provisioned
on eth0. If it is ecc interface, the Next Hop IP Address need not be specified.
Note 4: If the address is not specified or is invalid for eth0 interface, an error message is displayed
on submit.

9.13.3 Deleting a static route


The following are the steps to delete a static route.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Static Route. The Static routes
configuration page is displayed.
3 Select the check box in the Delete field for the static route to
be deleted.
4 Click Submit. A confirmation page is displayed.

TJ100CPr4
Configuration 111

5 Click Confirm Delete. A “Successfully Deleted” message is


displayed.

9.14 Proxy ARP Neighbour


The Proxy ARP allows a gateway network element to respond to
Address Resolution Protocol (ARP) requests for sub tending network
elements that are within the same subnetwork as the customer DCN
address range. The proxy ARP feature removes the need for
customers to provision static routes on their routers and routing
protocols (OSPF) between the gateway network elements and the
customer DCN.

The network element software supports viewing and adding of proxy


ARP neighbours.

In the Proxy ARP Neighbours menu, you can

• view all the proxy ARP neighbours


• add a new proxy ARP neighbour
• delete proxy ARP neighbours

9.14.1 Viewing Proxy ARP neighbours configuration


The following are the steps to view Proxy ARP neighbour
configuration information.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Proxy ARP Neighbour. The Proxy ARP
Neighbours configuration page is displayed.

User Interface Guide Version 1.0


112 Configuration

Table 9-38 describes the fields on the Proxy ARP Neighbours


configuration page.
Table 9-38
Fields on Proxy ARP Neighbours configuration page
Field Description
Proxy ARP Neighbours
Neighbour network IP Displays the IP address of the neighbouring network element.
address
NetInterfaceRef Displays the type of interface—LAN-1-6 (eth0).
delete Select the check box to delete the Proxy ARP neighbour.

9.14.2 Adding a Proxy ARP neighbour

Note 1: The maximum number of Proxy Address Resolution Protocol (ARP)


neighbours in a Tejas network element is 14.

Note 2: Ensure that the router ARP timers are set to less than 10 minutes to limit the
DCN outage to 10 minutes.
The following are the steps to add a Proxy ARP neighbour.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Add a new Proxy ARP Neighbour link.
The Creating Proxy ARP Neighbour page is displayed.
3 Enter values referring to Table 9-39.
4 Click Submit. A “Successfully Created” message is displayed.

TJ100CPr4
Configuration 113

Table 9-39 gives the default and acceptable values for the Proxy ARP
neighbour parameters page.
Table 9-39
Default and acceptable values for the Proxy ARP Neighbour parameters
Field Default value Acceptable value
Destination Network IP - Any valid IP address of a network element
Address in the same subnet that is reachable from
the gateway network element.
Network Interface Select the network interface. Currently it
supports only LAN-1-6 (eth0).

9.14.3 Deleting a proxy ARP neighbour

Note : Deleting Proxy Address Resolution Protocol (ARP) Neighbours will result in
loss of communication to the remote network elements, in the absence of static
route.
The following are the steps to delete a proxy ARP neigbhbour.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Proxy ARP neighbour. The Proxy ARP
Neighbours configuration page is displayed.
3 Select the check box in the Delete field for the Proxy ARP
neighbours to be deleted.
4 Click Submit. A confirmation page is displayed.
5 Click Confirm Delete. A “Successfully Deleted” message is
displayed.

User Interface Guide Version 1.0


114 Configuration

9.15 Serial Port


Serial communication between two network elements is possible due
to the serial port. Once the serial port has been properly configured,
the serial port can be used to send and receive data. There are three
applications for the serial port on the Tejas network element—User
Data Channel (UDC), or Terminal Server network. For UDC
application, overhead byte F1 is used for data communication
purpose. Serial communication requires that you specify the
transmission baud rate and application.

Terminal server helps in connecting to a remote node using telnet in


the absence of Diaguser provision in the network element.

In the Serial port menu, you can

• view serial port configuration


• edit serial port configuration

9.15.1 Viewing serial port information


The following are the steps to view serial port information.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Serial Port. The Serial port configuration
page is displayed.

TJ100CPr4
Configuration 115

Table 9-40 describes the fields on the View Serial Port page.
Table 9-40
Fields on the View Serial Port page
Field Description
Port Displays the Serial port name.
Application Displays the type of application that runs on the serial interface.
Baud Rate Displays the operating rate of serial interface.
Admin Status Displays the status of the serial interface as up or down.
edit Click the link to edit the serial port information.

9.15.2 Editing serial port

Note 1: In the serial port provisioning, the Application and the Admin status fields
cannot be changed simultaneously. First application and the corresponding
parameter has to be selected. For the application to come into effect, the
admin status of the serial port must be set to up.

Note 2: If F1-UDC needs to be used for serial port application, then F1 byte cannot
be used for ECC byte communication.

The following are the steps to edit a serial port.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click DCN. Click Serial Port. The Serial port configuration
page is displayed.
3 Click edit link in the edit column for the serial port to be
edited. The Serial port configuration page is displayed. Enter
values referring to Table 9-41.
4 Click Submit. A confirmation page is displayed.

User Interface Guide Version 1.0


116 Configuration

5 Click Accept Valid Modifications. A “Successfully Modified”


message is displayed.

Table 9-41 gives the default and acceptable values for configuring the
serial port parameters.
Table 9-41
Default and acceptable values for configuring serial port parameters
Parameter Default value Acceptable value
Application Unprovision • udc
Application • terminal server
• Unprovision Application
Admin Status Down • Up
• Down
UDC Application
Overhead byte F1 • F1
• F2
STM Port STM1-1-5-1 • STM1-1-5-1
• STM1-1-5-2
AUG AUG-1-5-1-1 • AUG-1-5-1-1
AU AUG-1-5-1-1-1 • AUG-1-5-1-1-1
Terminal Server
TCP Port 20090 20090 - 20099
Timeout (sec.) 0 0 - 600. Beyond 600 seconds, the telnet
connection is timed out.
Note: The AUG and AU fields are editable only if the F2 byte is selected for the Overhead byte.

TJ100CPr4
Configuration 117

9.16 Synchronization
The Synchronization feature provides the timing and synchronization
management functionality for the network element.

All the SDH network elements in a network are synchronized to the


same highly accurate clock called the Primary Reference Clock (PRC).
PDH signals can be transported on an SDH frame, but they are
multiplexed independently of the SDH timing.

The frequency of the primary reference clock is passed on to the


network elements through the traffic signal or through any external
means like Global Positioning System (GPS) or via the Building
Integrated Timing System (BITS).

The BITS clock input/output is at 2.048MHz and can be nominated


as a reference for node synchronization. Loss-of-Signal (LOS) is
detected on the clock input and this alarm is used as a trigger to
change over to the next synchronization reference.

The timing Synchronization sources depends on:

• user or automatic timing protection switch requests in the network


element
• validity of the nominated sources (synchronization status values)
• priorities assigned to the source (user provisionable)
• quality of the available signal on the nominated source (ppm offset
less than or equal to 17ppm)

9.16.1 Viewing and editing the synchronization status


The Synchronization state page displays the synchronization state
of the network element. The SSM timing alarms are displayed in the
lower portion of the Synchronization status page. The SSM timing
alarms are automatically refreshed for every two seconds.

User Interface Guide Version 1.0


118 Configuration

Table 9-42 describes the fields on the Synchronization state page.


Table 9-42
Fields on the Synchronization state page
Field Description
QL Mode Disabled The clock is selected based on the priority
assigned.
Enabled The clock is selected based on its quality and
priority.
Output QL Mode Auto The output clock is the same as the source
clock that is locked, provided QL Mode is
enabled.
Manual Quality of output clock can be set manually
(see Note).
Reversion Mode Auto The switching of the clock happens
automatically.
Manual The switching of the clock has to be selected
manually.
WTRTime (minutes) Select the time the clock takes to switch to previously locked clock
when it is restored.
WTR Time can be set only if the revertive mode is selected.
Node output quality level Set the quality of clock output if the Output QL mode is set to
Manual.
Node Minimum quality Select the minimum quality level expected by the network element
level to lock to a particular clock. If the clock does not have the QL as
expected, then the BITS clock output will be squelched. Squelching
is not done at the STM interfaces.
Output quality level Displays the actual value for the Quality of clock output.
SETG Status Displays the status of the PLL within the network elements
synchronization module.
Selected Clock Source Displays the clock source being used.
External Request on Displays external requests (forced switch, manual switch), if any.
Selected source
Note: Manual should be selected for Output QL mode when QL Mode is disabled.

TJ100CPr4
Configuration 119

The following are the steps to view and edit synchronization.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Synchronization. Click Synchronization Status. The
Synchronization state page is displayed. The lower part of
the Synchronization state page displays the status of the timing
reference.
3 Enter/Select values referring to Table 9-43.
4 Click Submit. A confirmation page is displayed.
5 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.
Table 9-43 gives the default and acceptable values for the configurable
synchronization status parameters.
Table 9-43
Default and acceptable values for the configurable synchronization status parameters
Parameter Default Value Acceptable value
QL Mode Disabled • Enabled
• Disabled
Output QL Mode Manual • Manual
• Auto
Reversion Mode Manual • Manual
• Auto

User Interface Guide Version 1.0


120 Configuration

Table 9-43 (continued)


Default and acceptable values for the configurable synchronization status parameters
Parameter Default Value Acceptable value
WTR Time (minutes) 5 0 - 12
Node Output Quality Level DNU • PRC
• SSU_A
• SSU_B
• SEC
• DNU
• INVALID
Node Minimum Quality Level Invalid • PRC
• SSU_A
• SSU_B
• SEC
• DNU
• INVALID

9.16.2 Viewing the selected timing references


The following are the steps to view selected timing references.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Synchronization. Click View Nominated timing
reference. The View nominated timing references page is
displayed.

TJ100CPr4
Configuration 121

Table 9-44 describes the fields on the View nominated timing


references page.
Table 9-44
Fields on the View nominated timing references page
Field Description
Current Source Indicates whether the clock source is the current source. The clock
source tagged with an asterisk is the current active source.
Clock Source Displays the clock source. Click the clock source link to view the
Edit Clock Sel page.
Priority Displays the priority assigned to the clock source.
Quality Level Defines quality of the timing reference to which the node is locked
to.
Clock Status Displays the availability status of the clock source as one of the
following:
• Normal
• Signal Fail
• Admin down
• Oper down
Lockout Request On Excludes the clock source from selection.
Off The clock source is available for selection.
delete Select the check box to delete the nominated timing references.
Note: 1 has the highest priority and 8 the least. Priority 0 indicates the clock source is not used for
selection.

Note : The Quality Level is visible only when the QL mode is enabled in
Synchronization state page. When the QL mode is disabled, Manual should be
selected for the Output QL Mode in the Synchronization state page.

User Interface Guide Version 1.0


122 Configuration

9.16.3 Editing selected timing reference


Table 9-45 describes the fields on the Edit ClockSel page.
Table 9-45
Fields on the Edit ClockSel page
Field Description
Priority Select a priority for the clock source (1 has the highest priority and
8 the least. Priority 0 indicates the clock source is not used for
selection).
LockOut Request Select LockOut request as On to exclude the clock source from
selection.
Quality Level & Input Defines quality of the timing reference to which the node is locked
Quality Mode to.
Note: Quality Level is displayed when the user has nominated E1 ports. Input Quality Mode &
Quality Level is displayed when the user has nominated BITS.

The following are the steps to edit a selected timing reference.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Synchronization. Click View Nominated timing
reference. The View nominated timing references page is
displayed.
3 Click the Clock Source link to edit the Clock Source
information. The Edit ClockSel page is displayed.
4 Make changes referring to Table 9-46 and click Submit. A
confirmation page is displayed.
5 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

TJ100CPr4
Configuration 123

Table 9-46 gives the default and acceptable values for the configurable
timing reference parameters.
Table 9-46
Default and acceptable values for configurable timing reference parameters
Parameter Default value Acceptable value
Priority 0 0-8
LockOut Request Off • On
• Off
Input Quality Mode Manual • Manual
• Auto
Quality Level Invalid • PRC
• SSU A
• SSU B
• SEC
• DNU
• Invalid
Note 1: Quality Level is displayed when the user has nominated E1 ports.
Note 2: Input Quality Mode and Quality Level are displayed when the user has nominated BITS.

9.16.4 Deleting a nominated timing reference


The following are the steps to delete a nominated timing reference
from the network element.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Synchronization. Click View Nominated timing
reference. The View nominated timing references page is
displayed.
3 Select the check box in the delete field, for the clock source to
be deleted.
4 Click Submit. A confirmation page is displayed.

User Interface Guide Version 1.0


124 Configuration

5 Click Confirm Delete. A “Successfully Deleted” message is


displayed.

Note : If the network element is locked to a clock source that needs to be deleted, then
lockout the network element from the clock source before deleting the clock.
9.16.5 Nominating a timing reference
Table 9-47 describes fields on the Nominate timing references
page.
Table 9-47
Fields on the Nominate timing references page
Field Description
Clock Reference Three types of references are available:
• Port
• Bits
• Internal
Clock Reference Port If Port is selected for Clock Reference, then select the desired STM
clock reference port.
If Bits is selected for Clock Reference, then select the desired bits.
The clock reference is given as BITSIN_n_1, BITSIN_n_2, (n is
slot number of the card from which BITS clock inputs are driving)
Priority Select the priority for the clock source.
Note 1: 1 has the highest priority and 8 has the least. 0 priority indicates the clock reference is not
used for selection.
Note 2: The Clock Reference Port is valid for BITS and ports timing references only.
Note 3: BITSIN_n_1 is a 2MHz signal where as BITSIN_n_2 is a 2Mbps signal.

Note : A maximum of eight clocks can be nominated for a network element.

TJ100CPr4
Configuration 125

The following are the steps to nominate a timing reference for the
network element.

Step Action

1 Click Configuration in the navigation menu. The sub menu


items are listed.
2 Click Synchronization. Click Nominate timing reference.
The Nominate timing references page is displayed.
3 Select values referring to Table 9-48.
4 Click Submit. A “Successfully Created” message is displayed.
Table 9-48 gives the default and acceptable values of parameters for
nominating timing references.
Table 9-48
Default and acceptable values of parameters for nominating timing references
Parameter Default values Acceptable values
Clock Reference Internal Internal
Port
Bits
Clock Reference port E1-1-5-1 when Port is selected For Ports—all PDH and STM
for clock reference ports
For Bits— BITSIN-1-5-1 and
BITSIN-1-5-1 when Bits is BITSIN-1-5-2
selected for clock reference where N is the slot number in
which the base card is placed.
Priority 0 0-8

User Interface Guide Version 1.0


126 Configuration

TJ100CPr4
10
Faults 1-

10.1 Introduction
Fault management deals with detection and reporting of faults by the
network element. Alarms are raised to alert the user about fault
conditions. The alarms can be categorized into the following types
based on their severity:

• Critical
• Major
• Minor
• Deferred
• Warnings
This chapter provides information on the following:

• Active alarms
• Suppressed alarms
• Alarm filters
• Event history and
• Alarm severity

10.2 Active Alarms


In the Active alarms sub menu, you can view information on active
alarms raised on objects. A Stop Refresh button is provided in the
Active Alarms page to stop the automatic refreshing of the page.

User Interface Guide Version 1.0


128 Faults

10.2.1 Viewing active alarms


The following are the steps to view active alarms.

Step Action

1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Active alarms. The Active alarms page is displayed on
the right pane.
Table 10-1 describes the fields on the Active alarms page.
Table 10-1
Field on the Active alarms page
Field Description
# Displays the serial number of the alarm.
Time Displays the date and time when the alarm was raised.
Information Provides information on the fault due to which the alarm was raised
Severity Displays severity of the Alarm – critical, major, minor, deferred or
warning.
Object Displays source of the fault.
Acknowledgement Status Displays whether alarm has been acknowledged or not.

TJ100CPr4
Faults 129

10.3 Suppressed Alarms


In the Suppressed alarms sub menu, you can view the alarms that
are suppressed by the network element alarm reporting control or by
any provisioned user alarm filter.

10.3.1 Viewing suppressed alarms


The following are the steps to view suppressed alarms.

Step Action

1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Suppressed alarms. The Suppressed alarms page is
displayed.
Table 10-2 describes the fields on the Suppressed alarms page.
Table 10-2
Fields on the Suppressed alarms page
Field Description
# Displays the serial number of the alarm.
Time Displays the date and time at which the alarm was raised.
Alarm Information Displays information on the fault due to which the alarm was
raised.
Severity Displays the severity of the alarm—Critical, major, minor, deferred
or warning.
Object Displays the object on which the alarm is suppressed.
Alarm Suppressor Displays the technique used to suppress the alarms.

User Interface Guide Version 1.0


130 Faults

10.4 Alarm Filters


Alarm filters are generally used for suppressing equipment level
alarms.

10.4.1 Viewing alarm filters


The following are the steps to view alarm filters.

Step Action

1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Alarm filters. The View Alarm Filter page is displayed.
Table 10-3 describes the fields on the View Alarm Filter page.
Table 10-3
Fields on the View Alarm Filter page
Field Description
Alarm Filter Displays the alarm filter.
Managed object Displays the object to which the filter is applied.
Alarm Displays the alarm that is being suppressed.

10.4.2 Provisioning a new alarm filter


The following are the steps to provision a new alarm filter.

Step Action

1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Alarm filters. The View Alarm Filters page is
displayed.
3 Click Provision a new alarm filter. The Provision New
Alarm Filter page is displayed.
4 Enter/Select values as described in Table 10-4.
5 Click Create. A confirmation page is displayed.

TJ100CPr4
Faults 131

6 Click Yes. A “Successfully Created” message is displayed.


Table 10-4 describes the fields on the Provision New Alarm Filter
page.
Table 10-4
Fields on the Provision New Alarm Filter page
Field Description
Alarm Class Select the object on which the alarm is to be suppressed from the drop
down menu.
Type Select an instances of the object class in the network element from the
drop down menu.
Alarm Select an alarm that should be suppressed from the drop down menu.
Name Enter a name for the alarm filter. The name should be a set of
alphanumeric characters.

10.4.3 Deleting an alarm filter


The following are the steps to delete an alarm filter.

Step Action

1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Alarm filters. The View Alarm Filters page is
displayed.
3 Select the check box in the Delete column for the alarm filter
to be deleted.
4 Click Delete. A confirmation page is displayed.
5 Click Confirm Delete. A “Successfully Deleted” message is
displayed.

User Interface Guide Version 1.0


132 Faults

10.5 Event History


The Event history provides information on the fault management
event log. In the Event History page, you can view the event history.
The Next and Previous buttons show the page immediate to the
current displayed page.

The Show All Events link opens a new window, in which all the
events are listed.

The Back to Node View link takes you to NE information page.

The Stop Refresh button, when clicked, stops automatic refresh of


the Event History page.

10.5.1 Viewing event history


The following are the steps to view events that occurred in the
network element.

Step Action

1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Event history. The Event history page is displayed.
3 Click Latest, to view a list of 20 latest events.
Click Previous, to view the previous 20 events.
Click Next, to view the next 20 events.
4 To view all the events, click Show All Events link. This opens
a separate window listing all the events.

TJ100CPr4
Faults 133

Table 10-5 describes the fields on the Event history page.


Table 10-5
Fields on Event history page
Field Description
# Displays the serial number of an event.
Time Displays the date and time at which the recorded event occurred.
Information Displays which event occurred at that instant.
Object Displays the object on which the event occurred.
Additional information Displays additional information.

10.6 Alarm Severity


The alarms are categorized as critical, major, minor, deferred and
warning based on their severity. In the Alarm severity page, you can
set the severity of alarms.

The alarms for which severity is changed is marked with an asterisk.


(*) in the Alarm column. The Restore Defaults button when clicked,
restores the default severity for the modified alarms.

The Back to Node View link takes you to the NE information


page.

10.6.1 Setting alarm severity


The following are the steps to set alarm severity.

Step Action

1 Click Faults in the navigation menu. The sub menu items are
listed.
2 Click Alarm severity. The Alarm severity page is displayed.
3 Select the desired severity level from the drop down menu in
the Severity field, for the alarm whose severity is to be
changed.

User Interface Guide Version 1.0


134 Faults

4 Click Submit to set the severity of the alarm. The page


refreshes with the changes made. The field modified is
indicated by an asterisk (*).
Click Reset to reject the changes.
Click Restore Defaults to bring back the alarm severity levels
to default values.
Table 10-6 describes the fields on the Alarm Severity page.
Table 10-6
Fields on the Alarm Severity page
Field Description
Trap ID Displays the Unique number for an alarm.
Alarm Displays the nature of alarm that has occurred.
Object Displays the object on which the alarm is raised.
Severity Select the severity of the alarm – critical, major, minor, deferred and
warning.

TJ100CPr4
Profiles
11 1-

11.1 Introduction
This chapter describes the Profiles menu in the WUI. In the Profiles
menu, the following two profiles are available:

Profiles define the behavior of the ports in the event of an alarm.

• STM Port Profiles - The STM profiles defines the path profiles to
be applied for all Higher order/Lower order
terminating/non-terminating cross-connects.
• Path Alarm Profiles - The path alarm profiles enable the alarm
reporting control on all alarms available in the AU and TU objects.
In the Profiles menu, you can

• view STM profiles


• edit STM profiles
• view path alarm profiles
• configure path alarm profiles
• edit path alarm profiles
• delete path alarm profiles

User Interface Guide Version 1.0


136 Profiles

11.2 STM Port Profiles


There are two STM port profiles provided by default—Internal NNI
and External NNI.

Internal NNI – The Internal NNI profile indicates preferences within


EMS domains.

External NNI – The External NNI profile indicates preferences


between different management domains.

STM port profile is not provisionable, but can be customized to point


to different path profiles. The changes made will be applicable only
for new connections. The existing connections will remain
unchanged.

In the STM port profile menu, you can

• view STM port profiles


• edit STM port profiles

11.2.1 Viewing STM port profiles


The following are the steps to view STM profiles.

Step Action

1 Click Profiles in the navigation menu. The sub menu items are
listed.
2 Click STM Port Profile. The View STM Port Profile page is
displayed with a table listing all the profiles.
3 Click the profile name link in the View column to view its
details. The corresponding port profile page is displayed.

TJ100CPr4
Profiles 137

Table 11-1 describes the fields on the View STM Port Profile page.
Table 11-1
Fields on the View STM Port Profile page
Field Description
View Click the profile name link to view the profile details.
Profile name Displays the profile name.
Edit Click to edit the STM Port profile.

11.2.2 Editing STM port profiles


The following are the steps to edit STM port profiles.

Step Action

1 Click Profiles in the navigation menu. The sub menu items are
listed.
2 Click STM Port Profile. The View STM Port Profile page is
displayed.
3 Click edit link in the Edit column for the profile to be edited.
The corresponding Edit port profile page is displayed.
4 Make changes referring to Table 11-2.
5 Click Submit. A confirmation page is displayed.
6 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

User Interface Guide Version 1.0


138 Profiles

Table 11-2 gives the default and acceptable values for the configurable
STM profile parameters.
Table 11-2
Default and acceptable values for the configurable STM profile parameters
Parameter Default value Accepted values
Profile Name Internal-NNI when Enter a profile name.
Internal NNI is selected
External-NNI when
External NNI is
selected
Terminating and Mask TIM • Mask TIM
UnProtected TU Alarm • Suppress TIM
Profile
• Mask all except LOP
• Mask all
Terminating and Protected Mask TIM • Mask TIM
TU Alarm Profile • Suppress TIM
• Mask all except LOP
• Mask all
Passthrough and Mask all except LOP • Mask TIM
UnProtected TU Alarm • Suppress TIM
Profile
• Mask all except LOP
• Mask all
Passthrough and Protected Mask all except LOP • Mask TIM
TU Alarm Profile • Suppress TIM
• Mask all except LOP
• Mask all
Terminating and Mask TIM • Mask TIM
UnProtected AU Alarm • Suppress TIM
Profile
• Mask all except LOP
• Mask all

TJ100CPr4
Profiles 139

Table 11-2 (continued)


Default and acceptable values for the configurable STM profile parameters
Parameter Default value Accepted values
Terminating and Protected Mask TIM • Mask TIM
AU Alarm Profile • Suppress TIM
• Mask all except LOP
• Mask all
Passthrough and Mask TIM • Select a Mask TIM
UnProtected AU Alarm • Suppress TIM
Profile
• Mask all except LOP
• Mask all
Passthrough and Protected Mask TIM • Mask TIM
AU Alarm Profile • Suppress TIM
• Mask all except LOP
• Mask all

11.3 Path Alarm Profiles


In the Path Alarm Profiles menu, you can

• view path alarm profiles


• provision a new path alarm profile
• delete path alarm profiles
11.3.1 Viewing path alarm profiles
The following are the steps to view path alarm profiles.

Step Action

1 Click Profiles in the navigation menu. The sub menu items are
listed.
2 Click Path Alarm Profiles. The View Path Alarm Profile
page is displayed with a table listing all the profiles.

User Interface Guide Version 1.0


140 Profiles

Table 11-3 describes the fields on the View Path Alarm Profile page.
Table 11-3
Fields on the View Path Alarm Profile page
Field Description
Profile Name Displays the profile name.
TIM Action Report TIM, no Reports the TIM alarm without affecting traffic.
Downstream AIS
Ignore TIM No alarm is reported or traffic affecting action
is taken on TIM.
Report TIM, Reports the TIM alarm and also transmits a
Downstream AIS downstream AIS so that traffic transmission is
affected.
Supress TIM Reports the TIM alarm, but in the suppressed alarm
page, and there are no traffic affecting alarms.
Signal Label Report SLM, no On Signal Label Mismatch (SLM), PLM alarm is
Mismatch Action downstream AIS reported, but no downstream AIS is sent.
Ignore SLM No action is taken on SLM.
Downstream AIS Reports PLM alarm and sends AIS downstream
(traffic affecting) on SLM.
Supress SLM The SLM alarm is reported in the supressed alarm
page.
UNEQ Signal Label Report UNEQ, Reports the UNEQ alarm without affecting traffic.
Action no Downstream
AIS
Ignore UNEQ No alarm is reported or traffic affecting action
is taken on an UNEQ.
Report UNEQ, Reports the UNEQ alarm and also transmits a
Downstream AIS downstream AIS. Traffic is affected.
Supress UNEQ Reports the UNEQ alarm in the suppressed alarm
page. There are no traffic affecting alarms.
Masked Alarms List Displays a list of masked alarms.
Delete Select the check box(s) to delete the path alarm profile(s).

TJ100CPr4
Profiles 141

11.3.2 Provisioning path alarm profile


The following are the steps to provision a new path alarm profile.

Step Action

1 Click Profiles in the navigation menu. The sub menu items are
listed.
2 Click Path Alarm Profiles. The View Path Alarm Profiles
page is displayed with a table listing all the profiles.
3 Click Provision a new Path Alarm Profile link. The
Provision New Path Alarm Profile page is displayed.
4 Enter values referring to Table 11-4.
5 Click Create. A confirmation page is displayed.
6 Click Yes. A “Successfully Created” message is displayed.
Table 11-4 lists the default and acceptable values for the configurable
path alarm profiles.
Table 11-4
Default and acceptable values for the configurable path alarm profile parameters
Parameter Default value Accepted values
Profile Name - Enter a profile name. The profile name
can be a set of alpha, numeric or
alphanumeric characters.
TIM Action Suppress TIM • Suppress TIM
• Ignore TIM
• Report TIM, No downstream AIS
• Downstream AIS on TIM

User Interface Guide Version 1.0


142 Profiles

Table 11-4 (continued)


Default and acceptable values for the configurable path alarm profile parameters
Parameter Default value Accepted values
Signal Label Mismatch Report SLM, No • Suppress SLM
Action downstream AIS • Ignore SLM
• Report SLM, No downstream AIS
• Downstream AIS on SLM
UNEQ Signal Label Action Report UNEQ, No • Suppress UNEQ
downstream AIS • Ignore UNEQ
• Report UNEQ, No downstream AIS
• Downstream AIS on UNEQ
Select Alarms for Masking - Select one or more alarms for masking by
selecting the check boxes.
• Alarm Indication Signal
• Remote Defect Indication
• Loss Of Pointer
• Signal Degrade
• Signal Fail

TJ100CPr4
Profiles 143

11.3.3 Deleting a path alarm profile


The following are the steps to delete path alarm profiles.

Step Action

1 Click Profiles in the navigation menu. The sub menu items are
listed.
2 Click Path Alarm Profiles. The View Path Alarm Profiles
page is displayed with a table listing all the profiles.
3 Select the check box in the Delete column, for the path alarm
profiles to be deleted.
4 Click Delete. A confirmation page is displayed.
5 Click Confirm Delete. A “Successfully Deleted” message is
displayed.

Note 1: Default path alarm profiles are indicated with an asterisk. Default path
alarm profiles cannot be deleted.

Note 2: A path alarm assigned to a AU, TU or STM cannot be deleted.

User Interface Guide Version 1.0


144 Profiles

TJ100CPr4
12
Performance 1-

12.1 Introduction
Performance Monitoring (PM) refers to the in-service, non-intrusive
monitoring of transmission quality.

Performance Monitoring (PM) is the process that monitors the


performance of a facility through performance data collection and
analysis without interruptions to service.

The functions of performance monitoring include:

• collection of PM counts
• reporting of PM counts
• storage of PM counts
• threshold crossing alerts when PM counts exceed their threshold
settings
The network element monitors performance parameters for working
and protection facilities separately.

You can use performance monitoring to section and isolate


intermittent faults without interrupting service.

SDH performance monitoring is based on block error measurement.


If one or more of the parity bits indicate a parity error when the BIP,
BIP-8/BIP24xN or BIP-2 byte is checked, then only one block error
is counted.

User Interface Guide Version 1.0


146 Performance

The network element monitors the performance parameters and


records the data for

• Current Interval – The Current interval statistics displays the


performance statistics for the current time interval, previous 15
minutes, current day and the previous day.
• 15min intervals – The Interval statistics displays the performance
statistics for 32 previous 15-minute intervals.
• Previous day – The Previous day’s history displays the
performance statistics for previous day.
The performance monitoring parameters are categorized as follows:

• STM performance monitoring parameters - You can monitor the


performance of Regenerator section-Multiplex section, path,
Tributary unit and Transceiver performance attributes.
• PDH performance monitoring parameters - You can monitor the
E1/E3 line and path performance attributes
• Ethernet performance monitoring parameters
• VCG performance monitoring parameters
The Reset options are provided to reset the performance counter at
the near and far end network elements. A value of 1 in the Interval
Valid column indicates that there has been no interruption in the
performance counter during the 15 minutes, current day or 24 hours
interval. A value of 0 indicates that there has been an interruption in
the performance counter such as a the network element software
restarting, facility administered down, reset, card being jacked out, etc.

TJ100CPr4
Performance 147

12.2 STM Performance Statistics


The STM performance statistics gives the statistics on a Regenerator
section-Multiplex section, path, Tributary unit and Transceiver.

12.2.1 Viewing Regenerator Section - Multiplex section performance


statistics
The following are the steps to view performance statistics of the
Regenerator-Multiplex section for current interval, 15mins interval,
and previous day.

Step Action

1 Click Performance in the navigation menu. The sub menu


items are listed.
2 Click Current Interval. Click STM. The STM-Current
interval statistics page is displayed.
Click 15min intervals. Click STM. The STM-Interval
statistics page is displayed.
Click Previous day. Click STM. The STM-Previous day’s
history page is displayed.
3 Click Regenerator Section - Multiplex section. The
performance statistics of the Regenerator section and the
Multiplex section are displayed.
Reset options available under STM-Regenerator Section are—Reset
Regeneration Section Current 15 Min Statistics, Reset Regeneration
Section Current Day Statistics.

Reset options available under Multiplex section are—Reset Multiplex


Section Current 15 Min Statistics, Reset Multiplex Section Current
Day Statistics, Reset Multiplex Section Current 15 Min (Far End),
Reset Multiplex Section Current Day (Far End).

User Interface Guide Version 1.0


148 Performance

Table 12-1 describes the Regenerator Section performance


parameters when the network element is configured in SDH mode.
Table 12-1
Regenerator section performance parameters
Parameter Description
ES Displays the errored second in the regenerator section.
SES Displays the severely errored second in the regenerator section.
UAS Displays the unavailable second in the regenerator section.
SEP Displays the severely errored period in the regenerator section.
EB Displays the errored blocks in the regenerator section.
BBE Displays the background block errors in the regenerator section.
ESR Displays the errored seconds ratio in the regenerator section.
SESR Displays the severely errored seconds ratio in the regenerator
section.
BBER Displays the background block error ratio in the regenerator section.
SEPI Displays the severely errored period intensity in the regenerator
section.
Interval Valid Interval Valid is the validity of the interval and the validity of data
during that interval in the regenerator section. 1 indicates the data
displayed during that interval is valid, while 0 indicates the data is not
valid.

Table 12-2 describes the Multiplex section performance parameters


when the network element is configured in SDH mode.
Table 12-2
Multiplex section performance parameters
Parameter Description
ES Displays the errored second in the multiplex section.
SES Displays the severely errored second in the multiplex section.
UAS Displays the unavailable second in the multiplex section.

TJ100CPr4
Performance 149

Table 12-2 (continued)


Multiplex section performance parameters
Parameter Description
SEP Displays the severely errored period in the multiplex section.
EB Displays the errored blocks in the multiplex section.
BBE Displays the background block errors in the multiplex section.
ESR Displays the errored seconds ratio in the multiplex section.
SESR Displays the severely errored seconds ratio in the multiplex section.
BBER Displays the background block error ratio in the multiplex section.
SEPI Displays the severely errored period intensity in the multiplex
section.
Interval Valid Interval Valid is the validity of the interval and the validity of data
during that interval in the multiplex section. 1 indicates the data
displayed during that interval is valid, while 0 indicates the data is not
valid.
ES-FE Displays the errored seconds at far end in the multiplex section.
SES-FE Displays the severely errored seconds at far end in the multiplex
section.
BBE-FE Displays the background blocked errors at far end in the multiplex
section.
UAS-FE Displays the unavailable seconds at far end in the multiplex section.
SEP-FE Displays the severely errored period at far end in the multiplex
section.
Far End Interval Valid Displays the validity of data during that interval at far end in the
multiplex section. 1 indicates the data displayed during that interval
is valid, while 0 indicates the data is not valid.

User Interface Guide Version 1.0


150 Performance

12.2.2 Viewing performance statistics of path


The following are the steps to view the performance statistics of path.

Step Action

1 Click Performance in the navigation menu. The sub menu


items are listed.
2 Click Current Interval. Click STM. The STM-Current
interval statistics page is displayed.
Click 15min intervals. Click STM. The STM-Interval
statistics page is displayed.
Click Previous day. Click STM. The STM-Previous day’s
history page is displayed.
3 Click STM. The STM-Current interval statistics page is
displayed.
4 Click Path. The performance statistics of all the AU in the path
are listed.

Note : The AU hyperlink takes you to the corresponding performance statistics.


Reset options available for each port are—Reset All Current 15 Min
Statistics, Reset All Current Day Statistics, Reset All Current 15 Min
(Far End), Reset All Current Day (Far End), Reset AU/STS Current
15 Min Statistics, Reset AU Current Day Statistics, Reset AU/STS
Current 15 Min (Far End), Reset AU/STS Current Day (Far End)

The current interval statistics of the Path is available for the current
time interval, previous 15 minutes, current day and the previous day.

TJ100CPr4
Performance 151

Table 12-3 describes the Path performance parameters when the


network element is configured in SDH mode.
Table 12-3
Path performance parameters
Parameter Description
ES Displays the errored second.
SES Displays the severely errored second.
UAS Displays the unavailable second.
SEP Displays the severely errored period in the path.
EB Displays the errored blocks.
BBE Displays the background block errors.
PPJE Displays the positive pointer justification events.
NPJE Displays the negative pointer justification events.
ESR Displays the errored seconds ratio.
SESR Displays the severely errored seconds ratio.
BBER Displays the background block error ratio.
SEPI Displays the severely errored period intensity in the path.
Interval Valid Interval Valid is the validity of the interval and the validity of data
during that interval. 1 indicates the data displayed during that
interval is valid, while 0 indicates the data is not valid.
ES-FE Displays the errored seconds at far end.
SES-FE Displays the severely errored seconds at far end.
BBE-FE Displays the background blocked errors at far end.
UAS-FE Displays the unavailable seconds at far end.
SEP-FE Displays the severely errored period at far end in the path.
Far End Interval Valid Displays the validity of data during that interval at far end. 1
indicates the data displayed during that interval is valid, while 0
indicates the data is not valid.

User Interface Guide Version 1.0


152 Performance

12.2.3 Viewing performance statistics of the tributary unit


The following are the steps to view performance statistics of tributary
unit.

Step Action

1 Click Performance in the navigation menu. The sub menu


items are listed.
2 Click Current Interval. Click STM. The STM-Current
interval statistics page is displayed.
Click 15min intervals. Click STM. The STM-Interval
statistics page is displayed.
Click Previous day. Click STM. The STM-Previous day’s
history page is displayed.
3 Click Tributary unit. Click the desired TU. The performance
statistics of the Tributary Unit is displayed.
Reset options available for each TU are—Reset All Current 15 Min
Statistics, Reset All Current Day Statistics, Reset All Current 15 Min
(Far End), Reset All Current Day (Far End).

Note : The current interval statistics of the Tributary Unit is available for the current
time interval, previous 15 minutes, current day and the previous day.
Table 12-4 describes the parameters on the Tributary Unit
performance parameters.
Table 12-4
Tributary Unit performance parameters
Parameter Description
ES Displays the errored second.
SES Displays the severely errored second.
UAS Displays the unavailable second.
SEP Displays the severely errored period.

TJ100CPr4
Performance 153

Table 12-4 (continued)


Tributary Unit performance parameters
Parameter Description
EB Displays the errored blocks.
BBE Displays the background blocked error.
ESR Displays the error seconds ratio.
SESR Displays the severely error seconds ratio.
BBER Displays the background blocked error ratio.
SEPI Displays the severely errored period intensity
Interval Valid Displays the lower order path interval valid. 1 indicates the data
displayed during that interval is valid, while 0 indicates the data is not
valid.
ES-FE Displays the error seconds at far end.
SES-FE Displays the severely error seconds at far end.
BBE-FE Displays the background blocked errors at far end.
UAS-FE Displays the unavailable seconds at far end.
SEP-FE Displays the severely errored period at far end.
Far End Interval Valid Displays the validity of data during that interval at far end. 1
indicates the data displayed during that interval is valid, while 0
indicates the data is not valid.

12.2.4 Viewing the performance statistics of the transceiver


The following are the steps to view the performance statistics of
transceiver.

Step Action

1 Click Performance in the navigation menu. The sub menu


items are listed.
2 Click Current Interval. Click STM. The STM-Current
interval statistics page is displayed.

User Interface Guide Version 1.0


154 Performance

Click 15min intervals. Click STM. The STM-Interval


statistics page is displayed.
Click Previous day. Click STM. The STM-Previous day’s
history page is displayed.
3 Click Transceiver. The performance statistics of the
transceiver is displayed.
Table 12-5 describes the transceiver performance statistics
parameters.
Table 12-5
Transceiver performance statistics parameters
Parameter Description
Received Power (dBm) Displays the value of the received power.
Transmit Power (dBm) Displays the value of the transmitted power.
Laser Bias (mA) Displays the Laser Bias value as received from the device.
Laser Voltage (Volts) Displays the Laser Voltage as received from the device.
Laser Temperature (degrees Displays the Laser Temperature as received from the device.
C)
Interval Valid Indicates the validity of the interval. 1 indicates the data displayed
during that interval is valid, while 0 indicates the data is not valid.
Note: ‘Port Admin Status is Down’ message is displayed when the Admin status of the port is
down.

TJ100CPr4
Performance 155

12.3 PDH Performance Statistics


The PDH performance statistics gives the line and path performance
statistics.

12.3.1 Viewing PDH performance statistics


The following are the steps to view PDH performance statistics.

Step Action

1 Click Performance in the navigation menu. The sub menu


items are listed.
2 Click Current Interval. Click E1 or E3. The E1 or
E3-Current interval statistics page is displayed.
Click 15min intervals. Click E1 or E3 to view 15min interval
for E1/E3. The E1 or E3-interval statistics page is displayed.
Click Previous day. Click E1 or E3 to view performance
history of the previous day. The E1 or E3-Previous day’s
history page is displayed.
3 Click the desired PDH port. The performance statistics of the
PDH port chosen is displayed.
Reset options available for each PDH interfaces are—Reset Current
15 Min Statistics at Line Level, Reset Current Day Statistics at Line
Level, Reset Current 15 Min at Path Level, Reset Current Day at Path
Level.

Clicking the Reset All E1/E3/DS3 Current 15 Min Statistics and


Reset All E1/E3/DS3 Current Day Statistics link will reset the
Current 15 minute statistics and Current day statistics for all the
E1/E3/DS3 ports respectively.

Note : The frame status of the port is displayed on the performance statistics page.

User Interface Guide Version 1.0


156 Performance

Table 12-6 describes the E1 Line performance parameters in SDH


mode.
Table 12-6
E1 line performance parameters
Parameter Description
CV-L Displays the coding violations occurring on the line.
ES-L Errored Seconds Line (ES-L) is a count of the seconds containing
one or more anomalies and/or defects on the line.
SES-L Displays the severely error seconds.
Line Interval Valid Indicates the validity of the interval. 1 indicates the data displayed
during that interval is valid, while 0 indicates the data is not valid.

Table 12-7 describes the E1 path performance parameters, when the


network element is configured in SDH mode.

Table 12-7
E1 path performance parameters
Parameter Description
EB-P Displays the errored blocks on the path.
BBE-P Displays the background blocked error on the path.
ES-P Errored Seconds Path (ES-P) is a count of the seconds containing
one or more anomalies and/or defects on the path.
SES-P Displays the severely errored seconds on the path.
UAS-P Displays the unavailable seconds on the path.
Path Interval Valid Indicates if the interval is valid. 1 indicates the data displayed during
that interval is valid, while 0 indicates the data is not valid.

TJ100CPr4
Performance 157

Table 12-8 describes the E3 Line performance parameters.


Table 12-8
E3 line performance parameters
Parameter Description
CV-L Displays the coding violations occurring on the line.
ES-L Errored Seconds Line (ES-L) is a count of the seconds containing
one or more anomalies and/or defects on the line.
SES-L Displays the severely errored seconds in the line.
Line Interval Valid Indicates if interval is valid. 1 indicates the data displayed during that
interval is valid, while 0 indicates the data is not valid.

Table 12-9 describes the E3 path performance parameters, when the


network element is configured in SDH mode.

Table 12-9
E3 path performance parameters
Parameter Description
ES-P Errored Seconds Path(ES-P) is a count of the seconds containing
one or more anomalies and/or defects on the path.
SES-P Displays the severely errored second on the path.
UAS-P Displays the unavailable second on the path.
Path Interval Valid Indicates if the interval is valid. 1 indicates the data displayed during
that interval is valid, while 0 indicates the data is not valid.

User Interface Guide Version 1.0


158 Performance

12.4 Ethernet-Performance Statistics


12.4.1 Viewing the performance statistics of ethernet interface
The following are the steps to view the performance statistics of an
ethernet interface.

Step Action

1 Click Performance in the navigation menu.The sub menu


items are listed.
2 Click Current Interval. Click Ethernet. The
Ethernet-Current interval statistics page is displayed.
Click 15min intervals. Click to view 15min interval for
Ethernet. The Ethernet-Interval statistics page is displayed
Click Ethernet under Previous day to view performance
history of the previous day. The Ethernet-Previous day’s
history page is displayed.
3 Click the desired Ethernet port. The performance statistics of
the selected Ethernet port is displayed.

Table 12-10 describes the Ethernet performance statistics parameters.


Table 12-10
Ethernet performance statistics parameters
Parameter Description
Frames Transmitted Displays the count of frames successfully transmitted.
Frames Received Displays the count of frames successfully received.
Octets Transmitted Displays the count of octets including padding octets successfully
transmitted.
Octets Received Displays the count of octets including padding octets successfully
received.
ES Displays the Errored Seconds count.
SES Displays the Severely Errored Seconds count.
UAS Displays the Un Available Seconds count.

TJ100CPr4
Performance 159

Table 12-10 (continued)


Ethernet performance statistics parameters
Parameter Description
Idle Seconds Displays the idle second in Ethernet client traffic. An Idle second is
a second in which (frames received+Errored Frames received)=0.
This counter will be incremented in a non-ES/non_SES/non_UAS
second.
Pause Frames Transmitted Displays the count of the PAUSE frames passed to the MAC
sublayer.
Pause Frames Received Displays the count of the PAUSE control frames passed by the
MAC sublayer to the upper layers.
FCS Error Frames Displays the count of frames whose FCS sequence is not correct.
FCS Error Bytes Displays the number of bytes whose FCS sequence is not correct.
Frames Dropped Rx Displays the count of frames dropped at the receiving port.
Frames Dropped Tx Displays the count of frames dropped at the transmitting port.
Frame Too Short Errors Displays the count of frames received with frame size below the
minimum permitted value.
Frame Too Long Errors Displays the count of frames received with frame size above the
maximum permitted value.
Frames Received Displays the count of frames successfully received.
Ethernet Interval Valid Indicates if the interval is valid. 1 indicates the data displayed during
that interval is valid, while 0 indicates the data is not valid.

User Interface Guide Version 1.0


160 Performance

12.5 VCG Interface


12.5.1 Viewing the performance statistics of a VCG interface
The following are the steps to view the performance statistics of a
VCG interface.

Step Action

1 Click Performance in the navigation menu. The sub menu


items are listed.
2 Click Current Interval. Click VCG. The VCG-Current
interval statistics page is displayed.
Click 15min intervals. Click VCG. The VCG-Interval
statistics page is displayed.
Click Previous day. Click VCG. The VCG-Previous day’s
history page is displayed.
3 Click the desired VCG. The performance statistics for of the
selected VCG is displayed.

Table 12-11 describes the parameters on the VCG Interface page.


Table 12-11
VCG performance statistics parameters
Parameter Description
VCG Interval valid Indicates whether the interval is valid. 1 indicates the data displayed
during that interval is valid, while 0 indicates the data is not valid.

Idle Seconds Displays the count of idle second in VCG traffic. An idle second is
a second in which no data frames or errored frames are received.
This counter will be incremented in a non-ES/non-SES/non-UAS
second.
ES Displays the count of Errored Seconds.
SES Displays the count of Severely Error Seconds.
UAS Displays the count of Un Available Seconds.

Valid Frames Transmitted Displays the count of valid frames transmitted count.

TJ100CPr4
Performance 161

Table 12-11 (continued)


VCG performance statistics parameters
Valid Frames Received Displays the count of valid frames received count.
Valid bytes Transmitted Displays the count of valid bytes transmitted count.
Valid bytes Received Displays the count of valid bytes Received count.

Core Header Single Error Displays the GFP (Generic Framing Procedure as in G.7041) core
Corrections header single errors correction count.
Type Header Single Error Displays the GFP type header single error correction count.
Corrections
Core Header CRC Errors Displays the GFP core header CRC error count.
Type Header CRC Errors Displays the GFP type header CRC error count.
Payload FCS Errors Displays the payload FCS incorrect count.

User Interface Guide Version 1.0


162 Performance

TJ100CPr4
13
Security 1-

13.1 Introduction
The user interface provides four different user access group
(ADMIN, OPERATOR, OPERATOR2, USER).

Table 13-1 lists the user access classes with their privileges.
Table 13-1
Access groups and corresponding privileges
Access Group Privileges
USER Has Read-only access to all the management information including
configuration, faults and performance.
OPERATOR Can preform all configuration operations such as port and
cross-connect configurations, acknowledgement of faults, resetting
performance statistics, etc.
OPERATOR2 Can configure node name, configure Router ID and Ethernet IP,
perform maintenance operations such as software or configuration
backup and restore, loopbacks and all other operations similar to
operator.
ADMIN Can create and delete logins on the network element. Can configure
network element parameters such as network element mode,
Location, Contact, as well as management parameters such as
Ethernet/Router IP Address/Masks, OSPF parameters, etc.

Note : Only an ADMIN can add users, delete users or modify user access field. All
the other users can only change their passwords.

User Interface Guide Version 1.0


164 Security

Table 13-2 lists the user name and password details for user accounts
on the network element.
Table 13-2
User name and password details
User name • is unique.
• can be alphabetic/numeric/alphanumeric.
• supports up to 32 characters.
• is case sensitive.
Password • is unique.
• must be exactly eight characters long.
• can be alphabetic/numeric/alphanumeric.
• supports special characters except # and space.
• is case sensitive.
• cannot be identical to user name

CAUTION
Risk of Unauthorized access
Change the initial password of the default user account on the
network element. The default user accounts and passwords are
widely known.

In the Security menu, you can

• create a new user account


• modify an existing user account
• modify password of a logged in user
• delete an existing user account

TJ100CPr4
Security 165

13.2 Managing User Accounts


13.2.1 Creating a new user account
Table 13-3 describes the configurable fields for provisioning a new
user.
Table 13-3
Configurable fields for provisioning a new user
Field Description
User Name Enter the user name.
Access Select access type for the user—USER, OPERATOR, Operator2,
ADMIN.
User lockout Select to allow or deny user lockout access to the user being created.
Password The password (exactly 8 characters long) required for accessing the
network element.
Confirm Password Re-enter the password for confirmation.
Note: Password must be assigned before a user can login to the network element.

The following are the steps to create a new user account.

Step Action

1 Click Security in the navigation menu. The sub menu items are
listed.
2 Click Manage users. The Manage Users page is displayed.
The page lists the existing users and the group to which they
belong to.
3 Click the Add User button. The New User page is displayed.
4 Enter/Select values referring to Table 13-4.
5 Click Submit. A confirmation page is displayed.
6 Click Yes. A “Successfully Created” message is displayed.

User Interface Guide Version 1.0


166 Security

Table 13-4 gives the default and acceptable values for configuring the
parameters on the New User page.
Table 13-4
Default and acceptable values for configuring new user
Parameter Default value Acceptable values
User Name - Can be a set of alphanumeric
characters. Maximum of 32
characters is allowed.
Access USER USER
OPERATOR
OPERATOR2
ADMIN
User lockout Allow access Allow access
Deny access
Password - Can be a set of alphanumeric
characters and should be
exactly 8 characters long.
Confirm Password - Same as password.

13.2.2 Modifying an existing user account


While modifying a user account, you can modify only the following:

• user access group


• user lockout
• password
The following are the steps to modify an existing user account.

Step Action

1 Click Security in the navigation menu. The sub menu items are
listed.
2 Click Manage Users. The Manage Users page is displayed.
The page lists existing users and their access group.
3 Click the hyperlink of the User Name to be modified. The
Modify User page is displayed.

TJ100CPr4
Security 167

4 Edit values referring to Table 13-4.


5 Click Submit. A confirmation message is displayed.
6 Click Accept Valid Modification. A “Successfully Modified”
message is displayed.
13.2.3 Modifying password of a logged in user
A user with USER access privilege can only view his account in the
Manage users page and is permitted to only change the password of
his account.

The following are the steps to change the password of a currently


logged in user.

Step Action

1 Click Security in the navigation menu. The sub menu items are
listed.
2 Click Manage Users. The Manage Users page is displayed.
The page lists existing users and their access group.
3 Enter the new password in the Password field. Re-enter the
password in the Confirm Password field.
4 Click Submit. A “Successfully Modified” message is displayed.

Note : For an ADMIN, the ADMIN should click the link in the user name field to
change the password.

User Interface Guide Version 1.0


168 Security

13.2.4 Deleting user account


Only an administrator has the privilege to delete existing user
accounts and his own account.

The following are the steps to delete a user account.

Step Action

1 Click Security in the navigation menu. The sub menu items are
listed.
2 Click Manage Users. The Manage Users page is displayed.
The page lists the existing users and the group to which they
belong.
3 Select the check box in the delete column for the users to be
deleted.
4 Click Submit. A confirmation message is displayed.
5 Click Confirm Delete. A “Successfully Deleted” message is
displayed.

TJ100CPr4
14
Maintenance Operations 1-

14.1 Introduction
This chapter describes the maintenance procedures that can be
performed on the network element. The maintenance procedures that
can be performed are—warm and cold reboot of cards, provision
loopbacks, backup and restore the network element configuration,
restore default settings, etc.

14.2 System Settings


The System settings menu helps you to set the alarm buzzer and the
crash recovery option for the network element. It also allows you to
set the time zone for the performance day bin rollover.

Table 14-1 describes the fields on the System settings page.

Table 14-1
Fields on the System Settings page
Field Description
Alarm Buzzer Enable Enables the hooter alarm.
Disable Disables the hooter alarm.
Performance Day Bin GMT Enables Performance Day Bin Rollover as per GMT
rollover timezone Time zone.
Local Enables Performance Day Bin Rollover as per Local
Time zone.
Note: If Local is set to IST (ahead of GMT by 5.30 hrs), Performance Day Bin Rollover happens
at 00:00:00 IST. If GMT is selected for day bin rollover, Performance Day Bin Rollover happens
at 05:30:00 IST.

User Interface Guide Version 1.0


170 Maintenance Operations

14.2.1 Viewing and editing the system settings


The following are the steps to view and edit system settings.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed.
2 Click System Settings. The System Settings page is
displayed.
3 Select values referring to Table 14-2.
4 Click Submit. A “Successfully Modified” message is displayed.
Table 14-2 gives the default and acceptable values for system setting
parameters.
Table 14-2
Default and acceptable values for the system setting parameters
Parameter Default value Acceptable Values
Alarm Buzzer Disable • Disable
• Enable
Performance Day Bin Local • Local
rollover timezone • GMT
Note: If Local is set to IST (ahead of GMT by 5.30 hrs), Performance Day Bin Rollover happens
at 00:00:00 IST. If GMT is selected for day bin rollover, the Performance Day Bin Rollover
happens at 05:30:00 IST.

14.3 Rebooting cards


Cards need to be rebooted in case of FPGA upgradation or when
alarms are not reported properly on the card. Cards can be rebooted
in the following two ways:

• Warm reboot - Warm reboot does not affect traffic on the card.
• Cold reboot - Cold reboot disrupts traffic on the card for the
period while the card is rebooting.

TJ100CPr4
Maintenance Operations 171

Note : : Warm reboot is applicable only for the PXAT8E1, PXAT21E1 and PXATDS3
cards. Cold reboot is applicable only for the tributary card (TETH02EX).
The following are the steps to reboot cards.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed
2 Click Warm Reboot cards/Cold Reboot cards. The
corresponding reboot cards page is displayed.
3 Select the cards to be rebooted in the Warm Reboot/Cold
Reboot column.
4 Click Submit. A “Successfully Modified” message is displayed.

14.4 Restart and download software


The Restart and download software menu enables you to restart
the network system in two modes—Warm restart and Cold restart
and also enables you to upgrade or downgrade software. The warm
restart is a service non-disruptive process in which the traffic is not
affected during the restart period. The cold restart mode is a
disruptive process in which the traffic is affected during the restart
period.

14.4.1 Warm/Cold restarting the network element


The following are the steps to warm restart a network element.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed.
2 Click Restart and download software. The Reset and load
management page is displayed.

User Interface Guide Version 1.0


172 Maintenance Operations

3 Click Warm restart/Cold restart button. The network


element is restarted.

14.4.2 Upgrading software


The following are the steps to upgrade software.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed.
2 Click Restart and download software. The Reset and load
management page is displayed.
3 Click Upgrade load button. The Load management page is
displayed.
4 Enter values referring to Table 14-3.
5 Click Submit. A message indicating the progress of
upgradation is displayed.

Note : A linux system has an inbuilt FTP server. On windows, the IIS server available
with Windows can be used or any third party server such as 3Com server
available at the following URL can be used:
http://support.3com.com/software/utilities_for_windows_32_bit.h
tm

Table 14-3 describes the fields on the Load management page.


Table 14-3
Fields on the Load Management page
Field Description
IP Address Enter the IP address of the Linux PC/Workstation where the
software binary is present.
Directory Enter the name of the directory in which the software binary is
stored in the selected machine.
Filename Enter the filename of the software binary stored in the selected
directory that has to be downloaded.

TJ100CPr4
Maintenance Operations 173

Table 14-3 (continued)


Fields on the Load Management page
Field Description
Type Select Software for the load in the drop down menu.
User Name Enter the username for the system from where software is to be
restored or downloaded.
Password Enter the password for logging to the system.

14.4.3 Downgrading software


The following are the steps to carry out software downgrade of the
network element.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed.
2 Click Restart and download software. The Reset and load
Management page is displayed.
3 Click Software load downgrade button. A confirmation
message to revert to the previous software version is displayed.
4 Click Yes. The older version of the network element software
is uploaded on the network element.

User Interface Guide Version 1.0


174 Maintenance Operations

14.5 Loop-Backs
Loopbacks are performed to check the continuity on SDH, PDH or
Ethernet ports. The ports can be configured for facility loopback and
terminal loopback. The exact location of failure can be detected using
loopbacks. You can perform facility and terminal loopbacks to test
the electrical (E1/E3) and optical (STM-1) connectivity of the
network element. When a facility loopback is operated on E1 and
optical ports, AIS is sent downstream.

Facility loopback tests traffic connections to and from E1/E3/DS3


port connections on the network element and are generally
performed on site.

Figure 14-1 shows a facility loopback for testing the E1/E3 port
connections at network elements 1 and 2.
Figure 14-1
Facility Loopback

Network element
Network element
1
2

Test set 1
Test Set 2
E1 STM-1/OC-3 STM-1/OC-3
E1
Interface E1
Interface
E1

Terminal loopback tests the E1/E3 and STM-1 connections.


Terminal loopback is supported on the Ethernet interfaces, but AIS
is not sent downstream.

TJ100CPr4
Maintenance Operations 175

Figure 14-2 shows a terminal loopback for testing E1/E3


connections.
Figure 14-2
Terminal Loopback

Network
element Network
1 element
2

Test Set
E1 E1
Interface STM-1/OC-3 STM-1/OC-3
E1
Interface
E1

CAUTION
Traffic affecting process
Facility loopback and terminal loopback are traffic affecting.

Application of facility or terminal loopback on the near end port (with


respect to NMS server) of a remotely managed node will result in loss
of connectivity with the node and the downstream network. Hence,
while applying loopbacks, the node should be provided with IBC
protection or should have a personal placed at the site of the node to
avoid loss of connectivity.

Figure 14-3 shows the connectivity of the nodes to the NMS server.
Facility or terminal loopbacks can be created at the near end ports of
Node A without loss of connectivity due to presence of Ethernet
connectivity. But, provisioning loopbacks at the near end and far end
ports of Node B and Node C will lead to loss of connectivity to the
downstream network.

User Interface Guide Version 1.0


176 Maintenance Operations

Figure 14-3
Terminal Loopback

Node A Node B Node C

NMS Near Far Near Far Near Far


end end
Server Ethernet end end end end
Connectivity

Remotely
Downstream Network Managed Nodes

Table 14-4 lists the various loopback modes.


Table 14-4
Loopback modes
Loopback modes Description
Normal Operation Normal connection is configured.
Facility Loopback Loopback is configured at the ingress.
Terminal Loopback Loopback is configured at the egress.

14.5.1 Performing loopback on STM ports


The following are the steps to perform loopback on STM ports.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed.
2 Click Loop-Backs.
Provisioning loopback for STM ports
3 Click STM. The STM Port loopback page is displayed.
4 Click the required STM port. The corresponding Port
maintenance page is displayed.
5 Select the loopback to be provisioned from the Loopback
Mode drop down menu.

TJ100CPr4
Maintenance Operations 177

6 Click Submit. A confirmation page is displayed.


7 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed
Performing loopback on PDH ports
8 Click PDH. The PDH Port loopback page is displayed.
9 Click the required PDH port. The corresponding Port
maintenance page is displayed.
10 Select the loopback to be provisioned from the Loopback
Mode drop down menu.
11 Click Submit. A confirmation page is displayed.
12 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.
Performing loopback on Ethernet ports
13 Click Ethernet. The Ethernet Port loopback page is
displayed.
14 Select the loopback to be provisioned from the Loopback
Mode drop down menu.
15 Click Submit. A confirmation page is displayed.
16 Click Accept Valid Modifications. A “Successfully Modified”
message is displayed.

User Interface Guide Version 1.0


178 Maintenance Operations

14.6 Database Changes


The Database Changes menu tracks the changes made to the network
element configuration by different users.

Table 14-5 describes the fields displayed on the DataBase Changes


page.
Table 14-5
Fields on the DataBase Changes page
Field Description
Db No. Indicates the nth change in the database.
Time Indicates the time at which the change was made.
Information Indicates the type of change—Addition, modification, deletion
Object Indicates the object on which the change was effected.
User Information Indicates the user who made the change.

By default the DataBase Changes page indicates the most recent


changes made. To view the previous changes, click the Previous
button. Click the Next button to view the more recent alarms. Click
the Latest button to view the latest changes made to the database.
The Show all DB Changes link displays all the changes made in a
new window.

The DataBase Changes page is refreshed for every few seconds. To


stop the referees, click Stop Refresh button. To refresh the page
again, click Start Refresh button (the Start Refresh button is
displayed only when the page is not refreshed).

TJ100CPr4
Maintenance Operations 179

The following are the steps to view changes made to the database.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed.
2 Click Database Changes. The DataBase Changes page is
displayed. Refer to Table 14-5 for information on the fields
displayed on the page
14.7 Diagnostics
The Diagnostics menu enables the user to view the system
diagnostics and the OSPF related information.

The OSPF monitor enables monitoring the neighbors of a particular


node and debugging the routing information for the IBC (In Band
Communication). The OSPF parameters can be configured for all the
embedded control channel interfaces and for the NMS port to enable
routing between these interfaces.

System diagnostics data comprises log files and dump files which
provide information on faults. The diagnostic data can be used for
analyzing problems arising in any network element.

14.7.1 Accessing OSPF diagnostics


The following are the steps to access the OSPF diagnostics.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed.
2 Click Diagnostics.
3 Click OSPF monitor. The Areas member page of the OSPF
protocol is displayed on the right pane.

User Interface Guide Version 1.0


180 Maintenance Operations

The following OSPF protocol members can be accessed in the


Diagnostics menu:

• Areas
• Database
• Interfaces
• Neighbors
• Statistics
• LSA expansion
• AS externals
• Routing table
• Opaque-LSAs
Area
The Area indicates the Open Shortest Path First area to which an
attached network belongs.

The area data structure contains all the information used to run the
basic OSPF routing algorithm. Each area maintains its own link-state
database. A network belongs to a single area, and a router interface
connects to a single area. Each router adjacency also belongs to a
single area.

Table 14-6 describes the OSPF area parameters.


Table 14-6
OSPF area parameters
Parameter Description
Area Displays the area ID, which is a 32-bit number identifying the area.
#Ifcs Displays the number of ECC interfaces which are part of the area.
#Routers Displays the number of reachable routers in the area.
#LSAs (Link State Displays the total LSAs in the network pertaining to this area.
Advertisement)
Xsum Displays the checksum on the area database maintained by the
node.
Comments Displays the description of the area
capability—transit/stub/demand-capable/no-import.

TJ100CPr4
Maintenance Operations 181

Database
The Database member displays the format and function of the LSA.

Table 14-7 describes the OSPF database parameters.


Table 14-7
OSPF database parameters
Parameter Description
LSA Type Displays the format and function of the LSA.
LS ID Displays LS ID.
Adv. Rtr Displays the OSPF Router ID of the Router originating the LSA.
LS Seqno Displays the signed 32-bit integer used to detect old and duplicate
LSAs.
Xsum Displays the checksum of the complete contents of the LSA, except
the LS age field.
Length Displays the size in bytes of the LSA.
Age Displays the age of the LSA in seconds.

Interfaces
The Interfaces member displays the type of physical network
interface. Different interfaces are eth, hdlcppp or ecc.

Table 14-8 describes the OSPF interfaces parameters.


Table 14-8
OSPF interfaces parameters
Parameter Description
Phy Displays the name of physical network interface. Different
interfaces are eth, hdlcppp, ecc.
Addr Displays the address of the interface available.
Area Displays the area of the OSPF network to which interface belongs.
Type Indicates the type of the link. Types of links can be
• BCast (Broadcast)
• P-P (Point-to-Point)
State Displays the state of the OSPF process.

User Interface Guide Version 1.0


182 Maintenance Operations

Table 14-8 (continued)


OSPF interfaces parameters
Parameter Description
#Nbr Displays the number of neighbors on the link.
#Adj Displays the number of adjacencies maintained by the network
element’s OSPF database.
Cost Displays the metric used to quantify links which the network
element has with other network elements.

Neighbors
The Neighbors member displays the name of the physical network
interface, address, router ID and state of the neighbors.

Table 14-9 describes the OSPF neighbors parameters.


Table 14-9
OSPF-Neighbors parameters
Parameter Description
Phy Displays the name of Physical network interface. The different
interfaces present are:
• eth
• hdlcppp
• ecc
Addr Displays the address of the neighboring network element.
ID Displays the OSPF router Id of the neighboring network element.

TJ100CPr4
Maintenance Operations 183

Table 14-9 (continued)


OSPF-Neighbors parameters
Parameter Description
State State indicates the state of the OSPF process.
Full Indicates completion of the OSPF process,
where the routing information has been
completely exchanged with the neighbour.
Exchange Indicates that information exchange
between the neighbors is underway.
1-Way Indicates traffic transmission is possible
only from the network element to its
neighbour and not vice versa, due to some
error/defect.
2-Way Indicates that traffic transmission is
possible from network element as well as
from its neighbour.
#DD Displays the number of database descriptor packets being received
by the network element.
#Req Displays the number of requests received by the network element
for a database description over that interface.
#Rxmt Displays the number of retransmissions of database descriptions
requested by the neighbors due to errors/defects in the previous
transmission.

Statistics
The Statistics member displays the checksum of number of external
LSAs received by the network element and also the checksum of the
Autonomous System (AS) externals.

User Interface Guide Version 1.0


184 Maintenance Operations

Table 14-10 describes the OSPF statistics parameters.


Table 14-10
OSPF statistics parameters
Parameter Description
Router ID Displays the 32-bit number assigned to each router running the
OSPF protocol.
# AS-external-LSAs Displays the number of external LSAs received by the network
element.
ASE checksum Displays the checksum of the AS externals.
#ASEs originated Displays the number of external LSAs originated by the network
element.
ASEs(Autonomous System Displays the maximum number of AS-external-LSAs in the
external) allowed database.
#Dijkstras Displays the number of times the dijkstra algorithm run on the LSA
database.
# Areas Displays the number of areas the network element is a part of.
# Nbrs in Exchange Displays the number of #Nbrs undergoing a database exchange.
MOSPF enabled Displays if the multicast OSPF is enabled or not.
Inter-area multicast Displays if Inter-area multicast is supported or not.
Inter-AS multicast Not supported.
In overflow state Displays if the number of external LSAs has exceeded the upper
limit.
Ospfd version Displays the version of the OSPF software running in the network
element.

LSA Expansion
The LSA Expansion member allows to select the format and
function of the LSA.

TJ100CPr4
Maintenance Operations 185

Table 14-11 describes the parameters on the LSA expansion page.


Table 14-11
Parameters on the OSPF-LSA Expansion page
Parameter Description
Area ID Select the identity of set of networks grouped together by the
OSPF.
LS Type Select the format and function of the LSA. The following formats
are available:
router-LSA
network-LSA
summary-LSA
ASBR-summary-LSA
AS-external-LSA
group-membership-LSA
LS ID Enter the routing domain that is being described by the LSA.
Adv Rtr Enter the OSPF Router ID of the router originating the LSA.

AS externals
The AS externals member displays the number of LSAs in the
database of the Autonomous system.

Table 14-12 describes the AS-externals parameters.


Table 14-12
OSPF-AS-externals parameters
Parameter Description
LSA Type Displays the format and function of the LSA.
LS ID Displays the routing domain that is being described by the LSA.
Adv. Rtr Displays the OSPF Router ID of the router originating the LSA.
LS Seqno Displays the signed 32-bit integer used to detect old and duplicate
LSAs.
Xsum Displays the checksum of the complete contents of the LSA,
excepting the LS age field.
Length Displays the size in bytes of the LSA.
Age Displays the age of the LSA in seconds.

User Interface Guide Version 1.0


186 Maintenance Operations

Routing Table
The Routing Table member displays all the neighboring network
element information indicating the number of hops to reach any
node.

Table 14-13 describes the Routing table parameters.


Table 14-13
OSPF-Routing table Parameters
Parameter Description
Prefix Displays the Prefix for the address.
Type Indicates the protocol using which the IP of the neighboring
network element is discovered (SPF – Shortest Path First).
Cost Displays the metric used to quantify links which the network
element has with other network elements.
Ifc Displays the Interface.
Next-hop Displays the IP address of the next network element through the
link.
#Paths Displays the number of paths available to the destination network
element/network from the source network element.

Opaque-LSAs
The Opaque-LSA member displays the checksum of the complete
contents of the Opaque LSAs.

TJ100CPr4
Maintenance Operations 187

Table 14-14 describes the Opaque-LSAs parameters.


Table 14-14
OSPF-Opaque-LSAs Parameters
Parameter Description
Phyint Displays the name of physical network interface.
If Address Displays the set of networks grouped together by the OSPF.
Area Displays the set of networks grouped together by the Area.
LS type Displays the piece of routing domain that is being described by the
LSA.
LS ID Displays the OSPF Router ID of the router originating the LSA.
Adv. Rtr Displays the signed 32-bit integer used to detect old and duplicate
LSAs.
LS Seqno Displays the checksum of the complete contents of the LSA, except
the LS age field.
Xsum Displays the size in bytes of the LSA.
Length Displays the length of the LSA in seconds.
Age Displays the age of the LSA in seconds.

14.7.2 Accessing System diagnostics data


System diagnostics data comprises log files and dump files which
provide information on faults. The diagnostic data can be used for
analyzing problems arising in any network element.

The following are the steps to access the system diagnostics data.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


item are listed.
2 Click Diagnostics.
3 Click System diagnostics. The Collect Debug Data page is
displayed.

User Interface Guide Version 1.0


188 Maintenance Operations

4 Select the card for which the debug data is to be collected from
the Card Name drop down menu. Click the Collect Data.
The data is stored as a tar file in the temp folder of your system.
Download Debug Data link for downloading the debug data
is displayed.
5 Click the Download Debug Data link and select the location
where you want to save the data. The debug data is saved as a
tar file.
Click Clean up data to clear the debug data from the
temporary folder.
14.8 Configuration Management
The user interface provides options for configuration backup and
storing it on a selected server.

Backup configuration is used for saving the network element


configuration. This command copies the existing snapshot of the
configuration and stores it to the server mentioned using the FTP
protocol. In case of backup failure, a backup operation failure alarm
is raised.

Restore configuration is used for restoring the configuration to the


network element when the configuration data gets corrupted. This
command obtains the configuration, using the FTP protocol from a
remote server, performs checks and accepts the configuration if
applicable to the network element. In case of failure, a restore failure
alarm is raised.

Restoring the configuration can be done by either restoring from


remote machine via FTP or from the local machine using HTTP.

The network element gives an error message for the cause of the
failure. The messages may be due to one of the following reasons:

• Username, password authentication failure


• Unable to reach the server IP address.
• Incorrect permissions to transfer file.

TJ100CPr4
Maintenance Operations 189

The network element can recover from restoration operation failures


due to network unavailability by using FTP timeout of 15 seconds.

The network element verifies the validity of the restored


configuration. The activation of restored configuration shall be
non-service affecting for the unaffected configuration. If the
verification fails, the restored configuration is rejected and
configuration restore failure alarm is raised.

The network element raises an alarm on detecting configuration


corruption or version mismatch without affecting traffic.

Note : It is recommended to perform a network element database backup on a daily


basis.

14.8.1 Taking backup of configuration data


The following are the steps to backup the network element
configuration data.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed.
2 Click Configuration management.
3 Click Backup Configuration. The Backup Configuration
page is displayed.
4 Enter values as described in Table 14-15.
5 Click Submit. You are connected to the PC to which you want
to back up the configuration data. Create a backup file.

Note : The Node Configuration state is displayed at the bottom of the page and is
refreshed for every 2 seconds. The Configuration state displayed is the last
operation performed with the configuration management.

User Interface Guide Version 1.0


190 Maintenance Operations

Table 14-15 describes the fields on the Backup configuration page.


Table 14-15
Fields on the Backup Configuration page
Field Description
User Name Enter the username of the system which has the configuration
backup.
Password Enter the password of the system which has the configuration
backup.
IP Address Enter the IP address of the system where the backup should be
created.
FTP port (optional) Enter FTP port number. (It is an optional field)
Directory Enter the directory into which the data has to be copied

14.8.2 Restoring configuration


The following are the steps to restore configuration data from a
remote server.

Note : The remote server should have an FTP server installed on it to carry out the
Restore configuration data command. For a Linux system, FTP server is
inbuilt. For a windows system, a IIS server provided along with windows or
any third party server such as 3com server needs to be installed.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed.
2 Click Configuration management.
3 Click Restore Configuration. The Restore Configuration
page is displayed.
4 Select/Enter values as described in Table 14-16. Click Submit.
You are connected to the PC from which you want to restore
configuration.
5 Click the configuration file. The configuration is restored on
the network element.

TJ100CPr4
Maintenance Operations 191

6 Click Commit for the restored configuration to take effect.

Note 1: Cold reboot the shelf after committing the configuration.

Note 2: The Node Configuration state is displayed at the bottom of the page.
Table 14-16 describes the fields on the Restore/Backup
configuration data page.
Table 14-16
Fields on the Restore/Backup Configuration Data page
Field Description
Configuration operation Restore The configuration is restored from local
configuration from machine or remote machine.
local machine
Restore The configuration is restored from remote
configuration from machine
remote machine
Username Enter the username of the PC to be accessed.
Password Enter the password of the PC to be accessed.
IP Address Enter the IP address of the PC to be accessed.
FTP port (optional) Enter the FTP port number for accessing the remote server.(It is an
optional field)
Directory Enter the directory where the configuration data file is located.

CAUTION
Restoration of Configuration Data
The restoration of configuration data of a network element is service
disruptive. The new configuration data requires backup. Restoration
could be done from a system which has an FTP server.

User Interface Guide Version 1.0


192 Maintenance Operations

14.8.3 Restoring factory default settings


The Restore factory defaults command should be used when all
configuration data of a node is to be deleted or when the node has to
be brought down with the factory default settings. While restoring the
factory defaults, all configuration information, event history and
performance data are deleted. The factory defaults can be restored
only by the ADMIN user.

The following are the steps to restore factory default settings for the
network element.

Step Action

1 Click Maintenance in the navigation menu. The sub menu


items are listed.
2 Click Configuration management.
3 Click Restore factory defaults. The Restore factory
defaults page is displayed.
4 Click Restore factory defaults button. The network element
is re-initialized.

Note 1: All configuration information, event history and performance data will be
deleted on restoring factory default settings.

Note 2: The Restore factory default operation brings down existing traffic. Please
attempt the action only if the network element needs to be re-initialized.

Note 3: A power cycle is necessary after the operation.

TJ100CPr4
15
Acronyms 1-

Table 15-1 lists the acronyms used in this chapter.


Table 15-1
Acronyms list
Acronym Expansion
AIS Alarm Indication Signal
ALS Automatic Laser Shutdown
AU Administrative Unit
APS Automatic Protection Switching
BBE Background Blocked Error
BER Bit Error Rate
DCC Data Communication Channel
ECC Embedded Channel Communication
EMS Element Management System
ES Errored Seconds
ETC Ethernet Tributary Card
GMT Greenwich Mean Time
WUI Web User Interface
IBC In-Band Communication
IP Internet Protocol
MAC Medium Access Control
MFC Multi-Function Card
MSP Multiplex Section Protection

User Interface Guide Version 1.0


194 Acronyms

Table 15-1 (continued)


Acronyms list

MTU Maximum Transmission Unit


NTP Network Time Protocol
NMS Network Management System
NOC Network Operations Center
OSPF Open Shortest Path First
PCM Pulse Code Modulation
PDH Plesiochronous Digital Hierarchy
PSS Processor Sub-System
SES Severely Errored Seconds
SETG Synchronization Equipment Timing Generator
SLM Signal Label Mismatch
SNMP Simple Network Management Protocol
SQL Structured Query Language
SSM Synchronization Status Message
STS Synchronous Transport Signals
TCA Threshold Crossing Alert
TIM Trace Identifier Mismatch
TU Tributary Unit
TUG Tributary Unit Group
VC Virtual Container
VCG Virtual Container Group
WAN Wide Area Network
UDP User Data Protocol
UPSR Unidirectional Path Switched Ring
URL Universal Resource Locator

TJ100CPr4
16
Appendix A 1-

16.1 Cross Connect Support


The following table lists the cross-connect support of the TJ100CPr4.
Table 16-1
Cross Connect support
Feature Type
Type of Cross-connects
AU4 Mapping AU4 (STM-n o, STM-n 4o, STM-n1e)
VC-3 (E3 ADD/DROP)
VC12 (E1 ADD/DROP)

User Interface Guide Version 1.0


196 Appendix A

TJ100CPr4
17
Appendix B 1-

17.1 List of Alarms


Table 17-1 lists the alarms supported by the TejNES.
Table 17-1
List of Alarms
Name
STM port level alarms
Loss of Signal on <STM port>
Loss of Frame on <STM port>
Out of Frame on <STM port>
Alarm Indication signal-Line
Remote Defect Indication-Line
Trace Identifier Mismatch <STM port>
BER Threshold exceeded for Signal Failure <STM port>
BER Threshold exceeded for Signal Degrade <STM port>
BER Threshold exceeded on Section for Signal Failure <STM port>
BER Threshold exceeded on Section for Signal Degrade <STM port>
BER Threshold exceeded on Far End line for Signal Failure <STM port>
BER Threshold exceeded on Far End Line for Signal Degrade
<STM port>
Revert to the work port <STM port>
SFP Alarms
SFP Mismatch
SFP Auto Provision Mismatch

User Interface Guide Version 1.0


198 Appendix B

Table 17-1 (continued)


List of Alarms
Name
SFP missing or removed
SFP Failure
SFP Unknown
STM 1 Alarms – Higher Order Alarms (AU)
Loss of VCAT Multiframe
Sequence Number Mismatch
Differential Delay Exceeded
Alarm Indication Signal
Remote Defect Indication
Loss of Pointer
Signal Label Unequipped
Trace Identifier Mismatch
Path Label Mismatch
Signal Degrade
Excessive Error
Tandem Connection - Remote Error Indication
Far End Signal Degrade
Far End Excessive Error
Tx Loss of Capacity - LCAS
Rx Loss of Capacity - LCAS
Lockout of protection
Forced switch to channel
Manual switch to channel
Member Not Deskewable-LCAS
Persistent CRC errors - LCAS
Persistent Unexpected MST-LCAS
Revert to the work channel after WTR TimeOut or SF/SD on protect channel
Alarms – Lower Order Path (TU)
Loss of VCAT Multiframe

TJ100CPr4
Appendix B 199

Table 17-1 (continued)


List of Alarms
Name
Sequence Number Mismatch
Differential Delay Exceeded
Alarm Indication Signal
Remote Defect Indication
Loss of Pointer
Signal Label Unequipped
Trace Identifier Mismatch
Path Label Mismatch
Signal Degrade
Excessive Error
Far End Signal Degrade
Far End Excessive Error
Alarm Indication Signal (Terminating)
Remote Defect Indication (Terminating)
Tx Loss of Capacity - LCAS
Rx Loss of Capacity - LCAS
Lockout of protection
Forced switch to channel
Manual switch to channel
Member Not Deskewable-LCAS
Persistent CRC errors – LCAS
Persistent Unexpected MST
Revert to the work channel
PDH Port Level Alarms
Loss of Signal <PDH port>
Alarm Indication Signal on Port <PDH port>
Loss Of Frame on Port
Lockout of protection
Forced switch to channel

User Interface Guide Version 1.0


200 Appendix B

Table 17-1 (continued)


List of Alarms
Name
Manual switch to channel
Revert to the work channel
Ethernet related Alarms
Link Down<Ethernet port>
Loss of Alignment<VCAT Group>
Link Integrity on<Ethernet port>
Differential Delay exceeded<VCAT Group>
Tx Total Loss of Capacity - LCAS<VCAT Group>
Rx Total Loss of Capacity<VCAT Group>
Excessive Error Ratio<VCAT Group>
Extended Header Mismatch<VCAT Group>
Auto Negotiation Failed<Ethernet port>
Forced Down - Link Integrity<Ethernet port>
Excessive Error Ratio<Ethernet port>
LCAS Mode Mismatch<VCAT Group>
Rx Partial Loss of Capacity - LCAS<VCAT Group>
Inconsistent Sequence Number-LCAS<VCAT Group>
Signal Degrade<VCAT Group>
Tx Partial Loss of Capacity - LCAS<VCAT Group>
Signal Degrade<Ethernet port>
Card related alarms
Temperature too high<Card>
System Reboot<Card>
Bad checksum on configuration file<Card>
Bad log file<Card>
Card missing or removed<Card>
Hardware Failure<Card>
Program Fault, Software Failure<Card>
EEPROM Failure<Card>

TJ100CPr4
Appendix B 201

Table 17-1 (continued)


List of Alarms
Name
Card jacked out<Shelf>
System clock in holdover mode<Shelf>
Derived Voltage Underload<Power supply Card>
Input Voltage Overload on PSU Card< Power supply Card >
Input Voltage Underload on PSU Card< Power supply Card >
Switched off/No Input Voltage< Power supply Card>
Onboard voltage generation lower threshold crossed<Card>
Onboard voltage generation upper threshold crossed<Card>
Input Voltage Overload on PSU Card <Card Voltage Monitor>
Input Voltage Underload on PSU Card<Card Voltage Monitor>
File system almost full <Card>
Software Downloading<Card>
SW version mismatch<Card>
Config out of sync<Card>
Redundant pair communication failure<Card>
Bus Error<Card>
Config Downloading<Card>
Software Committing<Card>
Software Download Failed<Card>
Memory Usage exceeded threshold<Card>
Inter Card Communication failure<Card>
Configuration File Not Found<Card>
Uploading Config<Card>
Timing Generation Entry to FreeRun<Shelf>
Timing Synchronization Related Alarms
System clock in holdover mode
System clock in internal mode
system primary timing reference failed
system secondary timing reference failed

User Interface Guide Version 1.0


202 Appendix B

Table 17-1 (continued)


List of Alarms
Name
Timing reference failed
Secondary reference out of range <Synchronization>
Primary reference clock PPM out of range
Start of Unavailability Period<Port>
End of Unavailability Period<Port>
Start of Unavailability Period<Channel>
End of Unavailability Period<Channel>
TU Sequence Indicator Mismatch<Connection>
Loss of Multiframe Alignment Signal<Connection>
Loss of Capacity<Connection>
LAN Port Down<Network Interface>
DCN Failure<Network Interface>
Transmitted Power lower threshold crossed<Port>
Transmitted Power upper threshold crossed<Port>
Laser Bias voltage lower threshold crossed<Port>
Laser Bias voltage upper threshold crossed<Port>
Received Power lower threshold crossed<Port>
Received Power upper threshold crossed<Port>
Laser temperature high threshold crossed<Port>
Laser temperature low threshold crossed<Port>
Laser supply voltage high threshold crossed<Port>
Laser supply voltage low threshold crossed<Port>
Amplifier Loss of Input Power
Amplifier Output Failure
Pump bias current reached maximum value
Pump temperature out of range
Amplifier Output Failure
Pump bias current reached maximum value
Pump temperature out of range

TJ100CPr4
Appendix B 203

Table 17-1 (continued)


List of Alarms
Name
Circuit Related Alarms
Traffic on circuit is down<Circuit>
Provisioning in progress<Circuit>
Unprovisioning in progress<Circuit>
Traffic on circuit is degraded<Circuit>

User Interface Guide Version 1.0


204 Appendix B

TJ100CPr4
18
Appendix C 1-

This chapter describes the procedure for installing and configuring


the 3com server. The 3com server is needed for upgrading or
downgrading the software version on the network element.

Note : The procedures and the screenshots in this appendix are for Version 1.1.007 of
the 3Com server.
18.1 Installing 3Com server
The following are the steps to install the 3Com server.

Step Action

1 Download a suitable server from the following location:


http://support.3com.com/software/utilities_for_windows_3
2_bit.htm
The downloaded file is in .zip format.
2 Extract the file.

User Interface Guide Version 1.0


206 Appendix C

3 Click the SETUP application file to install the server. The


installation wizard is displayed.

4 Click Next in the Welcome dialog box. The Software


License Agreement is displayed.

TJ100CPr4
Appendix C 207

5 Click Yes. The Choose Destination Location dialog box is


displayed.

6 Click Browse to change the default location of the installation


files.

User Interface Guide Version 1.0


208 Appendix C

Click Next to proceed with the installation. The Select


Program Folder dialog box is displayed.

7 Click Next. The Setup Complete dialog box is displayed.

8 Click Finish. The 3Com server is installed in your system.

TJ100CPr4
Appendix C 209

18.2 Configuring user in the 3Com server


The following are the steps to configure users on the 3Com server.

Step Action

1 From the Program menu, click 3CServer. The 3CServer


application window is opened.

Note : To upload or download software, the FTP server should be turned ON. The
ON/OFF status of the FTP server is indicated in the status bar. To turn
ON/OFF the FTP server, click the FTP icon .

User Interface Guide Version 1.0


210 Appendix C

2 Click the SETUP icon . The 3CServer Configuration


dialog box is displayed.

3 Click the FTP Configuration tab.


4 Click Browse to define the location for downloading and
uploading files.

TJ100CPr4
Appendix C 211

5 Click Edit User Profile/Security List. The User List dialog


box is displayed.

6 Enter the name of the user in the User Name text box.

User Interface Guide Version 1.0


212 Appendix C

7 Click Add User. The User Information dialog box is


displayed.

8 Enter password in the User Password text box.


9 Re-enter the password in Repeat: password to verify(6-8
chars) text box and select a location for the user to
upload/download files.
10 Select the operations the user can perform from the “This user
can” section.
11 Click OK. The User List dialog box is displayed.
12 Click Done.
13 Repeat steps 3 - 11 to add more users.

TJ100CPr4
213

Index 1-

A E
advertise route 150 E1 performance
Alarm area 14 interval Valid 198, 199
SES 198, 199
UAS 198, 199
C Environmental Alarm Input 55, 88–89
Connections (SNCP) 39, 43
cross connections F
1WAY 72
2WAY 72 Facilities 55, 92–134
numbering scheme 72 E1/DS1/E3/DS3 ports 113–119
protected 72 Ethernet ports 119
unprotected 72 EFM 252–253
Cross-connect 55 STM ports 92–111
VCG 119, 125–134
cross-connections 72–79 LCAS 130–132
Faults 167–173
D Active alarms 167–168
DCN 55, 138–156 Alarm filters 170–171
Alarm severity 173–174
ECC 143–144
Critical 173, 174
Management channel 144–145
Deferred 173, 174
Network interface 139–141
Major 173, 174
OSPF 146–148
Minor 173, 174
Proxy ARP 151–154
Warning 173, 174
Serial port 154–156
Event history 172–173
PPP 154
Suppressed alarms 169
Terminal Server 154
UDC 154
Static route 148–151 I
destination address 150 Input/Output area 14
Inventory 31–35

User Interface Guide Version 1.0


214 Index

M Trunks 137–138
next hop 150
Maintenance 211–236
Backup configuration 232
NMS 10
Cold reboot 212 Node Configuration 15
Cold restart 217
Diagnostics 223
OSPF diagnostics 224
O
Area 224 offset 27
AS externals 229 Other Time Zone 24–27
Database 225 Overhead Tunnel 55, 80–82
Interfaces 225
LSA Expansion 228
Neighbors 226 P
Opaque-LSA 230 Performance
Routing Table 230 Path 192
Statistics 227 Tributary unit 194
System diagnostics 223, 231
Loopbacks 219–223
performance
Facility loopback 219–221 multiplex section
Terminal loopback 219–221 BBE 189
Restart Options 217 BBE-FE 190
Restore configuration 232 BBER 189
Restore factory defaults 236 EB 189, 190, 193
software downgrade 219 ES 189, 190
System settings 211–212 ES-FE 190, 191
Upgrade software 217 ESR 189
Warm reboot 212 far end Interval valid 191
Warm restart 217 interval Valid 190
SES 189, 190
Maintenance Operations 211
SES-FE 190, 191
multiplex section SESR 189
SES 189, 190 UAS 189, 190
UAS-FE 190, 191
N path 193
BBE 192
Navigation Menu 14 BBE-FE 193
Network Adjacency 135–137 EB 192
Auto-discovery 135 ES 192, 193
Neighbour information 135–137 ES-FE 192, 193
Trunks 136–137 ESR 192
network interface 150 far end interval valid 193
Network Adjacency interval Valid 192, 193
NPJE 192, 193

TJ100CPr4
Index 215

PPJE 192, 193 STM port profiles 175–177


SES 192, 193
SES-FE 192, 193
SESR 192 R
UAS 192, 193 regenerator section
UAS-FE 193 BBE 188
tributary unit BBER 188
BBE 195 EB 188
BBE-FE 195 ES 188, 189
BBER 195 ESR 188
EB 195 interval valid 188, 189
ES 194 SES 188, 189
ES-FE 195 SESR 188, 189
ESR 195 UAS 188
Far End Interval Valid 195
interval Valid 195
SES 194 S
SES-FE 195 Security 206
SESR 195 User access group 205
UAS 194 Administrator 205
UAS-FE 195 Operator 205
Performance Monitoring 185–186 Operator2 205
Ethernet 201 User 205
PDH performance 197 User account 206–210
DS1 path performance 199 SFP 34
DS3 path performance 200 shelf 36
E1 path performance 198
Signal degradation 39
E1/DS1 Line performance 198
E3 path performance 199 Signal failure 39
E3/DS3 Line performance 199 SNCP 43–46
STM performance statistics 187 SNMP Traps 55, 89–91
Line performance 190 Synchronization 55, 158–166
Path performance 192, 193 Timing reference 162–166
Regenerator section 188
Section performance 189
Transceiver 195 T
Tributary unit 194 Technical Assistance Center 7
STM performance statistics Multiplex
section 189 Terminal Server 6
VCG 203 Time 23–29
Pluggable modules 34 time zone 24–26
Profiles 175–183 Timing Manager 39
Path Alarm Profiles 175, 179–183 Title area 13

User Interface Guide Version 1.0


216 Index

Trib Protection 6

U
UPSR 43–46

W
WUI 9–14

TJ100CPr4