260
iManager U2000 Unified Network Management System V100R002C00 Product Description Issue 03 Date 2010-11-02 HUAWEI TECHNOLOGIES CO., LTD.

IManager U2000 Product Description V100R002C00 03

Embed Size (px)

DESCRIPTION

hw imanager

Citation preview

Page 1: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System V100R002C00

Product Description

Issue 03

Date 2010-11-02

HUAWEI TECHNOLOGIES CO., LTD.

Page 2: IManager U2000 Product Description V100R002C00 03
Page 3: IManager U2000 Product Description V100R002C00 03

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd. i

Copyright © Huawei Technologies Co., Ltd. 2010. All rights reserved.

No part of this document may be reproduced or transmitted in any form or by any means without prior

written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions

and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.

All other trademarks and trade names mentioned in this document are the property of their respective

holders.

Notice

The purchased products, services and features are stipulated by the contract made between Huawei and

the customer. All or part of the products, services and features described in this document may not be

within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,

information, and recommendations in this document are provided "AS IS" without warranties, guarantees or

representations of any kind, either express or implied.

The information in this document is subject to change without notice. Every effort has been made in the

preparation of this document to ensure accuracy of the contents, but all statements, information, and

recommendations in this document do not constitute the warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.

Address: Huawei Industrial Base

Bantian, Longgang

Shenzhen 518129

People's Republic of China

Website: http://www.huawei.com

Email: [email protected]

Page 4: IManager U2000 Product Description V100R002C00 03
Page 5: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description About This Document

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

iii

About This Document

Related Version

The following table lists the product version related to this document.

Product Name Version

iManager U2000 V100R002C00

Intended Audience

The iManager U2000 Product Description describes the position, functional characteristics,

system architecture and networking mode of the U2000, appended with standards that the

U2000 complies with, and performance indexes.

This document provides guides for getting the features and functions of the U2000.

This document is intended for:

Network Planning Engineer

Data Configuration Engineer

System Maintenance Engineer

Symbol Conventions

The symbols that may be found in this document are defined as follows.

Symbol Description

Indicates a hazard with a high level of risk, which if not

avoided, will result in death or serious injury.

Indicates a hazard with a medium or low level of risk,

which if not avoided, could result in minor or moderate

injury.

Page 6: IManager U2000 Product Description V100R002C00 03

About This Document

iManager U2000 Unified Network Management System

Product Description

iv Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Symbol Description

Indicates a potentially hazardous situation, which if not

avoided, could result in equipment damage, data loss,

performance degradation, or unexpected results.

Indicates a tip that may help you solve a problem or save

time.

Provides additional information to emphasize or

supplement important points of the main text.

Command Conventions

The command conventions that may be found in this document are defined as follows.

Convention Description

Boldface The keywords of a command line are in boldface.

Italic Command arguments are in italics.

[ ] Items (keywords or arguments) in brackets [ ] are optional.

{ x | y | ... } Optional items are grouped in braces and separated by

vertical bars. One item is selected.

[ x | y | ... ] Optional items are grouped in brackets and separated by

vertical bars. One item is selected or no item is selected.

{ x | y | ... }* Optional items are grouped in braces and separated by

vertical bars. A minimum of one item or a maximum of all

items can be selected.

[ x | y | ... ]* Optional items are grouped in brackets and separated by

vertical bars. Several items or no item can be selected.

GUI Conventions

The GUI conventions that may be found in this document are defined as follows.

Convention Description

Boldface Buttons, menus, parameters, tabs, window, and dialog titles

are in boldface. For example, click OK.

> Multi-level menus are in boldface and separated by the ">"

signs. For example, choose File > Create > Folder.

Page 7: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description About This Document

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

v

Change History

Updates between document issues are cumulative. Therefore, the latest document issue

contains all updates made in previous issues.

Changes in Issue 03 (2010-11-02)

The second commercial release has the following updates:

The Management capabilities of the U2000 on different hardware platforms table is

updated.

Changes in Issue 02 (2010-04-15)

The initial commercial release has the following changes:

NMS Basic Functions

Descriptions of NMS basic functions are updated.

Management Capability

Descriptions of management capability are updated.

Changes in Issue 01 (2009-12-28)

Initial field trial release.

Page 8: IManager U2000 Product Description V100R002C00 03
Page 9: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description Contents

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

vii

Contents

About This Document ................................................................................................................... iii

1 Overview ...................................................................................................................................... 1-1

1.1 Network Position ........................................................................................................................................... 1-1

1.1.1 Development Trend of Network Management ..................................................................................... 1-2

1.1.2 Product Orientation .............................................................................................................................. 1-2

1.2 Product Characteristics .................................................................................................................................. 1-3

1.3 Manageable Equipment ................................................................................................................................. 1-5

2 Networking and Application ................................................................................................... 2-1

2.1 U2000 Deployment Mode ............................................................................................................................. 2-1

2.1.1 Centralized Deployment of the Single-Server System ......................................................................... 2-2

2.1.2 Distributed Deployment ....................................................................................................................... 2-2

2.1.3 Centralized Deployment of an HA System .......................................................................................... 2-3

2.1.4 Distributed Deployment of an HA System ........................................................................................... 2-4

2.2 Networking Scheme Introduction ................................................................................................................. 2-5

2.2.1 Inband Networking Mode .................................................................................................................... 2-5

2.2.2 Outband Networking Mode.................................................................................................................. 2-6

2.3 Application Scenario of the U2000 Management.......................................................................................... 2-7

2.3.1 Integrated NMS for Unified Network Equipment Management .......................................................... 2-8

2.3.2 Broadband Bearer Network.................................................................................................................. 2-9

2.3.3 Mobile Bearer Network ..................................................................................................................... 2-10

2.3.4 IP Core Network ................................................................................................................................ 2-12

2.3.5 Access Network ................................................................................................................................. 2-14

3 System Architecture ................................................................................................................... 3-1

3.1 Software Structure ......................................................................................................................................... 3-1

3.1.1 Software Structure of the U2000 Single-Server System ...................................................................... 3-1

3.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby) ................................................... 3-2

3.2 External Interfaces ........................................................................................................................................ 3-4

3.2.1 NBI....................................................................................................................................................... 3-5

3.2.2 SBI ....................................................................................................................................................... 3-9

4 NMS Basic Functions ................................................................................................................ 4-1

4.1 Security Management .................................................................................................................................... 4-3

Page 10: IManager U2000 Product Description V100R002C00 03

Contents

iManager U2000 Unified Network Management

System

Product Description

viii Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

4.2 Topology Management .................................................................................................................................. 4-5

4.3 Alarm Management ....................................................................................................................................... 4-7

4.4 Performance Management ........................................................................................................................... 4-15

4.5 Inventory Management ............................................................................................................................... 4-18

4.6 Log Management ........................................................................................................................................ 4-19

4.7 Database Management ................................................................................................................................ 4-21

4.8 NE Communication Parameter Management .............................................................................................. 4-22

4.9 DCN Management ...................................................................................................................................... 4-23

4.10 NE Software Management ........................................................................................................................ 4-23

4.11 Report Management .................................................................................................................................. 4-25

4.12 System Monitoring .................................................................................................................................... 4-27

5 MSTP Network Feature Management ................................................................................... 5-1

5.1 MSTP NE Management ................................................................................................................................ 5-2

5.2 MSTP Protection Subnet Management ......................................................................................................... 5-9

5.3 End-to-End MSTP Management ................................................................................................................. 5-10

5.4 End-to-End MSTP IP Management ............................................................................................................. 5-14

5.5 SDH ASON Management ........................................................................................................................... 5-15

6 WDM Network Feature Management.................................................................................... 6-1

6.1 WDM NE Management................................................................................................................................. 6-2

6.2 NA WDM NE Management ........................................................................................................................ 6-11

6.3 WDM Protection Subnet Management ....................................................................................................... 6-20

6.4 End-to-End WDM Management ................................................................................................................. 6-20

6.5 WDM ASON Management ......................................................................................................................... 6-23

7 RTN Network Feature Management ...................................................................................... 7-1

7.1 RTN NE Management ................................................................................................................................... 7-1

7.2 RTN Protection Subnet Management .......................................................................................................... 7-10

7.3 End-to-End RTN Management .................................................................................................................... 7-10

7.4 End-to-End RTN IP Management ............................................................................................................... 7-12

8 PTN Network Feature Management ...................................................................................... 8-1

8.1 PTN NE Management ................................................................................................................................... 8-1

8.2 End-to-End PTN Management .................................................................................................................... 8-18

9 Router Networks and Switch Networks Feature Management ........................................ 9-1

9.1 Router NE Management ................................................................................................................................ 9-2

9.2 Switch NE Management ................................................................................................................................ 9-6

9.3 Template Management .................................................................................................................................. 9-9

9.4 Diagnosis Management ............................................................................................................................... 9-11

9.5 Cluster Management ................................................................................................................................... 9-12

9.6 Node Redounded Management ................................................................................................................... 9-14

9.7 Report Subsystem Management .................................................................................................................. 9-14

9.8 VPN Service Management .......................................................................................................................... 9-14

Page 11: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description Contents

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

ix

9.9 Tunnel Service Management ....................................................................................................................... 9-16

10 Security Device Network Feature Management .............................................................. 10-1

10.1 NE Management of Security Devices ....................................................................................................... 10-1

10.2 Single-Point Web Configuration of Security Devices ............................................................................... 10-2

10.3 Centralized Security Policy Configuration ................................................................................................ 10-3

10.3.1 Policy Package Management ........................................................................................................... 10-4

10.3.2 Security Policy Configuration .......................................................................................................... 10-5

10.3.3 Attack Defense Configuration .......................................................................................................... 10-5

10.3.4 Policy Resource Configuration ........................................................................................................ 10-6

10.3.5 Mapping Service .............................................................................................................................. 10-6

10.4 Report Subsystem Management ................................................................................................................ 10-6

10.5 VPN Service Management ........................................................................................................................ 10-7

10.5.1 IPSec End-to-End Service ................................................................................................................ 10-7

10.5.2 Remote Access Service .................................................................................................................... 10-7

11 FTTx Network Feature Management ................................................................................. 11-1

11.1 OLT Management ...................................................................................................................................... 11-1

11.2 ONU Management .................................................................................................................................... 11-3

12 MSAN Network Feature Management .............................................................................. 12-1

12.1 MSAN Management ................................................................................................................................. 12-1

13 DSLAM Network Feature Management ............................................................................ 13-1

13.1 DSLAM Management ............................................................................................................................... 13-1

14 ONT Management ................................................................................................................. 14-1

15 Reliability ................................................................................................................................ 15-1

15.1 Reliability Indicator................................................................................................................................... 15-1

15.2 HA System ................................................................................................................................................ 15-2

15.3 DCN Protection ......................................................................................................................................... 15-3

15.4 Disk Mirroring .......................................................................................................................................... 15-3

15.5 Data Backup .............................................................................................................................................. 15-3

16 Performance Indicators ......................................................................................................... 16-1

17 Management Capability ....................................................................................................... 17-1

17.1 Management Capability ............................................................................................................................ 17-1

17.2 Manageable MSTP Series Equipment ..................................................................................................... 17-12

17.3 Manageable WDM Series Equipment ..................................................................................................... 17-14

17.4 Manageable NA WDM Series Equipment............................................................................................... 17-15

17.5 Manageable Marine Series Equipment .................................................................................................... 17-16

17.6 Manageable RTN Series Equipment ....................................................................................................... 17-16

17.7 Manageable PTN Series Equipment ........................................................................................................ 17-17

17.8 Manageable FTTx Series Equipment ...................................................................................................... 17-18

17.9 Manageable MSAN Series Equipment .................................................................................................... 17-19

Page 12: IManager U2000 Product Description V100R002C00 03

Contents

iManager U2000 Unified Network Management

System

Product Description

x Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

17.10 Manageable DSLAM Series Equipment ............................................................................................... 17-19

17.11 Manageable Router Series Equipment .................................................................................................. 17-20

17.12 Manageable Switch Series Equipment .................................................................................................. 17-21

17.13 Manageable Metro Service Platform Equipment .................................................................................. 17-22

17.14 Manageable Broadband Access Series Equipment ................................................................................ 17-22

17.15 Manageable VoIP Gateway Equipment ................................................................................................. 17-23

17.16 Manageable WLAN Series equipment .................................................................................................. 17-23

17.17 Manageable Firewall Series Equipment ................................................................................................ 17-23

17.18 Manageable Service Inspection Gateway Equipment ........................................................................... 17-26

17.19 Manageable SVN Series Equipment ..................................................................................................... 17-27

18 Standards Compliance .......................................................................................................... 18-1

A Glossary .................................................................................................................................... A-1

B Acronyms and Abbreviations ................................................................................................ B-1

Page 13: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description Figures

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

xi

Figures

Figure 1-1 Network position of the U2000 ........................................................................................................ 1-3

Figure 1-2 Centralized network management..................................................................................................... 1-4

Figure 2-1 Single-server mode ........................................................................................................................... 2-2

Figure 2-2 Distributed deployment mode ........................................................................................................... 2-3

Figure 2-3 Centralized deployment of an HA system......................................................................................... 2-4

Figure 2-4 Distributed deployment of an HA system ......................................................................................... 2-5

Figure 2-5 Inband networking diagram .............................................................................................................. 2-6

Figure 2-6 Outband networking mode ................................................................................................................ 2-7

Figure 2-7 Integrated NMS for unified network equipment management.......................................................... 2-8

Figure 2-8 Network management solution for a broadband bearer network ...................................................... 2-9

Figure 2-9 Network management solution for a mobile bearer network .......................................................... 2-11

Figure 2-10 Network management solution for an IP core network ................................................................. 2-13

Figure 2-11 Networking application of the U2000 in the access network ........................................................ 2-15

Figure 3-1 U2000 software structure .................................................................................................................. 3-2

Figure 3-2 Software structure - Solaris HA system (Veritas hot standby) .......................................................... 3-3

Figure 3-3 Software structure - SUSE Linux HA system (Veritas hot standby) ................................................. 3-3

Figure 3-4 Software structure - Windows HA system (Veritas hot standby) ...................................................... 3-4

Figure 3-5 Function and Feature ........................................................................................................................ 3-5

Figure 4-1 Overview of some of the U2000 applications ................................................................................... 4-1

Figure 4-2 Mechanism for implementing security management ........................................................................ 4-3

Figure 4-3 Topology view and its functions ....................................................................................................... 4-5

Figure 4-4 Alarm display in the topology view .................................................................................................. 4-6

Figure 4-5 Illustration of automatic topology discovery .................................................................................... 4-7

Figure 4-6 Alarm Browsing ................................................................................................................................ 4-9

Figure 4-7 Various alarm notification means .................................................................................................... 4-13

Figure 4-8 Alarm jumping ................................................................................................................................ 4-14

Page 14: IManager U2000 Product Description V100R002C00 03

Figures

iManager U2000 Unified Network Management

System

Product Description

xii Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Figure 4-9 Performance Management Process ................................................................................................. 4-15

Figure 4-10 Inventory management window and its functions ........................................................................ 4-18

Figure 4-11 Log management window and its functions .................................................................................. 4-19

Figure 4-12 Function and Feature .................................................................................................................... 4-24

Figure 4-13 Diagram of the NE resource report ............................................................................................... 4-26

Figure 4-14 Diagram of the network resource report ....................................................................................... 4-27

Figure 8-1 Unicast MPLS tunnel ...................................................................................................................... 8-10

Figure 8-2 CES service application model ....................................................................................................... 8-12

Figure 8-3 ATM service application model ...................................................................................................... 8-13

Figure 8-4 E-Line Service ................................................................................................................................ 8-14

Figure 8-5 E-Aggr service scenario 1 ............................................................................................................... 8-15

Figure 8-6 E-Aggr service scenario 2 ............................................................................................................... 8-15

Figure 8-7 E-LAN service ................................................................................................................................ 8-16

Figure 9-1 Cluster topology.............................................................................................................................. 9-13

Figure 9-2 Navigation path to cluster functions ............................................................................................... 9-13

Page 15: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description Tables

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

xiii

Tables

Table 4-1 Description of alarm functions ........................................................................................................... 4-9

Table 4-2 Monitoring template type ................................................................................................................. 4-16

Table 8-1 Types of PTN service interfaces ......................................................................................................... 8-3

Table 15-1 Reliability indicators of the U2000 ................................................................................................. 15-2

Table 15-2 Data backup .................................................................................................................................... 15-4

Table 16-1 Performance indicators ................................................................................................................... 16-1

Table 16-2 DCN bandwidth requirements ........................................................................................................ 16-2

Table 17-1 Management capabilities of the U2000 on different hardware platforms ....................................... 17-3

Table 17-2 Management capabilities of the U2000 on different OptiX NE equivalents .................................. 17-7

Table 17-3 Management capabilities of the U2000 on different IP NE equivalents ......................................... 17-9

Table 17-4 Management capabilities of the U2000 on different access NE equivalents ................................ 17-12

Table 17-5 Manageable MSTP series equipment ............................................................................................ 17-13

Table 17-6 Manageable WDM equipment ...................................................................................................... 17-14

Table 17-7 Manageable NA WDM series equipment ..................................................................................... 17-16

Table 17-8 Manageable marine series equipment ........................................................................................... 17-16

Table 17-9 Manageable RTN equipment ........................................................................................................ 17-17

Table 17-10 Manageable PTN series equipment ............................................................................................ 17-17

Table 17-11 Manageable FTTx series equipment ........................................................................................... 17-18

Table 17-12 Manageable MSAN series equipment ........................................................................................ 17-19

Table 17-13 Manageable DSLAM series equipment ...................................................................................... 17-19

Table 17-14 Manageable router series equipment .......................................................................................... 17-20

Table 17-15 Manageable switch series equipment ......................................................................................... 17-21

Table 17-16 Manageable Metro service platform equipment ......................................................................... 17-22

Table 17-17 Manageable broadband access series equipment ........................................................................ 17-22

Table 17-18 Manageable VoIP gateway equipment ........................................................................................ 17-23

Table 17-19 Manageable WLAN series equipment ........................................................................................ 17-23

Page 16: IManager U2000 Product Description V100R002C00 03

Tables

iManager U2000 Unified Network Management

System

Product Description

xiv Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Table 17-20 Manageable firewall series equipment ....................................................................................... 17-23

Table 17-21 Manageable service inspection gateway equipment ................................................................... 17-26

Table 17-22 Manageable SVN series equipment ............................................................................................ 17-27

Table 18-1 Details of the Standards and Protocols ........................................................................................... 18-2

Page 17: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 1 Overview

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

1-1

1 Overview

About This Chapter

This topic describes the position of the U2000 in the telecommunication management network

(TMN) hierarchy, the product characteristics, and the equipment that the U2000 can manage.

1.1 Network Position

Introduce the development trend of network management and the network position of the

U2000.

1.2 Product Characteristics

After software optimization, the U2000 improves the capability of managing integrated

networks, scalability, and ease of use. Therefore, the U2000 helps to construct a

customer-centered and future-oriented network management system of a new generation.

1.3 Manageable Equipment

Introduce the equipment that the U2000 V100R002C00 can manage.

1.1 Network Position

Introduce the development trend of network management and the network position of the

U2000.

1.1.1 Development Trend of Network Management

With the development of IT and IP technology and the convergence of telecommunications, IT,

media, and electronic industries, the telecommunications industry has witnessed tremendous

growth. The broadband services and mobile services have become the mainstream services in

telecommunications networks.

1.1.2 Product Orientation

The U2000 is the major and future-oriented network management product and solution in

Huawei.

Page 18: IManager U2000 Product Description V100R002C00 03

1 Overview

iManager U2000 Unified Network Management System

Product Description

1-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

1.1.1 Development Trend of Network Management

With the development of IT and IP technology and the convergence of telecommunications, IT,

media, and electronic industries, the telecommunications industry has witnessed tremendous

growth. The broadband services and mobile services have become the mainstream services in

telecommunications networks.

All-IP architecture and fixed-mobile convergence (FMC) are the network development goals

for the next three to five years, during which the market orientations and business modes of

telecom carriers will vary accordingly. The development of all-IP architecture is the leading

factor in the transition from the existing vertical network that is divided by technology and

service to the flattened horizontal network. Improving user experience, lowering operation

expenditure (OPEX), and improving efficiency are the driving forces for FMC.

Network convergence requires network management to be consolidated. To be oriented to the

future network trend, the iManager U2000 that is the integrated network management system

(NMS) combines all-IP and FMC, and manages carrier equipment and access equipment in a

centralized manner. The U2000 can perform not only integrated management of multi-domain

equipment but also integrated management at the network element (NE) and network layers.

The U2000 has revolutionized the layer-based management mode to meet the management

requirements in the transition from the existing vertical network to the flattened horizontal

network.

The integrated NMS U2000 aims to minimize operation and maintenance (O&M) costs for

customers and to bring more network value. The U2000 is based on the design of distributed

software architecture, and supports the new generation advanced telecom computing

architecture (ATCA) hardware platform. In addition, the super network management

capability and modular software architecture of the U2000 that shapes the development trend

in the future network management make the U2000 a leading all-IP and FMC management

solution.

1.1.2 Product Orientation

The U2000 is the major and future-oriented network management product and solution in

Huawei.

The U2000 is an integrated management platform for all equipment in the Huawei. It can

manage transport equipment, access equipment, and IP equipment (including routers, security

equipment, and Metro Ethernet equipment) in a centralized manner. The U2000 is designed as

the management system for Huawei equipment. With powerful management functions at the

NE and network layers, the U2000 is the major and future-oriented network management

product and solution in Huawei.

In the TMN hierarchy, the U2000 is located between the element management layer and

network management layer, and supports all functions of the NE and network layers. Figure

1-1 shows the network position of the U2000.

Page 19: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 1 Overview

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

1-3

Figure 1-1 Network position of the U2000

Access network

MSAN/FTTX

IP network

Router/Switch/

BRAS/PTN

iManager U2000

XML/CORBA/SNMP/FTP

Transport network

SDH/WDM/

OTN/MW

OSS

Service

management layer

Network

management layer

Element

management layer

Network

element layer

+

1.2 Product Characteristics

After software optimization, the U2000 improves the capability of managing integrated

networks, scalability, and ease of use. Therefore, the U2000 helps to construct a

customer-centered and future-oriented network management system of a new generation.

Centralized Network Management

The U2000 can manage transport equipment, access equipment, and IP equipment in a

centralized manner. Figure 1-2 shows the equipment that the U2000 manages. The main

characteristics of the U2000 are as follows:

Manages multiple equipment and the services related to the equipment in Huawei. For

details, see 1.3 Manageable Equipment.

Manages end-to-end services across domains in access and bearer networks. The services

include synchronous digital hierarchy (SDH, WDM, microwave, and packet services).

Page 20: IManager U2000 Product Description V100R002C00 03

1 Overview

iManager U2000 Unified Network Management System

Product Description

1-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Figure 1-2 Centralized network management

Home/Business

VDSL2

ONT

UPEMSTP

EPE

EPE

OLT

AG

IP MSAN

EPE

VPLS/MPLS

VC12/VC4

BRAS

MSE

MSE

BRAS

NPE

NPE

WDM

IMS

Core

IPTV

Internet/

SP

WDM

IP/MPLS

BackboneSR/BRASMetro NetworkAccess

Node

MSTP

MSTPMSTP

MSTP

U2000

Multiple Operating Systems

The U2000 is a stand-alone application that can be installed on different operating systems

and databases. Hence, multiple operating systems are compatible.

The U2000 is developed based on Huawei's integrated management application platform

(iMAP). It supports Sun workstations, PC servers, Sybase databases, Oracle databases, SQL

Server databases, and Solaris, Windows, and SuSE Linux operating systems. It provides

high-end solutions to large-scale networks and low-cost solutions to small and medium-scale

networks.

Modular Architecture

The U2000 uses a modular design to increase system flexibility.

By adopting the mature and widely-used C/S (Client/Server) architecture, the U2000

supports distributed and hierarchical database system, service processing system, and

foreground application system, and supports concurrent operations of multiple clients, to

meet the management requirements of complex and large-scale networks.

Page 21: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 1 Overview

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

1-5

The U2000 uses an object-oriented, multiprocessing, modular, and componentized

architecture design. Hence, the degree of coupling of NE management components

decreases. In addition, different application processes are integrated into the system by

means of registry files. In this way, the U2000 has flexible expansion capabilities.

Stand-alone and distributed deployment of the U2000 increases the management

capability to a great extent.

The modular architecture of the U2000 meets the management requirements of products

in a single domain and the integrated management requirements of products across

domains.

1.3 Manageable Equipment

Introduce the equipment that the U2000 V100R002C00 can manage.

The equipment that the U2000 V100R002C00 can manage is listed as follows:

Manageable MSTP series equipment

Manageable WDM series equipment

Manageable NA WDM series equipment

Manageable marine series equipment

Manageable RTN series equipment

Manageable PTN series equipment

Manageable FTTx series equipment

Manageable MSAN series equipment

Manageable DSLAM series equipment

Manageable router series equipment

Manageable switch series equipment

Manageable Metro service platform series equipment

Manageable broadband access series equipment

Manageable VoIP gateway series equipment

Manageable WLAN series series equipment

Manageable firewall series equipment

Manageable service inspection gateway series equipment

Manageable SVN series equipment

Page 22: IManager U2000 Product Description V100R002C00 03
Page 23: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 2 Networking and Application

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

2-1

2 Networking and Application

About This Chapter

The U2000 provides a centralized networkwide management solution to transport, IP, and

access networks. In addition, the U2000 provides standard external interfaces to integrate with

the operation support system (OSS), to meet the management requirements of large-scale

transport networks.

2.1 U2000 Deployment Mode

The U2000 supports the centralized and distributed deployment modes of servers.

2.2 Networking Scheme Introduction

The U2000 adopts the widely used C/S (Client/Server) model. In such a model, the client and

the server communicate through the LAN or wide area network (WAN). The U2000 server

communicates with its managed devices in inband or outband networking mode.

2.3 Application Scenario of the U2000 Management

This topic describes the typical application scenario of U2000 management.

2.1 U2000 Deployment Mode

The U2000 supports the centralized and distributed deployment modes of servers.

The U2000 uses the Client/Server architecture. Depends on the sizes of managed networks,

the U2000 supports the centralized and distributed deployment modes of servers.

To ensure the high availability of the system, the U2000 supports the HA system (Veritas hot

standby). The HA system (Veritas hot standby) can also be configured in the distributed mode.

The U2000 system contains management components for manageable equipment. The

components support multiple instances in the distributed mode.

2.1.1 Centralized Deployment of the Single-Server System

The U2000 supports centralized deployment of the single-server system on Windows, Solaris

or SUSE Linux OS, that is, there is only one U2000 server on which all management

components are installed and all processes run.

2.1.2 Distributed Deployment

Page 24: IManager U2000 Product Description V100R002C00 03

2 Networking and Application

iManager U2000 Unified Network Management System

Product Description

2-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The U2000 supports distributed deployment of the single-server system on SUSE Linux OS.

Slave servers can share the CPU usage and memory usage of the master server. In this manner,

the load is balanced.

2.1.3 Centralized Deployment of an HA System

The U2000 HA system (Veritas hot standby) supports the centralized deployment mode where

there is only one server on either the primary site or the secondary site.

2.1.4 Distributed Deployment of an HA System

The U2000 HA system (Veritas hot standby) on SUSE Linux OS supports the distributed

deployment mode where both the primary and secondary sites use distributed systems.

2.1.1 Centralized Deployment of the Single-Server System

The U2000 supports centralized deployment of the single-server system on Windows, Solaris

or SUSE Linux OS, that is, there is only one U2000 server on which all management

components are installed and all processes run.

The U2000 supports a networking scheme of a single server and multiple clients. In the

centralized deployment mode of the single-server system, there is only one U2000 server on

which all management components are installed and all processes run. See Figure 2-1.

Figure 2-1 Single-server mode

This type of networking is applicable to medium and small-scale networks.

2.1.2 Distributed Deployment

The U2000 supports distributed deployment of the single-server system on SUSE Linux OS.

Slave servers can share the CPU usage and memory usage of the master server. In this manner,

the load is balanced.

The U2000 supports a networking scheme of multiple servers and clients, as shown in Figure

2-2.

Page 25: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 2 Networking and Application

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

2-3

Figure 2-2 Distributed deployment mode

The management components for manageable equipment can be deployed on different servers

or on the same server.

Distributed system consists of the master server and slave server, which compose a site to

perform the U2000 server function.

The master server is the core of a distributed system. The database server and the core

subsystems of the U2000 are running on the master server.

The non-core subsystems of the U2000 (such as the management components for manageable

equipment) are running on the slave server. In this way, the CPU usage and the memory usage

of the master server are lowered, the load is balanced between the master and slave servers

and the management capability of the U2000 is increased.

In the distributed deployment mode, you can deploy all servers in only the same LAN.

2.1.3 Centralized Deployment of an HA System

The U2000 HA system (Veritas hot standby) supports the centralized deployment mode where

there is only one server on either the primary site or the secondary site.

Page 26: IManager U2000 Product Description V100R002C00 03

2 Networking and Application

iManager U2000 Unified Network Management System

Product Description

2-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The primary and secondary sites comprise an HA system. The data in different locations is

backed up through a network. When a fault occurs in the primary site, the system switches to

the secondary site so that network monitoring continues. Figure 2-3 shows the networking

diagram.

Figure 2-3 Centralized deployment of an HA system

2.1.4 Distributed Deployment of an HA System

The U2000 HA system (Veritas hot standby) on SUSE Linux OS supports the distributed

deployment mode where both the primary and secondary sites use distributed systems.

The primary and secondary sites comprise an HA system. The data in different locations is

backed up through a network. When a fault occurs in the primary site, the system switches to

the secondary site so that network monitoring continues. In the primary or secondary site,

master and slave servers are deployed in a distributed mode. The slave servers can share the

CPU usage and memory usage of the master server. In this manner, the load is balanced

between the master and slave servers. Figure 2-4 shows the networking diagram.

Page 27: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 2 Networking and Application

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

2-5

Figure 2-4 Distributed deployment of an HA system

2.2 Networking Scheme Introduction

The U2000 adopts the widely used C/S (Client/Server) model. In such a model, the client and

the server communicate through the LAN or wide area network (WAN). The U2000 server

communicates with its managed devices in inband or outband networking mode.

2.2.1 Inband Networking Mode

In inband networking mode, the U2000 uses the service channels that are provided by the

managed devices to manage the devices on the network. The messages sent from the U2000

are transmitted through the service channels of the managed devices.

2.2.2 Outband Networking Mode

In outband networking mode, the U2000 uses the communication channels that are provided

by devices other than the managed devices to transmit messages for network management. In

normal cases, the management interface on the main processing unit or routing switch unit of

the managed device are used as the access interface.

2.2.1 Inband Networking Mode

In inband networking mode, the U2000 uses the service channels that are provided by the

managed devices to manage the devices on the network. The messages sent from the U2000

are transmitted through the service channels of the managed devices.

Figure 2-5 shows the inband networking diagram.

Page 28: IManager U2000 Product Description V100R002C00 03

2 Networking and Application

iManager U2000 Unified Network Management System

Product Description

2-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Figure 2-5 Inband networking diagram

Managed Network

NMS

Networking Description

The devices managed by the U2000 are all connected to the managed network. The U2000

needs to be connected to only the nearby NE on the managed network. After configuring the

related routes, you can manage all the devices on the network.

The way of connecting the U2000 with the managed network depends on the distance

between the U2000 and its nearby NE. If the U2000 and its nearby IP devices are in the same

equipment room, you can use the LAN mode. If the U2000 and its nearby IP devices are far

from each other, you can use the private line mode. The private line mode is similar to the

outband networking mode.

Networking Advantages: This networking mode is flexible and cost-effective. It does not

need extra devices.

Networking Disadvantages: In the case of network failure, the communication channel

between the U2000 and its managed network is interrupted. As a result, the U2000

cannot maintain the managed network.

2.2.2 Outband Networking Mode

In outband networking mode, the U2000 uses the communication channels that are provided

by devices other than the managed devices to transmit messages for network management. In

normal cases, the management interface on the main processing unit or routing switch unit of

the managed device are used as the access interface.

In this mode, the U2000 can be connected to the managed devices in multiple ways. The

U2000 manages the devices within its management scope through the data communication

network (DCN).Figure 2-6 shows the outband networking mode.

Page 29: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 2 Networking and Application

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

2-7

Figure 2-6 Outband networking mode

Managed Network

NMS

DCN

Networking description

The devices managed by the U2000 are all connected to the managed network. The U2000

connects with the devices on the managed network through the DCN that is made up of other

devices. In this manner, the U2000 implements its management on the managed network and

devices.

Networking advantages: In outband networking mode, the U2000 is connected to its

managed devices through other devices. It is not connected to its managed devices

directly. Compared with the inband networking mode, this mode provides more reliable

device management channels. When a fault occurs on a managed device, the U2000 can

locate information about the faulty device in a timely manner and monitor this device in

real time.

Networking disadvantages: In outband networking mode, the U2000 manages its

managed devices through a maintenance channel that is independent of the service

channel. To provide such a maintenance channel, you need to build a network that is

made up of extra devices. Thus, the cost of constructing the network is high.

2.3 Application Scenario of the U2000 Management

This topic describes the typical application scenario of U2000 management.

2.3.1 Integrated NMS for Unified Network Equipment Management

This topic describes the integrated NMS U2000, which is developed for the typical solution of

unified equipment management.

2.3.2 Broadband Bearer Network

Page 30: IManager U2000 Product Description V100R002C00 03

2 Networking and Application

iManager U2000 Unified Network Management System

Product Description

2-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The U2000 provides perfect solutions for broadband bearer networks in terms of network

deployment, service deployment, and service assurance.

2.3.3 Mobile Bearer Network

The U2000 provides perfect solutions for mobile bearer networks in terms of network

deployment, service deployment, and service assurance.

2.3.4 IP Core Network

The U2000 provides perfect solutions for IP core networks in terms of network deployment,

service deployment, and service assurance.

2.3.5 Access Network

In the networking application of the access network, the U2000 manages and maintains xPON

OLTs, ONUs, MSANs, DSLAMs and ONTs in a centralized manner.

2.3.1 Integrated NMS for Unified Network Equipment Management

This topic describes the integrated NMS U2000, which is developed for the typical solution of

unified equipment management.

Figure 2-7 Integrated NMS for unified network equipment management

iManager U2000

XML/CORBA/SNMP/FTP/TL1

Service management layer

Network management layer

+

NE management layer

NE layer

oss

Access networkAccess network

MSAN/FTTX

Transport network

SDH/WDM/OTN/MW

Datacom network

Router/Switch/BRAS

/PTN

The features of the U2000 are as follows:

The U2000 provides a unified platform for managing access equipment, transport

equipment, and datacom equipment, thus realizing integrated management on

cross-domain equipment. In addition, the U2000 breaks the restrictions of the vertical

management mode and realizes integrated management on the equipment at the network

layer and NE layer.

The U2000 meets the network integration trend and can provide management schemes

for multiple types of networking scenarios. With unified and consistent GUIs, simple and

convenient service deployment, and effective service monitoring and assurance, the

U2000 brings good user experience and greatly reduces network operation and

maintenance costs.

Page 31: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 2 Networking and Application

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

2-9

U2000Blessed by the good cooperation relationships between Huawei and many

mainstream OSS vendors, the U2000 can provide abundant NBIs and powerful NBI

customization support, protecting user investment to the largest extent.

2.3.2 Broadband Bearer Network

The U2000 provides perfect solutions for broadband bearer networks in terms of network

deployment, service deployment, and service assurance.

Networking Diagram

Figure 2-8 Network management solution for a broadband bearer network

Network Deployment

The U2000 meets the following requirements in the network deployment stage:

Supporting the remote disaster recovery solutions

When the active server fails, the standby server can take over as the active server to

avoid service interruption.

Providing the fast OSS integration capability through abundant NBIs such as SNMP, FTP,

CORBA, and XML NBIs and implementing end-to-end management by providing alarm,

inventory, and performance data for upper-layer OSSs.

Page 32: IManager U2000 Product Description V100R002C00 03

2 Networking and Application

iManager U2000 Unified Network Management System

Product Description

2-10 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Service Deployment

Carrying multiple services is one of the most distinctive features of the Metro Ethernet.

Services such as the high-speed internet (HSI) service, IPTV, and voice over IP (VoIP) must

be established on logical channels.

The U2000 allows you to quickly establish specific logical channels on physical networks.

For example, you can quickly establish end-to-end MPLS LSP, MPLS TE, PW, and VPLS

logical channels through GUIs. You can verify the validity of services before deployment and

modify services after the logical channels are established.

The Metro Ethernet often carries heavy service traffic. To adapt to this feature, the U2000

provides the batch deployment function to accelerate the deployment process.

To ensure the reliability of key channels, you can configure protection protocols such as BFD,

VRRP, and MPLS OAM.

The U2000 provides efficient test diagnosis tools. Through the related test cases, you can use

test diagnosis tools to quickly identify fault causes and rectify network faults, thus ensuring

network stability.

Service Assurance

The U2000 monitors the running status of the network 24 hours a day and 7 days a week in

multiple ways. It can detect network faults or degradation in a timely manner and report

endto- end SLA data of the network.

The U2000 provides the following service assurance for the broadband bearer network:

Real-time alarm monitoring and notification

The U2000 can monitor network faults and the status of devices and interfaces in real

time. By notifying the related personnel of network faults through the SMS or email, the

U2000 effectively ensures the normal running of the network.

Performance monitoring 24 hours a day and 7 days a week

The U2000 regularly collects the traffic data of all the links or some key links on the

entire network to provide effective support for network monitoring.

End-to-end SLA monitoring on network nodes

The U2000 regularly collect the SLA data between PEs, between the local CE and PE,

and between the PE and remote CE. With these data, you can discover network

degradation, predict the trend of network running, and optimize the network accordingly.

2.3.3 Mobile Bearer Network

The U2000 provides perfect solutions for mobile bearer networks in terms of network

deployment, service deployment, and service assurance.

Page 33: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 2 Networking and Application

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

2-11

Networking Diagram

Figure 2-9 Network management solution for a mobile bearer network

Network Deployment

The U2000 meets the following requirements in the network deployment stage:

Large-scale network management in distributed deployment mode

In distributed deployment mode, NE Explorer instances can be deployed on one or more

servers, enabling the entire system to have good expansibility and meet various complex

network management requirements. This greatly reduces the operation and maintenance

investment of large-scale networks.

HA solution

The U2000 supports two-node cluster backup and real-time monitoring to ensure data

security.

Service Deployment

On a mobile bearer network, the TDM base station, ATM base station, and IP base station are

borne by end-to-end PWs.

The U2000 supports the following features in terms of service deployment:

Page 34: IManager U2000 Product Description V100R002C00 03

2 Networking and Application

iManager U2000 Unified Network Management System

Product Description

2-12 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Providing user-friendly GUIs for the creation and maintenance of logical CES, ATM,

Ethernet, and PWE3 channels

Supporting the ability to perform end-to-end management on static and dynamic tunnels

and to query the binding relations between PWs and tunnels

Supporting the ability to configure protocols such as BFD, VRRP, IP FRR, MPLS OAM,

and QoS to ensure service reliability

Supporting the ability to deploy services in batches through the service template to

improve the efficiency and preciseness of service deployment, in the case that a large

number of NEs are deployed on the mobile bearer network

Service Assurance

The U2000 provides the following service assurance for the mobile bearer network:

Real-time alarm monitoring and notification

The U2000 can monitor network faults and the status of devices and interfaces in real

time. By notifying the related personnel of network faults through the SMS or email, the

U2000 effectively ensures the normal running of the network.

Performance monitoring 24 hours a day and 7 days a week

The U2000 periodically collects the key performance indicators of networkwide links or

specified links and dynamically displays the network running status, providing important

references for locating network faults.

Service-centered performance monitoring

On a mobile bearer network, you can precisely analyze the trend of service traffic, and

identify and locate faults through the performance indicators used to monitor the related

services, such as PWE3, VPLS, and L3VPN services.

2.3.4 IP Core Network

The U2000 provides perfect solutions for IP core networks in terms of network deployment,

service deployment, and service assurance.

Page 35: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 2 Networking and Application

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

2-13

Networking Diagram

Figure 2-10 Network management solution for an IP core network

Network Deployment

The U2000 meets the following requirements in the network deployment stage:

Centralized deployment and authority- and domain-based user management

Different users can mange different objects according to their respective management

rights. In this manner, the security of the U2000 is ensured.

HA solution

The U2000 supports two-node cluster backup and real-time monitoring to ensure data

security.

Distributed deployment of collectors for managing large-scale networks

In distributed deployment mode, NE explorer instances can be deployed on one or more

servers, enabling the whole system to have good expansibility and meet various complex

network management requirements. This greatly reduces the operation and maintenance

investment of large-scale networks.

Service Deployment

The U2000 supports the following features in terms of service deployment:

Supporting the ability to deploy mainstream services such as VPLS, L3VPN, and PWE3

services and providing multiple types of service configuration templates and bulk

configuration templates

Page 36: IManager U2000 Product Description V100R002C00 03

2 Networking and Application

iManager U2000 Unified Network Management System

Product Description

2-14 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

With simple and user-friendly GUIs, the U2000 effectively improves the efficiency of

service deployment.

Supporting the ability to manage mainstream routing protocols, such as OSPF, ISIS, and

BGP

Supporting the ability to configure protocols such as BFD, VRRP, IP FRR, VPN FRR,

MPLS OAM, and QoS to ensure service reliability

Service Assurance

The U2000 provides the following service assurance for the IP core network:

Real-time alarm monitoring and notification

The U2000 can monitor network faults and the status of devices and interfaces in real

time. By notifying the related personnel of network faults through the SMS or email, the

U2000 effectively ensures the normal running of the network. By diagnosing services

according to network protocol layers, the U2000 can quick locate the faulty network

layer.

Performance monitoring 24 hours a day and 7 days a week

The U2000 periodically collects the key performance indicators of networkwide links or

specified links and dynamically displays the network running status, providing important

references for locating network faults.

End-to-end SLA monitoring on network nodes

The U2000 regularly collects the SLA data between PEs, between the local CE and PE,

and between the PE and remote CE. With these data, you can discover network

degradation, predict the trend of network running, and optimize the network accordingly.

2.3.5 Access Network

In the networking application of the access network, the U2000 manages and maintains xPON

OLTs, ONUs, MSANs, DSLAMs and ONTs in a centralized manner.

Figure 2-11 shows the networking application of the U2000 in the access network.

Page 37: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 2 Networking and Application

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

2-15

Networking Diagram

Figure 2-11 Networking application of the U2000 in the access network

Networking description Broadband access:

− As IP-DSLAMs, the broadband access devices support various broadband access

modes, such as the ADSL2+, SHDSL, and VDSL2. They provide high-speed Internet

access service, video service, and ATM and IP private line services for business users,

enterprises, cyber cafes, and common users.

− The DSLAMs at different levels can be subtended through GE/FE ports to provide

xDSL services. The subtending of devices extends the coverage of the network

efficiently and meets the requirements of the scenarios in which a large number of

users are supported.

− The broadband access devices provide the LAN private line interconnection service

of the carrier-class high quality. The service is applicable to the interconnection

between branches, such as the government, enterprise, and business user (for example,

a bank), and their headquarters. It is also applicable to other applications such as

broadband Internet access and video conference.

FTTx access:

Page 38: IManager U2000 Product Description V100R002C00 03

2 Networking and Application

iManager U2000 Unified Network Management System

Product Description

2-16 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

− The OLT in the PON system works with the ONU/ONT, which is connected to the

LAN switch or hub in the downstream direction, to provide service access for users.

− In the downstream direction, the OLT is connected to the MDU or mini-MSAN

through fibers. The MDU or mini-MSAN provides service access for more users

through twisted pairs, coaxial cables, and category-5 cables.

Integrated access:

− Controlled by the MGC, the MSAN supports the VoIP, FoIP, and MoIP service access

and provides ISDN BRA and ISDN PRA services.

− The MSAN provides the ADSL/VDSL2 broadband Internet access service and the

SHDSL private line interconnection service.

Page 39: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 3 System Architecture

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

3-1

3 System Architecture

About This Chapter

The U2000 provides solution of the single-layer management network for small- and

medium-scale transport networks. In addition, the U2000 provides standard external

interfaces, through which the U2000 is interconnected with an upper-layer NMS to form a

hierarchical management network. The U2000 assists the NMS at the network management

layer and the NMS at the service management layer to manage large-scale transport networks.

3.1 Software Structure

This topic describes the configuration requirements of the software structures of the U2000

single server system and U2000 HA system.

3.2 External Interfaces

An external interface is used for the communication and data exchange between the NMS and

external systems. An external interface can be a northbound or southbound interface.

3.1 Software Structure

This topic describes the configuration requirements of the software structures of the U2000

single server system and U2000 HA system.

3.1.1 Software Structure of the U2000 Single-Server System

This topic describes the software structure of the U2000 single-server system.

3.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby)

This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).

3.1.1 Software Structure of the U2000 Single-Server System

This topic describes the software structure of the U2000 single-server system.

The U2000 single-server system is a standard system structure of the U2000. A U2000 server

can be connected to multiple U2000 clients.

Figure 3-1 shows the structural relationship between main modules.

Page 40: IManager U2000 Product Description V100R002C00 03

3 System Architecture

iManager U2000 Unified Network Management System

Product Description

3-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Figure 3-1 U2000 software structure

3.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby)

This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).

The U2000 HA system (Veritas Hot Standby), a type of HA system provided by the U2000,

applies to geographic redundancy of an HA system.

The U2000 HA system (Veritas Hot Standby) supports the Solaris, SUSE Linux, and

Windows. Figure 3-2, Figure 3-3, and Figure 3-4 show the software structure.

Page 41: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 3 System Architecture

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

3-3

Figure 3-2 Software structure - Solaris HA system (Veritas hot standby)

Figure 3-3 Software structure - SUSE Linux HA system (Veritas hot standby)

Page 42: IManager U2000 Product Description V100R002C00 03

3 System Architecture

iManager U2000 Unified Network Management System

Product Description

3-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Figure 3-4 Software structure - Windows HA system (Veritas hot standby)

The Veritas volume replicator (VVR) is used to duplicate the U2000 data on the primary

site to the secondary site so that data is synchronized between the primary and secondary

sites in real time.

The Veritas cluster server (VCS) is used to monitor the system and application service in

real time. When a fault occurs in hardware or software, the VCS restarts or stops the

application service.

The Veritas volume manager (VxVM) is used to manage the disks and data volumes of

servers.

3.2 External Interfaces

An external interface is used for the communication and data exchange between the NMS and

external systems. An external interface can be a northbound or southbound interface.

Figure 3-5 depicts the function and feature of external interface.

Page 43: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 3 System Architecture

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

3-5

Figure 3-5 Function and Feature

3.2.1 NBI

Through the NBIs, the U2000 offers networking monitoring information for the OSS on

various aspects, such as alarms, performance, and inventory. Meanwhile, the NBIs of the

U2000 support network management functions, including service provisioning and diagnosis

test. By using NBIs of the U2000, you can integrate the U2000 flexibly with different OSSs.

3.2.2 SBI

Through the SBI, the U2000 can connect to the lower-layer NMSs and equipment, so as to

implement the functions such as provisioning services, transmitting alarms, and transmitting

performance data.

3.2.1 NBI

Through the NBIs, the U2000 offers networking monitoring information for the OSS on

various aspects, such as alarms, performance, and inventory. Meanwhile, the NBIs of the

U2000 support network management functions, including service provisioning and diagnosis

test. By using NBIs of the U2000, you can integrate the U2000 flexibly with different OSSs.

The following table lists the equipment supported by the NBIs of the U2000.

Page 44: IManager U2000 Product Description V100R002C00 03

3 System Architecture

iManager U2000 Unified Network Management System

Product Description

3-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Interface Type

Equipment

XML The XML NBI enables unified management functions for the OSS in

terms of alarms, performance, inventory, and service provisioning. These

management functions apply to routers, Metro equipment, transport

equipment, and access equipment.

CORBA The CORBA NBI enables unified alarm management for the OSS on

routers, Metro equipment, transport equipment, and access equipment.

Meanwhile, the CORBA NBI enables management of performance,

inventory, and service provisioning for the OSS in Metro and transport

domains.

SNMP The SNMP NBI enables unified alarm management of the OSS on

routers, Metro equipment, transport equipment, and access equipment.

TL1 The TL1 NBI enables inventory query, inventory provisioning, and

service provisioning (xDSL, xPON, broadband, and narrowband

services) for the OSS in the access domain.

FTP The FTP performance NBI enables the export of performance statistics

for the OSS. In this case, the performance statistics is exported to the

specified FTP server for analysis.

MML The U2000 can access an OSS test system, and can support tests on

narrowband access devices (lines and terminals) and ADSL lines through

the OSS test NBI.

XML NBI

Compliant with the TMF MTOSI 2.0 series standard, the U2000 XML NBI enables unified

management functions of the OSS in terms of alarms, performance, inventory, and service

provisioning. These management functions apply to routers, Metro equipment, transport

equipment, and access equipment.

The U2000 XML NBI mainly supports the following functions:

Alarm management

− Report alarm events.

− Synchronize active alarms.

− Acknowledge alarms.

− Unacknowledge alarms.

− Collect alarm statistics.

Performance management

− Query history performance data.

− Query current performance data.

− Report performance threshold-crossing events.

− Query performance threshold-crossing events.

Inventory management

− Query physical inventory (NE, shelf, slot, card, and physical port).

Page 45: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 3 System Architecture

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

3-7

− Query logical inventory (logical port, fiber/cable, tunnel, and service).

− Export inventory data and report the change of inventory.

Service provisioning management

− Provision resources for the routing and Metro tunnels (MPLS tunnel and IP tunnel).

− Provision resources for the routing and Metro services (ATM PWE3, CES PWE3,

ETH PWE3, VPLS, and L3VPN).

CORBA NBI

Compliant with the TMF MTNM V3.5 series standard, the U2000 CORBA NBI enables

unified alarm management for the OSS. Meanwhile, the CORBA NBI enables service

provisioning, diagnosis test, inventory management, and performance management on Metro

and transport equipment.

The U2000 CORBA NBI mainly supports the following functions:

Alarm management

− Report alarm events.

− Synchronize active alarms.

− Acknowledge alarms.

− Unacknowledge alarms.

Performance management in the Metro and transport domains

− Query history performance data.

− Query current performance data.

− Report performance threshold-crossing events.

− Query performance threshold-crossing events.

Inventory management in the Metro and transport domains

− Query physical inventory (NE, shelf, slot, card, and physical port).

− Query logical inventory (logical port, fiber/cable, and trail).

Service provisioning management in the Metro and transport domains

− Provision end-to-end services in the transport domain (SDH, WDM, OTN, MSTP,

ASON, and RTN).

− Provision single-station services in the transport domain (SDH, WDM, OTN, and

MSTP).

− Provision resources for Metro tunnels (MPLS tunnel and IP tunnel).

− Provision resources for Metro services (ATM PWE3, CES PWE3, ETH PWE3, and

VPLS).

Diagnosis test management in the transport domain

− Set loopback on a port and alarm insertion.

− Conduct Ethernet CC, LB, and LT tests.

− Conduct the 2M PRBS test.

SNMP NBI

Compliant with the SNMP V1/V2/V3 standard, the U2000 SNMP NBI enables unified alarm

management of the OSS on routers, Metro equipment, transport equipment, and access equipment.

Page 46: IManager U2000 Product Description V100R002C00 03

3 System Architecture

iManager U2000 Unified Network Management System

Product Description

3-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The U2000 SNMP NBI mainly supports the following functions:

Report alarm events.

Synchronize active alarms.

Acknowledge alarms.

Unacknowledge alarms.

Report heartbeat alarm events.

Set alarm filter criteria.

TL1 NBI

Compliant with the GR 831 standard, the U2000 TL1 NBI enables inventory query, inventory

provisioning, and service provisioning (xDSL, xPON, broadband, and narrowband services)

for the OSS in the access domain.

The U2000 TL1 NBI mainly supports the following functions:

Service provisioning management in the access domain

− Provision xDSL services (ADSL, SHDSL, and VDSL2).

− Provision xPON services (GPON and EPON).

− Provision multicast services.

− Provision voice services.

− Provision BRAS services.

− Manage service port/PVC connections.

− Manage VLANs.

− Manage Ethernet ports.

− Manage ACL&Qos.

Inventory management in the access domain

− Query resources (equipment, shelf, card, daughter card, port, and service virtual port).

− Report resource change notification.

− Manage and maintain resources.

FTP Performance NBI

The U2000 FTP performance NBI enables the export of performance statistics for the OSS. In

this case, the performance statistics is exported to the specified FTP server for analysis.

The U2000 FTP performance NBI mainly supports the following functions:

Set conditions for exporting performance data, as follows:

− Monitoring period of performance events

− Monitoring indicator of performance events

− Export period of performance data

Export performance data to the specified FTP server.

MML Test NBI

The U2000 provides the MML NBI for the upper layer OSS to implement the following

features:

Page 47: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 3 System Architecture

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

3-9

Controlling the test component of an access device to perform a line test and report the

test result.

Issuing commands to capture or release a subscriber line to the test bus of a device and

then using external test unit to perform a line test.

The MML NBI solves the following problems:

A centralized line test system is provided to manage and test lines in the entire network.

These lines can be managed by EMSs provided by different vendors.

The integrated line test system can control an access device and a test unit concurrently

to perform a line test.

The U2000 supports the following types of MML NBIs:

Narrowband line test NBI: It is used to test narrowband access devices (lines and

terminals).

ADSL line test NBI: It is used to query ADSL port information, and capture or release

lines.

3.2.2 SBI

Through the SBI, the U2000 can connect to the lower-layer NMSs and equipment, so as to

implement the functions such as provisioning services, transmitting alarms, and transmitting

performance data.

Qx Interface

The Qx interface adopts the private OptiX management protocol developed by Huawei.

Through the Qx interface, the U2000 is connected to the OptiX series equipment.

SNMP SBI

The SNMP interface is compliant with the SNMP V1, V2, and V2 standards. Through the

SNMP interface, the U2000 is connected to routers, switches, and security products of

Huawei.

CLI SBI

Through the CLI interface, the U2000 is connected to routers, switches, and security products

of Huawei.

SSH SBI

Secure Shell (SSH) is a tool that is similar to Telnet. All the transmitted data can be encrypted

through the SSH to prevent DNS spoofing and IP spoofing. In addition, the transmission rate

is high because the data transmitted through the SSH is compressed.

Telnet SBI

Through the Telnet SBI, the U2000 can log in to equipment remotely and manage equipment.

Page 48: IManager U2000 Product Description V100R002C00 03

3 System Architecture

iManager U2000 Unified Network Management System

Product Description

3-10 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

TFTP/FTP/SFTP SBI

The U2000 can back up the data of devices, upgrade devices, and load patches through the

TFTP/FTP/SFTP SBI.

When the data is backed up in the SFTP mode, the commands and the data are encrypted before they are

transmitted.

Syslog SBI

The U2000 can manage the NE logs through the Syslog SBI.

Page 49: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-1

4 NMS Basic Functions

About This Chapter

The U2000 provides all management functions at element management layer and network

management layer.

Figure 4-1 depicts an overview of some of the U2000 applications.

Figure 4-1 Overview of some of the U2000 applications

4.1 Security Management

Page 50: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

This topic describes how to ensure the security of the U2000 by managing objects such as

users, user groups, rights, and operation sets.

4.2 Topology Management

In topology management, the managed NEs and their connections are displayed in a topology

view. The managed NEs are displayed and managed in subnets and views. You can monitor

the operating status of the entire network in real time by browsing the topology view.

4.3 Alarm Management

In alarm management, you can monitor network exceptions in real time. It provides various

management methods such as alarm statistics, alarm identification, alarm notification, alarm

redefinition, and alarm correlation analysis. This helps the network administrator take proper

measures to recover the normal operation of the network.

4.4 Performance Management

The U2000 can monitor the key indicators of a network in real time, and provide statistics on

the collected performance data. It provides a graphical user interface (GUI) to facilitate

network performance management.

4.5 Inventory Management

The U2000 provides the inventory management function that allows you to query and collect

the statistics on physical and logical resources in a unified manner.

4.6 Log Management

Log management includes the management of U2000 security logs, U2000 operation logs,

and NE security logs. The U2000 allows you to query and save logs periodically, to detect

illegal login and operations, and analyze faults in a timely manner. You can query the U2000

client that is used by a U2000 user to log in to the U2000 server and query the operations

performed by the user after login. You can also dump or print log data.

4.7 Database Management

The database backup management system of the U2000 provides a tool for database backup

and restoration. This tool facilitates the maintenance of the U2000 database and ensures stable

and safe running of the U2000. Database management includes the management of NE and

U2000 databases. To ensure data security, you need to back up the database periodically.

4.8 NE Communication Parameter Management

You can set the parameters for the communication between the U2000 and NEs to ensure that

the U2000 communicate with the NEs in normal state.

4.9 DCN Management

DCN management is applicable only to MSTP, WDM, Marine, NA WDM, PTN and

microwave products.

4.10 NE Software Management

U2000 supports backup and loading of the equipment data.

4.11 Report Management

The U2000supports the iWeb report function and at the same time supports NMS report that

provides reports about alarms, logs, and resources. The U2000 user is able to print desired

data while viewing them. The report in table format supports filtering by equipment type and can be saved in Excel format.

Page 51: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-3

4.12 System Monitoring

The U2000 provides a GUI-based system monitoring tool, which is used for managing the

NMS and querying the system information.

4.1 Security Management

This topic describes how to ensure the security of the U2000 by managing objects such as

users, user groups, rights, and operation sets.

Figure 4-2 shows the mechanism for implementing security management.

Figure 4-2 Mechanism for implementing security management

iManager U2000

OSS/BSS

Firewall

Hacker

Worm

Virus

Client

SSL encryption

Plain text…<=> 1010100100...

Managed equipment and network

SNMP/Telnet/FTP…

Centralized authentication

Account security policy

Access control list

Database backup and

restoration

Log management

Firewall

SSL encryptionPlain text…

<=> 1010100100...

The following describes security management in details.

Login and Session Management

The functions of login and session management are described as follows:

The user can log in to the U2000 with an account. The user performs operations

according to the permissions assigned to the account.

If the client is not used for a period of time, the user can manually lock the client or set

the lock time to make the U2000 lock the client automatically. This prevents others from

performing operations illegitimately. If the client is locked out, you need to enter the user

password or use the administrator account to unlock the client.

The members of the administrator group have the permissions to monitor the session

information and log out of illegitimate users forcibly.

Page 52: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The U2000 can automatically detect and clear invalid sessions.

User and User Group Management

The functions of user and user group management are described as follows:

Creating a user account or user group. During user account creation, the user details,

owner group of the user, management domain, user permissions, and access control list

must be set. During user group creation, the user group details, management domain, and

user group permissions must be set.

Modifying the user or user group information, and deleting a user account or user group.

Adding a user to a user group. After addition, the user has the permissions of the user

group. A user can be added to multiple user groups. In this case, the user has the

permissions of the user groups besides those of the user.

Permission Management

User permissions are classified into management permissions and operation permissions.

Through permission assignment, user operations on the U2000 can be controlled.

Management permissions refer to the permissions that a user is given to manage the

specified equipment and its data, or the permissions that a user group is given to manage

the specified domains. In the topology view, the equipment or areas that cannot be

managed are invisible.

Operation permissions refer to the permissions that a user is given to perform operations.

If a user does not have the permissions to manage a type of equipment, the user does not

have the permissions to operate the equipment.

The functions of permission management are described as follows:

Adding or deleting user or user group permissions, and setting the management domain

of the user or user group.

Creating object sets. Managed objects are grouped into different object sets to facilitate

permission assignment.

Creating operation sets. Operation permissions are grouped into different operation sets

to facilitate permission assignment.

Modifying or deleting object sets or operation sets.

Assigning the permissions of a type set to the user. After that, the user has the

permissions to view and operate the devices whose type is consistent with the type set.

Security Policy Management

The functions of security policy management are described as follows:

The password policy is used to set the user password rules and password security

policies. The password rules involve the minimum password length of common users,

minimum password length of superusers, and maximum password length. The password

security policies involve the maximum number of password duplications with history

passwords, maximum password reservation period, minimum password reservation

period, and number of days ahead for notifying password expiration.

The account policy is used to set the minimum length of the user name, automatic

unlocking time, maximum number of login attempts, and timeout period at a login or

unlocking failure.

Page 53: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-5

Access Control List

The Access Control List (ACL) is a secure access control mechanism. It restricts user access

to the server by allowing only the clients with specified IP addresses.

ACL can effectively control the client IP addresses from which users can log in to the U2000.

In this case, even if the user account and password are obtained by illegal users, these users

cannot log in to the U2000. Thus, the security of the U2000 is improved.

4.2 Topology Management

In topology management, the managed NEs and their connections are displayed in a topology

view. The managed NEs are displayed and managed in subnets and views. You can monitor

the operating status of the entire network in real time by browsing the topology view.

U2000 provides the Physical Root, Clock View, IP View, Tunnel View, and Custom View.

Therefore, you can view the required information in different views and also monitor and

learn the operating status of the entire network.

Topology View and Its Functions

The topology view of the U2000 consists of a navigation tree on the left and a view on the

right. The navigation tree directly shows the network hierarchy. Meanwhile, the view displays

the objects at different coordinates in the background map, which offers an intuitive view on

the deployment of objects.

Figure 4-3 shows the functions provided in the topology view of the U2000.

Figure 4-3 Topology view and its functions

Page 54: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Adjustable topology view: The view can be zoomed in or out so that you can view the

objects clearly.

Bird's eye view: You can see the position of the current topological window in the entire

view.

Network-wide NE statistics collection: You can collect statistics on the number of NE

types and the number of NEs of each type in the entire network.

Filter tree: You can filter all the NEs to display only the required NEs quickly.

Status bar: It displays the information such as the current status, current login user, IP

address of the server that is connected currently, and current operation result.

Topology view: A GUI in the U2000, which reflects the network structure. This GUI

shows various physical and logical entities of the network and provides the entrances of

various operations.

Alarm Display In the Topology View

In the topology view of the U2000, alarms are displayed in different colors to indicate

different status of the submaps and NEs. The alarms in the topology view are displayed by

two methods: color-coded display and small icon display. The default method is the small

icon display, as shown in Figure 4-4.

Figure 4-4 Alarm display in the topology view

The display of topology alarms on the U2000 has the following features:

The color of a topological node indicates the polling status (such as normal, unknown, or

offline) and the alarm status of the monitored NE.

When an NE generates multiple fault alarms at different severities, the corresponding

topological node is displayed in the color/iron that indicates the highest alarm severity of

these alarms.

When multiple nodes in a subnet generate fault alarms, the subnet is displayed in the

color/iron that indicates the highest alarm severity of these alarms.

You can query the current alarms of an NE through the NE node. In addition, you can

query the details of the fault alarms through the NE Panel.

Automatic Topology Discovery

The U2000 provides the automatic topology discovery function. Therefore, manual

intervention is not required and the operational expenditure (OPEX) is reduced.

The U2000 supports two methods of automatic topology discovery, as follows:

After the SNMP parameters are set on the NE based on the SNMP protocol, the NE

sends traps to the U2000 in an unsolicited manner. Then, the NE is added to the topology view on the U2000 automatically.

Page 55: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-7

In automatic topology discovery, the transport NE, NE based on the SNMP protocol, and

NE based on the ICMP protocol are searched separately in batches. Then, the NE that is

searched out is added to the topology view automatically.

The Secuity NE can be added to the topology view automatically by use the function of

Batch Import NE.

The U2000 searches for the fiber/link in batches. Then, the discovered fiber/link is added

to the topology view on the U2000 automatically.

Figure 4-5 Illustration of automatic topology discovery

1. The automatic topology discovery operation is implemented step by step through a

wizard. Specifically, the wizard guides you to configure the parameters required for the

automatic discovery, such as NE type, SNMP parameters, and the IP address range.

2. After you finish configuring the parameters, the U2000 searches for the required NE

among the specified network segments according to the preset parameters. All NE (both

from Huawei and other vendors) that is based on the SNMP protocol and meets the

conditions is displayed automatically in the topology view. At the same time, the basic

configurations of the NE is uploaded automatically. In this manner, you need not

perform basic configurations on the NE again.

3. During the discovery, you can cancel the discovery at any time. In addition, you can

learn the cause if the discovery fails.

4.3 Alarm Management

In alarm management, you can monitor network exceptions in real time. It provides various

management methods such as alarm statistics, alarm identification, alarm notification, alarm

redefinition, and alarm correlation analysis. This helps the network administrator take proper

measures to recover the normal operation of the network.

Networkwide Alarm Browsing

Alarm display is classified into alarm panel display, alarm topology display, and alarm

browsing.

The U2000 supports the following alarm browsing functions:

Page 56: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Alarm panel display

It is used to display the number of alarms of the currently managed objects by severity

and simply provide the fault status of the system. It can be used as a monitoring panel.

Alarm topology display

When an NE reports an alarm, the NE icon in the topology view can be in different

colors according to the alarm severity. In this case, you can right-click the NE icon and

query the current alarm of the NE from the shortcut menu.

Alarm browsing

− Browsingcurrent alarms

It is used to browse the fault alarms that are currently not processed, that is,

unacknowledged and uncleared alarms.

− Browse history alarms

It is used to browse all fault alarms that were acknowledged and cleared.

− Browse alarm logs

It is used to browse all fault alarms reported by NEs.

− Browsing event logs

It is used to browse current abnormal events.

− Setting an alarm query template

You can save common query conditions in an alarm query template. Thus, next time

when you query alarms that meet the common conditions, you can use the template

directly without setting query conditions again. This helps you browse and monitor

the alarms that concerns you.

− In the handling suggestion pane of the alarm, a link is provided, which points to the

corresponding alarm reference topic in the Online Help.

In addition to the preceding functions, the U2000 provides various customized functions, as

shown in Figure 4-6 and as listed in Table 4-1.

Page 57: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-9

Figure 4-6 Alarm Browsing

Table 4-1 Description of alarm functions

Function Description

Unified alarm panel Through the alarm panel, you can customize alarm conditions in

an alarm template flexibly and display alarms dynamically. This

helps to classify alarms quickly and acknowledge the concerned

alarms.

Alarm filtering With the alarm filtering function, you can learn the running status

of an NE in real time. In addition, you can query the alarm status,

refresh the status in real time, and query the details of an alarm in

the alarm activation window. You can also print the alarm

records that are received recently and meet the print conditions.

Alarm query With the alarm query function, you can query alarms by object

where an alarm occurs, function, alarm status, and alarm severity.

In addition, you can save and print the query result.

Alarm color display The severity of each alarm in the alarm list is displayed with a

corresponding color. The color can be customized.

Alarm topology

display

When an NE reports an alarm, the icon in the upper left corner of

the NE in the topology view varies with the alarm severity, or the

NE icon in the topology view can be in different colors according

to the alarm severity. In this case, you can query the current alarm

of the NE from the shortcut menu.

Alarm locating With the alarm locating function, you can select an alarm and

locate the topology object that generates the alarm (For a physical

alarm, you can locate the panel of the NE that generates the

alarm.)

Page 58: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-10 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Function Description

Sequence customizing Through the sequence customizing function, you can sort alarms

by field in the alarm list and customize the alarm display. In

addition, you can save alarms in the .txt, html, xls, pdf, and csv

file, and print the required alarm records.

Alarm Statistics

You can learn the alarm status through alarm statistics and alarm analysis.

U2000 can collect alarm statistics based on user-defined conditions. The alarm conditions

include the alarm name, alarm severity, alarm function type, alarm rising time, alarm status, or

a combination of any preceding items.

Alarm Masking and Alarm Correlation Analysis

NEs report a large number of alarms during maintenance, test, or new deployment. However,

you need not concern the reported alarms. Therefore, these alarms reported by the NE need to

be masked, that is, these alarms are not displayed or saved. You can set conditions to mask the

alarms or events that meet the conditions.

The U2000 provides the following means for you to perform specific correlation analysis:

alarm/event correlation analysis, intermittent alarm analysis, repeated event analysis, and

alarm/event frequency analysis, and lasting time analysis of acknowledged but uncleared

alarms.

Alarm/Event correlation analysis

This function helps to find the root alarm. The U2000 supports the analysis of the

correlation between different NEs. The system analyzes the alarms based on the

pre-defined correlation rule to mask the correlative alarms and finds the root alarm. This

helps the maintenance personnel to easily find and rectify the fault.

Intermittent alarm/repeated event analysis

This function helps you to analyze alarms that are repeatedly cleared or events that are

repeatedly reported within a short period of time. To handle these alarms or events, the

system reserves only one of these alarms or events and/or change their severities. The

reserved alarms or events record the frequency with which the intermittent alarms or

Page 59: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-11

repeated events occur. In addition, the system can change the alarm or event severity

according to the pre-defined settings.

Alarm/Event frequency analysis

This function helps you to analyze the frequency with which an alarm or event occurs.

You can set a condition. Within the pre-defined period, when the number of alarms or

events exceeds the threshold, the system informs the user according to the pre-defined

correlation action.

Acknowledged&Uncleared alarm time analysis

This function helps you to analyze the time of an acknowledged but uncleared alarm.

You can set a condition. Within the pre-defined period, if the time of an acknowledged

alarm exceeds the threshold, the system changes the alarm severity.

Alarm Dumping and Acknowledging

Alarm acknowledgment helps to identify whether an alarm is processed.

Alarm acknowledgment helps you to identify a processed alarm. You can then take proper

measures by checking whether the alarm is in the acknowledged state.

Alarm dumping: It supports overflow dumping and manual dumping of alarms. Alarm

dumping is used to dump history alarms and events to files, which ensures a stable and

efficient system and saves disk space.

Alarm acknowledgment: It helps you to identify a processed alarm. You can then take

proper measures by checking whether the alarm is in the acknowledged state. The U2000

supports manual and automatic acknowledgment of alarms.

Alarm Synchronization

The U2000 supports the ability to synchronize NE alarms automatically and manually. You

can manually synchronize NE alarms by performing operations through GUI or set an

automatic synchronization policy. When the U2000 restarts or the communication with an NE

recovers, the NE sends an alarm to the U2000. This implements the automatic alarm

synchronization on the U2000.

The U2000 supports the ability to synchronize NE alarm.

Manual synchronization

You can manually synchronize NE alarms by performing operations through GUI.

Automatic synchronization

You can set an automatic synchronization policy. When the U2000 starts, when its

communication with an NE recovers, or when the LCT user logs out, the NE sends an

alarm to the U2000. This implements the automatic alarm synchronization on the U2000.

Alarms are synchronized according to the following rules:

If an alarm is cleared on the NE but uncleared on the U2000, the alarm on the U2000 is

cleared.

If an alarm exists on the NE but does not exist on the U2000, the alarm is added to the

U2000.

Page 60: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-12 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Alarm Redefinition

The U2000 allows you to redefine the alarms of the NE. You can redefine the alarm severity

according to the requirements.

You can use this function to change the alarm severity displayed on the U2000, thus

highlighting only the alarms that concerns you.

Alarm Suppression

U2000 supports the ability to suppress NE alarms. If you set the status of an alarm to

Suppressed, the NE does not report the alarm.

The difference between alarm suppression and alarm masking is as follows: If you enable

alarm masking, an NE still reports an alarm but the U2000 does not receive the alarm. If you

enable alarm suppression, the NE does not report an alarm.

Various Alarm Notification Means

The U2000 provides various alarm notification means. The U2000 can send notifications to

the related maintenance personnel for locating faults regardless of the time and place, which

ensures that the faults are troubleshoot in time. Figure 4-7 shows the alarm notification

means.

Page 61: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-13

Figure 4-7 Various alarm notification means

The U2000 supports the following two remote notification means:

By email

You can send an alarm remote notification by email. The alarm information is sent to an

email address. The user can check the email address for alarm information received on

the alarm server.

By SMS

You can send an alarm remote notification by SMS. The U2000 sends the alarm

information to a mobile phone through the SMS device (SM modem or SM gateway)

connected to the alarm server. The mobile phone user can check the SMS for alarm

information received on the alarm server.

Alarm Jumping

The U2000 supports the alarm locating function. This function helps to jump to the topology

object that generates the required alarm. In addition, this function helps to quickly locate a

network fault, which improves the efficiency of alarm locating. Figure 4-8 shows the alarm

jumping function.

Page 62: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-14 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Figure 4-8 Alarm jumping

Alarm Maintenance Experience Base

You can obtain the alarm processing information from the alarm maintenance experience base.

This base stores alarm details.

The alarm maintenance experience refers to the experience summarized by customers during

the maintenance. The experience is imported to the U2000. If the same fault occurs, you can

refer to the related experience to quickly handle the alarm, which improves the efficiency of

troubleshooting.

Page 63: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-15

Alarm Time Localization

U2000 can display the time when an alarm is generated, acknowledged, cleared, or received

as the local time. The U2000 can display the time based on the server time or client time.

The NE that reports an alarm and the current U2000, however, may be in different time zones.

To learn the correct alarm generation time, the U2000 automatically converts the alarm

generation time (NE time) into the local time of the client.

4.4 Performance Management

The U2000 can monitor the key indicators of a network in real time, and provide statistics on

the collected performance data. It provides a graphical user interface (GUI) to facilitate

network performance management.

Figure 4-9 Performance Management Process

Monitoring Instance Management

Monitoring instance enables you to collect performance data according to the monitoring

template and schedule policy for all performance indicators belonging to a resource from a

device. One monitoring instance collects data for only one resource. Monitoring instance can

be either data monitoring instance or TCA monitoring instance.

Creating a monitoring instance for resources, such as equipment, boards, ports, and links.

Monitoring the IP SPLA of the PTN and the third-party equipment.

Modifying a monitoring instance.

Page 64: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-16 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Querying a monitoring instance.

Suspending a monitoring instance.

Resuming a monitoring instance.

Synchronizing resources of an instance.

TCA query.

Querying a VPN SLA test matrix. Querying the VPN SLA test result through a matrix.

Capability license control. Capability license controls the monitoring instance creation

based on the license availed.

Data Monitoring Template Management

The monitoring template is used with a monitor instance to monitor the performance data for

specific indicators.

Table 4-2 Monitoring template type

Template Description

Data Monitoring Template A data monitoring template is a collection

of indicators, which can be applied on the

resources for collecting the performance

data. You can configure indicators and

indicator groups.

TCA Monitoring Template A threshold crossing alert (TCA)

monitoring template is a collection of

indicators and threshold definition that can

be applied on the resources for monitoring

the TCA alerts. TCA can be applied

according to the conditions selected such as

high TCA monitor and low TCA monitor.

Threshold definition includes high trigger,

low trigger, high clear, low clear, high alarm

level, and low alarm level.

View History Performance Data

You can query the performance of network resources by using the U2000 which displays the

history performance of a network in the form of table, curve diagram, or bar chart. In this way,

you can know the dynamic running status of the network from different dimensions. You can

save the performance data in different file formats. Meanwhile, you can compare the

performance data in different periods in the line chart or in the histogram.

Information displayed in line chart and bar chart mode can be saved in HTML or PDF format.

Information displayed in table mode can be saved in TXT,CSV or HTMLformat.

You can collect statistics on network performance data within a specified period, to know the

performance status of a network in the specified period and to provide data reference for

forecasting performance change of the network.

Page 65: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-17

By setting the performance monitoring template, you can manage performance monitoring

tasks in an easy manner.

View Real-time Performance Data

You can query real-time performance data in the form of table, curve diagram or bar chart,

and save the performance data into file.

Information displayed in line chart and bar chart mode can be saved in HTML or PDF format.

Information displayed in table mode can be saved in TXT,CSV or HTMLformat.

View TOPN Performance Data

You can query TOP N performance data sorted by two indicators, and the result will be

refreshed when the new data generates.

Schedule Policy Management

Schedule policy enables you to set the time segments and repeat periods at which the data

needs to be collected. The schedule policy can be applied on the resources while creating or

modifying a monitoring instance

Data Lifecycle Management

You can back up the performance data to a specified storage medium manually or

automatically when excessive performance data is saved in the database ofU2000.

Data can be dumped in the following two ways:

Automatic Dumping: Performance data is dumped automatically based on the

configured values, such as the number of days for different granularities and the database

usage.

Manual Dumping: Performance data is dumped based on the user-defined conditions,

according to the dump type with in the end date.

Monitoring Network Performance

Through network grouping, you can view the performance data of devices, interfaces, IP links,

L2 links, static tunnel, dynamic tunnel, and tests on the same network. In addition, you can

implement various tests within a network, such as the tests of UDP jitter and FTP ping, to

evaluate the quality of networks and services and perform association analysis on the quality

of networks and services.

Creating a network group

Associate the monitoring instances of the resources of different types with the same

network according to the customized grouping rules, such as the area-based rule and

service-based rule, so that you can conveniently browse and compare data.

Analyzing the interface performance trend

After the interface indicators on the network are set, the trend analysis graph of the

interface indicators which is generated at the current time point or 12 hours before and

after the current time point can be obtained. The trend analysis graph helps you know the

entire change trend of the interface performance in a timely manner.

Page 66: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-18 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Viewing the running results of SLA test on network monitoring through a matrix (Now

only support UDP jitter test through matrix)

You can view the results of the network monitoring test cases through a matrix. In this

manner, you can know the statistics about network-related indicators, evaluate network

performance, and perform association analysis on network performance.

4.5 Inventory Management

The U2000 provides the inventory management function that allows you to query and collect

the statistics on physical and logical resources in a unified manner.

Figure 4-10 shows the inventory management window of the U2000.

Figure 4-10 Inventory management window and its functions

Physical Resources

The physical resources are as follows:

Telecommunications room

Rack

NE

Shelf

Board

Subboard

Port

ONU

Slot Information Report

Slot Used Statistics

Page 67: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-19

SFP Information Report

Fiber/cable

Logical Resources

The logical resources are as follows:

Connection

Gateway

VLAN

Multicast

QoS and ACL

Protocol

Link

Link group

Interface resource

4.6 Log Management

Log management includes the management of U2000 security logs, U2000 operation logs,

and NE security logs. The U2000 allows you to query and save logs periodically, to detect

illegal login and operations, and analyze faults in a timely manner. You can query the U2000

client that is used by a U2000 user to log in to the U2000 server and query the operations

performed by the user after login. You can also dump or print log data.

Figure 4-11 shows the U2000 log management window and its functions.

Figure 4-11 Log management window and its functions

Page 68: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-20 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Operation Logs

Operation logs record the operations (such as fault management, performance management,

topology management, and resource management) performed on the U2000.

View operation logs. The network administrator can set query conditions and query user

operation logs by user name, operation terminal, operation result, risk level, time range,

operation name, operation object, or a random combination of the preceding items. In

this manner, the network administrator can learn the operations performed by the current

user in real time.

Dump operation logs.

− Dump operation logs manually.

− Dump operation logs upon log overflow or at scheduled times.

Forward operation logs to the syslog server.

Save operation logs as the TXT, HTML, CVS, PDF or Excel file.

System Logs

System logs record operations performed on the U2000, including the service start and stop,

and log exporting and deletion.

View system logs. The network administrator can set query conditions and query user

operation logs by source, level, time range, details, or a random combination of the

preceding items. In this manner, the network administrator can learn the operations

performed by the current user in real time.

Dump system logs.

− Dump system logs manually.

− Dump system logs upon log overflow or at scheduled times.

Forward system logs to the syslog server.

Save system logs as the TXT, HTML, CVS, PDF or Excel file.

Security Logs

Security logs record the security-based operations that the user performs on the U2000,

including logout, login, log dumping, and device log synchronization.

View security logs. The network administrator can set query conditions and query user

operation logs by user name, operation terminal, operation result, risk level, time range,

operation name, security event, operation object, or a random combination of the

preceding items. In this manner, the network administrator can learn the operations

performed by the current user in real time.

Dump security logs.

− Dump security logs manually.

− Dump security logs upon log overflow or at scheduled times.

Forward security logs to the syslog server.

Save operation logs as the TXT, HTML, CVS, PDF or Excel file.

NE Logs

NE logs record the operations on the managed NEs. You can query the NE logs through

theU2000 client GUI. You do not need to query the operation logs on each NE.

Page 69: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-21

Browse the NE syslog run logs.

You can know the equipment running information through NE logs.

Dump NE syslog run logs.

− Dump NE logs manually.

− Dump NE logs upon logs overflow or at scheduled times.

Forward NE logs to the syslog server.

Save NE logs as the TXT, HTML, CVS, PDF or Excel file.

4.7 Database Management

The database backup management system of the U2000 provides a tool for database backup

and restoration. This tool facilitates the maintenance of the U2000 database and ensures stable

and safe running of the U2000. Database management includes the management of NE and

U2000 databases. To ensure data security, you need to back up the database periodically.

NE Database Management

By using the U2000, you can perform the following NE database management operations:

For transport equipment and access equipment, back up the NE database to the system

control and communication unit (SCC).

For transport equipment and access equipment, back up the NE database of transport or

access equipment to the CF card manually or automatically.

For transport equipment and access equipment, restore the NE configuration data of

transport or access equipment from the SCC board or CF card.

Back up the NE database to a local or remote server.

Start a manual backup.

Set a scheduled backup task.

Restore the NE database from a local or remote server.

U2000 Database Management

By using the U2000, you can perform the following NMS database management operations:

Page 70: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-22 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Back up the U2000 database to a local or remote server.

− Start an immediate backup.

− Set a scheduled backup task.

Restore the U2000 database from a local or remote server.

Dump data in the U2000 database, including operation logs, system logs, security logs,

alarm /event logs, and performance data.

− Set a manual dump.

− Set periodical dump.

Import or export script files: Export the configuration data in the U2000 to script files, or

import the configuration data to the U2000 from script files. This function is applicable

only to MSTP, WDM, PTN and microwave products.

Initialize the U2000 database.

Configuration upgrade wizard: On the upgraded U2000 software, previous data can be

restored with the help of the upgrade wizard.

Customize scheduled tasks: Provide flexible customization of scheduled tasks to reduce

operation and maintenance costs. The scheduled tasks that the U2000 supports are

backing up the database, exporting script files, collecting performance data, collecting

ATM performance data, backing up history performance data, and refreshing the

automatically switched optical network (ASON) information.

In the case of MSTP and WDM products, the U2000 information can be exported to a

TXT file so that it can be used by the MDS 6600.

In the case of MSTP and WDM products, the U2000 can import a TXT file that contains

the MDS 6600 data.

4.8 NE Communication Parameter Management

You can set the parameters for the communication between the U2000 and NEs to ensure that

the U2000 communicate with the NEs in normal state.

You can query or set the following communication parameters:

Page 71: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-23

Query and set the NE access protocol parameters.

Manage the default access protocol parameters.

Query and set the NE Telnet or STelnet parameters.

Manage the Telnet or STelnet parameter template.

4.9 DCN Management

DCN management is applicable only to MSTP, WDM, Marine, NA WDM, PTN and

microwave products.

The U2000 communicates with NEs and manages and maintains network nodes through a

DCN. In the DCN, the U2000 and NEs can be considered as nodes. These nodes are

connected by using Ethernet or data communications channel (DCC). In actual practice, the

U2000 and NEs may be located at different floors of the same building, or different buildings

or cities. Hence, the U2000 and NEs are usually connected through an external DCN that

consists of equipment such as switches and routers. Comparatively, the DCN between NEs is

referred to as an internal DCN.

Modify gateway NE (GNE) parameters.

Change the GNE for an NE.

Set the secondary GNE for an NE.

Convert a GNE to a normal NE.

Convert a normal NE to a GNE.

Check the GNE switching status.

Test the communication between the U2000 and a GNE.

Check the network communication status.

4.10 NE Software Management

U2000 supports backup and loading of the equipment data.

Function and Feature

Figure 4-12 depicts the function and feature of software management.

Page 72: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-24 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Figure 4-12 Function and Feature

Task Management

U2000 enables you to create scheduled tasks, including backing up the data of an NE, loading

the programs or patches of an NE, and restoring the data of an NE. U2000 can automatically

perform the tasks and can also suspend and resume tasks.

Policy Management

U2000 enables you to configure backup policies and saving policies. You can configure the

default backup policy or saving policy. In this case, U2000 backs up or saves the data

automatically and periodically according to the configured policy. You can also modify,

suspend, and run the equipment backup or saving policy.

Data Backup Management

U2000 supports automatic and manual data backup. You can back up the data on the GUI of

U2000. U2000 supports the ability to restore the backup data of equipment. You can restore

the historical backup data of the equipment on the GUI of U2000.

Software library management

The system supports the ability to manage NE software. The NE software is imported to the

software library of the system for formal management.

During the upgrade, a user can select the required target software from the software library.

Page 73: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-25

4.11 Report Management

The U2000supports the iWeb report function and at the same time supports NMS report that

provides reports about alarms, logs, and resources. The U2000 user is able to print desired

data while viewing them. The report in table format supports filtering by equipment type and

can be saved in Excel format.

Alarm and Log Report Equipment alarm severity distribution details report

Equipment alarm severity distribution report

Equipment connectivity statistics report

General alarm information report

History change record report

Resource Report Port Resource Report

Statistics Report of SDH Tributary Port Resources

Lower Order Cross-Connections Statistic Report

SDH Fiber/Microwave Link Resource Usage Report

Statistics Report of Trails Between SDH NEs

Statistics Report of SDH Protection Subnet Resources

Statistics Report of SDH Circuit Resources

Microwave Link Report

Microwave License Capacity Report

Statistics Report of Ethernet Port Resources

Statistics Report of Service Resources Between Ethernet NEs

WDM Protection Group Switching State Report

WDM NE Master/Slave Subrack Info Report

Statistics Report of WDM Client-Side Port Resources

Statistics Report of WDM Link Resources

Statistics Report of Inter-Station Wavelength Resources

Browse WDM Wavelength Resource

Wavelength Resource Usage Report

PON Port Splitting Status

Board Manufacturer Information

Export project Document

Clock Tracing Diagram

Networking Diagram

Timeslot Allocation Diagram

Page 74: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-26 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iWeb report

The report subsystem provides a complete set of convenient services. It allows you to

generate, distribute, and manage reports based on the Web. The powerful report subsystem

can help you to monitor, analyze, improve, and plan network performance.

The function of the iWeb report see 9.7 Report Subsystem Management.

The diagrams of the resource report

Figure 4-13 Diagram of the NE resource report

Page 75: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 4 NMS Basic Functions

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4-27

Figure 4-14 Diagram of the network resource report

4.12 System Monitoring

The U2000 provides a GUI-based system monitoring tool, which is used for managing the

NMS and querying the system information.

The system monitoring tool of the U2000 provides the functions for managing system

processes, as shown in the following figure.

The main functions for managing system processes are as follows:

Page 76: IManager U2000 Product Description V100R002C00 03

4 NMS Basic Functions

iManager U2000 Unified Network Management System

Product Description

4-28 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Starting and stopping a process

Setting the security communication mode

The system monitoring tool of the U2000 provides the functions for querying the system

information, as shown in the following figure.

The main functions for querying the system information are as follows:

Querying the process information

Querying the hard disk information

Querying the database information

Querying the component information

Querying the operation logs

Page 77: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 5 MSTP Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5-1

5 MSTP Network Feature Management

About This Chapter

This topic describes the functional features of MSTP NE management and network

management.

5.1 MSTP NE Management

NE management refers to the management of configurations of an NE in terms of attributes,

communication, services, protection, and clocks. The configuration data is saved to the

database of the U2000 and to the database of the NE.

5.2 MSTP Protection Subnet Management

A protection subnet is a network structure with the comprehensive self-protection function. In

the U2000, the protection subnet is a generalized concept that includes not only the network

structure with the comprehensive self-protection function, such as an MSP ring and a path

protection (PP) ring, but also the network structure without the self-protection function, such

as an unprotected ring and an unprotected chain.

5.3 End-to-End MSTP Management

End-to-end network management is also referred to as trail management. You can construct

the configuration data of end-to-end network management by searching for the data at the NE

layer of the U2000, or directly configure the data at the network layer of the U2000, and apply

the data to all the related NEs. Compared with configuring NE data on a per-NE basis,

configuring NE data by using the trail management function is faster and more convenient.

5.4 End-to-End MSTP IP Management

There is the IP feature in MSTP equipment. You can build the configuration data of

end-to-end MSTP IP network management by searching for the data at the NE layer of the

U2000, or directly configure the data at the network layer of the U2000, and apply the data to

all the relevant NEs. Configuring NE data by using the trail management function is faster

and more convenient compared with configuring NE data on a per-NE basis.

5.5 SDH ASON Management

ASON is a new generation of optical network that integrates the exchange and transport. After

a user initiates a service request, the ASON selects a route automatically, establishes and

removes connections through the signaling control, and performs network connections

automatically and dynamically. An ASON NE refers to the equipment that is equipped with

Page 78: IManager U2000 Product Description V100R002C00 03

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System

Product Description

5-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

both SDH and ASON features. An ASON network is managed by the U2000 that combines

ASON and SDH features.

5.1 MSTP NE Management

NE management refers to the management of configurations of an NE in terms of attributes,

communication, services, protection, and clocks. The configuration data is saved to the

database of the U2000 and to the database of the NE.

Basic NE Configuration

By using the U2000, a user can perform the following operations:

Modify NE attributes such as:

− NE name

− NE ID

− NE Extended ID

− Remarks

− NE pre-configuration

In the case of the NE whose ID needs to be set through the DIP switch, you can modify the NE ID on the

U2000.

Synchronize NE time: Align all NEs with the system time of the U2000 server. The user

can configure the U2000 to automatically synchronize the NE time by specifying the

automatic synchronization period.

Query physical resources in the following lists:

− NE list

− Board manufacturer information

− Board list

− Cabinet list

− Subrack list

− Equipment room list

Support the board plug and display feature: After a board is inserted to the slot, the NE

Panel automatically displays the board and board information.

Replace a board. The user can replace a board with a board of another type on the

U2000.

− The user can replace board A with board B whose rate is the same as the rate of board

A and where the number of ports is the same as the number of ports on board A.

− The user can also replace board A with board B whose rate is lower than the rate of

board B and where the number of ports is less than the number of ports on board A.

Query the actual physical board type of a board that is used as a board of another type.

Automatically disable the NE functions: You can set to periodically disable some NE

functions that may affect services, such as loopback and automatic laser shutdown (ALS).

When the time expires, these operations automatically stop.

Environment monitoring information. You can set the following items:

− PMU interface

Page 79: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 5 MSTP Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5-3

− EMU interface

− CAU interface

− NE fan speed

Virtual NE management

− Create a virtual NE.

− Add a board.

− Create fibers between the virtual NE and other NEs.

− Create SDH services.

− Create protection subnets.

− Search for and create trails on the virtual NE.

Support the replacement of the boards.

Supports the management of inband DCN.

Support graphical display of performance events relevant to the optical power.

Orderwire Configuration

By using the U2000, a user can perform the following operations:

Set and query the orderwire phone numbers, call waiting time and orderwire phone port

availability.

Set and query the networkwide conference call number.

Set and query the subnet No. length and the related subnet of the optical interface.

Configure and query the SDH network node interface (NNI) connection for orderwire.

Configure and query the F1 data port.

Configure and query the broadcast data port.

Board Protection Configuration

By using the U2000, a user can perform the following operations:

Configure board 1+1 protection.

Configure 1:N tributary protection switching (TPS) protection for a tributary board.

Configure board level protection.

Configure port protection.

Query the data backup status between the active and standby SCC boards.

Interface Configuration

By using the U2000, a user can perform the following operations:

Interface board management: Query and set the SDH interface boards installed on NEs.

Set the parameters of SDH interfaces.

Set the parameters of PDH interfaces.

Modify the optical/electrical attributes of the board port.

Set overhead interfaces, including:

− Orderwire

− Hotline number

Page 80: IManager U2000 Product Description V100R002C00 03

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System

Product Description

5-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

− Special line number

− Conference call number

− Subnet number length

− F1 data port

− Broadcast data port

− Communication port

− Data port

− Out-ring route

Set the optical amplifier board interface.

Manage the optical power of a board.

Set tone and data access (TDA) interfaces, including:

− TDA clock source.

− TDA power feeding.

Query and set the overhead including:

− Regenerator section overhead (J0).

− Lower order path overhead (V5, J2)

− VC4 higher order path overhead (J1, C2) and its pass-through or termination.

− VC3 higher order path overhead (J1, C2).

Support PRBS.

Support pre-alerts for the port optical power.

Support setting and querying the TUG structure in the transmit and receive directions.

Support lower order loopbacks.

Support querying the in service (IS) port status and the out of service (OOS) port status

of a line board or a data board.

Support managing the power consumption.

Support setting and querying the optical power threshold of a line board.

Support the TCM function.

Support the configuration of enabling the AIS insertion of the J0MM alarm.

Set the parameters for an IF interface.

Set the parameters for a digital interface.

Set the parameters for an Outdoor unit (ODU) interface.

Configuration for SDH Services and Protection

By using the U2000, a user can perform the following operations:

Configure VC12, VC3, or VC4 services and select protection groups for them. In the

case of the platform 4.0 equipment, you can also select protection groups of these

services.

Manage Transmux services, including M13/E13 Transmux and M13/E13 Transmux

Server services.

Configure VC4-4C, VC4-8C, VC4-16C, or VC4-64C concatenated service; bind or

unbind services, and select protection groups for them. In the case of the platform 4.0

equipment, you can also select protection groups of these services.

Page 81: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 5 MSTP Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5-5

Configure other services: enterprise system connection (ESCON) services, 64 kbit/s

services (including TDA board services, N x 64 kbit/s services), and DSL services.

Manage subnetwork connection multiple protection (SNCMP) services.

Activate or deactivate services.

Manage subnetwork connection protection (SNCP) services.

Manage subnetwork connection tunnel protection (SNCTP) services.

Convert an SNCP service to a normal service or convert a normal service to an SNCP

service.

Support multiple multiplex section protection (MSP) rings configured at a single optical

port. You can configure multiple MSP rings by VC4 at an optical port to increase the

usage of network resources.

Configure REG. After the line board is set as REG on the U2000, each pair of optical

interfaces of the line board provides a special receive or transmit function. Through the

internal switch, the SDH signals from the receiving optical interface are sent out directly

to the corresponding transmitting optical interface after passing through the regenerator

section layer and being amplified. The REG function is completely realized by the board

without the need of the SCC board and a cross-connect board.

Query the capacity of higher order and lower order cross-connections on an NE.

Manage multiprotocol label switching (MPLS) for MSTP equipment. The MSTP

equipment builds a label switched path (LSP) with a PE router, identifies LSP labels and

service priorities, and encapsulates LSPs into virtual concatenation groups (VCGs) for

transmission.

The linear MSP supports the reconstruction protocol. You can set the appointed MSP

group as the reconstruction protocol.

Configure two 40G lower order cross-connect protection groups at the same time. You

can adjust concatenated timeslots and optimize higher order pass-trough.

Configuration for ATM Interfaces, Services, and Protection

By using the U2000, a user can perform the following operations:

Interface board management: Query and configure the ATM interface board on an NE.

ATM bandwidth management: Query the bandwidth of ATM board.

Set the parameters for an ATM interface.

Configure ATM traffic.

Configure ATM cross-connections.

Create a network to network interface (NNI) on the ATM processing board.

Configure ATM cross-connections.

Configure ATM protection groups.

Configure ATM protection pairs.

Configure ATM services from ATM board to SDH line.

Activate or deactivate ATM cross-connections.

Configure ATM bound path.

Perform ATM operation, administration and maintenance (OAM).

Set or query the section-end attribute of a connection point.

Set or query the continuity check (CC) activation status of the connection point.

Perform a remote loopback test.

Page 82: IManager U2000 Product Description V100R002C00 03

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System

Product Description

5-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Set or query the NE loopback location identifier (LLID).

Upload, download, duplicate the OAM data of the NE or perform the related consistency

check.

Configure an inverse multiplexing over ATM (IMA) group.

Configuration for Ethernet Interfaces and Services

By using the U2000, a user can perform the following operations:

Interface board management: Query and configure the Ethernet interface board on an

NE.

Configure fast Ethernet transparent transmission board.

Configure Ethernet internal interfaces, including:

− Basic attributes

− TAG attributes

− Network attributes

− Encapsulation/mapping

− Link capacity adjustment scheme (LCAS)

− Bound path

− Advanced attributes.

Configure external ports of Ethernet interface, including:

− Basic attributes

− Flow control

− TAG attributes

− Network attributes

− Advanced attributes.

Configure point-to-point LPT and point-to-multipoint LPT.

Configure private line services, including Ethernet private line (EPL) and Ethernet

virtual private line (EVPL). You can create a new service and configure a bound path.

Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge

(VB) and configure the following: service mount, VLAN filtering, VLAN unicast,

disable MAC address, bound path, self-learning MAC address, VB port MAC address

table capacity, and VLAN MAC address table capacity.

Configure Ethernet Layer-2 switching, including:

− Aging time

− Spanning tree

− Multiple Spanning Tree

− IGMP snooping protocol.

Configure QinQ service: QinQ is an embedded technology in VLAN, and tags users with

multi-layer VLAN ID, so that VLAN can be extended. You can perform operations such

as adding, stripping and exchanging of tags in different scenarios.

Configure Ethernet link aggregation group (LAG), which contains intra-board LAG and

inter-board LAG.

− Create or delete an LAG.

− Add or delete LAG ports.

Page 83: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 5 MSTP Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5-7

− Query LAG ports and aggregation state.

Configure quality of service (QoS), including:

− Flow configuration

− CAR configuration

− CoS configuration

− Flow shaping management

− Port shaping management

− Configuring the differentiated service (DiffServ) domains

− Port policy

− CAR policy

− Port WRED Policy

− V-UNI ingress policy

− V-UNI egress policy

− PW policy

− Weighted random early detection (WRED) congestion and discarding policy of

services

− QinQ policy

− Weighted fair queuing (WFQ) schedule policy

Test frame receiving and transmitting on Ethernet boards, including the EGT, EFT, EGS,

EFS and EMS boards.

Support the ability to query the opposite NE of the data services on these boards for the

Metro 1000V3.

Configure OAM for Ethernet services.

Configure OAM for Ethernet ports.

Configure the LCAS attributes such as hold-off time, WTR time and protocol mode.

Use QoS template to simplify the QoS configuration for Ethernet services.

Support the automatic reporting of RMON performance of Ethernet boards.

Support the dumping of history RMON performance of Ethernet boards.

Support the automatic creation of OAM for Ethernet trails.

Support the protocol diagnosis function.

Support the configuration of IGMP static multicast table items.

Support the standard LPT bearer mode.

Support the setting of the LCAS alarm threshold.

Support the alarm function in the case of no traffic at Ethernet ports.

Support the Ethernet port mirroring.

Support the unidirectional LPT function.

Support setting and querying the MAC address of a data board.

Support traffic monitoring and report for an Ethernet port.

Support the board-level configuration, including setting and querying the IP address.

Support the LPT and port traffic statistics functions.

Support creating flows in batches.

Page 84: IManager U2000 Product Description V100R002C00 03

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System

Product Description

5-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Support the setting of the LPT restoration time and the point to multi-point LPT

management in the three scenarios of IP->VCTrunk(s), VCTrunk->IP(s), and

VCTrunk(s)->VCTrunk(s) for a board.

Support the ability to manage multiprotocol label switching (MPLS) for multi-service

transmission platform (MSTP) equipment. The MSTP equipment builds an label

switched path (LSP) with a PE router, identifies LSP labels and service priorities, and

encapsulates LSPs into virtual concatenation groups (VCGs) for transmission.

Supports the management of the virtual Ethernet interface

Supports the control plane for configuring the static routes and address resolution.

Supports the packet Ethernet services including E-Line service, E-LAN service,

E-AGGR service and clock service.

RPR Management

By using the U2000, a user can perform the following operations:

Modify resilient packet ring (RPR) node information.

Set and query the node information of an NE in the RPR.

Set the RPR link information of an NE.

Query the topology of the RPR that the NE belongs to.

Query the protection status, switching status and switching position of the RPR that an

NE belongs to.

Configure forced switching, manual switching or clear switching in the RPR that an NE

belongs to.

Clock Configuration

By using the U2000, a user can perform the following operations:

Query the clock synchronization status.

Set clock source priority tables, including:

− System clock source priority list

− Priority table for phase-locked sources of 1st external clock output

− Priority table for phase-locked sources of 2nd external clock output

Set clock source switching, including:

− Clock source restoration parameters

− Clock source switching condition

− Clock source switching

Configure clock subnets, including:

− Clock subnet

− Clock quality

− Synchronization status message (SSM) output control

− Clock ID status

Set phase-locked sources output by external clock, including:

− External clock output phase-locked source

− 2 Mbit/s phase-locked source external clock attributes

Page 85: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 5 MSTP Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5-9

IEEE 1588 Packet Clock

By using the U2000, a user can perform the following operations:

Configure the selection mode of a frequency source.

Set the PTP clock source port.

Set the quality level of the clock source.

Set the PTP clock source priority.

Configure a PTP clock service.

Set the clock interface configuration.

Set the external clock interface configuration.

Ethernet OAM Management

By using the U2000, a user can configure the 802.1 ag Ethernet OAM as follows:

Create and configure maintenance nodes.

Perform a CC check.

Perform a loopback (LB) check.

Perform a link trace (LT) check.

Perform a ping test.

Perform performance detection.

By using the U2000, a user can configure the 802.3 ah Ethernet OAM as follows:

Query remote OAM parameters.

Set link monitoring parameters. This function can help you to detect the events of frame

error, frame error period, and frame error seconds.

Perform a remote loopback test.

Support reporting of Ethernet OAM loopback events.

Supports OAM management for MPLS tunnels.

5.2 MSTP Protection Subnet Management

A protection subnet is a network structure with the comprehensive self-protection function. In

the U2000, the protection subnet is a generalized concept that includes not only the network

structure with the comprehensive self-protection function, such as an MSP ring and a path

protection (PP) ring, but also the network structure without the self-protection function, such

as an unprotected ring and an unprotected chain.

To perform protection subnet management, you need to have the related license.

By using the U2000, a user can perform the following operations:

Create protection subnets of different types.

− Linear MSP: 1+1 and M:N.

− MSP ring: two-fiber bidirectional MS shared protection ring, two-fiber unidirectional

MS dedicated protection ring, and four-fiber bidirectional MS shared protection ring.

− PP ring: two-fiber unidirectional PP ring and two-fiber bidirectional PP ring.

Page 86: IManager U2000 Product Description V100R002C00 03

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System

Product Description

5-10 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

− dual node interconnection (DNI) protection.

− Non-protection (NP) ring and NP chain.

Search for a protection subnet according to the information of NEs and fibers or cables

in the U2000, to form a complete protection subnet.

Migrate an NP chain to a 1+1 linear MSP without interrupting services.

Start or stop the MSP protocol of the MSP subnet, such as enabling or disabling the MSP

protocols networkwide or the MSP protocol for a single node.

For 1+1 MSP, the U2000 automatically generates the service of the protection channel

according to the service of the working channel.

Adjust the bandwidth dynamically. You can dynamically adjust the MSP bandwidth

according to the service demands and how the network bandwidth is used currently to

improve the utilization of network bandwidth. For example, for an STM-16 MSP of an 8

x VC4 bandwidth, if the 6 x VC4 bandwidth is enough, then you can change the

protection bandwidth from 8 x VC4 to 6 x VC4 bandwidth and save 4 x VC4 for the use

of non-MSP-protected services.

Expand the capacity of an MSP ring and a linear MSP chain. Expand the link capacity by

replacing the line boards on both sides of the link without interrupting active services.

For example, upgrade an STM-16 MSP ring to STM-64 smoothly.

Change the reversion mode of linear MSP protection without restarting the protocol.

Expand and add nodes to multiple types of protection subnets, including MSP, SNCP, PP,

NP ring, NP chain and their combinations.

Query the names, types and status of all protection subnets.

Query and set the switching status, wait-to-restore (WTR) time and the trigger condition

of the protection subnet.

Query all the isolated nodes and delete useless nodes.

Set and view SDH NNIs.

Query the relevant trail by protection subnet.

Manage the entire RPR ring network. You can create, delete, and search for an RPR ring.

You can also manage the RPR ring protection parameters and link parameters. RPR ring

topology can be displayed through a view.

Collect statistics on protection subnets, and display the rate levels of the protection

subnets.

5.3 End-to-End MSTP Management

End-to-end network management is also referred to as trail management. You can construct

the configuration data of end-to-end network management by searching for the data at the NE

layer of the U2000, or directly configure the data at the network layer of the U2000, and apply

the data to all the related NEs. Compared with configuring NE data on a per-NE basis,

configuring NE data by using the trail management function is faster and more convenient.

To perform end-to-end network management, you need to have the related license.

MSTP Trail Management

By using the U2000, you can perform the following operations:

Create and maintain an SDH trail.

Page 87: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 5 MSTP Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5-11

− Create an SDH trail, designate a timeslot, and select the protection priority strategy

and the resource usage strategy. The service levels include VC12, VC3, VC4, VC4

server trail, VC4-4C, VC4-8C, VC4-16C and VC4-64C.

− Activate or deactivate, and lock or unlock an SDH trail.

− Join or split, and enable or disable a VC4 server trail.

− During search of SDH trails, the U2000 retains the attributes of the existing ones as

they are.

− Upgrade an SDH trail to an ASON trail.

− Degrade an ASON trail to an SDH trail.

− Query the service status on a per-NE basis according to SDH trails.

− Manage optical power: Query the input power, output power, and power thresholds

for SDH boards.

− Set and query the overhead bytes of all NEs on the trail, such as the trace byte.

− The U2000 prompts users to configure trace bytes when timeslot out-of-sequence

occurs to the MS.

− Query the status of a lower order service.

− Set overhead pass-through or termination of all NEs on the trail.

− Insert alarms into the trails of VC4 level, such as AIS and remote defect indication

(RDI).

− Set loopback on any nodes of the trail, including VC4 loopback, tributary loopback,

optical interface loopback and cross-connection loopback.

− Perform a PRBS test on the trail.

− Modify the add/drop ports of the trail and the timeslot occupied by the trail

in-service.

− Adjust the original route partially by changing the NE, board or timeslot that the trail

passes through.

− Modify the route for concatenated services in-service.

− Person SNCP switching on a trail.

− Generate dual-fed SDH services automatically for 1+1 linear MSP.

− Duplicate an SDH trail for creating trails in batches.

− Manage discrete SDH services, such as querying or analyzing discrete services.

− View the usage of VC12 or VC3 trails related to a VC4 server trail in an easy manner.

You can also view the information about the VC12 or VC3 trails.

− Convert SDH discrete cross-connections to a mono nodal trail.

− Manage an SDH trail based on rights and domains.

Manage the alarms and performance events related to an SDH trail.

− Configure alarm suppression or alarm reversion for a trail.

− Query current and history alarms, current and history performance data, unavailable

time (UAT) and performance threshold-crossing records of an SDH trail.

− Set the performance parameters for an SDH trail.

− Query the SDH trails and customer information affected by an alarm.

− Display the R_LOS alarms in the Transmission Media Layer Route view.

Search for trails. According to the NE configuration data, at the NE layer, or the fiber

connection data, protection subnet information at the network layer, the U2000 generates

Page 88: IManager U2000 Product Description V100R002C00 03

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System

Product Description

5-12 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

the network layer information about end-to-end trails, including SDH trails and Ethernet

trails.

Name trails automatically.

Filter trails in three ways.

− Filter all: Filter all trails and only display the qualified trails in a network.

− Secondary filter: Filter those trails that are already displayed according to the filter

criteria.

− Incremental filter: Filter the newly added trails and display the newly qualified trails

together with the currently displayed ones.

Ethernet Trail Management

By using the U2000, you can perform the following operations:

Create and maintain an Ethernet trail.

Create trunk links at VC12, VC3, VC4, VC4-4C, VC4-8C and VC4-16C levels.

Create an unterminated trunk link.

Create an Ethernet trail. The service includes EPL, EVPL, unterminated EPL, EPLAN,

EVPL based on QinQ, EVPL based on RPR and EVPLAN based on RPR.

For release 4.0 NEs, the SDH NNI needs to be created on Ethernet line boards.

Activate or deactivate an Ethernet trail.

During search of Ethernet trails, the U2000 retains the attributes of the existing ones as

they are.

Manage discrete Ethernet services, such as querying or analyzing discrete services.

Search for an Ethernet trail.

Manage the alarms and performance events related to an Ethernet trail.

Query the Ethernet trails and customer information affected by the alarm.

Query current and history alarms of an Ethernet trail.

Filter trails in three ways.

− Filter all: Filter all trails and only display the qualified trails in a network.

− Secondary filter: Filter those trails that are already displayed according to the filter

criteria.

− Incremental filter: Filter the newly added trails and display the newly qualified trails

together with the currently displayed ones.

Manage the alarms and performance events related to an Ethernet trail.

− Query the Ethernet trails and customer information affected by the alarm.

− Query current alarms, history alarms of an Ethernet trail.

− Implement the RMON performance function of an Ethernet trail.

ATM Trail Management

By using the U2000, you can perform the following operations:

Create and maintain an asynchronous transfer mode (ATM) trail.

− Create an ATM trunk link.

− Create an ATM trail.

Page 89: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 5 MSTP Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5-13

− Activate and deactivate an ATM trail.

− Manage ATM discrete services, such as querying and analyzing a discrete service.

− Search for an ATM trail.

Manage the alarms and performance events related to an ATM trail.

− Query the ATM trails and customer information affected by an alarm.

− Query the current and history alarms related to an ATM trail.

Filter trails in three ways.

− Filter all: Filter all trails and only display the qualified trails in a network.

− Secondary filter: Filter those trails that are already displayed according to the filter

criteria.

− Incremental filter: Filter the newly added trails and display the newly qualified trails

together with the currently displayed ones.

Network-Wide Clock Topology Management Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.

Displaying clock trace relationship.

Displaying clock alarm status.

PWE3 Service Management

By using the U2000, you can perform the following operations:

Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.

Pre-deploy a PWE3 service.

Implement the function of automatically discovering PWE3 services.

Modify and delete PWE3 services, and filter PWE3 services to view the desired services.

Manage multi-hop PWE3 services.

Implement the protection management of PWE3 services.

View the topology of PWE3 services.

View the alarms of a PWE3 service.

View the performance of a PWE3 service.

Test and check a PWE3 service.

Manage discrete PWE3 services.

Manage PWE3 services based on rights and domains.

Clone a PWE3 service.

Manage PWE3 service templates.

Implement the function of automatically generating Ethernet OAM for PWE3 services.

Tunnel Management

By using the U2000, you can perform the following operations:

Create static tunnels.

Pre-deploy a tunnel.

Implement the function of automatically discovering tunnels.

Page 90: IManager U2000 Product Description V100R002C00 03

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System

Product Description

5-14 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Modify and delete a tunnel, and filter tunnels to view the desired tunnels.

View the topology of tunnels, including the working and protection routes.

View the alarm of a tunnel.

View the performance of a tunnel.

Test and check a tunnel.

Manage discrete tunnels.

Manage BGP/MPLS VPN tunnels.

Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the

function of automatically discovering 1+1 or 1:1 tunnel protection groups.

Switch services in a 1+1 or 1:1 tunnel protection group manually.

Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection

groups.

5.4 End-to-End MSTP IP Management

There is the IP feature in MSTP equipment. You can build the configuration data of

end-to-end MSTP IP network management by searching for the data at the NE layer of the

U2000, or directly configure the data at the network layer of the U2000, and apply the data to

all the relevant NEs. Configuring NE data by using the trail management function is faster

and more convenient compared with configuring NE data on a per-NE basis.

To perform end-to-end network management by using the U2000, you need to have the

required license.

PWE3 Service Management

By using the U2000, you can perform the following operations:

Create the CES service and the Ethernet service of the PWE3 services.

Pre-deploy a PWE3 service.

Implement the function of automatically discovering PWE3 services.

Modify and delete PWE3 services, and filter PWE3 services to view the desired services.

Manage multi-hop PWE3 services.

View the topology of PWE3 services.

View the alarms of a PWE3 service.

View the performance of a PWE3 service.

Manage discrete PWE3 services.

Manage PWE3 services based on rights and domains.

Copy a PWE3 service.

Implement the function of automatically generating Ethernet OAM for PWE3 services.

VPLS Service Management

By using the U2000, you can perform the following operations:

Create a VPLS service.

Pre-deploy a VPLS service.

Page 91: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 5 MSTP Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5-15

Implement the function of automatically discovering VPLS services.

Modify and delete VPLS services, and filter VPLS services to view the desired services.

View the topology of VPLS services.

View the alarms of a VPLS service.

View the performance of a VPLS service.

Manage discrete VPLS services.

Manage VPLS services based on rights and domains.

Implement the function of automatically generating Ethernet OAM for VPLS services.

Tunnel Management

By using the U2000, you can perform the following operations:

Create static CR tunnel.

Pre-deploy a tunnel.

Implement the function of automatically discovering tunnels.

Modify and delete a tunnel, and filter tunnels to view the desired tunnels.

View the topology of tunnels.

View the alarm of a tunnel.

View the performance of a tunnel.

Manage discrete tunnels.

Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the

function of automatically discovering 1+1 or 1:1 tunnel protection groups.

Switch services in a 1+1 or 1:1 tunnel protection group manually.

Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection

groups.

5.5 SDH ASON Management

ASON is a new generation of optical network that integrates the exchange and transport. After

a user initiates a service request, the ASON selects a route automatically, establishes and

removes connections through the signaling control, and performs network connections

automatically and dynamically. An ASON NE refers to the equipment that is equipped with

both SDH and ASON features. An ASON network is managed by the U2000 that combines

ASON and SDH features.

ASON Topology Management

By using the U2000, a user can perform the following operations:

Discover ASON topologies and resources automatically.

Synchronize NEs in a domain: The U2000 can obtain the topology of the network

through the active NE.

Upload the configuration data of NEs that are already created automatically.

Set the active and standby NEs.

Synchronize cross-connections for NEs.

Page 92: IManager U2000 Product Description V100R002C00 03

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System

Product Description

5-16 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Manage domains, including creating and deleting domains, and changing the domain

name.

Query the ASON NE software version.

Search for ASON discrete signaling.

Manage node IDs on ASON NEs.

Enable or disable the optical virtual private network (OVPN) status of the NE.

Query SRGs relevant to an NE.

Control Link Management

By using the U2000, a user can perform the following operations:

Synchronize networkwide control links .

Filter links by domain or source/sink information.

View control links.

Query the current alarm and history alarm about a control link.

Set alarm suppression for a control link.

Customize whether to display the color of alarms in the SDH Control Link

Management window.

Print or save the report list control links information.

Component Link Management

By using the U2000, a user can perform the following operations:

Synchronize networkwide component links.

Filter component links by domain or source/sink information

View component link information.

Create component links.

Delete component links.

Set resources reservation.

Query VC4 timeslot usage status.

Query link timeslot segmentation.

Print or save the report list component links information.

TE Link Management

By using the U2000, a user can perform the following operations:

Synchronize networkwide links by domain.

Filter links by domain, source/sink information or OVPN customer.

View traffic engineering (TE) links.

Create virtual TE links.

Delete virtual TE links.

Create fibers.

Set the distance for a TE link.

Set the risk link group number.

Page 93: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 5 MSTP Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5-17

Create a link resource report.

View bandwidth usage.

Divide link resource to an OVPN customer.

Query the alarm information for a TE link.

Set alarm suppression for a TE link.

Query the performance for a TE link.

View the interrupted TE links.

Query SRGs relevant to a TE link.

Set the cost of a TE link.

ASON Trail Management

By using the U2000, a user can perform the following operations:

Filter relevant ASON services by actual route, original route or shared mesh restoration

trail.

Synchronize ASON trails by domain or attributes.

View ASON trails.

View the details of an ASON trail.

Create an ASON server trail of the diamond, gold, silver, or copper class.

Create an ASON trail of the diamond, gold, silver, copper or iron class.

Set OVPN customer of an ASON trail.

Activate or deactivate ASON trails or SDH ASON server trails.

Delete inactive SDH ASON trails or inactive SDH ASON server trails.

Delete SDH ASON trails or SDH ASON server trails from NM.

Duplicate ASON trails.

Optimize ASON trails.

Pre-calculate and optimize service trails.

Create a user network interface (UNI) service trail.

Set routing attributes of the ASON trails, including rerouting lockout status, revertive

lockout status, rerouting priority, rerouting revertive mode, WTR time, schedule

revertive time, rerouting policy, trigger condition, crankback and rerouting triggered by

B3 bit error

Query the rerouting reversion status of a revertive ASON trail.

Create and disable SDH ASON associated trails.

Set association for ASON trails.

Remove association for ASON trails.

Set the association source for ASON trails.

Set the trigger condition for rerouting associated route.

Query the related SDH trails for ASON trails.

Set a preset restoration trail for an ASON trail.

Downgrade an ASON trail to an SDH trail.

Migrate a trail in-service.

View the actual route, original route or associated route of an ASON trail.

Page 94: IManager U2000 Product Description V100R002C00 03

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System

Product Description

5-18 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

View the preset restoration trail or shared mesh for restoration trail an ASON trail.

Revert ASON trails manually.

Switch the working or protection trail of a diamond trail manually.

View the alarms of an ASON trail.

Set alarm suppression for the selected ASON trail.

View the control plane performance of an ASON trail.

View the performance events of an ASON trail.

Create the ASON trail report.

Refresh the original route, actual route or associated route of an ASON trail.

Refresh the preset restoration trail or shared MESH restoration trail for an ASON trail.

Set an actual route as an original route.

Restore to the original route in batches.

Set names for ASON trails in batches according to the naming rules.

Query the service level agreement (SLA) conformity of ASON trails.

Support the display of valid routes for gold services after the MSP switching.

Save the attributes of the service after you create an ASON service successful.

Restore the default attributes of the service when you create an ASON service.

Set SNCP access to a ASON trail.

Manage creators of SDH ASON trails.

Downgrade an SDH ASON trail forcibly.

Reroute the preset SDH ASON restoration trail in case of a fault.

UNI Service Management Synchronize UNI services by domain.

View the information about an UNI service.

Filter UNI services by domain or source/sink information.

ASON Clock Subnet Management Create an ASON clock subnet.

Create a preconfigured ASON clock subnet.

Convert a preconfigured ASON clock subnet into an ASON clock subnet.

Convert a traditional clock subnet into an ASON clock subnet.

Manage a hybrid network composed of an ASON clock subnet and a traditional clock

subnet.

Manage the startup time for the SDH ASON clock recovery.

SRG Management Create, delete and modify an SRG.

Manage SRGS of the pipe, fiber/cable, NE and site.

One-End Terminated ASON Server Trail Management

By using the U2000, a user can perform the following operations:

Page 95: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 5 MSTP Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5-19

Create and delete a one-end terminated ASON server trail.

Activate and deactivate a one-end terminated ASON server trail.

Associate one-end terminated ASON server trails.

Create and delete the ASON-SDH trail that contains one-end terminated ASON server

trail.

Activate and deactivate the ASON-SDH trail that contains one-end terminated ASON

server trail.

Search for the ASON-SDH trail that contains one-end terminated ASON server trail.

Set association relations between the ASON trails that have different sources and sinks.

Integration of SDH and ASON Trails

By using the U2000, a user can perform the following operations:

Specify the explicit route for ASON services when creating an ASON-SDH trail. That is,

an ASON-SDH trail includes an SDH trail and an ASON trail.

View SDH and ASON trails at the same time in the SDH Trail Management window.

Manage overhead bytes, alarms and performance of a joint trail in a unified manner.

Query the related ASON trails by an SDH trail.

Query the related SDH trails by an ASON trail.

Downgrade an ASON trail to an SDH trail.

Upgrade an SDH trail to an ASON trail.

Set the revertive attributes when an SDH trail is being migrated to an ASON trail.

Create dual-fed and selectively received VC4 ASON server trails.

Create lower order diamond trails.

Calculate working and protection routes using the SPC first policy.

The alarm in the ASON section of an ASON-SDH trail supports the alarm statistics

function.

Support an SNCP access scheme, such as setting the SNCP access attributes of an ASON

trail, querying the SNCP protection switching status of the ASON trail, and performing

protection switching on the SNCP access point of the ASON trail.

File Export or Import for Simulated Network Planning Information

By using the U2000, a user can perform the following operations:

Export the simulated network planning information, including networkwide

configuration file, NE configuration file, network layer information file, ASON

information file, the TE link information, the associated ASON service information, the

route calculation policy, the component link information, the ASON resource reservation

information, the WTR time information, the preset restoration trails and route calculation

policy for nodes.

Import file scripts of the simulated planning information.

ASON NE Catastrophe Restoration

The U2000 supports an ASON NE catastrophe restoration scheme.

Page 96: IManager U2000 Product Description V100R002C00 03

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System

Product Description

5-20 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

SDH ASON Management on a Per-NE Basis

By using the U2000, a user can perform the following operations:

Manage board ASON feature.

Manage control plane parameters.

LMP control channel.

Query LMP component link.

Query LMP TE link.

Set LMP auto discovery type.

Manage fiber resource threshold.

Query OSPF control link.

Query OSPF SDH TE link.

Query OSPF component link.

Manage OSPF IP address.

Manage OSPF TE Link flood threshold.

Manage OSPF protocol authentication.

Manage ASON trail group.

Query ASON trail.

Maintenance SDH ASON signaling.

Maintenance SDH ASON switch controller.

Maintenance ASON shared MESH switch controller.

Suppression the control plane alarm.

Manage control plane performance parameters.

Manage reserved resource .

Manage VC4 timeslot occupation status.

Page 97: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-1

6 WDM Network Feature Management

About This Chapter

This topic describes the functional features of WDM NE management and network

management.

6.1 WDM NE Management

NE management refers to the management of configurations of an NE in terms of attributes,

services, protection, and clocks. The configuration object is a single NE. The data is saved to

the database of the U2000 and the database of the NE.

6.2 NA WDM NE Management

NE management includes the configurations on attributes, communications, services,

protection, and clock on an individual NE basis. The configuration data is saved at the NE

layer on the U2000 and in the database of the NE.

6.3 WDM Protection Subnet Management

A protection subnet is a network structure with the comprehensive self-protection function. In

the U2000, the protection subnet is a generalized concept that includes not only the network

structure with the comprehensive self-protection function, such as an MSP ring and a PP ring,

but also the network structure without the self-protection function, such as an unprotected ring

and an unprotected chain.

6.4 End-to-End WDM Management

End-to-end network management is also referred to as trail management. You can construct

the configuration data of end-to-end network management by searching for the data at the NE

layer of the U2000, or directly configure the data at the network layer of the U2000, and apply

the data to all the related NEs. Compared with configuring NE data on a per-NE basis,

configuring NE data by using the trail management function is faster and more convenient.

6.5 WDM ASON Management

ASON is a new generation of optical network that integrates the exchange and transport. After

the user initiates a service request, the ASON selects a route automatically, establishes and

removes connections through the signaling control, and performs network connections

automatically and dynamically. An ASON NE refers to the equipment that is equipped with

both WDM and ASON features. An ASON network is managed by the U2000 that combines

ASON and WDM features.

Page 98: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

6.1 WDM NE Management

NE management refers to the management of configurations of an NE in terms of attributes,

services, protection, and clocks. The configuration object is a single NE. The data is saved to

the database of the U2000 and the database of the NE.

Basic NE Configuration

By using the U2000, a user can perform the following operations:

Synchronize NE time: Send the computer system time, NTP server time, or standard

NTP server time at the U2000 server end to all NEs for synchronizing the NE time. You

can set the U2000 to automatically synchronize the NE time by specifying the automatic

synchronization period.

Query the physical inventory information, including the equipment room, racks, NEs,

shelves, boards, subboards, and ports.

Support the board plug and display feature: After a board is inserted to the slot, the NE

Panel automatically displays the board and board information.

Disable NE functions automatically. You can set the U2000 to periodically disable

certain NE functions that may affect services, such as loopback and ALS. When the time

expires, these operations automatically stop.

Modify NE attributes such as:

− NE name

− NE ID

− NE extended ID

− Remarks

− NE pre-configuration

− NE Time zone and DST

Change attributes of optical NEs, including:

− Name

− Remarks

− Resources assigned for them

Environment monitoring information. You can set or query the PMU interface, NE fan

speed and monitor temperature.

Network operator information. You can set the information about the network operator,

including the international identifier, domestic identifier, and customized identifier.

Search and create NEs by discovering the NE IP address automatically.

Orderwire Configuration

By using the U2000, a user can perform the following operations:

Configure the board to an orderwire board, and query the orderwire board information.

Set and query the orderwire phone numbers, call waiting time, dialing mode, and

orderwire phone port availability.

Set and query the networkwide conference call number.

Set and query the subnet No. length and the related subnet of the optical interface.

Set and query the SDH NNI connection for orderwire.

Page 99: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-3

Configure and query the F1 data port.

Configure and query the broadcast data port.

Configure E1 Cross-Connections.

Configuration for Ethernet Interfaces and Services

By using the U2000, a user can perform the following operations:

Configure Ethernet port mirroring. You can monitor packets, perform routine

maintenance operations and in-service commissioning through a mirrored port in a

flexible manner.

Configure or query the internal ports of an Ethernet interface, including:

− Basic attributes

− Flow control

− TAG attributes

− Network attributes

− Bound path

− Advanced attributes

Configure or query the external port of an Ethernet interface, including:

− Basic attributes

− Flow control

− TAG attributes

− Network attributes

− Advanced attributes

Configure EPL services, EVPL (QinQ) services and VLAN SNCP services.

QinQ is an embedded VLAN technology that introduces multi-layer VLAN IDs to identify different

users. In this way, VLAN is expanded. The U2000 supports the ability to add labels.

The VLAN SNCP service is VLAN-based Ethernet private line service that has the SNCP protection.

You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a

VLAN SNCP service and a normal Ethernet service.

Configure EPLAN services. You can create a new VB and configure the following:

service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, and

self-learning MAC address.

Configure QoS, including:

− Flow

− CAR

− CoS

− Flow shaping

− Port shaping

Configure link capacity adjustment scheme (LCAS): The LCAS can dynamically adjust

the number of virtual containers for mapping desired services, to meet different

bandwidth requirements of services. In this manner, the bandwidth utilization is

improved.

Configure OAM for Ethernet services.

Configure OAM for Ethernet ports.

Page 100: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Support the intra-board LAG function.

Support the DLAG function.

Support the VLAN group function.

Support the port MAC address filtering.

Test frame receiving and transmitting on Ethernet boards.

Support the protocol diagnosis function.

Configure QinQ type area.

Configure Ethernet Layer-2 switching, including:

− Aging time

− Spanning tree.

− IGMP snooping protocol.

Configure Multiple Spanning Tree Protocol (MSTP). MSTP is compatible with the STP

and RSTP, and it also fixes the defects of the STP and RSTP. The convergence rate of the

MSTP is fast. In addition, traffic of different VLANs passes through corresponding trails,

which provides a well load balancing mechanism.

Configure MPLS Tunnel. In a PSN network, the MPLS tunnel carries PWs where

various services are encapsulated. In this way, data packets can be transparently

transmitted among NEs.

Configure Ethernet ring protection switching (ERPS). Based on the traditional Ethernet

mechanism, the ERPS uses the Eth-OAM function and the ring automatic protection

switching (R-APS) protocol to achieve fast protection switching on the Ethernet ring

network.

Configure link-state pass through (LPT). LPT is used to return the remote-end link status

to the near end. The near-end equipment performs operations depending on the

remote-end link status. The Ethernet board periodically monitors the network to know

the Ethernet status. For the change in the connection status of Ethernet ports, if the

change is caused by the opposite equipment, a board at the local end, network cable,

human factors and other reasons, you can use the LPT function to quickly switch the

route to the equipment on both ends.

Support the automatic reporting of RMON performance of Ethernet boards.

Dump history RMON performance data of Ethernet boards.

WDM Board Configuration

By using the U2000, a user can perform the following operations:

Configure optical transponder units.

Configure service multiplexing and de-multiplexing units.

Configure tributary and line boards.

Configure protection boards.

Configure optical amplifier units.

Configure spectrum analysis units.

Configure optical supervisory channel units.

Configure optical add/drop multiplexing units.

Configure variable optical attenuator units.

Configure optical equalization units.

Configure optical fiber monitoring units.

Page 101: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-5

Configure dispersion compensation units.

Configure wavelength management boards.

Manage dynamic ports.

Query the line rate of an optical transport network (OTN).

Overhead Configuration

By using the U2000, a user can configure OTN overheads as follows:

Configure and query the SM overhead.

Configure and query PM overheads.

Configure and query the TCM overhead.

Configure and query the FTFL overhead.

Query the OPU overhead.

By using the U2000, a user can configure WDM overheads as follows:

Configure the optical channel (OCh) overhead at the SDH interface.

Configure the optical transponder unit (OTU) overhead at the OTN interface.

Configure the optical demultiplexer unit (ODU) overhead at the OTN interface.

Configure the optical channel payload unit (OPU) overhead at the OTN interface.

Configure the optical transmission section (OTS) overhead at the OTN interface.

By using the U2000, a user can configure SDH overheads for the OptiX OSN 8800 I and

OptiX OSN 8800 II as follows:

Configure the regenerator section overhead (J0).

Configure the lower order path overhead (V5, J2).

Configure the VC4 higher order path overhead (J1, C2) and pass-through or termination.

Configure the VC3 higher order path overhead (J1, C2).

WDM Service Configuration

At an optical add/drop multiplexer (OADM) station, a user can perform ADM configuration

for GE/Any services using the OTU board as follows:

Several WDM service boards in specified slots form a cross-connect unit group.

GE/FC services can be added or dropped, passed through or looped back in each

cross-connect unit group.

Support wavelength cross-connection protection (WXCP), with working and protection

cross-connections configured at the sink NE.

Support the function of configuring electrical cross-connections.

The U2000 allows you to configure electrical cross-connections to control service flow

in the electrical layer, and to dynamically groom, converge and split sub-wavelength

services. In this way, the networking and network survivability ability is enhanced.

Integrated grooming of GE services, ODU0, ODU1 and ODU2 services realized by

cross-connect boards.

Distributed grooming of GE services, ODU0, ODU1 and ODU2 services and Any services.

Page 102: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Support SNCP at the ODU2, ODU1 and ODU0 level.

You can configure optical cross-connections as follows:

Create optical cross-connections dynamically. Manage optical cross-connections for a

board and a per-NE basis, including creation, activation, deactivation, deleting and

querying.

Support the functions of creating, querying, and deleting boundary ports.

You can perform the following service management functions:

Lock WDM trails and view the lock status of the corresponding trails in the service

management window of the NE Explorer.

View the name of the trail that a service belongs to.

Query the trail that a service belongs to.

The OSN 1800 supports service package management. The service package module helps you

perform typical service configurations. In this manner, you are freed from the in-field

commissioning. This reduces costs of deployment commissioning and maintenance of

products. In addition, the equipment can be configured in a one-touch manner.

Manage license for the service types and cross-connect capacity of the OptiX OSN 8800 I and

OptiX OSN 8800 II.

ROADM Configuration

Using the reconfigurable optical add/drop multiplexer (ROADM) function in the U2000, a

user can perform add/drop and pass-through configuration for optical channels. The WDM

equipment uses the DWC and wave selective switch (WSS) to implement the ROADM

function.

Configure ROADM boards based on the DWC boards: The wavelength grooming is

realized through the DWC boards. This configuration method is often used for the

normal nodes in a chain or ring network.

Configure ROADM boards based on the WSS boards: There are two types of networking:

WSSD+WSSM and WSS+RMU/ROAM. This configuration method is often used for the

cross-connect nodes in a ring network.

Configure ROADM boards based on the multiplexing and demultiplexing boards:

Wavelengths cannot be groomed dynamically. This configuration method is often used

for the normal nodes in a chain network.

Clock Configuration

By using the U2000, a user can perform the following operations:

Configure a board clock source.

Configure transparent transmission of an external clock.

Configure a clock for the SCC board.

− Configure a clock for the optical supervisory channel unit.

− Specify the traceable clock source for the SCC board.

− Define the clock source priorities.

Page 103: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-7

PTP Clock(1588 V2 Clock) Configuration Configure the frequency source mode.

Configure PTP clock synchronization attributes.

Query the clock source received at the port.

Configure PTP clock subnet.

Configure PTP packet attributes.

Configure the external time interface.

Physical Clock Configuration Configure input attributes of external clocks.

Configure the system clock source priority table.

Configure the clock source protection and clock source reversion.

Configure phase-locked source output of external clocks.

Configure the quality of clock sources.

WDM Protection Configuration

By using the U2000, a user can perform the following operations:

Configure optical line protection and 1:1 optical line protection.

Configure optical wavelength protection group.

Configure port protection.

Configure 1:N(N no larger than 8) optical channel protection.

Configure 1+N(N no larger than 48) optical channel protection.

Configure protection for clock transparent transmission.

Configure optical wavelength share protection (OWSP) in the case of the Metro WDM

equipment and the NG WDM equipment.

Configure WXCP protection for GE/FC services.

Configure WXCP protection group for the NE in the sink slot.

Configure and query the WXCP protection parameters.

Query the status of WXCP protection switching.

Query the services with WXCP protection.

Perform WXCP protection switching.

Configure tributary protection set.

Configure dual path protection set.

Configure board 1+1 protection.

− Configure SCC board 1+1 protection.

− Configure cross-connect and synchronous timing (XCS) board 1+1 protection.

− Perform switching between working and protection.

− Query the switching status.

Configure SNCP protection.

Configure sub-wavelength (SW) SNCP for GE services or services of the Any type on an

OTU board.

Configure SNCP for optical channel data unit (ODUk) services.

Page 104: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Configure MS SNCP.

Configure VLAN SNCP for an Ethernet board.

− Perform protection switching.

− Query the switching status.

Support BPS protection.

Support the DBPS protection. The distribute board protect system (DBPS) protects the

10GE and GE ports of the TBE board.

Support ODUk SPRings of the ODU1 and ODU2 levels.

Support the service package. The service package module helps you perform typical

service configurations. In this manner, you are freed from the in-field commissioning.

This reduces costs of deployment commissioning and maintenance of products. In

addition, the equipment can be configured in a one-touch manner.

In the case of 1+1 protection for the SCC board, a user can query the status of the data

backup between the active and standby SCC boards.

Optical Power Adjustment

By using the U2000, a user can perform the following operations:

Manage the optical power. The user can query the input power, output power and power

threshold and so on for each WDM board.

Perform the function of intelligent power adjustment (IPA) management. When a fiber is

cut off, the optical amplifier board detects the signal loss at the station. The station

reports an exceptional event to the U2000. After the user confirms the event, the optical

amplifier boards at the upstream and downstream stations reduce their output power to a

safe value to prevent the fiber maintainer from being hurt by the lasers emitted from the

cut-off fiber. After the fiber is reconnected, the optical signals restore to normal and the

optical power of each optical amplifier board automatically returns to a normal value.

Automatic level control (ALC) management: Support the adjustment modes including

wavelength count detection, power detection, and link attenuation (gain mode). The

wavelength detection mode applies to the transmission link where no service is added or

dropped or where the number of wavelengths added and that dropped are the same at the

OADM. When the spectrum analyzer unit detects that the sum of each wavelength power

greatly differs from the standard power of the corresponding wavelength count, an

exceptional event is reported to the U2000. After the user confirms the event, the user

needs to manually issue a command to adjust the attenuations of each station on the link.

The power reference mode applies to the transmission links where the number of added

wavelengths differs from the number of dropped ones at an OADM. When the optical

amplifier board detects that the output power becomes abnormal, the station

automatically issues the command to adjust the attenuation of each station on the link.

This mode does not involve the spectrum analyzer unit, and is thus cost-effective. For the

previous two modes, a user can manually control whether to enable the ALC function.

The link attenuation adjustment mode also applies to the transmission link where the

number of added wavelengths differs from the number of dropped ones at an OADM.

When the optical power is attenuated to the detection threshold, a command is

automatically issued to adjust the attenuation of each station on the link.

The link attenuation adjustment mode is also referred to as the gain mode, which compares the

difference between the line attenuation and the amplifier gain, and also compares the node gain

compensation offset. Through the adjustment of the nominal gain of the optical amplifier unit and the

attenuation value of the attenuation adjustment unit, the attenuation value is equal to the gain value, thus

ensuring the power budget of the entire link.

Page 105: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-9

Perform the function of automatic power equilibrium (APE). If the MCA board at the

receive end detects that the optical power of some channels is abnormal, the station

reports an exceptional event to the U2000. After the user confirms the event, the U2000

issues a command to the optical attenuation adjustment board of the upstream station.

This board adjusts the optical power of the abnormal channel so that the optical signal

noise ratio (OSNR) of each channel at the receive end is equalized.

Perform the function of ROADM optical power equalization. After the ROADM is used

to dynamically configure the wavelength services, the WDM equipment outputs

multiplexed wavelengths. The optical power, however, may be greatly different between

each channel, especially for the newly added wavelength channels. To avoid negative

impacts on the transmission performance, the ROADM optical power equalization

function is provided. The ROADM first distinguishes between the pass-through

wavelengths and the added wavelengths. Then the DWC/WSS adjusts the optical power

of the pass-through wavelengths, and the optical attenuation adjustment board adjusts the

added wavelengths based on the wavelength flags.

Support pre-alerts for the port optical power.

Dispersion Compensation

By using the U2000, a user can perform the following operations:

The DCM board can conduct dispersion compensation to each band to realize dispersion

equalization.

Tunable dispersion compensators (TDCs) can be used to precisely adjust the dispersion.

The submarine system supports using a separate dispersion compensation board, such as

the TDC1 and TDC2, to perform dispersion compensation for signals at the line side of

OTU boards.

Wavelength Monitoring

The U2000 supports wavelength monitoring management for the OptiX BWS 1600G, OptiX

OSN 6800, OptiX OSN 8800 I and OptiX OSN 8800 II.

WDM PRBS

You can perform a PRBS test on a board to check the path quality. You can also check

whether the WDM link is normal before a service is available.

SDH Board Configuration

You can configure SDH line boards for the OptiX OSN 8800 I and OptiX OSN 8800 II.

Configure dynamic SDH ports.

Adjust the rates of optical ports on SDH boards.

Query the status of a port.

Configuration for SDH Services and Protection

By using the U2000, a user can perform the following operations:

Configure SDH line boards, SDH services, and SDH service protection for the OptiX

OSN 8800 I and OptiX OSN 8800 II.

Configure VC12, VC3, or VC4 services and select protection groups for them.

Page 106: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-10 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Activate or deactivate services.

Configure subnetwork connection protection (SNCP) services.

Convert an SNCP service to a normal service or convert a normal service to an SNCP

service.

Query the capacity of higher order and lower order cross-connections on an NE.

Configure subnetwork connection tunnel protection (SNCTP). SNCTP provides

protection channels at the VC4 level. When the working channel is faulty, all its services

can be switched to the protection channel.

Configure linear multiplex section protection (MSP). In the MSP protection, bytes K1

and K2 in the SDH multiplex section overhead (MSOH) are used to transmit protocol

information to control the transmit and receive routes of services.

Configure MSP Ring, including two-fiber and four-fiber MSP rings.

Configure transoceanic MSP Ring, A transoceanic multiplex section (MS) is an MS

based on transoceanic MSP protocol and used to provide path protection for higher-order

service on a transoceanic ring network.

Power Consumption Management

By using the U2000, a user can perform the following operations:

Manage NE power consumption, to ensure that energy conservation and environment

protection can be achieved when the NE runs in the normal state.

Query the power consumption of a board or an NE.

Configure energy conservation for an NE. You can dynamically adjust NE power

consumption to achieve environment protection and energy conservation.

View the networkwide NE power consumption report.

Submarine Cable Line Management

You need to create a line group for the actual submarine cable on the U2000. Hence, you can

measure and analyze the line data, and monitor the working status of lines. Submarine cable

line management includes the following functions:

Create a submarine cable line.

Modify a submarine cable line.

Activate a submarine cable line.

Delete a submarine cable line.

Submarine Cable Line Monitoring

You can monitor and test the status of fibers and repeaters, analyze the test data, to monitor

the working status of a submarine line system and locate faults. Submarine cable line

monitoring includes the following functions:

Support submarine line threshold management.

Monitor submarine cable lines and the status of a repeater in the in-service mode.

Support the fast fault location function.

Locate a fault in a submarine cable line in the out-of-service mode.

Support tests of multiple types: manual test, comparison test in single-test mode, and

comparison test in periodic mode.

Page 107: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-11

Synchronize, query and analyze the test data.

Support the ability to refresh monitoring information in real time.

Support querying the gain report and event report.

PFE Managent

The U2000 supports the ability to manage the PFE 1670, the PFE 1670 is the power supply

equipment for the submarine transmission system.

FC Service Test

The FC service test uses the 12LOM board to replace the FC test equipment (such as Smartbit)

to run the test. The FC service test serves to verify whether the FC service line and the

equipment under test are normal.

6.2 NA WDM NE Management

NE management includes the configurations on attributes, communications, services,

protection, and clock on an individual NE basis. The configuration data is saved at the NE

layer on the U2000 and in the database of the NE.

Basic NE Configuration

By using the U2000, a user can perform the following operations:

Synchronize NE time: Send the computer system time, NTP server time at the U2000

server end to all NEs for synchronizing the NE time. You can configure the U2000 to

automatically synchronize the NE time by specifying the automatic synchronization

period.

Query physical resources in the following lists:

− NE list

− Board manufacturer information

− Board list

− Subrack list

− Equipment room list

Support the board plug and display feature: After a board is inserted to the slot, the NE

Panel automatically displays the board and board information.

Disable the NE functions automatically. You can set to periodically disable some NE

functions that may affect services, such as loopback and ALS. When the time expires,

these operations automatically stop.

Modify NE attributes such as:

− NE name

− Remarks

− Enable or disable automatic board installation.

− Enable or disable LAN port access control.

− Set start time for 24-hour performance monitoring.

− Enable or disable daylight saving time.

Page 108: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-12 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

− Modify IP address and subnet mask of NE.

− Enable or disable ARP proxy.

− Enable or disable OSI protocol.

− Modify subrack name.

− Modify subrack remarks.

− Set the time zone and DST.

− Cold reset or warm reset NE.

− Reset the NE in the DBERASE mode, with the NE database erased.

− Reset the NE in the SWDL mode after the NE software is downloaded.

− Enable or disable performance reporting.

− Enable or disable alarm reporting.

− Enable or disable database changed (DBCHG) reporting.

− Clear audible and visual alarm indication of NE cabinet.

− Set the NE alarm delay time, including the delay time of alarm start and the delay

time of alarm end.

− Set the longitude and latitude of the NE.

− Affiliated gateway IP address.

− Affiliated gateway port.

− Choose to set the state model level of the NE.

− Set the country code and national segment code of the NE.

− Enable or disable buzzer of the NE.

Change attributes of optical NEs, including:

− Type

− Name

− Remarks

− Vendor

− Resources assigned for them

Support querying and modification of the parameters in board attribute interface,

including:

− Set the primary and secondary states.

− Query NE logical board and physical board.

− Query board PCB version, software version, FPGA version, and BIOS version.

− Query CLEI code, vendor ID, part number, serial number, date of manufacture and

board description.

− Query backup power and rated power voltage.

− Set temperature upper threshold, temperature lower threshold and current

temperature.

− Set fan speed, working mode and LED state.

− Perform a cold reset on a board.

− Perform a warm reset on a board.

Environment monitoring information. You can set NE fan speed mode and speed level.

Manages fibers and cables as follows:

− View fiber cable information.

Page 109: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-13

− Create or delete a fiber cable.

− Create a fiber cable report.

Dynamically add a port: The new function of dynamically adding, deleting, or modifying

a port supports the SFP/XFP client side color port, fiber connection and optical

cross-connection, and client side 1+1 protection.

Search and create NEs by discovering the NE IP address automatically.

Orderwire Configuration

By using the U2000, a user can perform the following operations:

Set and query the orderwire phone numbers, and call waiting time.

Set and query the networkwide conference call number.

Set and query the subnet number length.

Card attributes Management

By using the U2000, a user can perform the following operations:

Set the primary and secondary states. The primary and secondary states are presented in

the form of PST-PSTQ, SST.

Query NE logical board and physical board.

Query board PCB version, software version, FPGA version, and BIOS version.

Query CLEI code, vendor ID, part number, serial number, date of manufacture and board

description.

Query backup power and rated power voltage.

Set temperature upper threshold, temperature lower threshold and current temperature.

Set fan speed, working mode and LED state.

Perform a cold reset on a board.

Perform a warm reset on a board.

Configuration for Ethernet Interfaces and Services

By using the U2000, a user can perform the following operations:

Configure Ethernet port mirroring. You can monitor packets, perform routine

maintenance operations and in-service commissioning through a mirrored port in a

flexible manner.

Configure the internal ports of an Ethernet interface, including:

− Basic attributes

− TAG attributes

− Network attributes

− Advanced attributes

− Flow control

Configure the external port of an Ethernet interface, including:

− Basic attributes

− Flow control

− TAG attributes

Page 110: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-14 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

− Network attributes

− Advanced attributes

Configure EPL services, EVPL (QinQ) services and VLAN SNCP services.

QinQ is an embedded VLAN technology that introduces multi-layer VLAN IDs to identify different

users. In this way, VLAN is expanded. The U2000 supports the ability to add labels.

The VLAN SNCP service is VLAN-based Ethernet private line service that has the SNCP protection.

You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a

VLAN SNCP service and a normal Ethernet service.

Configure EPLAN services. You can create a new VB and configure the following:

service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, and

self-learning MAC address.

Configure QoS, including:

− Flow

− CAR

− CoS

− Port shaping

Configure OAM for Ethernet services.

Configure OAM for Ethernet ports.

Support the intra-board LAG function.

Support the DLAG function.

Support the VLAN group function.

Support the port MAC address filtering.

Test frame receiving and transmitting on Ethernet boards.

Support the protocol diagnosis function.

Configure QinQ Type area.

Configure Ethernet Layer-2 switching, including:

− Aging time

− Spanning tree

− IGMP snooping protocol.

Support the automatic reporting of RMON performance of Ethernet boards.

Dump history RMON performance data of Ethernet boards.

WDM Card Configuration

By using the U2000, a user can perform the following operations:

Configure optical transponder units.

Configure service multiplexing and de-multiplexing units.

Configure tributary and line cards.

Configure protection cards.

Configure optical amplifier units.

Configure spectrum analysis units.

Configure optical supervisory channel units.

Configure optical add/drop multiplexing units.

Page 111: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-15

Configure variable optical attenuator units.

Configure optical equalization units.

Configure wavelength monitoring.

Optical equalization board.

Overhead Configuration

By using the U2000, a user can configure OTN overheads as follows:

Configure and query the SM overhead.

Configure and query the PM overhead.

Configure and query the TCM overhead.

Query the OPU overhead.

Configure and query the FTFL overhead.

By using the U2000, a user can configure WDM overheads as follows:

OCh Overhead Management-SONET Interface.

Configure the OTU overhead at the OCh overhead management-OTN interface.

Configure the ODU overhead at the OCh overhead management-OTN interface.

Configure the OPU overhead at the OCh overhead management-OTN interface.

Configure the TCM overhead at the OCh overhead management-OTN interface.

Configure the OTS overhead at the OCh overhead management-OTN interface.

WDM Service Configuration

At an OADM station, a user can perform ADM configuration for GE/Any services using the

LQG, LOG and other boards as follows:

Several WDM service boards in specified slots form a cross-connect unit group.

GE services can be added or dropped, passed through or looped back in each

cross-connect unit group.

Support WXCP protection, with working and protection cross-connections configured at

the sink NE.

Configure electrical cross-connections. The U2000 allows you to configure electrical

cross-connections to control service flow in the electrical layer. In this way, the networking

and network survivability ability is enhanced.

Integrated grooming of GE services, ODU1 and ODU2 services realized by XCS.

Distributed grooming of GE services, ODU1 and ODU2 services and Any services.

Support ODU1, ODU2, ODU0, GE/Any, and OTU1 cross-connections, and SNCP at the

ODU0, ODU1 and ODU2 level.

Optical Cross-connection Configuration:

Create OCh cross-connections dynamically. Manage optical cross-connections for a

board and a per-NE basis, including creation, activation, deactivation, deleting and

querying.

Create edge ports.

You can perform the following service management functions:

Page 112: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-16 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Lock WDM trails and view the lock status of the corresponding trails in the service

management window of the NE Explorer.

View the name of the trail that a service belongs to.

Query the trail that a service belongs to.

ROADM Configuration

Using the ROADM function in the U2000, a user can perform add/drop and pass-through

configuration for optical channels. The WDM equipment uses the DWC and WSS to

implement the function of reconfiguration optical add/drop multiplexing.

The DWC type of the ROADM: The DWC is applicable to normal nodes in a chain or

ring network.

The WSS type of the ROADM: The WSS is applicable to cross-connect nodes in a ring.

This way is applicable for the grooming of multi-dimensional optical cross-connections.

A maximum of eight dimensions are supported.

Optical cross-connection broadcast services: Support the broadcast services of optical

cross-connections on a per-NE basis.

Clock Configuration

By using the U2000, a user can perform the following operations:

Configure the master clock.

Add a clock source.

Delete a clock source.

Query a clock source.

Configure the OTC card clock.

Set the input attributes of the OTC card clock.

Set the output attributes of the OTC card clock.

Set the working route of the OTC card clock.

Set the synchronization clock source.

WDM Protection Configuration

By using the U2000, a user can perform the following operations:

Configure the 1+1 optical channel protection.

Configure 1:N optical channel protection.

Configure the inter-subrack protection.

Configure port protection.

− Configure optical line protection.

− Configure intra-board 1+1 protection: This function includes the intra-board 1+1

protection realized by the dual-fed OTU board and the intra-board 1+1 protection

realized by the assistance of the DCP or OLP board.

− Configure client-side 1+1 protection.

Configure protection for clock transparent transmission.

Configure OWSP protection.

Page 113: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-17

Configure WXCP protection for GE/OTU1 services.

− Configure WXCP protection group for the NE in the sink slot.

− Configure and query the WXCP protection parameters.

− Query the status of WXCP protection switching.

− Query the services with WXCP protection.

− Perform WXCP protection switching.

Configure board 1+1 protection.

− Configure SCC board 1+1 protection.

− Configure XCS board 1+1 protection.

− Configure AUX board 1+1 protection.

− Perform switching between working and protection.

− Query the switching status.

Configure SNCP protection.

− Configure subwavelength (SW) SNCP for GE services or services of the Any type on

an OTU board.

− Configure SNCP for ODUk services.

− Configure VLAN SNCP for an Ethernet board.

− Perform protection switching.

− Query the switching status.

Support BPS protection. The BPS protection uses two boards, that is, the working and

protection boards. This function realizes the protection of any one port by performing

board-level switching.

In the case of 1+1 protection for the SCC board, a user can query the status of the data

backup between the active and standby SCC boards.

Optical Power Adjustment

By using the U2000, a user can perform the following operations:

Manage the optical power, such as querying the input power, output power, and power

threshold for each WDM board.

Perform the function of IPA management. When a fiber is cut off, the optical amplifier

board detects the signal loss at the station. The station reports an exceptional event to the

U2000. After the user confirms the event, the optical amplifier boards at the upstream

and downstream stations reduce their output power to a safe value to prevent the fiber

maintainer from being hurt by the lasers emitted from the cut-off fiber. After the fiber is

reconnected, the optical signals restore to normal and the optical power of each optical

amplifier board automatically returns to a normal value.

ALC management: Support link attenuation (gain mode) as the adjustment mode. The

link attenuation adjustment mode applies to the transmission link where the number of

added wavelengths differs from the number of dropped ones at an OADM. When the

optical power is attenuated to the detection threshold, a command is automatically issued

to adjust the attenuation of each station on the link.

The link attenuation adjustment mode is also referred to as the gain mode, which compares the

difference between the line attenuation and the amplifier gain, and also compares the node gain

compensation offset. Through the adjustment of the nominal gain of the optical amplifier unit and the

attenuation value of the attenuation adjustment unit, the attenuation value is equal to the gain value, thus

ensuring the power budget of the entire link.

Page 114: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-18 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Perform the function of APE. If the MCA board at the receive end detects that the optical

power of some channels is abnormal, the station reports an exceptional event to the

U2000. After the user confirms the event, the U2000 issues a command to the optical

attenuation adjustment board of the upstream station. This board adjusts the optical

power of the abnormal channel so that the OSNR of each channel at the receive end is

equalized.

Perform the function of ROADM optical power equalization. After the ROADM is used

to dynamically configure the wavelength services, the WDM equipment outputs

multiplexed wavelengths. The optical power, however, may be greatly different between

each channel, especially for the newly added wavelength channels. To avoid negative

impacts on the transmission performance, the ROADM optical power equalization

function is provided. The ROADM first distinguishes between the pass-through

wavelengths and the added wavelengths. Then the DWC/WSS adjusts the optical power

of the pass-through wavelengths, and the optical attenuation adjustment board adjusts the

added wavelengths based on the wavelength flags.

Support pre-alerts for the port optical power.

Dispersion Compensation The G.652 and G.655 fibers have positive dispersion coefficient and positive dispersion

slope at 1550 nm window. After the optical signal is transmitted over a certain distance,

the accumulation of positive dispersion broadens the optical signal pulse and seriously

affects the system transmission performance. To minimize this effect, a negative DCM is

used in the network. It uses negative dispersion to compensate the positive dispersion of

transmitting fiber, so as to maintain the original shape of the signal pulse.

The OEQ NE can apply dispersion compensation to each band to reach dispersion

equalization.

This function supports 40G dispersion compensation configuration. It uses the TDC to

precisely adjust the dispersion.

Wavelength Monitoring

Wavelength monitoring uses the wavelength supervisory unit to monitor the wavelengths that

are transmitted from the WDM-side optical interface of the OTU board (including the service

convergence unit) and to control the wavelength drift. This function ensures stable

wavelengths.

WDM PRBS

You can perform PRBS on a board to check the path quality. You can also check whether the

WDM link is normal before a service is available.

Housekeeping Configuration

By using the U2000, a user can perform the following operations:

Set and query environment alarm property.

− Create environment alarm attributes.

− Set normal state of environment property.

− Query environment alarm attributes.

− Modify environment alarm attributes.

− Delete environment alarm attributes.

Page 115: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-19

Set and query external control property.

− Create external control attributes.

− Query external control attributes.

− Modify external control attributes.

− Delete external control attributes.

− Set the control time of the external control relay.

Query of AO Buffer Records

By using the U2000, a user can perform the following operations:

Query the records in the automatic output (AO) buffer.

− The time at which the record is generated.

− The auto report tag (ATAG) of the record.

− The type of the record.

− The description of the record.

Filter the records in the AO buffer.

Save the records in the AO buffer to file.

Export the AO buffer information to the browser of the operating system for printing.

EAPE Management

Enhanced automatic power equalization (EAPE) management can reduce the bit error rate

(BER) of a service. You can query the EAPE function for an OCh trail.

Power Consumption Management

By using the U2000, a user can perform the following operations:

Manage NE power consumption, to ensure that energy conservation and environment

protection can be achieved when the NE runs in the normal state.

Query the power consumption of a board or an NE.

Configure energy conservation for an NE. You can dynamically adjust NE power

consumption to achieve environment protection and energy conservation.

View the networkwide NE power consumption report.

ASON Management

Topology Management

By using the U2000, a user can perform the following operations:

Discover ASON topologies and resources automatically.

Synchronize NEs in a domain: the U2000 can obtain the topology of the network through

the active NE.

Set the active and standby NEs.

Manage domains, including creating and deleting domains, and changing the domain

name.

Query the ASON NE software version.

Page 116: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-20 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Manage node IDs on ASON NEs.

Query the enable status of the ASON NE software.

Enable or disable the ASON feature of an ASON NE.

TE Link Management

By using the U2000, a user can perform the following operations:

Synchronize networkwide links by domain or payload type.

Filter links by domain, link signal type, payload type, or source/sink information.

View TE links.

Create fibers.

Manage TE links whose payload type is OCh.

Set the distance for a TE link.

Create a link resource report.

6.3 WDM Protection Subnet Management

A protection subnet is a network structure with the comprehensive self-protection function. In

the U2000, the protection subnet is a generalized concept that includes not only the network

structure with the comprehensive self-protection function, such as an MSP ring and a PP ring,

but also the network structure without the self-protection function, such as an unprotected ring

and an unprotected chain.

To perform protection subnet management, you need to have the related license.

By using the U2000, a user can perform the following operations:

Search for a wavelength protection subnet.

− Create a 1:N wavelength protection subnet by using the search function.

− Create ODUk SPRings at ODU1 and ODU2 levels by using the search function.

Manage a wavelength protection subnet.

− Set 1:N Wavelength Protection Subnet Parameters.

− Perform and verify the 1:N Wavelength Protection Switching.

− Set Parameters of an ODUk SPRing Protection Subnet.

− Perform and verify the ODUk Wavelength Protection Switching

− Query and delete a protection subnet.

− Query and delete an isolated node.

− Query protection subnet resources.

6.4 End-to-End WDM Management

End-to-end network management is also referred to as trail management. You can construct

the configuration data of end-to-end network management by searching for the data at the NE

layer of the U2000, or directly configure the data at the network layer of the U2000, and apply

the data to all the related NEs. Compared with configuring NE data on a per-NE basis,

configuring NE data by using the trail management function is faster and more convenient.

Page 117: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-21

To perform end-to-end network management, you need to have the related license.

By using the U2000, a user can perform the following operations:

Search for a trail.

− According to the NE configuration data and fiber connection data in the NE layer, the

U2000 generates the network layer information about end-to-end trails, including

OTS trails, OCh client trails, OCh trails, optical multiplex section (OMS) trails,

optical supervisory channel (OSC) trails, ODUk layer trails and optical channel

transport unit (OTUk) layer trails.

− Manage conflict and discrete trails created during the search process.

− Join trails automatically during the wavelength trail search process.

− Support the reservation of user-defined information on trails during WDM trail

search.

− Search for inverse multiplexing trail of the 40G and 10G rate levels.

Create a trail.

− The U2000 automatically generate an OTS trail after the fibers are correctly

connected between the specified boards.

− Create an OCh trail, and create an OCh cross-connection by using the trail

management function.

− Create an ODU0, ODU1 or ODU2 trail, and create an ODU0, ODU1 or ODU2

cross-connection by using the trail management function.

− Create a client trail, and create GE, FC, and FE services based on the OCh and ODUk

trails by using the trail management function.

− Create SNCP or WXCP by using the trail management function.

− Create a WDM trail by double-clicking an NE and select the source and sink ends.

− Select the explicit route of the protection trail when creating a WDM trail.

− Support the end-to-end management function for ASON-WDM trails.

− Create multi-layer WDM trails. Meanwhile, the Client and ODUk cross-connections

are created by using the end-to-end trail management function.

− Create trails through duplication. You can create multiple trails by duplicating a trail.

In addition, you can generate Client and ODUk cross-connections in batches by using

the end-to-end trail management function.

− Create WDM trails whose fiber jumpers are connected inside a station

− Support port attribute.

− View inner cross-connection.

Manage customers of a trail.

− Create a customer.

− View and modify the customer information.

− View the trail related to a customer.

− View the current and history alarms for a customer.

− Delete a customer.

View trails.

− Join trails of the same type.

− Split a trail into trails of the same type.

− Browse the trails included in a trail group.

Page 118: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-22 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

− Query the route information of a trail.

− Display the signal flow diagram of a trail.

− Query the transmission media layer (that is, server trail) for a trail.

− Query the client trail for a trail.

− Query details of a trail, including its attributes and channel allocation.

− Query the optical power of a trail. You can query the optical power of a WDM trail,

and the input and output optical power of the source and sink of the trail.

− Query the DPPS protection for a trail.

− Support display of valid routes for the protected wavelength trails.

− Query the associated working and protection trails for the protected OCh trails.

− Support the functions of displaying intra-site fibers in real lines and inter-site fibers in

dotted lines in the signal flow diagram of a trail.

− Support the functions of displaying working and protection routes in different colors

in the signal flow diagram of a trail.

− Support the function of displaying the details of a trail group. The details of a trail

group include direction, name, trail status, source and sink, source and sink

wavelength, bearer rate, rate, and service type.

− Support enable or disable service alarm.

− Switch between the window for viewing WDM trails and the window for viewing

associated SDH trails.

− Support lock WDM trails.

Manage the alarms and performance events related to a trail.

− Query the current alarms of a trail.

− Query the history alarms of a trail.

− Query history performance data of a trail.

− Query UAT of a trail.

− Support the ability to set the performance threshold of a WDM trail.

− Query the performance threshold-crossing records of a trail.

− Query the current performance data of a trail.

− Query the Ethernet performance of an OCh client trail with GE services.

− Manage networkwide alarmed WDM trails in real time.

− Support display of MUT_LOS and R_LOS alarms on the signal flow diagram of a

trail.

− Support the function of setting the alarm threshold for a trail.

− Support the service alarm.

Query statistics resources report.

− Support the function of collecting the statistics on WDM client-side port resources.

− Support the function of collecting the statistics on WDM inter-site wavelength

resources.

− Support the function of collecting the statistics on WDM link resources.

− Support the OTUk link resource occupancy report.

− Support the statistics report of WDM wavelength resource.

− Support the statistics report of WDM wavelength usage.

Manage trails.

Page 119: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-23

− Query 1+1 protection for an optical layer trail and perform protection switching for

the optical layer trail.

− Query WXCP and SNCP protected trails, and perform protection switching.

− Support the ability to add and delete a WXCP protection group.

− Use the TTI byte to check fiber connection relations of an OCh trail.

− Support the transaction creation of WDM trails and the rollback in the case of a

creation failure.

− Support outputting the TM-TM connection diagram for WDM trails.

− Support the automatic naming rule for WDM trails.

− Modify the source and sink of a Client trail.

− Support ODU trail end-to-end management.

− Support the search and end-to-end management of Client trails.

− Support the optical layer alarms and the configuration of optical layer overheads on

trail levels.

− Support the functions of adding and deleting the WXCP or SNCP protection of an

ODUk trail or a Client trail.

− Set the optical power mode by the end-to-end trail management function.

− Implement the Save As and Print functions for the channel allocation of a WDM trail.

− Save the signal flow diagram of a WDM trail.

− Manage WDM trails base on rights and domains.

− Manage WDM discrete services.

− Manage WDM platinum trails.

− Support 8 clients to create WDM trail on the same time.

Delete a trail. You can delete a WDM trail (except the OTS trail) from the NE layer and

network layer of the U2000.

Support enhanced automatic power equilibrium (EAPE) based on an OCh trail. The

EAPE function automatically adjusts the transmitted optical power of each path

according to the signal quality of each path monitored by the OTU board at the receive

end, to ensure the quality of signals in each path at the receive end meets the preset

requirements. This ensures that services are available.

Filter trails in three ways.

− Filter all: Filter all trails and only display the qualified trails in a network.

− Secondary filter: Filter those trails that are already displayed according to the filter

criteria.

− Incremental filter: Filter the newly added trails and display the newly qualified trails

together with the currently displayed ones.

6.5 WDM ASON Management

ASON is a new generation of optical network that integrates the exchange and transport. After

the user initiates a service request, the ASON selects a route automatically, establishes and

removes connections through the signaling control, and performs network connections

automatically and dynamically. An ASON NE refers to the equipment that is equipped with

both WDM and ASON features. An ASON network is managed by the U2000 that combines

ASON and WDM features.

Page 120: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-24 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Topology Management

By using the U2000, a user can perform the following operations:

Discover ASON topologies and resources automatically.

Synchronize NEs in a domain: the U2000 can obtain the topology of the ASON domain

through the active NE.

Set the active and standby NEs.

Manage domains, including creating and deleting domains, and changing the domain

name.

Query the ASON NE software version.

Manage node IDs on ASON NEs.

Query the version of the ASON software.

ASON Control Link Management

By using the U2000, a user can perform the following operations:

Synchronize control links networkwide.

Filter links by domain or source/sink information.

View control links.

View the current alarm or history alarm information about a control link.

Set alarm suppression for a control link.

Customize whether to display the color of alarms in the Control Link Management

window.

TE Link Management

By using the U2000, a user can perform the following operations:

Synchronize networkwide links by domain or payload type.

Filter links by domain, link signal type, payload type (optical layer, electrical layer), or

source/sink information.

View TE links.

Query the related ASON trails for a TE link.

Create fibers according the TE link.

Create a virtual TE link.

Delete a virtual TE link.

Manage TE links whose payload type is OCh, ODUk or client (GE/Any).

Set the distance for a TE link.

Set the risk link group number.

Create a link resource report.

View resource usage.

View the current alarm or history alarm information about a link.

Set alarm suppression for a control plane alarm.

Page 121: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-25

ASON Trail Management

By using the U2000, a user can perform the following operations:

Filter relevant ASON services by domain, name, original route, shared MESH restoration

trail, created time, planned time, OVPN customer, type, activation status, managed

identifier, class or whether original route is active.

Synchronize networkwide ASON trails by domain, level or attributes.

View ASON trails.

View details of an ASON trail.

Create an ASON trail of the diamond, gold, silver, or copper class.

When diamond WDM ASON OCh trails are created, the working and protection

wavelengths are shared.

Create an ASON trail of the OCh, ODU0, ODU1, ODU2 and Client level.

Set the SNCP type and OTN level when create a diamond WDM ASON ODUk trai.

Create a inverse multiplexing WDM ASON trail.

Create WDM ASON associated trail.

Duplicate ASON trails.

Pre-calculate route when create or optimize ASON trails.

Activate or deactivate ASON trails.

Apply planning data to an ASON trail.

Delete inactive ASON trails.

Delete an ASON trail from NM.

Set routing attributes, including rerouting lockout status, reversion lockout status,

rerouting priorities , revertive mode, WTR time, scheduled revertive time, rerouting

policy, trigger condition, crankback, rerouting triggered by B3 bit error and rerouting

hold-off time.

Set association source for ASON trails.

Set association for ASON trails.

Remove association for ASON trails.

Set the trigger condition for rerouting associated route.

Set the shared policy of associated service.

Downgrade an ASON trail to an traditional trail.

Query related server trails for ASON trails.

Query related client trails for ASON trails.

Query related trails for ASON trails.

Migrate a ASON trail in-service.

Enable or disable the optical parameters of WDM ASON OCh trails, including OSNR,

PMD and chromatic dispersion.

Revert an ASON trail to the original route.

Optimize ASON trails.

Switch the working or protection trail of a diamond trail manually.

Revert ASON trails manually.

Refresh the actual route, original route, associated route or signal flow diagram of an

ASON trail.

Page 122: IManager U2000 Product Description V100R002C00 03

6 WDM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

6-26 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Set an actual route as an original route.

Refresh the preset restoration trail for an ASON trail.

Set the preset restoration trail for an ASON trail.

Delete the preset restoration trail for an ASON trail.

View the actual route , original route or associated route of an ASON trail.

View the preset restoration trail for an ASON trail.

View the alarms of an ASON trail.

View the alarm suppression information for the selected ASON trail.

Set alarm suppression for the selected ASON trail.

View the performance events of the ASON trails.

View the control plane performance of the ASON trails.

View the control plane performance parameters of the ASON trails.

Create the ASON trail report.

Recover to original route in batch.

Set names for ASON trails in batches according to the naming rules.

Save the attributes of the service after you create an ASON service successful.

Restore the default attributes of the service when you create an ASON service.

Manage creators of WDM ASON trails.

Downgrade a WDM ASON trail forcibly.

Combination of ASON and Traditional Trails

By using the U2000, a user can perform the following operations:

Support the ability to create an ASON-WDM trail.

View both WDM and WDM ASON trails in the WDM Trail Management window.

Manage the overhead bytes, alarms, and performance events of an ASON-WDM trail in

a centralized manner.

Query the ASON trail related to a WDM trail.

Query the WDM trail related to an ASON trail.

Downgrade an ASON trail to a traditional trail.

Upgrade a traditional WDM trail to a WDM ASON trail.

The alarm in the ASON section of an ASON-WDM trail supports the alarm statistics

function.

Exchange Script Files

By using the U2000, a user can perform the following operations:

Import and export the script files of WDM ASON nodes,.

Import and export the script files of WDM TE links

Import and export the script files of WDM ASON trails.

NG WDM ASON Management on a Per-NE Basis

By using the U2000, a user can perform the following operations:

Page 123: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 6 WDM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6-27

Enable or disable ASON features.

Manage node IDs on ASON NEs.

Query control plane parameters.

Manage control channel.

Manage LMP TE links.

Support LMP automatic discovery.

Manage OSPF control links.

Manage OSPF TE links.

Manage OSPF IP addresses.

Authenticate the OSPF protocol.

Authenticate the RSVP protocol.

Manage WDM ASON trails.

Maintain ASON signaling.

Maintain the ASON switching controller.

Manage the LMP status.

Manage the OSPF protocol status.

Set alarm suppression for a control plane alarm.

Manage the control plane performance.

Manage resource reservation.

Manage the resource occupation status.

Page 124: IManager U2000 Product Description V100R002C00 03
Page 125: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 7 RTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

7-1

7 RTN Network Feature Management

About This Chapter

This topic describes the functional features of RTN NE management and network

management.

7.1 RTN NE Management

NE management refers to the management of configurations of an NE in terms of attributes,

communication, services, protection, and clocks. The configuration object is a single NE. The

data is saved to the database of the U2000 and to the database of the NE.

7.2 RTN Protection Subnet Management

A protection subnet is a network structure with the comprehensive self-protection function.

7.3 End-to-End RTN Management

End-to-end network management is also referred to as trail management. You can construct

the configuration data of the end-to-end network management by searching for the data at the

NE layer of the U2000, or directly configure the data at the network layer of the U2000, and

apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis,

configuring NE data by using the trail management function is faster and more convenient.

7.4 End-to-End RTN IP Management

There is the IP feature in RTN equipment. You can build the configuration data of end-to-end

RTN IP network management by searching for the data at the NE layer of the U2000, or

directly configure the data at the network layer of the U2000, and apply the data to all the

relevant NEs. Configuring NE data by using the trail management function is faster and more

convenient compared with configuring NE data on a per-NE basis.

7.1 RTN NE Management

NE management refers to the management of configurations of an NE in terms of attributes,

communication, services, protection, and clocks. The configuration object is a single NE. The

data is saved to the database of the U2000 and to the database of the NE.

Basic NE Configuration

By using the U2000, a user can perform the following operations:

Page 126: IManager U2000 Product Description V100R002C00 03

7 RTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

7-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Support the ability to manage the connections between back-to-back RTN NEs. On the

Main Topology of the U2000, the connections between back-to-back RTN NEs indicate

the relations between the RTN NEs on the same station that are connected in a

back-to-back manner through network interfaces.

Modify NE attributes such as:

− NE name

− NE ID

− NE Extended ID

− Remarks

Synchronize NE time: Align all NEs with the system time of the U2000 server. The user

can configure the U2000 to automatically synchronize the NE time by specifying the

automatic synchronization period.

Query physical resources in the following lists:

− NE list

− Board manufacturer information

− Board list

− Cabinet list

− Subrack list

− Equipment room list

Support the board plug and display feature: After a board is inserted to the slot, the NE

Panel automatically displays the board and board information.

Automatically disable the NE functions: You can set to periodically disable some NE

functions that may affect services, such as loopback and automatic laser shutdown (ALS).

When the time expires, these operations automatically stop.

Environment monitoring information. You can set the interfaces of environment

monitoring.

Support the license management function for equipment.

Support the press-to-install function for logical boards.

Support the Hop management function.

Orderwire Configuration

By using the U2000, a user can perform the following operations:

Set and query the orderwire phone numbers, call waiting time and orderwire phone port

availability.

Set and query the orderwire occupied bytes.

Configure and query the F1 data port.

Configure and query the broadcast data port.

Equipment Protection Configuration

By using the U2000, a user can configure board 1+1 protection.

Interface Configuration

By using the U2000, a user can perform the following operations:

Page 127: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 7 RTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

7-3

Set the parameters for a SDH interface.

Set automatic laser shutdown.

Set the parameters for a PDH interface.

Set the parameters for an IF interface.

Set the parameters for a digital interface.

Set the parameters for an Outdoor unit (ODU) interface.

Set overhead interfaces, including:

− Orderwire

− Broadcast data port

Query and set the overhead including:

− Regenerator section overhead (J0).

− Lower order path overhead (V5, J2)

− VC4 higher order path overhead (J1, C2) and its pass-through or termination.

− VC3 higher order path overhead (J1, C2).

Enable IEEE-1588 overhead bytes.

Support PRBS.

Support the feature of packet-based microwave. You can configure a microwave

interface in terms of basic and advanced attributes, IF attributes, and Layer-2 and

Layer-3 attributes.

Support the ability to configure the long and short serial numbers for an MP group.

Configuration for RTN Service and Protection

By using the U2000, a user can perform the following operations:

Configure VC12, VC3, or VC4 services.

Convert between an SNCP service and a normal service.

Modify attributes of SNCP services.

Perform SNCP protection switching.

Support 1+1 linear MSP, 1:N (N no larger than 3) linear MSP.

Support the N+1 protection.

Support IF 1+1 protection.

Support the REG configuration.

Support MSP rings.

Support the XPIC feature.

Configuration for Ethernet Interfaces and Services

By using the U2000, a user can perform the following operations:

Configure Ethernet internal interfaces, including:

− TAG attributes

− Encapsulation/mapping

− Network attributes

− Link capacity adjustment scheme (LCAS)

Page 128: IManager U2000 Product Description V100R002C00 03

7 RTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

7-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

− Bound path

Configure external ports of Ethernet interface, including:

− Basic attributes

− Flow control

− TAG attributes

− Network attributes

− Advanced attributes.

Configure Jumbo frame.

Configure QinQ Type area.

Configure Ethernet private line (EPL) services.

Configure EVPL (QinQ) services.

Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge

(VB) and configure the following: service mount, VLAN filtering, VLAN unicast,

disable MAC address, bound path, self-learning MAC address, and VLAN MAC address

table capacity.

Configure Ethernet virtual private LAN (EVPLAN) services.

Test frame receiving and transmitting on Ethernet boards.

Configure quality of service (QoS), including:

− Flow configuration

− CAR configuration

− CoS configuration

− Port shaping configuration

− Board shaping configuration

Configure Ethernet Layer-2 switching, including:

− Aging time

− Spanning tree

− IGMP snooping protocol.

Support the ability to diagnose protocol faults and restore protocols.

Configure point-to-point LPT management and point-to-multipoint LPT management.

Configure Ethernet intra-board LAG.

Configure Ethernet Ring Protection.

Configure the RMON performance functions such as browsing history groups of

Ethernet ports, collecting performance statistics of a group, setting an alarm group of

Ethernet ports, and setting a history control group.

Clock Configuration

By using the U2000, a user can perform the following operations:

Query the clock synchronization status.

Set system clock source priority list.

Set clock source switching, including:

− Clock source restoration parameters

− Clock source switching condition

Page 129: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 7 RTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

7-5

− Clock source switching

Configure clock subnets, including:

− Clock subnet

− Clock quality

− Synchronization status message (SSM) output control

− Clock ID status

Set 2 Mbit/s phase-locked source external clock attributes.

Set the priority table of NE clock sources and query the currently-traced clock source.

IEEE 1588 Packet Clock

By using the U2000, a user can perform the following operations:

Configure the selection mode of a frequency source.

Set the PTP system time.

Configure a PTP clock subnet.

Configure a PTP clock service.

Set the WTR time for a PTP clock source.

Set the PTP clock source priority.

Ethernet OAM Management

By using the U2000, a user can configure the 802.1 ag Ethernet OAM as follows:

Support maintenance domain (MD), maintenance association (MA), maintenance end

point (MEP), and maintenance intermediate point (MIP).

Perform CC check.

Perform LB check.

Perform LT check.

Perform Ping test.

Perform Performance detect.

By using the U2000, a user can configure the 802.3 ah Ethernet OAM as follows:

Support OAM self-loop detection.

Enable OAM automatic discovery.

Support link event notification and support the adjustment of the OAM error frame

monitoring threshold.

Perform remote loopback.

IS-IS Protocol Configuration

The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the

protocol of the network control plane, and provides the following configuration functions:

Configure an IS-IS protocol instance.

Enable the IS-IS protocol for a port.

Import routes.

Configure link TE information.

Page 130: IManager U2000 Product Description V100R002C00 03

7 RTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

7-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

OSPF Protocol Configuration

The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the network

control plane, and provides the following configuration functions:

Configure an OSPF protocol instance.

Enable the OSPF protocol for a port.

Import routes.

Configure the TE information about a link.

MPLS Signaling Protocol Configuration

The U2000 supports configuring the following two signaling protocols:

RSVP-TE protocol. Resource reservation protocol-traffic engineering (RSVP-TE) is

derived from the RSVP protocol. The RSVP protocol is a type of QoS protocol. The

RSVP protocol reserves resources for specific services in a network to ensure the service

quality. As the TE is generated, RSVP is extended accordingly to support LSP creation

and to realize TE.

LDP protocol. Label distribution protocol (LDP) is a control and signaling protocol of

multi-protocol label switching (MPLS).

PTN equipment supports using the RSVP-TE protocol to create dynamic LSP connection and

using the LDP protocol to create PW connection.

Static Route Management Configuration

The U2000 supports configuring the static route management.

Address Parse Configuration

The U2000 supports configuring the address parse.

LAG Configuration

Link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logical

link of faster rate for transmitting data. This function improves the link availability and

increases link capacity.

The U2000 supports configuring the following LAG attributes:

Configure the load sharing type, including sharing and non-sharing.

Configure the LAG type, including manual and static.

Configure the service distribution algorithm of the LAG.

Configure the port priority and system priority of the LAG.

BFD Configuration

Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status.

BFD is a simple Hello protocol. It is similar to the neighbor check of those famous protocols

in many aspects. A pair of systems periodically sends detection packets on the channel on

which session between the two systems is created. If a system does not receive any detection

Page 131: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 7 RTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

7-7

packet from the opposite end in a specific time, the system regards that a failure occurs in

some part of the bidirectional channel to the adjacent system.

QoS Configuration

Quality of service (QoS) indicates the performance of the data flow that travels through a

network. The QoS is used to ensure end-to-end service quality. The QoS cannot increase the

bandwidth, but it can minimize the delay and jitter in the network by reasonably allocating

and monitoring network resources. In this way, the quality of important services is ensured.

The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ

function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision

policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS

nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification

on the traffic that enters the DS domain. Traffic of different types is marked with different

PHB service types. For internal DS nodes, you need to perform only simple flow

classification based on PHB service type.

The U2000 supports the following QoS functions:

Configure Diffsever domains.

Configure ATM CoS mapping.

Configure simple flow classification and complex flow classification.

Configure CAR and Shaping.

Configure the color blindness mode.

Configure the WFQ schedule policy.

Configure the port WREQ schedule policy.

To simplify the operation and share some common QoS configuration parameters, the

U2000 supports creating QoS function point policy. The function point policies are as

follows: port policy, ATM policy and V-UNI ingress policy. By using these function

point policies, you can bind the CAR configuration attribute, shaping configuration

attribute, flow classification configuration attributes, WFQ schedule policy and WRED

policy attributes.

MPLS Tunnel Configuration

The MPLS tunnel is the tunnel defined in the MPLS protocol. Independent from the service,

the MPLS tunnel realizes end-to-end transmission and carries the PWs related to the service.

The U2000 supports configuring the following functions of the MPLS tunnel on a per-NE

basis:

Configure basic attributes of the MPLS.

Configure static unicast MPLS tunnels.

Create forward and backward MPLS tunnels at the same time.

Create the E-LSP.

Manage PWs.

Manage Tunnel labels and PW labels.

MPLS Tunnel Protection Group Configuration

The U2000 provides the following functions of configuring an MPLS tunnel protection group:

Page 132: IManager U2000 Product Description V100R002C00 03

7 RTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

7-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group,

containing the switching mode, revertive mode, wait-to-restore (WTR) time, and

hold-off time.

Perform MPLS tunnel protection switching.

Query the protection switching status of an MPLS tunnel.

PWs with UDP Encapsulation.

The U2000 supports the PWs with UDP encapsulation that are carried in IP tunnels.

IP Tunnel and GRE Tunnel Configuration

If the equipment at the two ends of an IP network does not support MPLS tunnel, PWE3

services can pass through the IP network by using the IP tunnel or GRE tunnel.

IP tunnel and GRE tunnel mainly applies to the Offload scenarios of mobile communication.

The U2000 supports configuring bidirectional IP tunnels and GRE tunnels on a per-NE basis.

The U2000 supports the Offload protection between MPLS and GRE tunnels.

CES Service Configuration

CES is mainly used for service transparent transmission of TDM trail switching data in the

packet transport network (PTN).

The U2000 provides the following configuration functions for CES service creation:

Create the corresponding PW when creating a CES service.

Create UNI-UNI and UNI-NNI CES services.

Create CES services of structure-aware TDM circuit emulation service over packet

switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).

Configure QoS of the CES service.

Configure idle timeslot recovery value.

Support to carry the CES service by IP/GRE Tunnel.

ATM Service Configuration

ATM emulation service is mainly used to transparently transmit ATM services in the PTN.

The U2000 provides the following configuration functions for ATM service creation:

Create an ATM service that contains multiple ATM connections.

Create UNI-UNI and UNIs-NNI ATM services.

Create PVP and PVC ATM services.

Create the corresponding PW when creating an ATM service.

Configure the IMA group.

Configure QoS of the ATM service.

Configure the CoS mapping.

Page 133: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 7 RTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

7-9

E-Line Service Configuration

The E-line service is a point-to-point Ethernet service. The equipment transmits user packets

from the user side to the network side based on Port or Port+VLAN. In this way, user data can

be transparently transmitted in a point-to-point manner.

The U2000 supports the following functions of configuring E-line services on a per-NE basis:

Create UNI-UNI E-Line services.

Create UNI-NNI E-Line services that are carried on ports.

Create UNI-NNI E-Line services that are carried on PWs.

Create UNI-NNI E-Line services that are carried on QinQ links.

Configure the service and the QoS of the corresponding PW when creating an L2VPN

service.

Configure the V-UNI group.

E-Aggr Service Configuration

The E-Aggr service is a multipoint-to-point Ethernet service. The equipment uses several

ports to access services from the V-UNI side, and converges the services into one PW at the

network side for transmission. In this way, user data from multiple points can be converged

into one point.

The U2000 supports the following functions of configuring E-Aggr services on a per-NE

basis:

Configure the VLAN forwarding table items of an E-Aggr service.

Configure the service and the QoS of the corresponding PW when creating an E-Aggr

service.

Configure the V-UNI group.

MPLS OAM Configuration

MPLS OAM is an OAM function of the MPLS network. This function can check the quality

of LSPs in an MPLS network. The MPLS OAM scheme can effectively check, acknowledge,

and locate a defect inside the network at the MPLS layer. It can report and handle a defect.

When a fault occurs, the MPLS OAM provides trigger scheme of protection switching.

The U2000 provides the following functions of configuring MPLS OAM:

Configure MPLS OAM parameters of a tunnel.

Perform CV/FFD check.

Perform LSP ping check.

Perform PW ping check.

Perform LSP traceroute check.

ATM OAM Configuration

ATM OAM is an end-to-end OAM function for ATM services. This function can check the

quality of ATM links that pass through multiple NEs. The ATM OAM function checks an

ATM link by inserting some OAM cells of the standard cell structure to the user cell flow.

The U2000 provides the following functions of configuring ATM OAM:

Page 134: IManager U2000 Product Description V100R002C00 03

7 RTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

7-10 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Set segment end attributes.

Perform CC activation test.

Perform remote loopback.

Set LLID.

7.2 RTN Protection Subnet Management

A protection subnet is a network structure with the comprehensive self-protection function.

To perform protection subnet management, you need to have the related license.

By using the U2000, you can perform the following operations:

Create an RTN protection subnet.

IF_1+1 protection subnet

IF_N+1 protection subnet

Manage RTN protection subnets.

Set the parameters for a protection subnet.

Query the switching status of a protection subnet.

Query and delete a protection subnet.

Query protection subnet resources.

7.3 End-to-End RTN Management

End-to-end network management is also referred to as trail management. You can construct

the configuration data of the end-to-end network management by searching for the data at the

NE layer of the U2000, or directly configure the data at the network layer of the U2000, and

apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis,

configuring NE data by using the trail management function is faster and more convenient.

To perform end-to-end network management, you need to have the related license.

By using the U2000, you can perform the following operations:

Create and maintain an RTN trail.

− Create a PDH microwave trail.

− Create a PDH microwave trail.

− Activate and deactivate an RTN trail.

Manage the alarms and performance events related to an RTN trail.

− Query current and history alarms, current and history performance data, UAT and

performance threshold-crossing records of an RTN trail.

− Set the performance parameters for an RTN trail.

− Query the RTN trails and customer information affected by an alarm.

Filter trails in three ways.

− Filter all: Filter all trails and only display the qualified trails in a network.

− Secondary filter: Filter those trails that are already displayed according to the filter criteria.

Page 135: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 7 RTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

7-11

− Incremental filter: Filter the newly added trails and display the newly qualified trails

together with the currently displayed ones.

Network-Wide Clock Topology Management Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.

Displaying clock trace relationship.

Displaying clock alarm status.

PWE3 Service Management

By using the U2000, you can perform the following operations:

Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.

Pre-deploy a PWE3 service.

Implement the function of automatically discovering PWE3 services.

Modify and delete PWE3 services, and filter PWE3 services to view the desired services.

Manage multi-hop PWE3 services.

Implement the protection management of PWE3 services.

View the topology of PWE3 services.

View the alarms of a PWE3 service.

View the performance of a PWE3 service.

Test and check a PWE3 service.

Manage discrete PWE3 services.

Manage PWE3 services based on rights and domains.

Clone a PWE3 service.

Manage PWE3 service templates.

Implement the function of automatically generating Ethernet OAM for PWE3 services.

Tunnel Management

By using the U2000, you can perform the following operations:

Create static tunnels.

Pre-deploy a tunnel.

Implement the function of automatically discovering tunnels.

Modify and delete a tunnel, and filter tunnels to view the desired tunnels.

View the topology of tunnels, including the working and protection routes.

View the alarm of a tunnel.

View the performance of a tunnel.

Test and check a tunnel.

Manage discrete tunnels.

Manage BGP/MPLS VPN tunnels.

Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the

function of automatically discovering 1+1 or 1:1 tunnel protection groups.

Switch services in a 1+1 or 1:1 tunnel protection group manually.

Page 136: IManager U2000 Product Description V100R002C00 03

7 RTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

7-12 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection

groups.

7.4 End-to-End RTN IP Management

There is the IP feature in RTN equipment. You can build the configuration data of end-to-end

RTN IP network management by searching for the data at the NE layer of the U2000, or

directly configure the data at the network layer of the U2000, and apply the data to all the

relevant NEs. Configuring NE data by using the trail management function is faster and more

convenient compared with configuring NE data on a per-NE basis.

To perform end-to-end network management by using the U2000, you need to have the

required license.

PWE3 Service Management

By using the U2000, you can perform the following operations:

Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.

Pre-deploy a PWE3 service.

Implement the function of automatically discovering PWE3 services.

Modify and delete PWE3 services, and filter PWE3 services to view the desired services.

View the topology of PWE3 services.

View the alarms of a PWE3 service.

View the performance of a PWE3 service.

Manage discrete PWE3 services.

Manage PWE3 services based on rights and domains.

Copy a PWE3 service.

Implement the function of automatically generating Ethernet OAM for PWE3 services.

Tunnel Management

By using the U2000, you can perform the following operations:

Create static CR, RSVP, and IP tunnels.

Create RSVP tunnels in batches.

Pre-deploy a tunnel.

Implement the function of automatically discovering tunnels.

Modify and delete a tunnel, and filter tunnels to view the desired tunnels.

View the topology of tunnels.

View the alarm of a tunnel.

View the performance of a tunnel.

Manage discrete tunnels.

Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the

function of automatically discovering 1+1 or 1:1 tunnel protection groups.

Switch services in a 1+1 or 1:1 tunnel protection group manually.

Page 137: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 7 RTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

7-13

Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection

groups.

Page 138: IManager U2000 Product Description V100R002C00 03
Page 139: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 8 PTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8-1

8 PTN Network Feature Management

About This Chapter

This topic describes the functional features of PTN NE management and network

management.

8.1 PTN NE Management

NE management refers to the management of configurations of an NE in terms of attributes,

communication, services, protection, and clocks. The configuration object is a single NE.

8.2 End-to-End PTN Management

End-to-end network management is trail management. You can build the configuration data of

end-to-end network management by searching for the data at the NE layer of the U2000, or

directly configure the data at the network layer of the U2000, and apply the data to all the

relevant NEs. Configuring NE data by using the trail management function is faster and more

convenient compared with configuring NE data on a per-NE basis.

8.1 PTN NE Management

NE management refers to the management of configurations of an NE in terms of attributes,

communication, services, protection, and clocks. The configuration object is a single NE.

Basic NE Configuration

By using the U2000, a user can perform the following operations:

Modify NE attributes such as:

− NE name

− NE ID

− NE extended ID

− Remarks

− NE pre-configuration

Synchronize NE time: Align all NEs with the system time of the U2000 server. You can

set the U2000 to automatically synchronize the NE time by specifying the automatic

synchronization period.

Page 140: IManager U2000 Product Description V100R002C00 03

8 PTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

8-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Support the board plug and display feature: After a board is inserted to the slot, the NE

Panel automatically displays the board and board information.

Disable NE functions automatically: You can set to periodically disable certain NE

functions that may affect services, such as loopback and ALS. When the time expires,

these operations automatically stop.

Support environment monitoring information.

Support the board replacement function.

Configure NE Alarm Attribute Configure alarm severity and auto reporting.

Configure alarm saving mode, reversion mode and alarm correlation.

Configure alarm suppression.

Configure AIS insert switch.

Configure alarm reversion.

Configure NE Performance Attribute Configure NE performance monitoring time.

Configure RMON performance.

Query board current performance, history performance and UAT event.

Reset board performance register.

Configure board performance monitor status.

Configure board performance threshold.

Configure NE Security Attribute Support NE user management.

Support NE login management.

Configure LCT Access control.

Support NE user group management.

Support Online user management.

Configure NE security parameters.

Query NE security log.

Configure ACL.

Service Interface Types Configuration

You can configure the basic, Layer-2, or Layer-3 attributes for an interface to specify the

working mode and application scenario of the interface.

Basic attributes are physical attributes of the interface. Layer-2 attributes are data link layer

attributes of the interface, such as ATM attribute, VLAN attribute, and QinQ attribute.

Layer-3 attributes are network layer attributes of the interface, such as the IP attribute.

Table 8-1 lists the PTN service interface types that the U2000 supports.

Page 141: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 8 PTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8-3

Table 8-1 Types of PTN service interfaces

Service Interface

Supported Port Mode/Encapsulation Type

Port Type MP Group Supported or Not

Function

SDH interface General

attributes

Physical port Not supported Sets together

with the Layer

3 attributes or

connects to the

equipment as

the channelized

STM service

interface.

Layer 2

attributes

Physical port Not supported This interface

can carry the

ATM services.

Layer 3

attributes

Physical port Not supported This interface

can carry

tunnels after the

PPP is enabled.

PDH interface General

attributes

Physical port Not supported This interface

can carry the

TDM services.

Layer 2

attributes

Physical port Not supported Carries the

IMA signals.

Layer 3

attributes

Physical port Supported This interface

can be added

into a multilink

PPP (MP)

group after the

PPP is enabled.

Ethernet

interface

General

attributes

None None Sets together

with the Layer

2 and Layer 3

attributes.

Layer 2

attributes

Physical port Not supported Carries the

user-side or

network-side

Ethernet

services.

Layer 3

attributes

Physical port Not supported Carries tunnels.

Ethernet Virtual

interface

General

attributes

Logical port Not supported Sets together

with the Layer

2 and Layer 3

attributes.

Page 142: IManager U2000 Product Description V100R002C00 03

8 PTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

8-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Service Interface

Supported Port Mode/Encapsulation Type

Port Type MP Group Supported or Not

Function

Layer 2

attributes

Logical port Not supported Carries the

Ethernet

services for

VLAN Sub

Interface.

Layer 3

attributes

Logical port Not supported EOA Virtual

Interface:

carries the IP

or GRE

tunnels.

VLAN Sub Interface:

applies to the

BFD, L3VPN

or Tunnel

ADSL interface General

attributes

Physical port - Carries the

ADSL signals

G.SHDSL

interface

General

attributes

Physical port - Carries the

G.SHDSL

signals

Serial interface General

attributes

None None Sets together

with the Layer

3 attributes.

Layer 3

attributes

Logical port Supported This interface

can be added to

an MP group

after the PPP is

enabled.

MP Group General

attributes

None None Sets together

with the IP

attributes.

Layer 3

attributes

Logical port None Carries tunnels.

IMA Group Configuration

By using the U2000, you can perform the following operations:

Bind ports.

Manage IMA groups.

Query the status of an IMA group.

Query the status of an IMA link.

Page 143: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 8 PTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8-5

Manage ATM ports.

Microwave Interface Configuration

By using the U2000, you can perform the following operations:

Configure a microwave interface in terms of basic and advanced attributes, IF attributes,

and Layer-2 and Layer-3 attributes.

Configure a radio link, including the IF 1+1 protection, IF boards, and ODU boards.

Configure HOP Management.

IS-IS Protocol Configuration

The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the

protocol of the network control plane, and provides the following configuration functions:

Configure node attributes.

Configure port attributes.

Import routes.

Configure link TE information.

Configure GR Session.

Configure route aggregation.

OSPF Protocol Configuration

The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the network

control plane, and provides the following configuration functions:

Configure node attributes.

Configure port attributes.

Configuring peer attributes.

Import routes.

Configure link TE information.

Configure route aggregation.

MP-BGP Protocol Configuration

By using the internal border gateway protocol (IBGP), the U2000 implements L3VPN

functions and provides the following configuration functions:

Configuring MP-BGP instance.

Configuring MP-BGP Peer.

Configuring route filtering policy.

LDP Protocol Configuration

By using the label distribution protocol (LDP), the U2000 creates LSP connections and PW

connections and provides the following configuration functions:

Configuring MPLS-LDP peer entities.

Configuring node attributes.

Page 144: IManager U2000 Product Description V100R002C00 03

8 PTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

8-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Configuring port attributes.

Configuring IP address filtering table.

Configuring routing policy.

Configuring label policy.

RSVP Protocol Configuration

By using the resource reserved protocol (RSVP), the U2000 creates LSP connections and

provides the following configuration functions:

Configure node attributes.

Configure port attributes.

Static Route Management Configuration

The U2000 supports the function of configuring the static route management.

Address Parse Configuration

The U2000 supports configuring the address parse.

Routing Policy Configuration

The U2000 supports configuring routing policy.

Clock Configuration

The U2000 supports configuring various clock mode.

Configuration the clock domain.

Query the clock synchronization status.

IEEE 1588 Packet Clock

− Configure clock service.

− Configure clock synchronization attribute.

− Configure clock source priority table.

− Configure clock subnet.

− Configure external interface.

TOP Packet Clock Configuration

− Configure clock services.

− Select a differential clock source.

ACR Clock Configuration

− Configure CES ACR or 1588 ACR clock.

− Configure ACR clock protection.

Physical Clock Configuration

− Query the clock synchronization status.

− Set clock source priority tables, including:

− System clock source priority list

− Priority table for phase-locked sources of 1st external clock output

Page 145: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 8 PTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8-7

− Priority table for phase-locked sources of 2nd external clock output

− Configure clock subnets, including:

− Clock subnet

− Clock quality

− SSM output control

− Clock ID status

− Set phase-locked sources output by external clock, including:

− External clock output phase-locked source

− 2 Mbit/s phase-locked source external clock attributes

Board-Level Protection Configuration

By using the U2000, a user can perform the following operations:

Configure TPS protection of a sub-board.

Configure board 1+1 protection for the SCC and cross-connect boards.

Check the switching status.

Perform protection switching.

LAG/MC LAG Configuration

A LAG aggregates multiple Ethernet physical links to form a logical link of faster rate for

transmitting data. This function improves the link availability and increases link capacity.

The MC LAG supports the ability to share load between aggregation group devices.

The U2000 supports configuring the following LAG/MC LAG attributes:

Configure the load sharing type, including sharing and non-sharing.

Configure the LAG type, including manual and static.

Configure the load sharing hash algorithm of the LAG.

Configure the port priority and system priority of the LAG.

MSTP Configuration

The MSTP can be used to clear loops in a network. The MSTP uses a specific algorithm to

block some redundant trails and change a loop network to a non-loop tree network. This

function prevents packet increase in a loop network and generation of broadcast storms in an

endless cycle. Different from the STP and RSTP, the MSTP can forward data according to

VLAN packets and realize load balance of VLAN data.

The U2000 supports configuring the following MSTP attributes:

Configure parameters of port groups and bridges.

Configure CIST and MSTI parameters.

Query CIST status and MSTI status.

IGMP Snooping Configuration

IGMP Snooping is the multicast constraint scheme that runs on the Layer-2 equipment, and is

used to manage and control multicast groups.

Page 146: IManager U2000 Product Description V100R002C00 03

8 PTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

8-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The U2000 supports the ability to configure IGMP snooping for E-LAN services and provides

the following functions:

Configure IGMP Snooping protocol parameters.

Configure quick leave ports.

Manage routes.

Configure route member ports.

Query statistic information of IGMP protocol packets.

BFD Configuration

Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status.

BFD is a simple Hello protocol. It is similar to the neighbor check of those famous protocols

in many aspects. A pair of systems periodically sends detection packets on the channel on

which session between the two systems is created. If a system does not receive any detection

packet from the opposite end in a specific time, the system regards that a failure occurs in

some part of the bidirectional channel to the adjacent system.

The U2000 supports the functions of performing the BFD detection on IP/GRE tunnels and

the inter gateway protocol (IGP).

The U2000 supports configuring single-hop or multi-hop BFD detection.

LPT Configuration

LPT is used to return the remote-end link status to the near end. The near-end equipment

performs operations depending on the remote-end link status. When the intermediate

transmission network of the services becomes faulty, the LPT informs the access equipment at

both ends of the transmission network to enable the backup network. That ensures the normal

transmission of the important data.

Synchronization Protocol Configuration

In the application scenario of dual-homing, the status of the peer equipment needs to be

obtained either for the MC LAG or for the cross-MC LMSP. Meanwhile, the actions on both

sides need to be negotiated based on different fault cases. With the method of adding

information of the peer end, a channel is established for control status synchronization with

the peer end. In this manner, the control packets can be transmitted and received through the

channel and link fault detection can be performed.

LMSP/MC LMSP Configuration

Linear MSP protection contains 1+1 linear MSP and 1:N linear MSP. They use the protection

channel to protect services that are transmitted on the working channel. When the working

channel fails, services are switched to the protection channel. The linear MSP applies to the

POS interface and structured STM interface.

The multi-chassis (MC) LMSP can implement the LMSP among NEs.

The U2000 supports the following functions of LMSP/MC LMSP configuration:

Create a linear MSP.

Check the linear MSP switching status.

Perform linear MSP switching.

Page 147: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 8 PTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8-9

QoS Configuration

QoS indicates the performance of the data flow that travels through a network. The QoS is

used to ensure end-to-end service quality. The QoS cannot increase the bandwidth, but it can

minimize the delay and jitter in the network by reasonably allocating and monitoring network

resources. In this way, the quality of important services is ensured.

The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ

function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision

policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS

nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification

on the traffic that enters the DS domain. Traffic of different types is marked with different

PHB service types. For internal DS nodes, you need to perform only simple flow

classification based on PHB service type.

The U2000 supports the following QoS functions:

Configure QoS profile.

Configure DiffServ domains.

Configure ATM CoS mapping.

Configure SVLAN DEI used flag.

Configure simple flow classification and complex flow classification.

Configure CAR and Shaping.

Configure the color blindness mode.

Configure the WFQ schedule policy.

Configure the port WRED schedule policy.

Configure the port WFQ policy.

Configure the service WRED policy.

To simplify the operation and share some common QoS configuration parameters, the

U2000 supports creating QoS function point policy. The function point policies are as

follows: port policy, ATM policy, V-UNI ingress policy, V-UNI egress policy, PW policy

and QinQ policy. By using these function point policies, you can bind the CAR

configuration attribute, shaping configuration attribute, flow classification configuration

attributes, WFQ schedule policy, WRED policy and color blindness mode attributes.

Configure CoS queue mapping.

Supports the application of the QoS policy to multiple NEs.

MPLS Tunnel Configuration

The MPLS tunnel is the tunnel defined in the MPLS protocol. Independent from the service,

the MPLS tunnel realizes end-to-end transmission and carries the PWs related to the service.

See Figure 8-1. Unicast MPLS tunnel is mainly used to transparently transmit point-to-point

PWE3 services.

Page 148: IManager U2000 Product Description V100R002C00 03

8 PTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

8-10 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Figure 8-1 Unicast MPLS tunnel

The U2000 supports configuring the following functions of the MPLS tunnel on a per-NE

basis:

Configure basic attributes of the MPLS.

Configure static unicast MPLS tunnels.

Create forward and backward MPLS tunnels at the same time.

Create bidirectional MPLS Tunnel.

Create the E-LSP and L-LSP.

Manage PWs.

Manage tunnel labels and PW labels.

Query the PWs that a tunnel carries.

MPLS Tunnel Protection Group Configuration

The U2000 provides the following functions of configuring an MPLS tunnel protection group:

Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group,

containing the switching mode, revertive mode, wait-to-restore (WTR) time, and

hold-off time.

Perform MPLS tunnel protection switching.

Query the protection switching status of an MPLS tunnel.

MS PW Configuration

By creating multi step (MS)-PW to transmit services, you can save tunnel resources and

transmit services over different networks.

Page 149: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 8 PTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8-11

UDP-Encapsulated PW Configuration

The U2000 supports the UDP-encapsulated PWs that are carried in IP tunnels.

PW APS/MC PW APS Configuration

As a network protection mechanism, PW automatic protection switching (APS) is intended to

protect the services on the working PW with a protection PW. That is, when the working PW

is faulty, the services on the working PW are switched to the protection PW. In this manner,

the services on the working PW are protected.

By using the MC PW APS function, you can implement the PW APS protection among NEs.

You can perform the following PW APS/MC PW APS functions on a per-NE basis:

Create a protection group.

Bind the master and slave protection pairs.

IP Tunnel and GRE Tunnel Configuration

If the equipment at the two ends of an IP network does not support MPLS tunnel, PWE3

services can pass through the IP network by using the IP tunnel or GRE tunnel.

IP tunnel and GRE tunnel mainly applies to the Offload scenarios of mobile communication.

The U2000 supports configuring bidirectional IP tunnels and GRE Tunnels on a per-NE basis.

Query the PWs that a tunnel carries.

Dual-Homing Protection Configuration

The two sets of PE equipment, that is, dual-homing nodes, are connected to the same CE

equipment through the corresponding attachment circuits (ACs). In this case, the services that

are received on the PE nodes at the two end of a carrier network can be protected. This is the

dual-homing protection.

You can configure the following types of dual-homing protection for ATM and CES services.

1:1 MC-PW APS and 1:1 MC-LMSP

1:1 MC-PW APS and 1+1 MC-LMSP

1:1 PW redundancy and 1:1 MC-LMSP

1+1 PW redundancy and 1+1 MC-LMSP

You can configure the following types of dual-homing protection for E-line services.

1:1 MC-PW APS and MC-LAG

1:1 PW redundancy and MC-LAG

You can configure dual-homing protection for E-LAN services through the MAC address

withdrawal and MC-LAG.

CES Service Configuration

CES is mainly used for service transparent transmission of TDM trail switching data in the

PTN network.

Page 150: IManager U2000 Product Description V100R002C00 03

8 PTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

8-12 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

See Figure 8-2. The 2G/3G stations or Intranet line accesses the PTN equipment by using the

E1/ channelized STM-1 line. The equipment divides the E1 signals into pieces, encapsulates

the pieces into the Ethernet, and transmits the E1 signals to the opposite end by using the PW.

Figure 8-2 CES service application model

The U2000 provides the following configuration functions for CES service creation:

Create the corresponding PW when creating a CES service.

Create UNI-UNI and UNI-NNI CES services.

Create CES services of structure-aware TDM circuit emulation service over packet

switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).

Configure QoS of the CES service.

Configure idle timeslot recovery value.

Configure CES service alarm transparent transmission.

Select the tunnel where a PW is carried online.

ATM Service Configuration

ATM emulation service is mainly used to transparently transmit ATM services in the PTN.

See Figure 8-3. The 3G station accesses the PTN equipment by using the ATM IMA group.

The equipment encapsulates the ATM cells into the Ethernet, and transmits the ATM cells to

the opposite end by using the PW.

Page 151: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 8 PTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8-13

Figure 8-3 ATM service application model

The U2000 provides the following configuration functions for ATM service creation:

Create UNI-UNI and UNIs-NNI ATM services.

Create PVP, PVC and transparent ATM services.

Create the corresponding PW when creating an ATM service.

Configure the IMA group.

Configure QoS of the ATM service.

Configure the CoS mapping.

Select the tunnel where a PW is carried online.

E-Line Service Configuration

The E-line service is a point-to-point Ethernet service. The equipment transmits user packets

from the user side to the network side based on Port or Port+VLAN. In this way, user data can

be transparently transmitted in a point-to-point manner.

See Figure 8-4. Company A has branches in City 1 and City 3. Company C has branches in

City 1 and City 2. Branches of Company A or Company C that are in different cities have data

communication requirements. The PTN equipment can provide E-line services for Company

A and Company C, to meet their communication requirements. In addition, the service data

can be completely isolated.

Page 152: IManager U2000 Product Description V100R002C00 03

8 PTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

8-14 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Figure 8-4 E-Line Service

The U2000 supports the following functions of configuring E-line services on a per-NE basis:

Create UNI-UNI E-Line services.

Create UNI-NNI E-Line services that are carried on ports.

Create UNI-NNI E-Line services that are carried on PWs.

Create UNI-NNI E-Line services that are carried on QinQ links.

Configure the service and the QoS of the corresponding PW when creating an L2VPN

service.

Configure ETH LPT.

Configure the V-UNI group.

Select the tunnel where a PW is carried online.

E-Aggr Service Configuration

The E-Aggr service is a multipoint-to-point Ethernet service. The equipment uses several

ports to access services from the V-UNI side, and converges the services into one PW at the

network side for transmission. In this way, user data from multiple points can be converged

into one point.

See Figure 8-5 and Figure 8-6. One carrier wants to construct a 3G network. Services of each

Node B are converged and transported to the RNC. The data between each Node B and RNC

is regarded as one service. At the convergence point, the QoS parameters such as the overall

bandwidth are specified.

Page 153: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 8 PTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8-15

Figure 8-5 E-Aggr service scenario 1

Figure 8-6 E-Aggr service scenario 2

The U2000 supports the following functions of configuring E-Aggr services on a per-NE

basis:

Configure the VLAN forwarding table items of an E-Aggr service.

Configure the service and the QoS of the corresponding PW when creating an E-Aggr

service.

Configure the V-UNI group.

Select the tunnel where a PW is carried online.

Page 154: IManager U2000 Product Description V100R002C00 03

8 PTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

8-16 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

E-LAN Service Configuration

The E-LAN is a multipoint-to-multipoint Ethernet service. It connects to multiple V-UNI and

NNI access points. It realizes packet forwarding and interconnection by using the MAC

address self-learning scheme of layer 2.

See Figure 8-7. The HQ of Company A is in City 3. Company A has Branch A in City 1, City

2, and City 3, and has Branch B in City 1 and City 2. Branch A and Branch B do not have

business with each other. Hence, the data should be isolated between the two branches. The

HQ has requirements of communicating with each branch and accessing the Internet.

Figure 8-7 E-LAN service

Different VLANs are used to identify service data of different branches by using the E-LAN

service. In this way, data is shared within a branch and is isolated from other branches. The

Internet data of the HQ is also isolated from the internal service data by using the VLAN.

The U2000 supports the following functions of configuring E-LAN services on a per-NE

basis:

Create E-LAN services that are carried on port.

Create E-LAN services that are carried on PWs.

Create E-LAN services that are carried on QinQ links.

Configure the service and the QoS of the corresponding PW when creating an E-LAN

service.

Configure the V-UNI and NNI interfaces of an E-LAN service.

Configure the split horizon group of an E-LAN service.

Configure the V-UNI group.

Configure the MAC address learning parameters.

Configure the unknown frame processing mode.

Configure the static MAC address.

Page 155: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 8 PTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8-17

Configure the disabled MAC address.

Select the tunnel where a PW is carried online.

Service Mirroring Configuration

In the case of the service mirroring, all packets that enter a certain port are duplicated and

then duplicated packets are transmitted through an observation port. In this manner, the

normal service is scarcely affected when packets of the mirrored service are captured and

analyzed.

You can configure the service mirroring as follows:

Configure the local service mirroring.

Configure the remote service mirroring.

MPLS OAM Configuration

MPLS OAM is an OAM function of the MPLS network. This function can check the quality

of LSPs in an MPLS network. The MPLS OAM scheme can effectively check, acknowledge,

and locate a defect inside the network at the MPLS layer. It can report and handle a defect.

When a fault occurs, the MPLS OAM provides trigger scheme of protection switching.

The U2000 provides the following functions of configuring MPLS OAM:

Configure MPLS OAM parameters of a tunnel.

Perform CV/FFD check.

Perform LSP ping check.

Perform PW ping check.

Perform LSP traceroute check.

Perform PW traceroute check.

The FDI can be enabled and disabled.

Ethernet Service OAM Configuration

Ethernet service OAM is an end-to-end OAM function for services. This function can check

the quality of Ethernet links that pass through multiple NEs. The Ethernet service OAM

checks an Ethernet link by sending OAM packets. The OAM packet is handled only at the

MAC layer. As a low rate protocol, the OAM protocol uses very small network bandwidth.

Hence, this function does not affect services carried by the link.

The U2000 provides the following functions of configuring Ethernet service OAM:

Create maintenance domains (MDs), maintenance associations (MAs), maintenance end

points (MEPs), and maintenance intermediate points (MIPs).

Perform a CC check.

Perform an LB check.

Perform an LT check.

Ethernet Port OAM Configuration

The Ethernet port OAM is mainly used to automatically check the connectivity and

performance and locate the faults of the physical links under the MAC layer. It is applicable when the physical Ethernet ports are directly connected.

Page 156: IManager U2000 Product Description V100R002C00 03

8 PTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

8-18 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The U2000 provides the following functions of configuring Ethernet port OAM:

Configure OAM parameters.

Configure the OAM error frame monitoring.

Query the remote OAM parameters.

ATM OAM Configuration

ATM OAM is an end-to-end OAM function for ATM services. This function can check the

quality of ATM links that pass through multiple NEs. The ATM OAM function checks an

ATM link by inserting some OAM cells of the standard cell structure to the user cell flow.

The U2000 provides the following functions of configuring ATM OAM:

Set segment end attributes.

Perform CC activation test.

Perform remote loopback.

Set LLID.

Configure ATM alarm transmission

8.2 End-to-End PTN Management

End-to-end network management is trail management. You can build the configuration data of

end-to-end network management by searching for the data at the NE layer of the U2000, or

directly configure the data at the network layer of the U2000, and apply the data to all the

relevant NEs. Configuring NE data by using the trail management function is faster and more

convenient compared with configuring NE data on a per-NE basis.

To perform end-to-end network management by using the U2000, you need to have the

required license.

PWE3 Service Management

By using the U2000, you can perform the following operations:

Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.

Pre-deploy a PWE3 service.

Implement the function of automatically discovering PWE3 services.

Modify and delete PWE3 services, and filter PWE3 services to view the desired services.

Manage multi-hop PWE3 services.

Implement the protection management of PWE3 services.

View the topology of PWE3 services.

View the alarms of a PWE3 service.

View the performance of a PWE3 service.

Test and check a PWE3 service.

Manage discrete PWE3 services.

Manage PWE3 services based on rights and domains.

Clone a PWE3 service.

Page 157: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 8 PTN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8-19

Manage PWE3 service templates.

Implement the function of automatically generating Ethernet OAM for PWE3 services.

VPLS Service Management

By using the U2000, you can perform the following operations:

Create a VPLS service.

Pre-deploy a VPLS service.

Implement the function of automatically discovering VPLS services.

Modify and delete VPLS services, and filter VPLS services to view the desired services.

View the topology of VPLS services.

View the alarms of a VPLS service.

View the performance of a VPLS service.

Test and check a VPLS service.

Manage VSI resource.

Manage VPLS services based on rights and domains.

Manage VPLS service templates.

Implement the function of automatically generating Ethernet OAM for VPLS services.

L3VPN Service Management

By using the U2000, you can perform the following operations:

Create an L3VPN service that supports the BGP/MPLS protocol.

Pre-deploy an L3VPN service.

Implement the function of automatically discovering L3VPN services.

Modify and delete L3VPN services, and filter L3VPN services to view the desired

services.

View the topology of L3VPN services.

View the alarms of an L3VPN service.

View the performance of an L3VPN service.

Test and check the configuration of an L3VPN service.

Manage VRF resource.

Manage L3VPN services based on rights and domains.

Manage L3VPN service templates.

Tunnel Management

By using the U2000, you can perform the following operations:

Create static CR, RSVP, LDP, and IP tunnels.

Create RSVP and LDP tunnels in batches.

Pre-deploy a tunnel.

Implement the function of automatically discovering tunnels.

Modify and delete a tunnel, and filter tunnels to view the desired tunnels.

View the topology of tunnels.

Page 158: IManager U2000 Product Description V100R002C00 03

8 PTN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

8-20 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

View the alarm of a tunnel.

View the performance of a tunnel.

Test and check a tunnel.

Manage discrete tunnels.

Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the

function of automatically discovering 1+1 or 1:1 tunnel protection groups.

Switch services in a 1+1 or 1:1 tunnel protection group manually.

Network-Wide Clock Topology Management Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.

Displaying clock trace relationship.

Displaying clock alarm status.

Page 159: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description

9 Router Networks and Switch Networks Feature

Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

9-1

9 Router Networks and Switch Networks Feature Management

About This Chapter

This topic describes the functions and features of router networks and switch networks.

9.1 Router NE Management

NE Configuration Management provides GUIs for you to configure and maintain NE

configurations. You can directly configure devices through GUIs.

9.2 Switch NE Management

NE Configuration Management provides GUIs for you to configure and maintain NE

configurations. You can directly configure devices through GUIs.

9.3 Template Management

In the process of NE configuration management, you need to perform a large number of

repetitive operations. With the template management function, you can quickly configure NEs

in batches.

9.4 Diagnosis Management

It provides easy-to-use test diagnosis functions for you to test the connectivity of networks

and services. You can manually run diagnosis cases or customize test policies to let the

diagnosis cases run automatically at scheduled times.

9.5 Cluster Management

The Huawei Group Management Protocol (HGMP) is mainly used to solve the problems of

automatic management operations and centralized management for multiple dispersed

low-end and mid-range switches.

9.6 Node Redounded Management

E-Trunk (Enhanced-Trunk), developed on the basis of Link Aggregation Control Protocol

(LACP), is a protocol that controls and implements link aggregation among multiple sets of

equipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS,

VLL, or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links

between the CE and PEs.

9.7 Report Subsystem Management

Page 160: IManager U2000 Product Description V100R002C00 03

9 Router Networks and Switch Networks Feature

Management

iManager U2000 Unified Network Management System

Product Description

9-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The report subsystem provides a complete set of convenient services. It allows you to

generate, distribute, and manage reports based on the Web. The powerful report subsystem

can help you to monitor, analyze, improve, and plan network performance.

9.8 VPN Service Management

The U2000 provides centralized and unified management, including service deployment,

service monitoring, and service diagnosis, on VPN services, namely, L3VPN service, VPLS

service, and PWE3 service.

9.9 Tunnel Service Management

Tunnel service management is used to plan and deploy services on the entire MPLS network.

Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel service

management, thus reducing the costs of operating and maintaining MPLS networks.

9.1 Router NE Management

NE Configuration Management provides GUIs for you to configure and maintain NE

configurations. You can directly configure devices through GUIs.

Device Management

Identify the software versions of devices and adapt to different types of devices automatically.

Entity Management

This function allows you to perform the following operations:

Automatically obtain the data about device entities, including frames, boards, power

supplies, fans, and ports.

Refresh entity data and monitor the entity status.

Device Panel Management

This function displays device entities, including frames, boards, power supplies, fans, and

ports, on the device panel.

Clock Management

This function supports physical clock and PTP clock.

Interface Management

This function allows you to configure a variety of media interfaces, including:

Ethernet interfaces

POS interfaces

Virtual interfaces such as sub-interfaces, trunk interfaces, loopback interfaces, and

virtual template (VT) interfaces

Page 161: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description

9 Router Networks and Switch Networks Feature

Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

9-3

LLDP Management

This function supports the configuration of LLDP globally or on interfaces.

Ethernet Features Management

The specific functions are as follows:

Manage VLANs, such as configuring the global VLAN, port VLAN, VLAN stacking,

and VLAN mapping.

Manage MAC address forwarding, such as configuring static MAC addresses, MAC

address learning rules, and MAC address aging.

Manage VLAN switch.

Ethernet OAM Management

To realize OAM, two standards are available: IEEE 802.1ag and IEEE 802.3ah. With IEEE

802.1ag, the U2000 can continuously monitor user services, and acknowledge and locate

faults. With IEEE 802.3ah, the U2000 can monitor the user services of the last mile, and

notify the related faults.

The specific functions are as follows:

Manage global information.

Support IEEE 802.1ag-related functions, such as managing the configurations of the MD,

MA, local MEP, remote MEP, and MIP and managing test diagnosis (including loopback,

link trace, MAC ping, and MAC trace).

Support IEEE 802.3ah-related functions, such as configuring protocols, querying ports,

and detecting loopbacks.

NE Channel Management

This function allows you to configure and maintain various types of management channels,

including:

Manage local users

Configure VTYs

Configure the Telnet and FTP service

Configure log services

Configure alarm services

Configure SSH services

Configure NAP services

QoS Management

The specific functions are as follows:

Manage the configurations of traffic classifications, traffic behaviors, and traffic policies.

Manage the configurations of interface QoS and system QoS.

Configure DS domain policies.

Manage the configurations of mirrored traffic and mirrored ports.

Page 162: IManager U2000 Product Description V100R002C00 03

9 Router Networks and Switch Networks Feature

Management

iManager U2000 Unified Network Management System

Product Description

9-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Manage the configurations of HQoS, including the discard policy, HQoS flow queue

policy, HQoS flow queue mapping, HQoS scheduler, and HQoS user scheduling.

Route Management

This function allows you to configure the static routes, routing information, routing policy,

public network and private network of BGP routes, IS-IS routes, and OSPF routes.

MPLS Management

This function supports NE-level MPLS management, including:

Enable MPLS-related protocols.

Configure MPLS TE tunnel.

Set MPLS interface parameters.

Configure static LSPs.

Configure MPLS OAM detection and protection groups.

ACL Management

This function allows you to configure ACLs on network devices and perform specific access

control.

BRAS Management

This function supports the broadband remote access service (BRAS) features of multi-service

gateways, including:

Address pool management

Authorization, authentication and accounting (AAA) management

Domain and Point-to-Point Protocol (PPP) management

Built-in Web server management

Layer-3 Internet Service Provider (ISP) configuration management

Portal server management

VLAN management

User management

This function also allows the system to collect the statistics on domains, IP address segments,

and IP addresses of the whole device in real time.

VPDN Management

This function allows you to configure the Layer-2 Tunneling Protocol (L2TP) on

multi-service gateways and manage L2TP tunnels.

BFD Management

The specific functions are as follows:

Configure BFD attributes.

Manage BFD sessions.

Page 163: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description

9 Router Networks and Switch Networks Feature

Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

9-5

Manage BFD alarms.

Perform BFD in VRF, PW, MPLS TE, IS-IS, BGP, and physical links services.

VRRP/VGMP Management

The specific functions are as follows:

Manage the configurations of the Virtual Router Redundancy Protocol (VRRP), such as

configuring global VRRP attributes, interface attributes, and interface VR, and managing

VRRP alarms.

Manage the configurations of the VRRP Group Management Protocol (VGMP), such as

configuring global VGMP attributes, managing VGMP members, and managing VGMP

alarms.

VPN Management

The specific functions are as follows:

Support tunnel policies.

Support PW templates.

Manage PWs.

Manage VSIs.

Manage VRFs.

MSE Management

This function enables routers to support MSE features, such as configuring MSE globally,

managing AAA, managing users, and configuring interface services.

Multicast Management

This function enables routers to support multicast features, such as configuring IGMP

Snooping, configuring SSM Mapping, managing multicast CAC, and configuring channel

group.

E-Trunk Management

This function supports E-Trunk search and discovery, configure E-Trunk and member of

E-Trunk.

Smart Configuration Tool

This function supports import NE from other system, grammer check of CLI, template of

configuration, parameter setup and batch execution, provide menu entry and integration

withU2000

ANCP Management

This function enables routers to support ANCP services, such as configuring global ANCP

information, configuring ANCP template, and configuring access management.

Page 164: IManager U2000 Product Description V100R002C00 03

9 Router Networks and Switch Networks Feature

Management

iManager U2000 Unified Network Management System

Product Description

9-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

9.2 Switch NE Management

NE Configuration Management provides GUIs for you to configure and maintain NE

configurations. You can directly configure devices through GUIs.

Device Management

This function identifies the software versions of devices and adapts to different types of

devices automatically.

Entity Management

This function allows you to perform the following operations:

Obtain the data about device entities, including frames, boards, power supplies, fans, and

ports automatically.

Refresh entity data and monitor the entity status.

Device Panel Management

This function displays device entities, including frames, boards, power supplies, fans, and

ports on the device panel.

LLDP Management

This function supports the configuration of LLDP globally or on ports.

Interface Management

This function allows you to configure a variety of media interfaces, including:

Ethernet interfaces

POS interfaces

Virtual interfaces such as sub-interfaces, trunk interfaces, loopback interfaces, and VT

interfaces

Ethernet Features Management

The specific functions are as follows:

Manage VLANs.

Manage MAC address forwarding.

Isolate ports.

Detect LDT loopback.

Detect PWs.

Configure BPDU tunnels.

OAM Management To realize the OAM, two standards are available: IEEE 802.1ag and IEEE 802.3ah. With

IEEE 802.1ag, the U2000 can continuously monitor user services, and acknowledge and

Page 165: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description

9 Router Networks and Switch Networks Feature

Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

9-7

locate faults. With IEEE 802.3ah, the U2000 can monitor the user services of the last

mile, and notify the related faults.

BFD is used to detect the communication fault between forwarding engines. To be

specific, BFD detects the connectivity of a data protocol on the same path between two

systems. The path can either be a physical link or a logical link.

The specific OAM management functions are as follows:

− Manage global information.

− Support IEEE 802.1ag-related functions, such as managing the configurations of the

MD, MA, local MEP, remote MEP, and MIP, and managing test diagnosis (including

loopback, link trace, MAC ping, and MAC trace).

− Support IEEE 802.3ah-related functions, such as configuring protocols, querying

ports, and detecting loopback.

− Configure BFD attributes, manage BFD sessions and BFD alarms, and perform BFD

in VRF, PW, and VSI services.

QoS Management

The specific functions are as follows:

Manage the configurations of traffic classifications, traffic behaviors, and traffic policies.

Manage the configurations of interface QoS and system QoS.

Configure DS domain policies.

Manage the configurations of mirrored traffic and mirrored ports.

Route Management

This function allows you to configure the public network, routing information, routing policy,

and private network of static routes, BGP routes, IS-IS routes, and OSPF routes.

MPLS Management

This function supports NE-level MPLS management, including:

Enable MPLS-related protocols.

Configure MPLS TE tunnel.

Configure MPLS interface parameters.

Configure static LSPs.

Configure MPLS OAM detection and protection groups.

ACL Management

This function allows you to configure ACLs on network devices and perform specific access

control.

BFD Management

The specific functions are as follows:

Configure BFD attributes.

Manage BFD sessions.

Page 166: IManager U2000 Product Description V100R002C00 03

9 Router Networks and Switch Networks Feature

Management

iManager U2000 Unified Network Management System

Product Description

9-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Manage BFD alarms.

Perform BFD in VRF, PW, MPLS TE, VSI, and physical links services.

VRRP/VGMP Management

The specific functions are as follows:

Manage the configurations of the Virtual Router Redundancy Protocol (VRRP), such as

configuring the global VRRP attributes, interface attributes, and interface VR, and

managing VRRP alarms.

Manage the configurations of the VRRP Group Management Protocol (VGMP), such as

configuring global VGMP attributes, and managing VGMP members and VGMP alarms.

VPN Management

The specific functions are as follows:

Support tunnel policies.

Support PW templates.

Manage PWs.

Manage VSIs.

Manage VRFs.

EPON Management

This function supports PON interface management and ONU management.

NE Channel Management

This function allows you to configure and maintain various types of management channels,

including:

Configure VTYs.

Configure FTP services.

Manage local users.

Configure log services.

Configure alarm services.

Configure SSH services.

Set SNMP parameters.

DLDP Management

This function supports the management on the DLDP working mode, packet authentication

mode, and statistics.

MSTP Management

This function supports the management on the MSTP domain, MSTP protection, and

statistics.

Page 167: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description

9 Router Networks and Switch Networks Feature

Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

9-9

DHCP Management

This function supports the management on the DHCP server, DHCP relay, client address, and

DHCP statistics.

Web Authentication Management

This function supports the management on the Web authentication server.

Controllable Multicast Management

This function supports the management on the multicast group, multicast template, and

interface filtering.

Mirroring Management

This function supports the management on the local/remote interface mirroring, VLAN

mirroring, MAC address mirroring, flow mirroring, CPU mirroring, and CPU buffer statistics.

IP Source Guard Management

This function supports the management on the static user binding table, dynamic check, and

clearance of dynamic configurations.

Interface Security Management

This function supports the management on the Ethernet interface security.

MAC Address Authentication Management

This function supports the management on the MAC address authentication.

PPPoE+ Management

This function supports the management on the PPPoE+ function.

AAA and User Management

This function supports the management on the user authentication, authorization, and

accounting.

9.3 Template Management

In the process of NE configuration management, you need to perform a large number of

repetitive operations. With the template management function, you can quickly configure NEs

in batches.

Template Features

Template Management provides some default configuration templates. When you reference a

template, the attribute settings on the template automatically apply to the configured resource.

Page 168: IManager U2000 Product Description V100R002C00 03

9 Router Networks and Switch Networks Feature

Management

iManager U2000 Unified Network Management System

Product Description

9-10 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

A template has the following features:

Offline configuration

Global templates are created in advance and saved on the U2000 instead of being created

on a device. Thus, you can create global templates when devices are offline or do not

exist. The creation of global templates is irrelevant to the device status.

Global validity

After a global template is created, this template can take effect on all the devices

managed by the U2000. It can be referenced by a type of device or none of the devices.

Little duplicate data

− After a global template is applied to a type of device, if the template data on some

devices is the same, the U2000 keeps only one template data record for these devices.

− When a device references a global template, the U2000 does not adds a record of

template data. Instead, the U2000 records the reference relation between the device

and global template.

A global template can be referenced by a large number of devices of the same type,

which helps to reduce recorded template data and facilitate maintenance.

Main Templates

The main templtes are as follows:

ACL template

ACLs can be used to control the access of user packets that flow into ports. Configuring

ACLs in batches simplifies the configuration of the defense against attacks on the

network access side. When you configure the firewall on the network access side, you

need to configure ACL matching rules, such as the restriction on a MAC address and the

restriction on an IP address. If a rule needs to be applied to multiple interfaces on

different routers, configuring the rule at every point is time-consuming and increases the

costs of management and maintenance.

QoS template

The main applications of network QoS are as follows:

− CBQoS template, and it can be applied to interfaces on NEs in batches.

− DS domain template, and it can be applied to interfaces on NEs in batches.

− HQoS template, and it can be applied to interfaces on NEs in batches.

− PQ template, and it can be applied to interfaces on NEs in batches.

− Interface CAR template, and it can be applied to interfaces on NEs in batches.

VPN service template

The service template is used to perform batch configurations for multiple devices when a

VPN service is created or configured. In this manner, the efficiency of service

deployment is greatly improved.

Switch EPON template

When you configure multiple ONU services, you can manage ONUs uniformly by

configuring templates to improve configuration efficiency.

Page 169: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description

9 Router Networks and Switch Networks Feature

Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

9-11

9.4 Diagnosis Management

It provides easy-to-use test diagnosis functions for you to test the connectivity of networks

and services. You can manually run diagnosis cases or customize test policies to let the

diagnosis cases run automatically at scheduled times.

Test Diagnosis Functions This describes the test diagnosis function of the U2000. The U2000 provides test cases,

such as VPLS MAC ping/traceroute, ICMP ping/traceroute, PWE3 ping/traceroute, LSP

ping/traceroute, and ICMP VRF ping/traceroute, which can help you to test the network

connectivity at each protocol layer.

The U2000 allows you to combine several test cases into a test suite, so that you can

perform test diagnosis in batches as required. By diagnosing services layer by layer

according to network protocol layers, theU2000 can quickly locate the faulty network

layer.

− Application Layer

DNS, DHCP, FTP, SNMP, VOIP

− Transport Layer

TCP, UDP

− Network Layer

ICMP ping/traceroute, ICMP VRF ping/traceroute, ICMP Jitter, multicast ping/trace,

multicast VRF trace, MTU ping

− Data Link layer

8021.ag MAC ping, CE ping

− MPLS Services

PWE3 ping, LSP ping, VPLS MAC ping, MAC study, mfib ping, service ping

The U2000 provides intelligent result analysis. You can manually customize the

thresholds of test case indicators such as delay, jitter, and packet loss ratio in the result

analysis template and the result analysis policy according to the related service level. In

this manner, you can quickly determine the network status.

Test Diagnosis Management

Through test diagnosis management, you can test the connectivity and QoS of a network and

diagnose network faults according to the test results. Test diagnosis management helps to

narrow the range of fault diagnosis and reduce the time of fault location and rectification.

A test diagnosis tool consists of the following parts:

Test suite

− A test suite is made up of multiple test cases. Created according to user test requests,

a test case is the entity of a test tool based on the application layer, transport layer,

network layer, data link layer, and MPLS services. The test suite is a group of test

tools organized according to certain test scenarios.

− You can take a test suite as a performance unit and perform all the test cases or

optionally perform some test cases in the test suite. Then you can diagnose network

QoS according to the parameters shown in the test results, such as delay, jitter, and

packet loss ratio.

Diagnosis policy

Page 170: IManager U2000 Product Description V100R002C00 03

9 Router Networks and Switch Networks Feature

Management

iManager U2000 Unified Network Management System

Product Description

9-12 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The U2000 provides multiple running policies for test suites. You can run the test suite

associated with a certain running policy at a specified time daily, weekly, or monthly.

Network scanning

It collects network information through network synchronization and tests the

connectivity of partial types links on the network. The U2000 provides real-time

scanning and allows you to stop running scanning tasks. The U2000 also provides the

traceroute function for you to locate faults.

History data

The history data is the records of test suite operations. You can filter and query history

data according to conditions such as the test suite name, test result, or test time, and

export query results.

Diagnosis result analysis

It provides intelligent result analysis. You can manually customize the thresholds of test

case indicators such as delay, jitter, and packet loss ratio in the result analysis template

and the result analysis policy according to the related service level. In this manner, you

can quickly determine the network status.

9.5 Cluster Management

The Huawei Group Management Protocol (HGMP) is mainly used to solve the problems of

automatic management operations and centralized management for multiple dispersed

low-end and mid-range switches.

Cluster network management involves the following functions:

Managing cluster views

Configuring clusters

Managing cluster configuration files

Managing image programs

Locating cluster faults

The U2000 provides cluster management for the

CX200/CX200D/CX300/CX380/CX600/S2300/S3300/S5300. This function allows you to

manage network equipment in a more convenient and efficient manner. With this function,

you can monitor the network status through the physical topology of cluster networks and

reduce improper operations on single equipment during management. Therefore, the U2000

meets the ever-increasing service requests.

Figure 9-1 and Figure 9-2 show the cluster topology management window and functions

provided by theU2000.

Page 171: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description

9 Router Networks and Switch Networks Feature

Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

9-13

Figure 9-1 Cluster topology

Figure 9-2 Navigation path to cluster functions

Automatically discovering and dynamically refreshing cluster equipment nodes

Automatically discovering and dynamically refreshing the physical topology of cluster

networks and links

Managing the configurations of cluster equipment in batches and in a unified and

centralized manner

Maintaining the equipment of a cluster in a centralized manner and supporting fault

detection and recovery

Facilitating the backup and recovery of configuration data

Setting the parameters, such as the management VLAN, IP address pool, and multicast

MAC address, for the switches of a cluster

Supporting the plug-and-play feature of protocols such as NDP, NTDP, and HGMP

Supporting the access to command or member switches through Telnet based on the

nodes in the cluster view

Page 172: IManager U2000 Product Description V100R002C00 03

9 Router Networks and Switch Networks Feature

Management

iManager U2000 Unified Network Management System

Product Description

9-14 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

9.6 Node Redounded Management

E-Trunk (Enhanced-Trunk), developed on the basis of Link Aggregation Control Protocol

(LACP), is a protocol that controls and implements link aggregation among multiple sets of

equipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS,

VLL, or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links

between the CE and PEs.

This function allows you to perform the following operations:

Creat an E-Trunk, bind Eth-Trunks, and configure the attributes of the E-Trunk and the

Eth-Trunks.

Display the automatically discovered E-Trunk information in the database of the NMS

to the interface of the NMS.

Automatically discover the E-Trunk by user specify the equipment range, the

configuration of the equipment and the E-Trunk group can be automatically discovered.

9.7 Report Subsystem Management

The report subsystem provides a complete set of convenient services. It allows you to

generate, distribute, and manage reports based on the Web. The powerful report subsystem

can help you to monitor, analyze, improve, and plan network performance.

The report subsystem not only supports the manual and periodical generation of reports, but

also is perfect in distributing reports. It can be easily integrated with the security management

module of the U2000 and has a strong data display power.

The report subsystem provides Web-based report generation, distribution, and management

functions.

For more information, reference to "iManager U2000 (RPT)V100R002C00SPC001 Release

Notes_01.doc".

9.8 VPN Service Management

The U2000 provides centralized and unified management, including service deployment,

service monitoring, and service diagnosis, on VPN services, namely, L3VPN service, VPLS

service, and PWE3 service.

Service Deployment

The U2000 provides a user-friendly service configuration GUI on which you can complete all

configuration operations. The parameters of multiple sets of equipment can be automatically

generated through related service templates. User configuration results can be previewed

through the topology before being delivered.

Customer management

The U2000 supports the operations of adding, deleting, and modifying customers, and

binding customers to VPN services.

L3VPN service management

Page 173: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description

9 Router Networks and Switch Networks Feature

Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

9-15

− Configuring L3VPNs in networking modes such as Full-Mesh, Hub-Spoke, and

Extranet

− Configuring VPN FRR and IP FRR for L3VPNs and binding L3VPNs to TE tunnels

− Configuring static, OSPF, and BGP private routes

− Configuring VPN services in inter-AS OptionA or inter-AS OptionB mode

VPLS service management

− Supporting the VPLS services in LDP signaling (Martini) mode

− Supporting the interworking of different VSIs

− Supporting VLL/VPLS services

PWE3 service management

− Configuring static and dynamic PWE3 services

− Supporting PWE3 services in CES, ATM, Ethernet, IWF, and heterogeneous

interworking mode

− Backing up PW configurations

− Configuring PW FRR

Composite service management

The U2000 supports the management on composite services, such as VLL/VPLS,

VLL/L3VPN, L3VPN multi-VRF, and inter-AS OptionA.

Automatic Service Discovery

The U2000 provides the function of automatically discovering L3VPN, VPLS, and PWE3

services that are running on the managed network. In addition, the U2000 can quickly load

services on the current network to itself for unified management and monitoring, without

requiring much user participation.

Service Monitoring The U2000 provides the visual topology display function for L3VPN, VPLS, and PWE3

services. The running status of the resources used by the current service, such as an

interface, a VRF, or a VSI, can be displayed in the related topology view, thus helping

you to quickly locate faults.

You can quickly locate a faulty service based on the alarm generated by the related NE.

Service Diagnosis The diagnosis tools are used to detect the connectivity of networks and locate faults.

Through the service diagnosis function, you can generate diagnosis tasks according to

the selected services and directly operate equipment nodes in topology views. The

diagnosis results can be directly displayed.

Service Check and Test Configuration check: checking the consistency of VPN service configurations on

different sites and showing the positions of configuration errors

Service connectivity test: testing the service connectivity through the ping and tracert

tests, and locating the fault equipment

Protocol status test: checking the service protocol status and the forwarding table, and

displaying the error information, thereby helping you to locate faults

Page 174: IManager U2000 Product Description V100R002C00 03

9 Router Networks and Switch Networks Feature

Management

iManager U2000 Unified Network Management System

Product Description

9-16 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

9.9 Tunnel Service Management

Tunnel service management is used to plan and deploy services on the entire MPLS network.

Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel service

management, thus reducing the costs of operating and maintaining MPLS networks.

Tunnel Deployment Enabling MPLS, LDP, and MPLS TE on the network equipment and interfaces in

batches

Implement the planning of traffic on MPLS core networks by supporting the deployment

of end-to-end MPLS TE tunnel services

Facilitating the implementation of the MPLS access scheme by supporting the

deployment of static LSP services

Implementing the end-to-end MPLS OAM protection by supporting the configuration of

end-to-end MPLS TE protection groups, configuration of MPLS OAM detection, and

monitoring of related alarms

Automatic Tunnel Discovery

With the help of a network administrator, the LSPs and related protection groups that are

previously deployed on the network can be restored to the U2000. This satisfies the

requirement in the special case where the LSP deployment is prior to the U2000 installation.

Moreover, less time of the network administrator is required and the impact of incorrect

operations on original services is prevented.

Tunnel Monitoring Supporting the networkwide tunnel view and displaying multiple types of tunnels, such

as static, RSVP, LDP, and IP tunnels, and their alarms in the topology view

Collecting and displaying the performance data of tunnels

Switching to the related tunnel from an alarm

Tunnel Diagnosis

The U2000 supports LSP ping and LSP tracert functions through which you can diagnose

deployed MPLS TE tunnels and static tunnel services.

Page 175: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 10 Security Device Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

10-1

10 Security Device Network Feature Management

About This Chapter

This topic describes the functions and features of security device networks.

10.1 NE Management of Security Devices

NE Configuration Management provides GUIs for you to configure and maintain NE

configurations. You can directly configure basic configurations on devices through GUIs.

10.2 Single-Point Web Configuration of Security Devices

Single-point Web configuration integrates the existing Web functions on the device by

embedding browser controls in the Client/Server interfaces. Single-point configuration applies

to all the configurations of security devices. In collaboration with centralized security policy

configuration, it provides an integrated and comprehensive network security management

solution.

10.3 Centralized Security Policy Configuration

Deploying a set of security devices with comprehensive technologies during network security

construction does not mean that the network is under stable and reliable security protection.

10.4 Report Subsystem Management

The report subsystem provides a complete set of convenient services. It allows you to

generate, distribute, and manage reports based on the Web. The powerful report subsystem

can help you to monitor, analyze, improve, and plan network performance.

10.5 VPN Service Management

As an important management component for the IPSec and L2TP VPN solutions, the VPN

service management module is used to configure and monitor the IPSec and L2TP VPN

services. It provides intelligent configuration and monitoring means.

10.1 NE Management of Security Devices

NE Configuration Management provides GUIs for you to configure and maintain NE

configurations. You can directly configure basic configurations on devices through GUIs.

Page 176: IManager U2000 Product Description V100R002C00 03

10 Security Device Network Feature Management

iManager U2000 Unified Network Management System

Product Description

10-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The NE configuration management functions are as follows:

Device management

This function allows you to perform the following operations:

− Identify the software versions of devices and adapt to different types of devices

automatically.

− Configure management tunnels on devices, for example, configure local users such as

Telnet users or STelnet users, set SNMP parameters and set trap parameters.

Entity management

This function allows you to perform the following operations:

− Obtain the data about device entities, including frames, boards, power supplies, fans,

and ports automatically.

− Refresh entity data and monitor the entity status.

Panel management

This function is used to display device entities, including frames, boards, power supplies,

fans, and ports, on the device panel.

Interface management

This function is used to configure the general interface information and Ethernet

interfaces.

GTP management

Through the configuration of GTP policies, the security devices can filter GTP packets

according to different rules, thus realizing the security defense of the GPRS network.

The security devices defend against GTP overbilling attacks, thus protecting users'

benefits against illegitimate damages.

Automatic registration

This function is used to receive the automatic registration messages sent by devices. If

the IP address of a device changes, the NMS can synchronize the IP address information

of the device in time.

10.2 Single-Point Web Configuration of Security Devices

Single-point Web configuration integrates the existing Web functions on the device by

embedding browser controls in the Client/Server interfaces. Single-point configuration applies

to all the configurations of security devices. In collaboration with centralized security policy

configuration, it provides an integrated and comprehensive network security management

solution.

The Web features of security devices provide users with simple and easy-to-use Web

configuration interfaces. You can easily operate and maintain devices.

The single-point Web configuration is a proxy-based Web access mode. It includes two parts:

Web proxy and Web browser.The functions of single-point Web configuration are as follows:

Open the Web management interface of a device through a U2000 client.

Log in to the device Web interface automatically.

Access devices through the Hyper Text Transfer Protocol (HTTP) or Hyper Text Transfer

Protocol Secure (HTTPS).

Support multiple Web protocols, such as javascript, Hyper Text Marked Language (HTML), CSS, and Applet, and technologies related to Web 2.0.

Page 177: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 10 Security Device Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

10-3

Function without modifying or affecting the usage of local browsers such as IE and

Firefox.

10.3 Centralized Security Policy Configuration

Deploying a set of security devices with comprehensive technologies during network security

construction does not mean that the network is under stable and reliable security protection.

In network security maintenance, even deploying a satisfied security policy scheme for a

small-sized local network is a rather complex task. Designing and deploying a set of reliable

security protection policies for a large-scale network, accordingly, is a fairly hard and

challenging task.

An industry-leading security policy design, configuration, and management system is worked

out upon the aim of making a security configuration and management center. With this system,

the truly reliable and stable network security protection can be implemented on the basis of

the security devices deployed on the network.

It has the following features:

Policy package management

A policy package can be used to manage all the security devices on the whole network

and sort the protection tasks on each security device into security policy, attack defense,

and service port mapping.

Users can create their own policy packages and include the configuration tasks in the

policy packages. Users can also perform operations such as creating, deploying,

undeploying, and verifying policy packages. A policy package can cover all the network

security configuration and management tasks of a user on a network.

Configuration and management ranges

Security policy

Attack defense

Service port mapping

Policy resource

Policy recovery

During network security management and maintenance, how to ensure the data

consistency between the NMS and devices so that the actual network configurations can

be accurately displayed on the NMS?

Policy recovery can restore the security policies and attack defense configurations

deployed on devices and the used resources of devices to the NMS, thereby achieving

the data consistency between the NMS and devices.

Policy audit

Auditing the configuration data difference between the NMS and devices helps to ensure

the data consistency and make users to fully trust the NMS when using it.

Security policy configuration and management modes of two dimensions

1. Service-dimension configuration: manages the configurations when the services are

deployed on multiple or all devices on the network. This helps users to manage and audit

services from the point of networkwide view. On a large-scale network, users do not

need to check and configure services on devices one by one. Therefore, missing

configurations are reduced, and security services can be configured reliably and efficiently.

Page 178: IManager U2000 Product Description V100R002C00 03

10 Security Device Network Feature Management

iManager U2000 Unified Network Management System

Product Description

10-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

2. Single NE-dimension configuration: manages the configurations of a single NE. Users

can select an NE to check security configurations, create, modify, deploy, and undeploy

configurations, and import the configurations of other NEs to this NE.

Policy deployment status display

Whether a policy is deployed, whether the deployment is successful, and whether the

deployment status is the same as that on the device are displayed. This helps to prevent

the repeated deployment of a policy that is already deployed.

History record query

The detailed policy package configuration and maintenance procedures are recorded. The

history operations that users perform on policy packages can be audited.

10.3.1 Policy Package Management

This topic describes the fuction of policy package management.

10.3.2 Security Policy Configuration

The U2000 allows you to manually create and modify security device rules.

10.3.3 Attack Defense Configuration

The U2000 provides attack defense functions.

10.3.4 Policy Resource Configuration

The configuration of policy resources includes the configuration of service,addess sets,period

and ports sets.

10.3.5 Mapping Service

The U2000 It provides the configuration function that re-maps the most common service ports

to other ones.

10.3.1 Policy Package Management

This topic describes the fuction of policy package management.

This feature allows you to create, modify, delete, verify, deploy, undeploy, discover, and audit

policy packages, view the deployment and audit result of policy packages.

By changing operations based on single policies and single devices to centralized operations

based on batch policies and multiple devices, this feature increases operation efficiency and

reduces maintenance cost.

The policy packages verifying function ensures the correctness of policy package

configurations and correlations among the policies within the same policy package. With the

policy verifying function, you can correctly deploy policy packages on devices and avoid

repeated modifications due to configuration errors during policy deployment.

Policy auditing is to audit the policy configuration differences between the NMS and device,

so as to determine whether the policy needs to be deployed or discovered.

Policy discovery is to recover the data synchronized to the database to the NMS for

management.

The rights to perform various operations on policy packages are under control. Operations on

policy packages are recorded in logs for the policy maintenance personnel to monitor and

manage policies.

Page 179: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 10 Security Device Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

10-5

10.3.2 Security Policy Configuration

The U2000 allows you to manually create and modify security device rules.

The U2000 allows you to manually create the device rule, including:

Specify the name of a new rule

Select the source security zone

Add the source address manually

Select the destination security zone

Add the destination address

Select the service

Select the action

Add the device

Add the time range

Choose whether to generate logs

Configure functions such as ASPF

Configure functions such as DDoS

Configure functions such as package filtering

After a rule is created and deployed to a device, the device filters device information

according to this rule.

The U2000 allows you to modify the device rule, including:

Change the name of a rule

Change the source security zone

Change the source address

Change the destination security zone

Change the destination address

Change the service

Change the action

Change the device

Change the time range

Change whether to generate logs

Modify functions such as ASPF

Modify functions such as DDoS

Modify functions such as package filtering

The U2000 also allows you to delete a rule, or the value of a certain configuration item of a

rule.

10.3.3 Attack Defense Configuration

The U2000 provides attack defense functions.

This feature provides attack defense functions against SYN flood, UDP flood, ICMP flood,

HTTP get flood, DNS request flood, connection flood, scanning, malformed packet, special

packet control, and blacklist for security devices.

Page 180: IManager U2000 Product Description V100R002C00 03

10 Security Device Network Feature Management

iManager U2000 Unified Network Management System

Product Description

10-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

10.3.4 Policy Resource Configuration

The configuration of policy resources includes the configuration of service,addess sets,period

and ports sets.

Configuring services, address set, time range, and port set

− Services

As flexible support for the IP protocol, security services can be classified into TCP

services, UDP services, ICMP services, and other services. The U2000 provides some

basic services by default. You can create different services by adding different

parameter settings to the same protocol. Different types of services can form a service

group. A rule corresponds to one or multiple services. In the case where a rule

corresponds to multiple services, these services can be in a service group or map to

these services. When you log in to the U2000 for the first time, the U2000 provides

some services by default.

− Address set

When setting source and destination addresses on the U2000, you can either set

single IP addresses or set address sets.

− Time range

Time ranges are classified into two types: continuous time ranges and periodic time

ranges. A continuous time range starts from one time point and ends at another time

point. Rules are valid only within the time range. A period time range is on a weekly

cycle. You need to set the start time and end time of a day and specify on which days

of a week the rules are valid. Then the rules will take effect on a weekly cycle.

− Port set

A port set is a collection of single, continuous, or discontinuous port numbers,

specifying the ports through which the server can provide services. The value of a

port set ranges from 0 to 65535.

Configuration log server

Binary flow logs of devices can be sent to binary servers via configuration of log server.

10.3.5 Mapping Service

The U2000 It provides the configuration function that re-maps the most common service ports

to other ones.

Mapping Service means security devices map the service ports of networking program to

out-of-ordered ports when forwarding network data packets.It implies the most common ports

to prevent the outer attack to programs.

10.4 Report Subsystem Management

The report subsystem provides a complete set of convenient services. It allows you to

generate, distribute, and manage reports based on the Web. The powerful report subsystem

can help you to monitor, analyze, improve, and plan network performance.

9.7 Report Subsystem Management lists the details of the report subsystem management.

Page 181: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 10 Security Device Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

10-7

10.5 VPN Service Management

As an important management component for the IPSec and L2TP VPN solutions, the VPN

service management module is used to configure and monitor the IPSec and L2TP VPN

services. It provides intelligent configuration and monitoring means.

10.5.1 IPSec End-to-End Service

The IPSec end-to-end service is to securely connect two intranets trustable to each other

through Internet. It is applied when secure communication connections need to be established.

This application mode can be used to protect the sensitive data transmitted on the Internet.

10.5.2 Remote Access Service

The U2000 supports the implementation of remote VPN access through L2TP, IPSec (IKEv2)

and L2TP over IPSec technologies. The remote access service is applicable to employees

accessing the enterprise intranet in remote dial-up mode over the Internet.

10.5.1 IPSec End-to-End Service

The IPSec end-to-end service is to securely connect two intranets trustable to each other

through Internet. It is applied when secure communication connections need to be established.

This application mode can be used to protect the sensitive data transmitted on the Internet.

Service deployment

This feature provides both the single service deployment function and the service batch

deployment function. Service deployment is used to make services take effect on devices.

You can view the deployment results through the auditing function.

Service discovery

This feature supports the function of automatically discovering services. With this

function, you can discover running IPSec VPN services on the network and then restore

the discovered services to the U2000 for unified management and monitoring.

Service monitoring

By monitoring the status of managed services in real time, the performance management

module allows you to view the service status in the topology view. The performance

management module monitors the service status and performance indicators and displays

collected performance data in graphs or reports.

Display of the service topology

This feature provides the function of visualizing the service topology. In the topology

view, you can view service alarms, service statuses, and service-related device alarms.

Service audit

This feature supports to audit the differences of service configuration between the NMS

and device.

10.5.2 Remote Access Service

The U2000 supports the implementation of remote VPN access through L2TP, IPSec (IKEv2)

and L2TP over IPSec technologies. The remote access service is applicable to employees

accessing the enterprise intranet in remote dial-up mode over the Internet.

Service deployment

The remote access service management supports the deployment of a single service and the deployment of services in batches. In addition, you can view deployment results in

Page 182: IManager U2000 Product Description V100R002C00 03

10 Security Device Network Feature Management

iManager U2000 Unified Network Management System

Product Description

10-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

the service topology view. Remote access services include L2TP service, L2TP over

IPSec service and IPSec (IKEv2) service three types.

Service monitoring

The L2TP service, L2TP over IPSec service and IPSec (IKEv2) service management can

manage and monitor the online users of remote access services. It also provides the

functions of displaying the statuses of online users in real time, restricting the number of

online users, and forcing users to log out.

Display of the service topology

The remote access service management provides the function of visualizing the service

topology. In the topology view, you can view service alarms, service statuses, and

service-related device alarms.

Service audit

The remote access service management supports to audit the differences of service

configuration between the NMS and device.

Service resource management

The remote access service management provides the function of radius template

management and user domain management.

Page 183: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 11 FTTx Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

11-1

11 FTTx Network Feature Management

About This Chapter

This topic describes the functional features of FTTx NE management and network

management.

11.1 OLT Management

In the FTTx solution, the OLT is connected with high bandwidth across a long distance. It

works with the ONU to provide voice, data, and video services and meets the individualized

requirements of telecom users. NE configuration management provides GUIs for you to

configure NEs and maintain NE configurations. You can directly configure services on

devices through GUIs.

11.2 ONU Management

The ONU supports GPON, EPON, and GE in the upstream direction and provides different

access modes to meet different FTTx application scenarios. NE configuration management

provides GUIs for you to configure NEs and maintain NE configurations. You can directly

configure services on devices through GUIs.

11.1 OLT Management

In the FTTx solution, the OLT is connected with high bandwidth across a long distance. It

works with the ONU to provide voice, data, and video services and meets the individualized

requirements of telecom users. NE configuration management provides GUIs for you to

configure NEs and maintain NE configurations. You can directly configure services on

devices through GUIs.

Device Management

By using the U2000, you can manage device panels, shelves, cards, clock sources, and system

parameter profiles.

Network Interface Management

By using the U2000, you can perform the following operations:

Manage and maintain TDM E1/T1 ports.

Page 184: IManager U2000 Product Description V100R002C00 03

11 FTTx Network Feature Management

iManager U2000 Unified Network Management System

Product Description

11-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Manage and maintain CES E1/T1 ports.

Manage and maintain STM-x/OC-x TDM ports.

Manage Ethernet ports.

Connection Management

By using the U2000, you can manage service virtual ports and traffic profiles.

Layer 2 Management

By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and

LACP.

Layer 3 Management

By using the U2000, you can configure the DHCP relay and the ARP function and perform

MPLS management.

ACL&QoS

By using the U2000, you can manage ACLs, QoS, time segments, and HQoS.

User Security and System Security

By using the U2000, you can perform the following operations:

Configure user access in PITP mode.

Configure user access in DHCP option 82 mode.

Configure user access control.

Configure system security access.

Manage BFD sessions.

Ethernet Connection Fault Management

By using the U2000, you can manage maintenance domains (MDs), maintenance associations

(MAs), and maintenance association end point (MEPs).

Protection Group Management

By using the U2000, you can manage PS protection groups and configure type B dual homing

protection, GPON type C protection, and EPON type D protection.

GPON Management

By using the U2000, you can manage GPON optical ports, ONTs, GEM ports, TDM private

line services, and GPON profiles.

EPON Management

By using the U2000, you can manage EPON optical ports, ONTs, CESoP connections, TDM

private line services, and EPON profiles.

Page 185: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 11 FTTx Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

11-3

Multicast Service Management

By using the U2000, you can perform basic configurations and manage programs, profiles,

and users.

Service Provisioning Profile

The U2000 supports E2E service provisioning profiles to improve the service provisioning

efficiency.

Alarm Root Cause Identification

By using the U2000, you can quickly determine the reason why the ONU is offline, and

distinguish whether the backbone or tributary optical fiber is faulty or the terminal is powered

off. This reduces the number of orders that require engineers to rectify faults on site.

Quick Service Cutover of PON Ports

When a PON port of an OLT is faulty, you can connect the optical fiber that is connected to

the faulty PON port to an idle PON port on the OLT, copy the configurations of the faulty

PON port to the idle PON port, and transfer the configurations of the MDUs that are

connected to the faulty PON port to the idle PON port. Then, the services restore quickly.

11.2 ONU Management

The ONU supports GPON, EPON, and GE in the upstream direction and provides different

access modes to meet different FTTx application scenarios. NE configuration management

provides GUIs for you to configure NEs and maintain NE configurations. You can directly

configure services on devices through GUIs.

Device Management

By using the U2000, you can manage device panels, shelves, cards, and system parameter

profiles.

Network Interface Management

By using the U2000, you can perform the following operations:

Manage and maintain TDM E1/T1 ports.

Manage and maintain CES E1/T1 ports.

Manage GPON optical ports.

Manage EPON optical ports.

Connection Management

By using the U2000, you can manage service virtual ports and traffic profiles.

Page 186: IManager U2000 Product Description V100R002C00 03

11 FTTx Network Feature Management

iManager U2000 Unified Network Management System

Product Description

11-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Layer 2 Management

By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and

LACP.

Layer 3 Management

By using the U2000, you can configure the DHCP relay and ARP.

ACL&QoS

By using the U2000, you can manage ACLs, QoS, and time segments.

User Security and System Security

By using the U2000, you can perform the following operations:

Configure user access in PITP mode.

Configure user access in DHCP option 82 mode.

Configure user access control.

Configure system security access.

Manage BFD sessions.

Ethernet Connection Fault Management

By using the U2000, you can manage MDs, MAs, and MEPs.

Protection Group Management

By using the U2000, you can manage PS protection groups and configure type B dual homing

protection, GPON type C protection, and EPON type D protection.

xDSL Management

By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and

ports, and VDSL2 profiles and ports.

Ethernet Access Management

By using the U2000, you can manage Ethernet ports.

Multicast Service Management

By using the U2000, you can perform basic configurations and manage programs, profiles,

and users.

VoIP Service Management

By using the U2000, you can manage media gateways (MGs), signaling gateways, POTS

ports, and IP interfaces.

Page 187: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 11 FTTx Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

11-5

Layer 2 Topology Management of MDUs

In the topology view, an MDU is managed as a card in the remote shelf of an OLT node. You

can double-click the virtual ODN shelf to enter the Layer 2 topology view of the ODN and the

MDU. Then, you can add, delete, or modify the MDU and configure the services associated

with the MDU.

Sheet Pre-deployment

The U2000 provides the sheet pre-deployment solution. Therefore, you can bulk import

devices to the U2000 and implement the functions of software-commissioning-free and

remote acceptance. In addition, only one site visit is required and the plug and play (PnP)

feature is supported. These features greatly improve the deployment efficiency and reduce

network construction costs.

PnP and Quick Replacement

When an MDU is faulty, you need to quickly locate the fault and restore services. It is time

consuming to locate internal faults of an MDU and repair the MDU. Therefore, it is

recommended that you replace faulty MDUs directly and store and repair the faulty MDUs in

a centralized manner.

Remote Acceptance

In FTTx network construction, the U2000 supports remote acceptance of deployed ONUs to

implement one site visit and reduce operation and maintenance costs.

Automatic Bulk Upgrade

The U2000 provides the solution to automatic bulk upgrade of offline ONTs. By using the

U2000, you can perform the following operations:

Bulk upgrade ONTs.

Manage scheduled upgrade tasks.

Upgrade offline ONTs.

Enable the function of automatically upgrading ONTs when the ONTs are connected.

Page 188: IManager U2000 Product Description V100R002C00 03
Page 189: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 12 MSAN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

12-1

12 MSAN Network Feature Management

About This Chapter

This topic describes the functions and features of msan device networks.

12.1 MSAN Management

The multi-service access node (MSAN) connects user telephone lines to the core network. It

also provides voice, ISDN, and broadband services on the same platform. NE configuration

management provides GUIs for you to configure NEs and maintain NE configurations. You

can directly configure services on devices through GUIs.

12.1 MSAN Management

The multi-service access node (MSAN) connects user telephone lines to the core network. It

also provides voice, ISDN, and broadband services on the same platform. NE configuration

management provides GUIs for you to configure NEs and maintain NE configurations. You

can directly configure services on devices through GUIs.

Device Management

By using the U2000, you can manage device panels, shelves, cards, clock sources, and system

parameter profiles.

Network Interface Management

By using the U2000, you can perform the following operations:

Manage E1 ports and Ethernet ports.

Configure and maintain E3/T3 ports.

Manage and maintain STM-x/OC-x TDM ports

Manage IMA groups and links.

Connection Management

By using the U2000, you can manage service virtual ports, traffic profiles, and CESoP

connections.

Page 190: IManager U2000 Product Description V100R002C00 03

12 MSAN Network Feature Management

iManager U2000 Unified Network Management System

Product Description

12-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Layer 2 Management

By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and

LACP.

Layer 3 Management

By using the U2000, you can configure the DHCP relay and ARP.

ACL&QoS

By using the U2000, you can manage ACLs, QoS, and time segments.

User Security and System Security

By using the U2000, you can perform the following operations:

Configure user access in PITP mode.

Configure user access in DHCP option 82 mode.

Configure user access control.

Configure system security access.

Manage BFD sessions.

Ethernet Connection Fault Management

By using the U2000, you can manage MDs, MAs, and MEPs.

Protection Group Management

By using the U2000, you can manage PS protection groups and configure type B dual homing

protection, GPON type C protection, and EPON type D protection.

xDSL Management

By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and

ports, and VDSL2 profiles and ports.

Multicast Service Management

By using the U2000, you can perform basic configurations and manage programs, profiles,

and users.

VoIP Service Management

By using the U2000, you can manage MGs, signaling gateways, POTS ports, and IP

interfaces.

V5 Voice Service Management

By using the U2000, you can manage V5 interfaces, service ports, SPCs, and VFB, ATI, CDI,

and party line services.

Page 191: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 12 MSAN Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

12-3

Narrowband Data Service Management

By using the U2000, you can manage MTA and HSL services and TDM SHDSL ports.

Page 192: IManager U2000 Product Description V100R002C00 03
Page 193: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 13 DSLAM Network Feature Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

13-1

13 DSLAM Network Feature Management

About This Chapter

This topic describes the functions and features of dslam device networks.

13.1 DSLAM Management

In the ATM-DSLAM or IP-DSLAM networking mode, the DSLAM provides the access to

various services such as ADSL, ADSL2+, SHDSL, and VDSL2. It also provides the

integrated services that feature large capacity, high rate, and high quality. NE configuration

management provides GUIs for you to configure NEs and maintain NE configurations. You

can directly configure services on devices through GUIs.

13.1 DSLAM Management

In the ATM-DSLAM or IP-DSLAM networking mode, the DSLAM provides the access to

various services such as ADSL, ADSL2+, SHDSL, and VDSL2. It also provides the

integrated services that feature large capacity, high rate, and high quality. NE configuration

management provides GUIs for you to configure NEs and maintain NE configurations. You

can directly configure services on devices through GUIs.

Device Management

By using the U2000, you can manage device panels, shelves, cards, and system parameter

profiles.

Network Interface Management

By using the U2000, you can perform the following operations:

Manage E1 ports and Ethernet ports.

Configure and maintain E3/T3 ports.

Manage and maintain STM-x/OC-x TDM ports

Manage IMA groups and links.

Page 194: IManager U2000 Product Description V100R002C00 03

13 DSLAM Network Feature Management

iManager U2000 Unified Network Management System

Product Description

13-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Connection Management

By using the U2000, you can manage service virtual ports, traffic profiles, and CESoP

connections.

Layer 2 Management

By using the U2000, you can manage VLANs and configure the RSTP, MSTP and LACP.

Layer 3 Management

By using the U2000, you can configure the DHCP relay and ARP.

ACL&QoS

By using the U2000, you can manage ACLs, QoS, and time segments.

User Security and System Security

By using the U2000, you can perform the following operations:

Configure user access in PITP mode.

Configure user access in DHCP option 82 mode.

Configure user access control.

Configure system security access.

Manage BFD sessions.

Ethernet Connection Fault Management

By using the U2000, you can manage MDs, MAs, and MEPs.

Protection Group Management

By using the U2000, you can manage PS protection groups and configure type B dual homing

protection, GPON type C protection, and EPON type D protection.

xDSL Management

By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and

ports, EFM SHDSL ports, and VDSL2 profiles and ports.

Multicast Service Management

By using the U2000, you can perform basic configurations and manage programs, profiles,

and users.

Page 195: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 14 ONT Management

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

14-1

14 ONT Management

The U2000 supports the management of EPON terminals in the OAM mode and GPON

terminals in the OMCI mode. In this manner, the terminals are managed in a centralized

manner, which saves the maintenance workload.

To manage xPON terminals, the U2000 adopts two solutions, namely, SNMP+OMCI and

FTP+OMCI.

The objects managed by the ONT L2 protocol and protocols at lower layers provision

multicast IPTV and data services by using the SNMP+OMCI solution.

The VoIP services are provisioned through the FTP+OMCI solution. The N2000 BMS

generates a .xml configuration file and then uploads the file to the FTP server. The OLT

obtains the configuration file from the FTP server, loads it, and then sends it to the ONT

through the OMCI. Finally, the service configuration of the ONT is complete.

The U2000 supports the automatic batch upgrade of ONTs.

Supports the batch upgrade of ONTs.

Supports the scheduled task upgrade management.

Supports the upgrade of offline ONTs, that is, automatic upgrade when the ONT is

connected.

Page 196: IManager U2000 Product Description V100R002C00 03
Page 197: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 15 Reliability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

15-1

15 Reliability

About This Chapter

In reliability design, measures are taken to reduce potential risks, so that the product can

operate in a safer manner.

15.1 Reliability Indicator

This topic describes the indicators of the reliability design.

15.2 HA System

The high availability (HA) system helps you improve the running reliability of the U2000

server.

15.3 DCN Protection

You can use a data communication network (DCN) to connect the U2000 to a standby

gateway NE (GNE). This improves the reliability of the communication connection between

the U2000 and equipment.

15.4 Disk Mirroring

The disk mirroring function helps you improve the reliability of disk data on the U2000

server.

15.5 Data Backup

The data backup function helps you improve the reliability of important U2000 data.

15.1 Reliability Indicator

This topic describes the indicators of the reliability design.

Table 15-1 lists the reliability indicators of the U2000.

Page 198: IManager U2000 Product Description V100R002C00 03

15 Reliability

iManager U2000 Unified Network Management System

Product Description

15-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Table 15-1 Reliability indicators of the U2000

Item Indicator Remarks

MTBF The average fault interval is

larger than 6 months.

The fault is defined as database

crash.

HA system

MTTR The average fault recovery time

is no more than 15 minutes.

The fault is defined as database

crash.

HA system

HA switching time ≤ 15 minutes 70% of the management

capacity

NMS start time ≤ 10 minutes 70% of the management

capacity

NMS shutdown time ≤ 10 minutes 70% of the management

capacity

15.2 HA System

The high availability (HA) system helps you improve the running reliability of the U2000

server.

The non-distributed U2000 server uses a 1+1 scheme. If the active site fails, the U2000 can be

switched to the standby site so that the U2000 application is not interrupted.

The U2000 supports distributed cluster. For better stability and risk resistance capability, the

distributed cluster uses a 1+1 scheme. If a slave server fails, the master server fails, the

Page 199: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 15 Reliability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

15-3

database is faulty, IP addresses conflict, or the key process fails to be switched, you can

switch the distributed cluster to the standby distributed cluster without interrupting the U2000.

The protection mechanism of an HA system has two aspects:

Database synchronization and backup between the active and standby sites

Switching the application program between the active and standby sites

The U2000 provides the following HA schemes:

HA system (Veritas 1+1 hot standby): Applicable to remote hot standby of the

non-distributed system, featuring automatic switching.

HA system (Veritas distributed hot standby): Applicable to remote hot standby of the

distributed system on SUSE Linux OS, featuring automatic switching.

15.3 DCN Protection

You can use a data communication network (DCN) to connect the U2000 to a standby

gateway NE (GNE). This improves the reliability of the communication connection between

the U2000 and equipment.

The communication between non-GNEs and the U2000 is forwarded by the GNE. In the

U2000, you can set the active GNE and standby GNE for NEs in advance. When the

communication between the active GNE and the U2000 is interrupted, the U2000

automatically switches to the standby GNE for communication, so that the communication

between the U2000 and NEs is not interrupted. When the communication between the U2000

and the active GNE recovers, the U2000 determines whether to use the active GNE again

according to the preset revertive mode.

15.4 Disk Mirroring

The disk mirroring function helps you improve the reliability of disk data on the U2000

server.

If the server is a Sun workstation with more than two hard disks, disk mirroring can be

installed together with the U2000. After you create disk mirroring, if the active disk fails, you

can use a command to switch the data to the standby disk, to restore the working data and

parameter settings before the active disk is damaged.

15.5 Data Backup

The data backup function helps you improve the reliability of important U2000 data.

The security of network data is a concern for users. The U2000 provides the following

solutions listed in Table 15-2.

Page 200: IManager U2000 Product Description V100R002C00 03

15 Reliability

iManager U2000 Unified Network Management System

Product Description

15-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Table 15-2 Data backup

Data to Be Backed Up Solution of the U2000 Operation Description

Alarm log, abnormal event

log, performance log,

security, and operation log

Dump logs. Operate on the U2000 client.

For more details, see the

U2000 Online Help.

Configuration data Export them to script files,

adopting the MML

command format. The script

files can neglect the

structural differences among

databases of all the U2000

versions, and are suitable for

data backup in the case of

version upgrade. The script

files supported by the

U2000 consist of

networkwide configuration

files, NMS naming file, NE

configuration file, NE list

files, server computer

information files, service

implementation

configuration file,

network-layer information

files, and network

simulation and planning

information files.

Database Back up all data in the

U2000 database.

NE database Back up the NE data.

Page 201: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 16 Performance Indicators

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

16-1

16 Performance Indicators

This topic describes the performance indicators of the U2000.

Table 16-1 Performance indicators

Item Subitem Indicator

Storage capacity Capacity of current alarms Default: 100,000 pieces

Maximum: 100,000 pieces

Capacity of history alarms Default: 2,000,000 pieces

Maximum: 2,000,000 pieces

Capacity of logs, including

operation logs and system

logs

Default: 1,000,000 pieces

Maximum: 1,000,000 pieces

Resources occupied CPU usage Normally, the CPU usage is

not greater than 10%.

Processing capability Response speed of alarm

handling

Normally, the time interval

from the time at which an

alarm is generated on the

equipment to the time at

which the alarm is displayed

on the U2000 is not more

than 10 seconds.

Response speed of

performance event handling

Normally, in the case of

1,000 pieces of performance

data, the time interval from

the time at which they are

reported to the U2000 to the

time at which they are stored

in the database is

approximately 10 seconds.

Alarm handling capability Normally, 100 (not more

than 400 at most) pieces of

alarms can be handled per

second.

Page 202: IManager U2000 Product Description V100R002C00 03

16 Performance Indicators

iManager U2000 Unified Network Management System

Product Description

16-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Item Subitem Indicator

U2000 user management User Maximum: 500

User group Maximum: 50

Equipment set Maximum: 100

Function set Maximum: 255

HA switching time Switching between remote

active and standby servers < 15 minutes

Stability Mean time between failures

(MTBF)

The MTBF is more than six

months (a failure refers to

the situation where the

database quits

unexpectedly).

Mean time to recovery

(MTTR)

The MTTR is not more than

15 minutes (a failure refers

to the situation where the

database quits

unexpectedly).

Management capability The number of managed

physical nodes

Maximum: 15,000 physical

nodes

The number of managed

equivalent NEs

Maximum: 15,000

equivalent NEs

Table 16-2 DCN bandwidth requirements

Item Bandwidth Requirements

Bandwidth required for the communication

between the U2000 server and a U2000

client

2 Mbit/s

Page 203: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 16 Performance Indicators

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

16-3

Item Bandwidth Requirements

Bandwidth required for the communication

between the N equivalent NEs and U2000

server

A bandwidth of 2 Mbit/s may not meet the

bandwidth requirements in the case of

different networks. In this case, you can

determine the CIR or PIR by using the

following formula:

CIR:

− N>56:

2048k+(N-56)*

0.5k

− N<=56:

2Mbit/s

PIR:

− N>56:

2048k+(N-56)*

5k

− N<=56:

10Mbit/s

Bandwidth required for the communication

between the OSS and U2000 server

2 Mbit/s

NOTE

A minimum of 2 Mbit/s is required.

Bandwidth required for the communication

between the primary and secondary sites in

an HA system (Veritas)

2 Mbit/s

NOTE

A minimum of 2 Mbit/s is required. A bandwidth

of 2 Mbit/s refers to the bandwidth that is

required when you do not synchronize all

performance data by using PMS. If you want to

synchronize the performance data, more

bandwidth is required.

Page 204: IManager U2000 Product Description V100R002C00 03
Page 205: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-1

17 Management Capability

About This Chapter

Introduce the manageable equipment and the management capability of the U2000.

17.1 Management Capability

The management capability of the U2000, on the basis of satisfying the preceding

performance indexes, can be measured by the maximum number of NEs it manages.

17.1 Management Capability

The management capability of the U2000, on the basis of satisfying the preceding

performance indexes, can be measured by the maximum number of NEs it manages.

Currently, a set of U2000 can manage a maximum of 15,000 physical NEs, 20,000 equivalent

NEs and 100 clients. This conclusion is drawn after the tests under a certain environment and

objectively reflects the actual management capability of the U2000.

Management capability: In this document, management capability refers to the capability

of the NMS to manage network resources, which are expressed in the number of

equivalent NEs.

Equivalent NE: The functional features, cross-connect capacity, and number of

boards/ports/channels are specific to NEs of different types. As these NEs require

different resources of the NMS, the number of NEs that can be managed by the NMS

depends on the NE types. For easy description and calculation of the management

capability, the concept of equivalent NE is defined so that NEs of different types or a

number of ports can be converted to equivalent NEs by an uniform criteria according to

the system resources required by them. The system resources required by an equivalent

NE is equal to the resources for managing an STM-1 transport NE.

Equivalent coefficient: The equivalent coefficient refers to the ratio of the resources used

by physical NEs or ports to the resources used by equivalent NEs. Equivalent coefficient

= (Resources used by physical NEs or ports)/(Resources used by equivalent NEs)

The management capability of the U2000 in a network that consists of different types of NEs

is affected by the following factors:

The key technical specifications include the number of equivalent NEs, number of

clients, and number of physical NEs.

Page 206: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The management capability of the U2000 also depends on the hardware and varies with

the hardware configuration.

The system limits the number of physical nodes. Hence, the number of physical nodes is

a restriction for the management capability.

The management capability refers to the maximum number of equivalent NEs that can

be managed by the U2000 on certain hardware configuration conditions.

If a client also runs on the computer where the server is running, the management

capability is reduced by 50%. Hence, it is recommended that you run the client and

server on different computers.

Virtual NEs are not included in the management capability. A pre-configured NE is equal

to a real NE. One third-party NE is equal to one equivalent NE, and can only be

discovered instead of being managed. The equivalent coefficient of the OEM equipment

is calculated in the way similar to Huawei equipment.

Generally, the number of equivalent NEs that the U2000 can manage is calculated according

to the following rules:

Number of equivalent NEs = <Number of equivalent NEs in the transport domain> +

<Number of equivalent NEs in the IP domain> + <Number of equivalent NEs in the

access domain>

<Number of equivalent NEs in the transport domain> = (Number of transport NEs of

type_I x Equivalent coefficient + ... + (Number of transport NEs of type_n x Equivalent

coefficient)

For example, there are 5 OptiX OSN 9500 (equivalent coefficient: 10), 10 OptiX OSN 7500 (equivalent

coefficient: 6.5), and 100 OptiX OSN 3500 (equivalent coefficient: 4.5). Then, you can calculate the

number of equivalent NEs in the transport domain as follows:

Number of equivalent NEs in the transport domain = 5 x 10 + 10 x 6.5 + 100 x 4.5 = 565

<Number of equivalent NEs in the IP domain> = (Number of IP NEs of type_I x

Equivalent coefficient) + ... + (Number of IP NEs of type_n x Equivalent coefficient)

For example, there are 5 NE5000E (equivalent coefficient: 10), 200 S5300 (equivalent coefficient: 1.25),

and 1000 CX200 (equivalent coefficient: 0.625). Then, you can calculate the number of equivalent NEs

in the IP domain as follows:

Number of equivalent NEs in the IP domain = 5 x 10 + 200 x 1.25 + 1000 x 0.625 = 925

<Number of equivalent NEs in the access domain> = Number of FTTx OLT equivalent

NEs + Number of FTTx MDU equivalent NEs + Number of MSAN equivalent NEs +

Number of DSLAM equivalent NEs + Number of equivalent NEs of other access

equipment

Number of FTTx OLT equivalent NEs = (Number of ONTs x Equivalent coefficient) + (Number of

MDUs x Equivalent coefficient) + (Number of P2P ports x Equivalent coefficient)

Number of FTTx MDU equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ...

+ (Number of ports of type n x Equivalent coefficient)

Number of MSAN equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +

(Number of ports of type n x Equivalent coefficient)

Number of DSLAM equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +

(Number of ports of type_n x Equivalent coefficient)

Number of equivalent NEs of other access equipment = (Number of NEs of type_I x Equivalent

coefficient) + ... + (Number of NEs of type_n x Equivalent coefficient)

The basic unit of an equivalent NE of the U2000 is OptiX Metro 1000.

Page 207: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-3

The comparison coefficient of an equivalent NE of the U2000 to the equivalent NE in

each domain is as follows:

− 1 equivalent NE in the transport domain = 1 equivalent NE of the U2000

− 4 equivalent nodes in the IP domain = 1 equivalent NE of the U2000

− 3.3 equivalent nodes in the access domain = 1 equivalent NE of the U2000

The management scales of the U2000 are defined as follows:

− Small-scale network: less than 2,000 equivalent NEs of the U2000

− Medium-scale network: less than 6,000 equivalent NEs of the U2000

− Large-scale network: less than 15,000 equivalent NEs of the U2000

− Extra-large-scale network: less than 20000 equivalent NEs of the U2000

Conversion between monitored instances to equivalent nodes:

Monitored instances are converted into physical equivalent nodes as follows: 2

monitored instances = 1 equivalent NE of the U2000

Conversion between service resources to equivalent NEs.

Service resource management needs to be converted into a certain number of equivalent

nodes. The formulas for calculating the equivalent nodes are as follows:

− For 1-20,000 service resource licenses, Equivalent nodes of services = Total

equivalent nodes x 20%

− For 20,001-60,000 service resource licenses, Equivalent nodes of services = Total

equivalent nodes x 25%

− For 60,001-100,000 service resource licenses, Equivalent nodes of services = Total

equivalent nodes x 30%

The management capability of the U2000 varies with hardware platforms, as shown in Table

17-1.

Table 17-1 Management capabilities of the U2000 on different hardware platforms

Server Short Name of Computer

Management Capability

Number of Clients

Support Unified Network Management

Mainstream Server to Be Delivered with the U2000 V100R002C00

Sun

Server

T5220-4C*1.2G-16G 2000 32 No

T5220-8C*1.4G-32G 6000 64 Yes

M4000-4P*2.53G-32G

Array: 6*146G Array

15000 100 Yes

Page 208: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Server Short Name of Computer

Management Capability

Number of Clients

Support Unified Network Management

PC

Server

HP

DL380G6-2P*2.0G-8G

2000 32 Yes

HP

DL580G5-4P*2.13G-16G

6000 64 Yes

Compatible Server (Reuse)

SUN

Server

M4000-2P*2.15G-16G 6000 64 No

SUN V890-4P*1.5G-16G 3000 48 No

SUN V890-2P*1.5G-8G 1500 32 No

SUN

V445-4P*1.6GHz-8G

1500 32 No

SUN

E2900-8P*1.5GHz-32G

5000 80 Yes

SUN

E2900-12P*1.5GHz-48G

5000 100 Yes

Fujitsu

Server

PW650-4P*1.8GHz-16G 2000 48 No

PW650-2P*1.8GHz-8G 1500 32 No

PC

Server

IBM X3650-2P*2.0G-8G 2000 32 No

IBM

X3850M2-4P*2.13G-16G

6000 64 No

Compatible Server for the Single-Domain Upgrade

The servers are applicable to only the single-domain upgrade instead of the

cross-domain management in centralized manner. For example, if the T2000 is

installed on SUN V490, the T2000 can be directly upgraded to the U2000, but the

U2000 cannot have the management functions of the IP and access domains in this

case.

Page 209: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-5

Server Short Name of Computer

Management Capability

Number of Clients

Support Unified Network Management

SUN

Server

SUN

Netra240-2P*1.5GHz-2G

600 16 No

SUN Netra240

does not

support the

management

of PTN

devices. If

T2000 is

installed on

Netra240,

after upgraded

to the U2000,

the U2000

cannot have

the

management

functions of

the PTN

devices. If

must to

manage the

PTN devices,

the Netra240

must be

changed.

SUN

V490-2P*1.6GHz-4G

800 24 No

SUN

V440-2P*1.6GHz-4G

800 24 No

SUN

V240-2P*1.5GHz-4G

600 16 No

SUN

V245-2P*1.5GHz-4G

600 16 No

PC

Server

IBM X3500-2P*2.0G-4G 2000 64 No

IBM X3200-1P*2.4G-2G 600 14 No

HP ML350-2P*2.0G-4G 2000 64 No

Page 210: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Server Short Name of Computer

Management Capability

Number of Clients

Support Unified Network Management

HP ML110-1P*2.4G-2G 600 24 No

HP ML570-4P*2.0G-4G 2000 48 No

DELL

R900-4P*2.13G-4G

2000 48 No

DELL

PE6800-4P*2.0G-4G

2000 48 No

DELL

PE2900-2P*2.0G-4G

1500 32 No

DELL

PE840-1P*2.4G-2G

600 24 No

HP

DL380G5-2P*2.0G-8G

6000 64 No

HP

DL580G5-4P*2.13G-16G

10000 100 No

IBM X3650-2P*2.0G-8G 6000 64 No

IBM

X3850M2-4P*2.13G-16G

10000 100 No

Maximum number of physical NEs managed by U2000 as follows:

Maximum number of physical NEs: 15000

Maximum number of SDH paths: 300000

Maximum number of WDM paths: 50000

The management capability of the U2000 varies with OptiX NE equivalents, as shown in

Table 17-2.

Page 211: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-7

Table 17-2 Management capabilities of the U2000 on different OptiX NE equivalents

NE Series NE Type Equivalent Coefficient for the U2000

OSN series OptiX OSN 500 1

OptiX OSN 1500 3.5 (With ASON)

2.5 (Without ASON)

OptiX OSN 2000 2

OptiX OSN 2500 4.5 (With ASON)

3.5 (Without ASON)

OptiX OSN 2500 REG 1.5

OptiX OSN 3500 6.5 (With ASON)

4.5 (Without ASON)

OptiX OSN 7500 10 (With ASON)

6.5 (Without ASON)

OptiX OSN 9500 15 (With ASON)

10 (Without ASON)

MSTP series OptiX Metro 100 0.5

OptiX Metro 200 0.5

OptiX Metro 500 1

OptiX 155/622H (Metro

1000)

1

OptiX Metro 1000V3 1

OptiX Metro 1050 1.5

OptiX Metro 1100 1.5

OptiX 155/622 (Metro

2050)

2

OptiX 2500+(Metro 3000) 3

OptiX Metro 3100 3

OptiX 10G (Metro 5000) 4

SDH series OptiX 155C 1

OptiX 155S 1

OptiX 155/622B_I 2

OptiX 155/622B_II 2

OptiX 2500 3

Page 212: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

NE Series NE Type Equivalent Coefficient for the U2000

Metro WDM series OptiX Metro 6020 1

OptiX Metro 6040 1

OptiX Metro 6040V2 1

OptiX Metro 6100 1.5

OptiX Metro 6100V1 1.5

OptiX Metro 6100V1E 1.5

OptiX OSN 900A 1

LH WDM series OptiX BWS OAS, OptiX

BWS OCS, OptiX BWS

OIS

1.5

OptiX BWS 320GV3 1.5

OptiX BWS 1600G, OptiX

BWS 1600G OLA

1.5+1.5*N (N refers to the

number of slave shelves)

OptiX OTU40000 1

Marine series OptiX BWS 1600S 1.5

OptiX PFE 1670 1

OptiX SLM 1630 1

NG WDM series OptiX OSN 1800 1

OptiX OSN 3800 3.5 (With ASON)

1.5 (Without ASON)

OptiX OSN 6800 4+4*N (With ASON)

2+2*N (Without ASON)

N refers to the number of

slave shelves

OptiX OSN 8800 I 10+10*N (With ASON)

6+6*N (Without ASON)

N refers to the number of

slave shelves

OptiX OSN 8800 II 16+16*N (With ASON)

12+12*N (Without ASON)

N refers to the number of

slave shelves

NA WDM series OptiX BWS 1600A 1.5

OptiX BWS 1600(NA) 1.5

Page 213: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-9

NE Series NE Type Equivalent Coefficient for the U2000

OptiX OSN 1800(NA) 1

OptiX OSN 3800A 3.5 (With ASON)

1.5 (Without ASON)

OptiX OSN 6800A 4+4*N (With ASON)

2+2*N (Without ASON)

N refers to the number of

slave shelves

OptiX OSN 8800 I(NA) 10+10*N (With ASON)

6+6*N (Without ASON)

N refers to the number of

slave shelves

OptiX OSN 8800 II(NA) 16+16*N (With ASON)

12+12*N (Without ASON)

N refers to the number of

slave shelves

RTN series OptiX RTN 605 0.4

OptiX RTN 610 0.4

OptiX RTN 620 0.5

OptiX RTN 910 0.5

OptiX RTN 950 1

OptiX RTN 5000S 1

The management capability of the U2000 varies with IP NE equivalents, as shown in Table

17-3.

Table 17-3 Management capabilities of the U2000 on different IP NE equivalents

NE Series NE Type Equivalent Coefficient for the U2000

Router NE05/NE08(E)/NE16(E) 0.75

NE20/NE20E 1.25

NE40/NE80 5

NE40E/NE80E 10

NE5000E 10*N (N: number of

chassis)

R-series router 1

Page 214: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-10 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

NE Series NE Type Equivalent Coefficient for the U2000

AR-series router 0.25

Security equipment for load

balancing and blocking

SSP 10

NSE 10

Switch S2000 series 0.125

S2300 series 0.625

S3000 series 0.125

S3300 series 0.75

S5000 series 0.25

S5300 series 1.25

S6500 series 0.75

S7800 series 1.25

S8016 series 1.25

S8500 series 1.25

S9300 series 2.5

PTN series OptiX PTN 1900 2.5

OptiX PTN 3900 4.5

OptiX PTN 912 0.5

OptiX PTN 910 0.5

OptiX PTN 950 1

MAN service platform CX200 series 0.625

CX300 series 1.25

CX600 series 5

Firewall Eudomen 300/500/1000 0.5

Eudomen 200E series 0.25

Eudomen 1000E series 0.75

Eudomen 8040 3

Eudomen 8080 6

Eudomen 8080E 4

Eudomen 8160E 8

USG USG9110 4

Page 215: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-11

NE Series NE Type Equivalent Coefficient for the U2000

USG9120 2

USG9210 3

USG9220 6

USG9310 4

USG9320 8

USG5000 series 0.75

USG3030 0.25

USG3040 0.25

USG2100 series 0.25

USG2200 series 0.25

USG50 0.25

SRG SRG1200 0.25

SRG20-10 0.25

SRG20-11 0.25

SRG20-12 0.25

SRG20-15 0.25

SRG20-20 0.25

SRG20-21 0.25

SRG20-30 0.25

SRG20-31 0.25

SRG20-31-D 0.25

SIG SIG9810 4

SIG9820 8

SIG9800 Server 0.25

SVN SVN3000 0.25

Broadband access MA5200E/F series 1.5

MA5200G series 10

ME60 series 10

Voice gateway VG1040/1041 series 0.25

WLAN AP AP 0.25

Page 216: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-12 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

The management capability of the U2000 varies with access NE equivalents, as shown in

Table 17-4.

Table 17-4 Management capabilities of the U2000 on different access NE equivalents

Class Type Equivalent Coefficient for the U2000

FTTx OLT (calculation

based on the managed ONT,

MDU, and P2P resources in

the case of OLT)

ONT 1/64

MDU 1/32

P2P port 1/64

FTTx MDU (calculation

based on the managed user

ports in the case of MDU)

xDSL port 1/128

E1 port 1/128

ETH port 1/128

PSTN/ISDN/HSL port 1/160

MSAN (calculation based

on the number of managed

ports)

xDSL port 1/128

E1 port 1/128

ETH port 1/128

PSTN/ISDN/HSL port 1/160

DSLAM (calculation based

on the number of managed

ports)

xDSL port 1/128

E1 port 1/128

ETH port 1/128

Other NEs (calculation

based on the NE types)

MD5500 1.5

8850 18

8825 18

8750 18

MA5200V1R2/R9 3

17.2 Manageable MSTP Series Equipment

Manageable MSTP series equipment is listed as follows:

Page 217: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-13

Table 17-5 Manageable MSTP series equipment

Category Equipment Description

SDH series OptiX 155C OptiX 155C SDH transmission unit for

the access network

OptiX 155S OptiX 155S simplified STM-1 optical

transmission system

OptiX 1556/622B_I

OptiX 1556/622B_II

OptiX 155/622B STM-1/STM-4

compatible optical transmission system

(19-inch rack)

OptiX 2500 OptiX 2500 STM-4/STM-16

compatible optical transmission system

OptiX 2500 REG OptiX 2500 REG STM-16 regenerator

MSTP series OptiX Metro 100 OptiX Metro 100 terminal STM-1

optical transmission system

OptiX Metro 200 OptiX Metro 200 ultra compact STM-1

optical transmission system

OptiX Metro 500 OptiX Metro 500 ultra compact STM-1

multi-service transmission system

OptiX 155/622H (Metro

1000)

OptiX 155/622H(Metro1000)

STM-1/STM-4 MSTP

OptiX Metro 1000 OptiX 155/622H(Metro1000)

STM-1/STM-4 MSTP optical

transmission system V3 series

OptiX Metro 1050 OptiX Metro 1050 compact

STM-1/STM-4 multi-service optical

transmission system

OptiX Metro 1100 OptiX Metro 1100 compact container

STM-16 multi-service transmission

system

OptiX 155/622 (Metro

2050)

OptiX 155/622(Metro2050)

STM-1/STM-4 compatible optical

transmission system

OptiX 2500+ (Metro

3000)

OptiX 2500+(Metro3000) STM-16

MADM/MSTP optical transmission

system

OptiX Metro 3100 OptiX Metro 3100 STM-16

multi-service transmission system

OptiX 10G (Metro 5000) OptiX 10G(Metro5000)STM-64

MADM optical transmission system

OSN series OptiX OSN 500 OptiX OSN 500 STM-1/STM-4

multi-service CPE optical transmission system

Page 218: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-14 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Category Equipment Description

OptiX OSN 1500 OptiX OSN 1500 intelligent optical

transmission system

OptiX OSN 2000 OptiX OSN 2000 enhanced

STM-1/STM-4 multi-service optical

transmission system

OptiX OSN 2500 OptiX OSN 2500 intelligent optical

transmission system

OptiX OSN 2500 REG OptiX OSN 2500 REG STM-16

regenerator

OptiX OSN 3500

OptiX OSN 3500 II

OptiX OSN 3500 intelligent optical

transmission system

OptiX OSN 7500 OptiX OSN 7500 intelligent optical

switching system

OptiX OSN 9500 OptiX OSN 9500 intelligent optical

switching system

17.3 Manageable WDM Series Equipment

Manageable WDM series equipment is listed as follows:

Table 17-6 Manageable WDM equipment

Category Equipment Description

Metro WDM series OptiX Metro 6020 OptiX Metro 6020 compact

container CWDM system

V100R001

OptiX Metro 6040 OptiX Metro 6040 compact

container WDM system

V100R001

OptiX Metro 6040 V2 OptiX Metro 6040 compact

container DWDM system

V200R001 or higher

OptiX Metro 6100 OptiX Metro 6100 DWDM

multi-service transmission

system V100R002

OptiX Metro 6100V1 OptiX Metro 6100 DWDM

multi-service transmission

system V100R003

Page 219: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-15

Category Equipment Description

OptiX Metro 6100 V1E OptiX Metro 6100 WDM

multi-service transmission

system V100R004 or higher

OptiX OSN 900A OptiX OSN 900A compact

WDM system (A Type)

LH WDM series OptiX BWS 320G OptiX BWS 320G backbone

DWDM optical transmission

system V300R002

OptiX BWS 320G V3 OptiX BWS 320G backbone

DWDM optical transmission

system V300R004

OptiX BWS 1600G, OptiX

BWS 1600G OLA

OptiX BWS 1600G

backbone DWDM optical

transmission system

V100R003 or higher

OptiX OTU40000 OptiX OTU 40000

backbone DWDM optical

transmission system

NG WDM series OptiX OSN 1800 OptiX OSN 1800 compact

multi-service edge optical

transport platform

OptiX OSN 3800 OptiX OSN 3800 compact

intelligent optical transport

platform

OptiX OSN 6800 OptiX OSN 6800 intelligent

optical transport platform

OptiX OSN 8800/8800 II OptiX OSN 8800 I/ 8800 II

intelligent optical transport

platform

The OptiX BWS 1600G OLA is an independent power supply subrack. It is supported by the OptiX

BWS 1600G backbone DWDM optical transmission system V100R004 and higher versions.

17.4 Manageable NA WDM Series Equipment

Manageable NA WDM series equipment is listed as follows:

Page 220: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-16 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Table 17-7 Manageable NA WDM series equipment

Category Equipment Description

LH WDM series OptiX BWS 1600A OptiX BWS 1600A WDM

Optical Transmission

System

OptiX BWS 1600G(NA) OptiX BWS 1600G(NA)

Backbone DWDM Optical

Transmission System

NG WDM series OptiX OSN 1800(NA)

compact intelligent optical

transport platform

OptiX OSN 1800(NA)

OptiX OSN 3800A compact

intelligent optical transport

platform

OptiX OSN 3800A

OptiX OSN 6800A

intelligent optical transport

platform

OptiX OSN 6800A

OptiX OSN 8800 I/II(NA)

intelligent optical transport

platform

OptiX OSN 8800 I/II(NA)

17.5 Manageable Marine Series Equipment

Manageable marine series equipment is listed as follows:

Table 17-8 Manageable marine series equipment

Category Equipment Description

Submarine line series OptiX SLM 1630 OptiX SLM 1630 submarine

line monitor

OptiX PFE 1670 OptiX PFE 1670 Power

Feeding Equipment

OptiX BWS 1600S OptiX BWS 1600S

submarine line terminal

equipment

17.6 Manageable RTN Series Equipment

Manageable RTN series equipment is listed as follows:

Page 221: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-17

Table 17-9 Manageable RTN equipment

Category Equipment Description

RTN series OptiX RTN 605 OptiX RTN 605 radio

transmission system

OptiX RTN 610 OptiX RTN 610 radio

transmission system

OptiX RTN 620 OptiX RTN 620 radio

transmission system

OptiX RTN 910 OptiX RTN 910 radio

transmission system

OptiX RTN 950 OptiX RTN 950 radio

transmission system

OptiX RTN 5000S OptiX RTN 5000S radio

transmission system

17.7 Manageable PTN Series Equipment

Manageable PTN series equipment is listed as follows:

Table 17-10 Manageable PTN series equipment

Category Equipment Description

PTN series OptiX PTN 1900 OptiX PTN 1900 optical

network PTN series

multi-service packet

transmission platform

OptiX PTN 3900 OptiX PTN 3900 optical

network PTN series

multi-service packet

transmission platform

OptiX PTN 912 OptiX PTN 912 optical

network PTN series

multi-service packet

transmission platform

OptiX PTN 910 OptiX PTN 910 optical

network PTN series

multi-service packet

transmission platform

OptiX PTN 950 OptiX PTN 950 optical

network PTN series

multi-service packet transmission platform

Page 222: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-18 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

17.8 Manageable FTTx Series Equipment

Manageable FTTx series equipment are listed as follows:

Table 17-11 Manageable FTTx series equipment

Category Equipment Description

OLT series MA5600T SmartAX MA5600T Multi-service

Access Module

MA5603T SmartAX MA5603T Optical Access

Equipment

MA5680T SmartAX MA5680T Optical Access

Equipment

MA5683T SmartAX MA5683T Optical Access

Equipment

MA5606T SmartAX MA5606T Optical Access

Equipment, Only the version of

V800R105 support.

ONU series MA5606T SmartAX MA5606T Optical Access

Equipment

MA5620 SmartAX MA5620 Multiple Dwelling

Unit

MA5626 SmartAX MA5626 Multiple Dwelling

Unit

MA5620E SmartAX MA5620E EPON Multiple

Dwelling Unit

MA5626E SmartAX MA5626E EPON Multiple

Dwelling Unit

MA5620G SmartAX MA5620G GPON Multiple

Dwelling Unit

MA5626G SmartAX MA5626G GPON Multiple

Dwelling Unit

MA5610 SmartAX MA5610 Multi-service Access

Module

MA5612 SmartAX MA5612 Multi-service Access

Module

MA5616 SmartAX MA5616 Multi-service Access

Module

Page 223: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-19

Category Equipment Description

MA5651 SmartAX MA5651 Multiple Dwelling

Unit

MA5651G SmartAX MA5651G Multiple Dwelling

Unit

MA5652G SmartAX MA5652G GPON Multiple

Dwelling Unit

MA5635 SmartAX MA5635 Multi-service Access

Module

ATN930 ATN930 FMC Multi-service Access Unit

SRG2220 SRG2220 Service Router Gateway

17.9 Manageable MSAN Series Equipment

Manageable MSAN series equipment are listed as follows:

Table 17-12 Manageable MSAN series equipment

Category Equipment Description

UA5000 series UA5000 UA5000 Universal Access Unit

UA5000(PVU) UA5000 Universal Access Unit

UA5000(IPMB) UA5000 Universal Access Unit

UA5000(PVMV1) UA5000 Universal Access Unit

MD5500 series MD5500 MD5500 Multi-service

Distribution Module

17.10 Manageable DSLAM Series Equipment

Manageable DSLAM series equipment are listed as follows:

Table 17-13 Manageable DSLAM series equipment

Category Equipment Description

MA5100 series MA5100V1

MA5100V2

SmartAX MA5100 Multi-service

Access Module

Page 224: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-20 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Category Equipment Description

MA5105 series MA5105 SmartAX MA5105 Multi-service

Access Module

MA5605 series MA5605 SmartAX MA5605 Multi-service

Access Module

MA5615 series MA5615 SmartAX MA5615 Broadband

Access System

MA5300 series MA5300 SmartAX MA5300 Broadband

Access System

MA5600 series MA5600V3 SmartAX MA5600 Multi-service

Access Module

MA5600V8 series MA5600T SmartAX MA5600T

Multi-service Access Module

MA5603T SmartAX MA5603T

Multi-service Access Module

MA5606T SmartAX MA5606T

Multi-service Access Module

17.11 Manageable Router Series Equipment

Manageable router series equipment are listed as follows:

Table 17-14 Manageable router series equipment

Category Device Description

NE series routers NE05 Net engine 05 router

NE08 Net engine 08 router

NE16 Net engine 16 router

NE08E Net engine 08E router

NE16E Net engine 16E router

NE20 Net engine 20 router

NE20E Net engine 20E router

NE40 Net engine 40 universal switching router

NE80 Net engine 80 universal switching router

NE40E/NE80E Net engine 40E/80E core router

NE5000E Net engine 5000E core router

Page 225: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-21

Category Device Description

R/AR series routers R series routers R series routers

AR18 Advanced router 18 serials router

AR28 Advanced router 28 serials router

AR46 Advanced router 46 serials router

AR19 Advanced router 19 serials router

AR29 Advanced router 29 serials router

AR49 Advanced router 49 serials router

17.12 Manageable Switch Series Equipment

Manageable switch series equipment are listed as follows:

Table 17-15 Manageable switch series equipment

Category Device Description

S8500 series switches S8505 Quidway S8505 routing switch

S8505E Quidway S8505E routing switch

S8508 Quidway S8508 Lanswitch

S8512 Quidway S8512 routing switch

S6500 series switches S6502 Quidway S6502 Lanswitch

S6503 Quidway S6502 Ethernet switch

S6506R Quidway S6506R Ethernet

switch

S6506 Quidway S6506 Ethernet switch

S5000 series switches S5000 series switches Quidway S5000 Lanswitch

S5500 series switches Quidway S5500 Lanswitch

S5600 series switches Quidway S5600 Lanswitch

S3000 series switches S3000 series switches Quidway S3000 Lanswitch

S3500 series switches Quidway S3500 Lanswitch

S3900 series switches Quidway S3900 Lanswitch

S2000 series switches S2000 series switches Quidway S2000 Lanswitch

S2400 series switches Quidway S2400 Lanswitch

Page 226: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-22 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Category Device Description

box series switches S2300 series switches Quidway S2300 Ethernet switch

S3300 series switches Quidway S3300 Lanswitch

S5300 series switches Quidway S5300 Lanswitch

frame series switches S9300 series switches Quidway S9300 Lanswitch

17.13 Manageable Metro Service Platform Equipment

Manageable Metro service platform equipment are listed as follows:

Table 17-16 Manageable Metro service platform equipment

Category Device Description

CX series devices CX200 Quidway carrier switch platform 200

CX200C Quidway carrier switch platform 200C

CX200D Quidway carrier switch platform

200D

CX300 Quidway carrier switch platform 300

CX380 Quidway carrier switch platform 380

CX600 Quidway carrier switch platform 600

17.14 Manageable Broadband Access Series Equipment

Manageable broadband access series equipment are listed as follows:

Table 17-17 Manageable broadband access series equipment

Category Device Description

Multi-service

gateways

MA5200E Multiservice access 5200E service gateway

MA5200F Multiservice access 5200F service gateway

MA5200G Multiservice access 5200G service gateway

ME60 series Multiservice engine 60 serials service gateway

Page 227: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-23

17.15 Manageable VoIP Gateway Equipment

Manageable VoIP gateway equipment are listed as follows:

Table 17-18 Manageable VoIP gateway equipment

Category Device Description

VoIP Gateway VG10 VoIP gateways 10

VG20 VoIP gateways 20

VG80 VoIP gateways 80

XE series

17.16 Manageable WLAN Series equipment

Manageable WLAN Series equipment are listed as follows:

Table 17-19 Manageable WLAN series equipment

Category Device Description

WLAN WA10 AP WLAN 10

WA12 AP WLAN 12

17.17 Manageable Firewall Series Equipment

Manageable firewall series equipment are listed as follows:

Table 17-20 Manageable firewall series equipment

Category Device Description

Eudemon Eudemon 8040 Eudemon 8000 series Firewall

Eudemon 8080 Eudemon 8000 series Firewall

Eudemon 1000 Eudemon 1000 series Firewall

Eudemon 500 Eudemon 500 series Firewall

Eudemon 300 Eudemon 300 series Firewall

Eudemon 8080E Eudemon 8000E series Firewall

Eudemon 8160E Eudemon 8000E series Firewall

Page 228: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-24 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Category Device Description

Eudemon 1000E-U2 Eudemon 1000E series Firewall

Eudemon 1000E-U3 Eudemon 1000E series Firewall

Eudemon 1000E-U5 Eudemon 1000E series Firewall

Eudemon 1000E-U6 Eudemon 1000E series Firewall

Eudemon 200E_B Eudemon 200E series Firewall

Eudemon 200E_C Eudemon 200E series Firewall

Eudemon 200E_F Eudemon 200E series Firewall

Eudemon 200S Eudemon 200S series Firewall

Eudemon 100E Eudemon 100E series Firewall

Eudemon 6080E Eudemon 6000E series Firewall

USG USG9210 USG9210 Unified Security Gateway

USG9220 USG9220 Unified Security Gateway

USG9310 USG9310 Unified Security Gateway

USG9320 USG9320 Unified Security Gateway

USG5320 USG5320 Unified Security Gateway

USG5330 USG5330 Unified Security Gateway

USG5350 USG5350 Unified Security Gateway

USG5360 USG5360 Unified Security Gateway

USG3030 USG3030 Unified Security Gateway

USG3040 USG3040 Unified Security Gateway

USG2130 USG2130 Unified Security Gateway

USG2130W USG2100 Unified Security Gateway

USG2130P USG2100 Unified Security Gateway

USG2130WP USG2100 Unified Security Gateway

USG2130BSR USG2100 Unified Security Gateway

USG2130BSR-W USG2100 Unified Security Gateway

USG2130HSR USG2100 Unified Security Gateway

USG2130HSR-W USG2100 Unified Security Gateway

USG2130HSR-P USG2100 Unified Security Gateway

USG2130HSR-WP USG2100 Unified Security Gateway

USG2120BSR USG2100 Unified Security Gateway

Page 229: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-25

Category Device Description

USG2110 USG2110 Unified Security Gateway

USG2160 USG2100 Unified Security Gateway

USG2160W USG2100 Unified Security Gateway

USG2160P USG2100 Unified Security Gateway

USG2160WP USG2100 Unified Security Gateway

USG2160BSR USG2100 Unified Security Gateway

USG2160BSR-W USG2100 Unified Security Gateway

USG2160HSR USG2100 Unified Security Gateway

USG2160HSR-W USG2100 Unified Security Gateway

USG2160HSR-P USG2100 Unified Security Gateway

USG2160HSR-WP USG2100 Unified Security Gateway

USG5120 USG5100 Unified Security Gateway

USG5120-D USG5100 Unified Security Gateway

USG5120BSR USG5100 Unified Security Gateway

USG5120BSR-D USG5100 Unified Security Gateway

USG5120HSR USG5100 Unified Security Gateway

USG5150 USG5100 Unified Security Gateway

USG5150BSR USG5100 Unified Security Gateway

USG5150HSR USG5100 Unified Security Gateway

USG2210 USG2210 Unified Security Gateway

USG2220 USG2220 Unified Security Gateway

USG2230 USG2230 Unified Security Gateway

USG2250 USG2250 Unified Security Gateway

USG50 USG50 Unified Security Gateway

USG9110 USG9110 Unified Security Gateway

USG9120 USG9120 Unified Security Gateway

SRG SRG1210-S SRG1200 Secure Routing Gateway

SRG1210 SRG1200 Secure Routing Gateway

SRG1210W SRG1200 Secure Routing Gateway

SRG1210P SRG1200 Secure Routing Gateway

SRG1210WP SRG1200 Secure Routing Gateway

Page 230: IManager U2000 Product Description V100R002C00 03

17 Management Capability

iManager U2000 Unified Network Management System

Product Description

17-26 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Category Device Description

SRG1220 SRG1200 Secure Routing Gateway

SRG1220W SRG1200 Secure Routing Gateway

SRG1220P SRG1200 Secure Routing Gateway

SRG1220WP SRG1200 Secure Routing Gateway

SRG20-11 SRG20 Secure Routing Gateway

SRG20-12 SRG20 Secure Routing Gateway

SRG20-15 SRG20 Secure Routing Gateway

SRG20-20 SRG20 Secure Routing Gateway

SRG20-21 SRG20 Secure Routing Gateway

SRG20-30 SRG20 Secure Routing Gateway

SRG20-31 SRG20 Secure Routing Gateway

SRG20-31-D SRG20 Secure Routing Gateway

SRG3230 SRG3200 Secure Routing Gateway

SRG3230-D SRG3200 Secure Routing Gateway

SRG3240 SRG3200 Secure Routing Gateway

SRG3240-D SRG3200 Secure Routing Gateway

SRG3250 SRG3200 Secure Routing Gateway

SRG3260 SRG3200 Secure Routing Gateway

EGW EGW2130 EGW2100 series Enterprise Gateway

EGW2160 EGW2100 series Enterprise Gateway

17.18 Manageable Service Inspection Gateway Equipment

Manageable service inspection gateway equipment are listed as follows:

Table 17-21 Manageable service inspection gateway equipment

Category Device Description

SIG SIG9810 SIG9810 Service Inspection

Gateway

SIG9820 SIG9810 Service Inspection

Gateway

Page 231: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 17 Management Capability

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17-27

Category Device Description

SIG9800 Server SIG9800 Server Service

Inspection Gateway Server

17.19 Manageable SVN Series Equipment

Manageable SVN series equipment are listed as follows:

Table 17-22 Manageable SVN series equipment

Category Device Description

SVN SVN3000 SVN3000

Page 232: IManager U2000 Product Description V100R002C00 03
Page 233: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 18 Standards Compliance

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

18-1

18 Standards Compliance

This topic describes the standards that the U2000 is compliant with.

The U2000 is developed according to the network management system model that the ITU-T

TMN series standards define. The information model is constructed based on the

object-oriented concept. Complying with multiple standards, the U2000 has good

expandability and reusability. The U2000 complies with the following international standards

and protocols:

RFC 793 Telnet/TCP/IP standards

RFC 1155, RFC 1157, RFC 1212, RFC 1213 and RFC 1215 SNMP V1 series standards

RFC 1905, RFC 1906, RFC 1907, RFC 1908, RFC 2011, RFC 2012, RFC 2013, RFC

2571, RFC 2572, RFC 2573, RFC 2574, RFC 2576, RFC 2578, RFC 2579, and RFC

2580 SNMP V2 series standards

RFC 3411, RFC 3412, RFC 3413, RFC 3414, RFC 3415, RFC 3416, RFC 3417, and

RFC 3418 SNMP V3 series standards

RFC 3164 Syslog standards

ISO 8824 and ISO 8825 ASN.1 standards

ITU-T standards for managing the telecommunications management network: M.3000,

M.3010, M.3020, M.3100, and M.3400 (without accounting)

HTTP and JAVA interface protocols and standards

W3C SOAP 1.1/WSDL

TL1 (Telcordia GR-811, GR-831, etc.)

The XML service delivery and inventory query are based on the MTOSI standards as

follows: TMF 517, TMF 608, and TMF 854

CORBA 2.5 protocol

ISO 8824 and ISO 8825 ASN.1 standards

The CORBA alarm northbound interface complies with the MTNM standards as

follows: TMF 513, TMF 608, and TMF 814

Table 18-1 lists the details of the standards and protocols.

Page 234: IManager U2000 Product Description V100R002C00 03

18 Standards Compliance

iManager U2000 Unified Network Management System

Product Description

18-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Table 18-1 Details of the Standards and Protocols

Standards and Protocols Description

RFC 793 Transmission Control Protocol (Darpa Internet Program Protocol

Specification)

RFC 1155 Structure and Identification of Management Information for TCP/IP-based

Internets

RFC 1212 Concise MIB Definitions

RFC 1213 Management Information Base for Network Management of TCP/IP-based

Internets: MIB-II

RFC 1215 A Convention for Defining Traps for use with the SNMP

RFC 1905 Protocol Operations for Version 2 of the Simple Network Management

Protocol

RFC 1906 Transport Mappings for Version 2 of the Simple Network Management

Protocol

RFC 1907 Management Information Base for Version 2 of the Simple Network

Management Protocol

RFC 1908 Coexistence between Version 1 and Version 2 of the Internet-standard

Network Management Framework

RFC 2011 SNMPv2 Management Information Base for the Internet Protocol using

SMIv2

RFC 2012 SNMPv2 Management Information Base for the Transmission Control

Protocol using SMIv2

RFC 2013 SNMPv2 Management Information Base for the User Datagram Protocol

using SMIv2

RFC 2571 An Architecture for Describing SNMP Management Frameworks

RFC 2572 Message Processing and Dispatching for the Simple Network Management

Protocol

RFC 2573 SNMP Applications

RFC 2574 User-based Security Model (USM) for version 3 of the Simple Network

Management Protocol

RFC 2576 Coexistence between Version 1, Version 2, and Version 3 of the

Internet-standard Network Management Framework

RFC 2578 Structure of Management Information Version 2 (SMIv2)

RFC 2579 Textual Conventions for SMIv2

RFC 2580 Conformance Statements for SMIv2

RFC 3411 An Architecture for Describing Simple Network Management Protocol

(SNMP) Management Frameworks

Page 235: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 18 Standards Compliance

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

18-3

Standards and Protocols Description

RFC 3412 Message Processing and Dispatching for the Simple Network Management

Protocol (SNMP)

RFC 3413 Simple Network Management Protocol (SNMP) Applications

RFC 3414 User-based Security Model (USM) for version 3 of the Simple Network

Management Protocol (SNMPv3)

RFC 3415 View-based Access Control Model (VACM) for the Simple Network

Management Protocol (SNMP)

RFC 3416 Version 2 of the Protocol Operations for the Simple Network Management

Protocol (SNMP)

RFC 3417 Transport Mappings for the Simple Network Management Protocol (SNMP)

RFC 3418 Management Information Base (MIB) for the Simple Network Management

Protocol (SNMP)

RFC 3164 BSD syslog Protocol

ISO

8824-4-200

0

Information Technology - Abstract Syntax Notation One (ASN.1):

Parameterization of ASN.1 Specifications Amendment 1: ASN.1 semantic

model

ISO

8825-2-199

8

Information Technology - ASN.1 Encoding Rules: Specification of Packed

Encoding Rules (PER) Second Edition; Technical Corrigendum 1:

12/15/1999; Amendment 1: 12/01/2000

ITU-T

M.3000

Overview of TMN recommendations

ITU-T

M.3010

Principles for a telecommunications management network

ITU-T

M.3013

Considerations for a telecommunications management network

ITU-T

M.3017

Framework for the integrated management of hybrid circuit/packet networks

ITU-T

M.3020

TMN interface specification methodology

ITU-T

M.3100

Generic network information model

ITU-T

M.3101

Managed Object Conformance statements for the generic network

information model

ITU-T

M.3180

Catalogue of TMN management information

ITU-T

M.3200

TMN management services and telecommunications managed areas:

overview

Page 236: IManager U2000 Product Description V100R002C00 03

18 Standards Compliance

iManager U2000 Unified Network Management System

Product Description

18-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Standards and Protocols Description

ITU-T

M.3300

TMN F interface requirements

ITU-T

M.3400 TMN management functions

ITU-T

X.720

Management information model

ITU-T

X.721

Definition of management information

ITU-T

X.722

Guidelines for the definition of managed objects

ITU-T

X.733

Information technology - Open Systems Interconnection - Systems

Management: alarm reporting function

ITU-T

X.903

Information technology - Open distributed processing - Reference Model:

architecture

ITU-T

G.707

Network node interface for the synchronous digital hierarchy (SDH)

ITU-T

G.773

Protocol suites for Q-interfaces for management of transmission systems

ITU-T

G.774 (01,

02, 03, 04)

Synchronous digital hierarchy (SDH) - Management information model for

the network element view

ITU-T

G.783

Characteristics of synchronous digital hierarchy (SDH) equipment

functional blocks

ITU-T

G.784

Synchronous digital hierarchy (SDH) management

ITU-T

G.803

Architecture of transport networks based on the synchronous digital

hierarchy (SDH)

ITU-T

G.831

Management capabilities of transport networks based on the synchronous

digital hierarchy (SDH)

ITU-T

G.851.1

Management of the transport network - Application of the RM-ODP

framework

ITU-T

G.852.1

Enterprise viewpoint for simple subnetwork connection management

ITU-T

G.852.2

Enterprise viewpoint description of transport network resource model

ITU-T

G.852.3 Enterprise viewpoint for topology management

Page 237: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description 18 Standards Compliance

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

18-5

Standards and Protocols Description

ITU-T

G.852.6

Enterprise viewpoint for trail management

ITU-T

G.853.1

Common elements of the information viewpoint for the management of a

transport network

ITU-T

G.853.2

Subnetwork connection management information viewpoint

ITU-T

G.853.3

Information viewpoint for topology management

ITU-T

G.853.6

Information viewpoint for trail management

ITU-T

G.854.1

Computational interfaces for basic transport network model

ITU-T

G.854.3

Computational viewpoint for topology management

ITU-T

G.854.6

Computational viewpoint for trail management

Rational

Unified

Process 5.5

Rational Unified Process

Sif99025 EML-NML interface models

TMF513

V2.0

Multi-Technology Network Management Business Agreement NML-EML

Interface Version 2.0

TMF608

V2.0

Multi-Technology Network Management Information Agreement

NML-EML Interface Version 2.0

TMF814

V2.0

Multi Technology Network Management Solution Set Conformance

Document Version 2.0

TMF814

V2.0

Multi Technology Network Management Solution Set Conformance

Document Version 2.0

Page 238: IManager U2000 Product Description V100R002C00 03
Page 239: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description A Glossary

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

A-1

A Glossary

A

Abnormal Resource When the NMS carries out the operation of device resource polling

on the device management module or the module is refreshed

manually, the physical resources of some devices, such as the card,

sub-card and port, cannot be accessed because they have been

deleted or have some faults. So, after the NMS carries out the

operation of device resource polling on the device management

module or the module is refreshed manually again, the result of

polling the physical resources differ from the first time. The

physical resources that cannot be polled in the second time are

called the abnormal resource.

AIS insertion If there are excessive errors in a channel, AIS can be inserted in this

channel to indicate it is unavailable. For a line board, you can set

whether to insert AIS when there are excessive errors in the B1, B2

and B3 bytes. For a tributary board at the E1 or T1 level, you can

set whether to insert AIS when there are excessive errors in BIP-2.

For a tributary board at the E3 level or higher, you can set whether

to insert AIS when there are excessive errors in the B3 byte.

AIS Alarm Indication Signal. A signal sent downstream in a digital

network if an upstream failure has been detected and persists for a

certain time.

Alarm correlation

analysis

In the case alarm2 is raised within five seconds after alarm1 is

raised, and alarm2 complies with the conditions defined in the

alarm correlation analysis rule, you can either suppress the alarm2

or raise its severity level according to the behavior defined in the

alarm correlation rule. Such a process is called alarm correlation

analysis.

Alarm Level Alarm level is to identify the severity of an alarm or event. It is

divided up into four levels: critical, major, minor, warning alarm.

Alarm Status Device reports the trap information to NMS. NMS displays the

received information on the alarm start on the topological view.

The alarm state contains four types: urgent alarm, important alarm,

subordinate alarm and prompt alarm.

Page 240: IManager U2000 Product Description V100R002C00 03

A Glossary

iManager U2000 Unified Network Management System

Product Description

A-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Auto Discovery NMS tests the remote device by using PING or the SNMP

parameter module configured in advanced to discover the IP device

or the device that supports SNMP and to add the discovered devices

automatically.

Alarm reversion For the port that has already been configured but not actually loaded

with services, this function can be used to avoid generating relevant

alarm information, thus preventing alarm interference.

Alarm severity According to ITU-T recommendations, the alarm is classified into

four severities: Critical, Major, Minor, and Warning.

Alarm suppression The suppressed alarm of a specific object is not reported. The object

here may be the networkwide equipment, a specific NE, a specific

board and even a specific function module of a specific board.

Alarm A visible or an audible indication to notify the person concerned

that a failure or an emergency has occurred. See also Event.

ATM protection

group

An ATM protection group refers to the logically bound ATM VP

network or subnetwork connections that share the same physical

transmission channel. In the VP group (VPG), a pair of VP

connections (working connection and its protection connection) is

used for monitoring the automatic protection switching, called

monitoring connections (APS VPCs). If the monitoring connections

switch over, the whole VPG will switch over to quicken the ATM

protection switching (as quick as the protection switching of the

SDH layer.

ALS Automatic Laser Shutdown. ALS is turned on when the optical

interface board does not carry services or the optical fibre is faulty.

Its service life can be prolonged by decreasing the duration during

which laser is on.

Attribute Property of an object.

Automatic switching When the active board or path fails, the standby one can

automatically take over the job of the active one.

B

Band Width In the data communication area, bandwidth specifies the maximum

value of the rate when the data passes through some data channel.

Baseline Select the test result when the line is in good condition as the line

test baseline, to provide a basis of comparison and analysis for the

following line test result.

Baseline collection

test

One of the test types for submarine line. In the case of deployment

or fault restoration, or when updating the baseline is required, you

need to collect the baseline, to provide reference for comparison

tests, and alerts or alarms.

Binding In virtual concatenated payload configuration, designating one

binding number to identify the VC4s of the same virtual

concatenated payload is called "bind". If a fault occurs to one of the

bound services, all bound services will switch as a whole.

Page 241: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description A Glossary

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

A-3

Bit error alarm

threshold

When the bit error reaches a specific limit, the equipment will

report an alarm. This limit is the bit error alarm threshold. The

threshold can be divided into crossing threshold and defect

threshold.

C

Comparison test in

periodic mode

One of the test types for submarine line. Carry out polling tests for

multiple lines on the same LMU board periodically, compare the

test result with the baseline data in in-service mode, and provide

alerts or alarms for the line.

Comparison test in

single-test mode

One of the test types for submarine line. Test a line by using test

parameters of the baseline collection test in in-service mode,

compare the test result with the baseline data, and provide alerts or

alarms for the line.

Check alarms The check feature compares one (or more) uncleared alarm on the

NMS with that on the NE. If an alarm is included in the current

alarms on the NE, it is kept on the NMS. If not, it will be removed

from the NMS.

Client A kind of terminal (PC or workstation) connected to a network that

can send instructions to a server and get results through a user

interface. See also server.

Clock View The Clock View provides a visible platform to enable:1. NE clock

settings2. Networkwide clock synchronisation status query3. Clock

tracing and search functions

Configuration data The data that configures the NE hardware for coordination between

this NE and other NEs in the entire network and operation of

specified services. Configuration data is the instruction file of NEs,

and it is the key for efficient network running. The typical

configuration data includes board configuration, clock configuration

and protection relationship.

Configuration

management

Configuration management enables inventory query of network

configuration resources, including relevant configuration of NMS

or SNMS, NE, subnet, links, SNC, route, TP, edge point,

equipment, and so on. Real-time inventory change report can also

be provided through this resource, it will be timely reported to the

upper NMS to notify the carrier of the current network operation

status and ensure data consistency of the upper NMS or SNMS.

Configure To set the basic parameters of an operation object.

Connection point A reference point where the output of a trail termination source or a

connection is bound to the input of another connection, or where the

output of a connection is bound to the input of a trail termination

sink or another connection. The connection point is characterized by

the information which passes across it. A bidirectional connection

point is formed by the association of a contradirectional pair.

Page 242: IManager U2000 Product Description V100R002C00 03

A Glossary

iManager U2000 Unified Network Management System

Product Description

A-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Connection A "transport entity" which consists of an associated pair of

"unidirectional connections" capable of simultaneously transferring

information in opposite directions between their respective inputs

and outputs.

Current alarms Alarms that do not clear, or has cleared but is not acknowledged.

Current performance

data

The performance data stored in the current register is called current

performance data. The current 15-minute or 24-hour register (only

one for each) is applied to collect the performance data in the

current monitoring period. It changed within the monitor period.

Change Audit

Service

Change Audit Service is developed to record the change on the

network device, including the changes on the information about the

device, the configuration and the mapping. It provides one

integrated database. Every application program records these

changes in the database and ensures that these changes in the

database are reflected on other applications.

Cluster The cluster is an administrative domain composed of a set of

switches. It consists of a command switch and multiple member

switches. The management over all the switches within the cluster

is realized through a public IP address.

Configuration File Text file, including various configuration on the device.

D

DCC Within an STM-N signal there are two DCC channels, one is the

192 kbit/s DCC-R channel composed of bytes D1-D3, and the other

is the 576 kbit/s DCC- channel composed of bytes D4-D12. All

NEs can communicate with one another through the DCC-R. The

DCC-M is not the regenerator section overhead and does not

support communications among regenerators, and it is used to

support communication channels of more universal purpose.

DNI Dual Node Interconnection. The protection mode defined in G. 842

Recommendation for the inter-ring service . By using the

recommended protection modes, the protection of the

interconnecting service between two ring networks composed of the

devices from different manufacturers and in different protection

modes can be realised. Moreover, in case of fibre failure or node

failure, services can also be protected.

Domain The domain of the NMS specifies the scope of address or functions

which are available to a certain user.

Dump Dump is a process of exporting alarm data from the database to the

customized file and meanwhile the exported data is cleared in the

database.

E

Page 243: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description A Glossary

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

A-5

EMU Environment Monitoring Unit. As one type of power and

environment monitoring unit, EMU is installed on the top of the

OptiX 155/622H equipment cabinet to monitor the environment

variables, such as the power supply and temperature. With external

signal input through the relay, fire alarm, smoke alarm, burglary

alarm, and so on can be monitored as well. Displayed on the NMS,

the change of environment can be monitored timely and accurately.

Equipment set An aggregate of multiple managed equipment. Equipment set

facilitates the user authority management on equipment in the

management domain of the NMS. If some operation authorities

over one equipment set are assigned to a user (user group), these

operation authorities over all equipment of the equipment set are

assigned to the user (user group).

F

Failure The fault cause persisted long enough to consider the ability of an

item to perform a required function to be terminated. The item may

be considered as failed; a fault has now been detected.

Fault A fault is the inability of a function to perform a required action.

This does not include an inability due to preventive maintenance,

lack of external resources, or planned actions.

Filter The filter is used to filter the matched logs and have the unmatched

one left.

Forced switch This command performs the ring switch from working channels to

the protection channels. This switch occurs regardless of the state of

the protection channels, unless the protection channels are

satisfying a higher priority bridge request.

H

History alarms Alarms that have cleared and been acknowledged.

History performance

data

The performance data stored in the history register and the

auto-report performance data stored on the NMS are called history

performance data in a unified way.

I

Intermediate office It refers to the equipment used for optical fibre management and

dispatch in the metropolitan area. It has multiple pairs of interfaces

for the optical fibre connection. Every two interfaces in a pair are

connected with each other to form a longer physical optical fibre

path. The physical optical fibre path connecting the transmission

equipment can comprise two or more sections of optical fibre

cascaded via the intermediate office. There is an intermediate office

information list for some fibre & cable connections, which shows

the section information about the fibre & cable.

Page 244: IManager U2000 Product Description V100R002C00 03

A Glossary

iManager U2000 Unified Network Management System

Product Description

A-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

In-Service Mode One of the test modes for submarine line. By using the in-service

test mode , you can test submarine cables and repeaters without

damaging the existing services of the submarine system.

Image (OS) Binary file, equivalent to the OS of the device and a part of the

device version.

IP address In the TCP/IP protocol, it is used to uniquely identify the address of

the communication port, which consists of four bytes in decimal

digits, for example, 129.9.161.55.

J

Jitter This index shows the delay stability of many Ping operations with

the unit of ms.

L

Label A mark on a cable, a subrack, or a cabinet for identification.

Layer A concept used to allow the transport network functionality to be

described hierarchically as successive levels; each layer being

solely concerned with the generation and transfer of its

characteristic information.

LCT Local Craft Terminal. The LCT provides the user with single-layer

management network solutions to the transmission network of up to

five NEs to realise integrated management of multi-service

transmission network. Usually it uses the cross-over cable or serial

port cable to connect one NE, so as to configure and maintain a

single NE. See also U2000 LCT.

Licence A permission provided by a vendor to authorise the use of specific

functions of a product. Usually the licence consists of encrypted

codes, and the operation authority varies with different level of

licence.

Link The link is responsible to transmit the data from one station to next

neighbour station correctly.

Lock NE login This function prohibits the users at lower levels from logging in NE

and forces logged NE users with lower level to log out.

M

Main Topology The default NMS client interface and all topology management

functions are accessed here.

Management

information

The signal passing across an access point.

Manual switch When the protection channel is efficient and there is no higher-level

switching request, this mode switches the service from the working

channel to the protection channel, thus testing whether network still

has the protection capability.

Page 245: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description A Glossary

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

A-7

Manual test One of the test types for submarine line. You need to set test

parameters manually, start the test, and save the test result as the

baseline of the in-service mode.

MO Managed Object. The management view of a resource within the

telecommunication environment that may be managed via the agent.

Examples of SDH managed objects are: equipment, receive port,

transmit port, power supply, plug-in card, virtual container,

multiplex section, and regenerator section.

MS Multiplex Section. A multiplex section is the trail between and

including two multiplex section trail termination functions.

MSP Multiplex section protection. The nodes online achieve protection

switching through the K1 and K2 bytes in the multiplex section,

including linear 1+1 MS protection switching link, linear 1:n MS

protection switching link, dedicated MS protection ring and shared

MS protection ring.

N

NE database There are three types of database on NE SCC board as following:

(1) DRDB: a dynamic database in a dynamic RAM, powered by

battery; (2) SDB: a static database in a power-down RAM; (3)

FDB0, FDB0: permanently saved databases in a Flash ROM. In

efficient operation, the NE configuration data is saved in DRDB

and SDB at the same time. Backing up an NE database means

backing up the NE configuration data from SDB to FDB0 and

FDB1.

NE Explorer NE Explorer is the main operation interface of the NMS. For easy

navigation, the NE Explorer window presents an expandable

directory tree (Function Tree) in the lower left pane. The

configuration, management and maintenance of the equipment are

accessed here.

NE Network Element. NE includes the hardware unit and the software

running on it. Usually, one NE has at least an SCC (system control

and communication) board which responsible for the management

and monitoring of the NE. The NE software runs on the SCC board.

NM Network Management. In the telecommunication management

network structure, the NMS is located between the NE level and

network level, which can supports all functions at NE level and part

of the network level management functions. See also U2000.

NNI Network Node Interface. NNI identifies the interface between the

ATM network nodes. See also SDH NNI.

Node Node is one of the topology objects and the minimum unit that

represents the device displayed on the topological view. The device

is displayed with the node icon on the topological view. The type of

the node includes the router, the switch and the 3rd-party device and

the virtual node.

Page 246: IManager U2000 Product Description V100R002C00 03

A Glossary

iManager U2000 Unified Network Management System

Product Description

A-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

O

Online help An indexed collection of information on all aspects of the NMS.

They can be accessed at any time from the Help menu or by

pressing the F1 key.

Optical time domain

reflectormeter

OTDR is an optical fault locator and analysis tool for optical fiber

networks. The OTDR features a light, compact, hand-held design

with an intelligent user interface that is easy and quick to use. The

color LCD display and backlight design makes testing work more

comfortable and convenient, whether during daylight or at night.

Out-of-Service

Mode

One of the test modes for submarine line. By transmitting detection

light with high power, the out-of-service test can detect the fiber

status and repeater status, to realize the status detection and fault

point location after fiber cut. In general, when detecting that a line

is abnormal during a test in in-service mode, you can carry out a test

in out-of-service mode to locate the fault.

OWSP Optical Wavelength Shared Protection. OWSP is a bidirectional

ring, where each node is equipped with an OWSP. There are two

channels (λ1 and λ2) in the main optical path on the internal and

external rings in each span on a ring. The fibre and the OWSP on

the main optical path are connected with the optical ports inputting

λ1 and λ2 on the mux/demux board (unnecessary to be connected

with the OTU), and thus λ1 and λ2 can be added and dropped at

every node.

P

Path protection The working principle of path protection: When the system works

in path protection mode, the PDH path uses the dual-fed and signal

selection mode. Through the tributary unit and cross-connect unit,

the tributary signal is sent simultaneously to the east and west lines.

Meanwhile, the cross-connect matrix sends the signal dually sent

from the opposite end to the tributary board through the active and

standby buses, and the hardware of the tributary board will

selectively receive the signal from the two groups of buses

automatically according to the AIS number of the lower order path.

Path A trail in a path layer.

Performance register Performance register is the memory space for performance event

counts, including 15-min current performance register, 24-hour

current performance register, 15-min history performance register,

24-hour history performance register, UAT register and CSES

register.

Performance

threshold

Performance events usually have upper and lower thresholds. When

the performance event count value exceeds the upper threshold, a

performance threshold-crossing event is generated; when the

performance event count value is below the upper threshold for a

period of time, the performance threshold-crossing event is ended.

In this way, performance jitter caused by some sudden events can

be shielded.

Page 247: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description A Glossary

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

A-9

PMU One type of power and environment monitoring unit.

Private line Both communication parties are connected permanently.

Procedure A generic term for an action.

Process A generic term for a collection of actions.

Protection path A specific path that is part of a protection group and is labeled

protection.

Protection strategy In case the service route provides multiple service protections,

different protection strategies can be selected as required. Protection

strategy refers to the protection mode given the priority in use for

the trail: protection, no protection, and extra traffic. Of the above,

the protection preference is divided into trail protection and

sub-network connection protection.

Protection subnet The resources that form a protection subnetwork include NEs and

fiber cables. The creation of the protection subnetwork actually

means that corresponding logical system is configured for each NE

by means of creating the protection subnetwork, the optical

interfaces (or VC4) of each board are mapped into the logical

system, and then these independent logical systems are connected

with one another to form a complete network structure.

Packets Loss Ratio This index shows the packet loss ratio after many Ping operations

with the unit of %.

Poll Status The NMS polls the device status and other configuration data

periodically and displays the polling results on the topology view.

The polling status contains normal, unknown, off-line, light fault,

subordinate fault, important fault and urgent fault.

R

ROADM Reconfiguration Optical Add/Drop Multiplexing. ROADM helps

you to terminate or pass through any one wavelength at every node

without affecting the existing services. At the same time, ROADM

can change wavelengths through the NMS remotely, to adjust

wavelengths added or dropped in a quick and convenient manner. In

addition, ROADM enables power equalization at path level through

a built-in power equalization function, and thus adjusts power for

pass-through paths in a better way than a band-based dynamic gain

equalizer (DGE) does.

Page 248: IManager U2000 Product Description V100R002C00 03

A Glossary

iManager U2000 Unified Network Management System

Product Description

A-10 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Route The IP route selection is in table driving mode. In each host and

each router of the Internet, there is a routing table that contains

information about how the service is transmitted from the source to

the sink, providing a basis for route selection. Ethernet static

routing in ET1 refers to the mapping relationship between the

Ethernet port and the bound path. Its routing type includes port

routing and VLAN routing. Port routing: It means configuring a

route between the Ethernet port and the bound path port, which is

usually used for point-to-point networking communication; VLAN

routing: It means configuring a route between the Ethernet port and

the bound path port based on the VLAN service. It can be used

flexibly in point-to-point, point-to-multipoint or

multipoint-to-multipoint communication. The implementation is to

divide and converge the data stream according to the VLAN flag of

the packet. As a VLAN flag can be added to the Ethernet port, the

equipment can be applied more flexibly.

Report The report that is generated manually in a real-time fashion.

RTT RTT is the round trip time, which is the time delay of the ping task.

S

Script file It is the text file describing the physical information and

configuration information of the entire network, including the NE

configuration file, port naming file, end-to-end configuration file,

NE physical view script file, NM information file and service

implementation data script file.

Schedule Task The report on schedule task that is generated at a interval along with

the periodical running of the schedule tasks.

Script A list of instructions for performing a specific task or action,

written in a scripting language.

SDH NNI SDH Network Node Interface. It is applied to build

communications connection with the equipment beyond the NMS

management area. Usually, the NM creates an SDH NNI by

creating a logical system on the port of an idle line board, and the

NE must be a TM without protection and fibre connection.

Section A trail in a section layer.

Settings Parameters of an operation that can be selected by the user.

Severity See Alarm Severity.

Subnet mask Also referred to as the network mask off code, it is used to define

network segments, so that only the computers in the same network

segment can communicate with one another, thus suppressing

broadcast storm between different network segments.

Subnet number Subnetwork number is used to differentiate the different network

sections in the sub-network conference. Actually it is the first

several digits (one or two) of the user phone number. An orderwire

phone number is composed of the sub-network number and the user number.

Page 249: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description A Glossary

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

A-11

Subnet Sub-network is the logical entity in the transmission network and

comprises a group of network management objects. A sub-network

can contain NEs and other sub-networks. A sub-network planning

can better the organisation of a network view.

Support The frame on the bottom of a cabinet, when installing the cabinet on

the antistatic floor.

Synchronise NE

time

Send the system time of the NMS server to NEs so as to

synchronise all NEs with the server.

T

TDA clock source TDA is short for Tone Data Access. For the 2500+ NE equipment,

it can be installed with the external TDA board for which the clock

source must be set so that the TDA board can switch according to

the set clock source sequence when clock source switching occurs.

TMN Telecommunications Management Network. The entity which

provides the means used to transport and process information

related to management functions for the telecommunications

network.

Topology The NMS topology is a basic component of the man-machine

interactive interface. The topology clearly shows the structure of the

network, the alarms of different NEs, sub-networks in the network,

the communication status as well as the basic network operation

status.

Trail management

function

A network level management function of the NMS. Through trail

management, you can configure end-to-end services, view graphic

interface and visual routes of a trail, query detailed information of a

trail, filter, search and locate a trail quickly, manage and maintain

trails in a centralised manner, manage alarms and performance data

by trail, and print a trail report.

Trail A trail is a kind of transport entity, mainly engaged in transferring

signal from the input of the trail source to the output of the trail

sink, and monitoring the integrality of the transferred signal.

According to the different levels of the trail, the trail includes

various types (OTS, OCH, OMS, SPI, RS, MS, VC4 server trail,

VC4, VC3 and VC12). Among them, OTS, OCH and OMS

represent the trails in a DWDM layer network. For the ADM and

TM equipment in the SDH network, each optical fibre connection

corresponds to an SPI, RS or MS trail, and a trail is the general

name for service carriers, including SDH and PDH services.

Tributary loopback A fault can be located for each service path by performing loopback

to each path of the tributary board. There are three kinds of

loopback modes: No loopback, Outloop and Inloop.

Threshold The alarm range will be defined after the performance data is

collected. The threshold contains the upper and lower one, related

with the unit and index.

Page 250: IManager U2000 Product Description V100R002C00 03

A Glossary

iManager U2000 Unified Network Management System

Product Description

A-12 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

U

U2000 To be oriented to the future network trend, the iManager U2000 that

is the unifed network management system (NMS) combines all-IP

and FMC, and manages carrier equipment and access equipment in

a centralized manner.

UAT Unavailable Time. A UAT event is reported when the monitored

object generates 10 consecutive severely errored seconds (SES) and

the SESs begin to be included in the unavailable time. The event

will end when the bit error ratio per second is better than 10-3

within 10 consecutive seconds.

UNI UNI is the abbreviation for User Network Interface. It identifies the

interface between the user and the ATM network node.

Unprotected Services transmitted through an ordinary way, once a failure or

interruption occurs, the data cannot be restored for lack of

protection mechanism.

Upload Report all or part of the configuration data of the NE to the NM and

overwrite the configuration data saved in the NE layer on the NM

side.

User group User set refers to the set of NMS users with the same management

authorities. The default user group includes: system administrator,

system maintainer, system operator and system supervisor. The

attributes of user set include name and detailed description.

User The user of the NMS client, and the user and his/her password

define the corresponding authority of operation and management of

the NMS.

V

VC4 loopback The fault of each VC4 path on the optical fibre can be located by

setting loopback for each VC4 path of the line. There are three

kinds of loopback modes: No loopback, Outloop, Inloop.

VC4 server trail The path rate of the VC4 server trail is 150.336Mbit/s. The VC4

server trail provides transparent channels (that is, circuit group) for

circuit-layer network nodes (for example, a switch) in a path-layer

network, and acts as the basic unit of inter-office communication

path. When the VC4 server trail is configured, only the higher order

cross-connection of VC4 is generated in the intermediate NE, but

no cross-connection is generated at the two ends, that is, no service

is added/dropped. Therefore, the VC4 server trail is not a traditional

service. It is only the basis for VC3 and VC12 trail creation.

VCI The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in

both NNI cell or UNI cell. It indicates the virtual channel in the

path. The VPI and VCI together indicate a virtual connection.

Page 251: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description A Glossary

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

A-13

View Organize and display rules and filter conditions of the topology

data. Customize the view according to requirements of every

product and organize the data in the view displayed by the topology

module, such as the layer 2 view, VPN view and IP view. By

default, the platform provides the physical view. The topology view

can be planned according to the domain, maintenance relationship

and so on.

Edits and displays the rule of the topology data or the filter

conditions. It can be tailored according to the requirements

Virtual fibre A virtual fibre is created between SDH equipment that has WDM

equipment in between. From SDH equipment perspective, creation

of virtual fibres disassociates its fibre connection with WDM

equipment and prevents impact on the auto fibre search function,

ensuring independence of SDH trail management.From WDM

equipment perspective, its service bearer layer is a virtual fibre

instead of a true one after the virtual fibre is created. Deletion of the

true fibre does not affect trail management.

Virtual NE Like a common NE, a virtual NE is also displayed with an icon on a

view, but it is only an NE simulated according to the practical

situation, which does not represents an actual NE. Therefore, the

actual status of this NE cannot be queried and its alarm status

cannot be displayed with colours. Usually, when the trail

management function is used for the NEs or sub-networks the NMS

cannot manage, or the equipment is interconnected with other

vendors' NEs for service configuration, the end-to-end service

configuration method and the trail management capability are

provided.

VLAN ID Namely, it is the virtual LAN identifier. One Ethernet port can

support 4K VLAN routes, and one NE can support up to 8K VLAN

routes.

VPI The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the

NNI cell, and 8 bits in the UNI cell.

W

Wavelength

protection group

The wavelength protection group is important to describe the

wavelength protection structure. Its function is similar to that of the

protection sub-network in the SDH NE. The wavelength path

protection can only work with the correct configuration of the

wavelength protection group.

WDM service The WDM service is accessed at the client side of the OTU board

that can access SAN services.

Web LCT In the TMN architecture, the Web LCT is located in the NE

management level, which can manage the RTN series and NG

WDM series equipment.

Working path A specific path that is part of a protection group and is labelled

working.

Page 252: IManager U2000 Product Description V100R002C00 03

A Glossary

iManager U2000 Unified Network Management System

Product Description

A-14 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

WTR time A period of time that must elapse before a - from a fault recovered -

trail/connection can be used again to transport the normal traffic

signal and/or to select the normal traffic signal from.

WTR Wait to Restore. This command is issued when working channels

meet the restoral threshold after an SD or SF condition. It is used to

maintain the state during the WTR period unless it is pre-empted by

a higher priority bridge request.

WXCP Wavelength Cross-Connection Protection. It is a path protection

type for ring networks. In this protection mode, services are

switched between the primacy and secondary rings through

cross-connection based on the dual fed signal selection principle.

Page 253: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description B Acronyms and Abbreviations

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

B-1

B Acronyms and Abbreviations

A

AAA Authorization, Authentication and Accounting

ACE Adaptive Communication Environment

ACL Access Control List

AIS Alarm Indication Signal

ALC Automatic Level Control

APE Automatic Power Equilibrium

ARP Address Resolution Protocol

ASN.1 Abstract Syntax Notation One

ASON Automatically Switched Optical Network

ATM Asynchronous Transfer Mode

B

BFD Bidirectional Forwarding Detection

BGP Border Gateway Protocol

BML Business Management Layer

BRAS Broadband Remote Access Server

C

CAR Committed Access Rate

CC Continuity Check

CORBA Common Object Request Broker Architecture

CLI Command Line Interface

CoS Class of Service

Page 254: IManager U2000 Product Description V100R002C00 03

B Acronyms and Abbreviations

iManager U2000 Unified Network Management System

Product Description

B-2 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

CPU Central Processing Unit

CWDM Coarse Wavelength Division Multiplexing

D

DC Data Center

DCC Data Communications Channel

DCN Data Communication Network

DDN Digital Data Network

DHCP Dynamic Host Configuration Protocol

DNI Dual Node Interconnection

DNS Domain Name System

DPPS Dual Path Protection Switching

DWC Dynamic Wavelength Control

DMS Datacom network Management System

DWDM Dense Wavelength Division Multiplexing

E

ECC Embedded Control Channel

EML Element management Layer

EMS Element Management System

EPL Ethernet Private Line

EPLAN Ethernet Private LAN

ESCON Enterprise System Connection

EVPL Ethernet Virtual Private Line

F

FCAPS Fault Management, Configuration Management, Accounting

Management, Performance Management, Security Management

FTP File Transfer Protocol

G

GNE Gate Network Element

GUI Graphical User Interface

Page 255: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description B Acronyms and Abbreviations

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

B-3

H

HA High-Availability

HGMP HUAWEI Group Management Protocol

HQoS Hierarchical QoS

HSI High Speed Internet

HTML Hyper Text Markup Language

HTTP Hyper-Text Transmission Protocol

I

ID IDentification

IEEE Institute of Electrical and Electronics Engineers

IF Intermediate Frequency

IGMP Internet Group Management Protocol

IMA Inverse Multiplexing for ATM

iMAP Integrated Management Application Platform

ION Intelligent Optical Network

IP Internet Protocol

IPA Intelligent Power Adjustment

ISDN Integrated Services Digital Network

ISO International Organization for Standardization

ISP Internet Service Provider

ITU-T International Telecommunication Union- Telecommunication

Standardization Sector

L

LAN Local Area Network

LCAS Link Capacity Adjustment Scheme

LCD Liquid Crystal Display

LCT Local Craft Terminal

LLID Locate Loopback ID

LPT Link-state Pass Through

L2TP Layer 2 Tunneling Protocol

Page 256: IManager U2000 Product Description V100R002C00 03

B Acronyms and Abbreviations

iManager U2000 Unified Network Management System

Product Description

B-4 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

LLDP Link Layer Discovery Protocol

LSP Label Switched Path

M

MA Maintenance Association

MAC Media Access Control

MCA Multi-channel Spectrum Analyzer Unit

MEP Maintenance association End Point

MD Maintenance Domain

MDI Multi-Document Interface

MDP Message Dispatch Process

Mgr Manager

MIB Management Information Base

MIP Maintenance association Intermediate Point

MIT Managed Object Instance Tree

MML Man Machine Language

MO Managed Object

MPLS Multiprotocol Label Switching

MS Multiplex Section

MSP Multiplex Section Protection

MSTP Multi-Service Transmission Platform

MTBF Mean Time Between Failures

MTTR Mean Time to Repair

NBI Northbound Interface

N

NE Network Element

NEL Network Element Level

NML Network Management Layer

NMS Network Management System

NSAP System Network Service Access Point

O

Page 257: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description B Acronyms and Abbreviations

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

B-5

OADM Optical Add/Drop Multiplexer

OAM Operation Administration and Maintenance

OAMS Optical fiber (cable) line Automatic Monitoring System

OCH Optical Channel

OEQ Optical Equalizer

ODU Optical Demultiplexer Unit

ODU Outdoor Unit

OIF Optical Internetworking Forum

OLA Optical Line Amplifier

OMS Optical Multiplex Section

OMU Optical Multiplexer Unit

OSC Optical Supervisory Channel

OSF Operation System Function

OSI Open Systems Interconnection

OSN Optical Switch Network

OSNR Optical Signal-to-Noise Ratio

OSS Operation Support System

OTDR Optical Time Domain Reflectometry

OTM Optical Terminal Multiplexer

OTS Optical Transmission Section

OTU Optical Transponder Unit

OWSP Optical Wavelength Shared Protection

OSPF Open Shortest Path First

P

PC Personal Computer

PSTN Public Switched Telephone Network

PDH Plesiochronous Digital Hierarchy

PP Path Protection

PPP Point-to-Point Protocol

PRBS Pseudo-Random Binary Sequence

PSTN Public Switched Telephone Network

Page 258: IManager U2000 Product Description V100R002C00 03

B Acronyms and Abbreviations

iManager U2000 Unified Network Management System

Product Description

B-6 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Q

QoS Quality of Service

R

RAID Redundant Array of Inexpensive Disk

RAS Reliability, Availability, Survivability

RDBMS Relational Database Management System

RPR Resilient Packet Ring

RMON Remote Monitoring

ROADM Reconfiguration Optical Add/drop Multiplexer

RPT Repeater

RS Regenerator Section

RSVP Resource Reservation Protocol

RTN Radio Transmission Node

RUP Rational Unified Process

S

SDH Synchronous Digital Hierarchy

SLM Submarine Line Monitor

SLTE Submarine Line Terminal Equipment

SML Service Management Layer

SMS Service Management System

SNCMP Sub-Network Connection Multiple Protection

SNCP Sub-Network Connection Protection

SNCTP Sub-Network Connection Tunnel Protection

SNML Sub-Network Management Layer

SNMS Subnetwork Management System

SONET Synchronous Optical Network

SSL Security Socket Layer

SAP Service Access Point

SNMP Simple Network Management Protocol

STP Spanning Tree Protocol

Page 259: IManager U2000 Product Description V100R002C00 03

iManager U2000 Unified Network Management System

Product Description B Acronyms and Abbreviations

Issue 03 (2010-11-02) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

B-7

T

TCM Tandem Connection Measurement

TCP/IP Transmission Control Protocol / Internet Protocol

TDA Tone & Data Access Unit

TFTP Trivial File Transfer Protocol

TM Terminal Multiplexer

TMF TeleManagement Forum

TMN Telecommunication Management Network

TPS Tributary Protection Switching

U

UML Unified Modeling Language

UPS Uninterrupted Power Supply

V

VB Virtual Bridge

VCI Virtual Channel Identifier

VCS Veritas Cluster Server

VOA Variable Optical Attenuator

VPI Virtual Path Identifier

VLAN Virtual Local Area Network

VPN Virtual Private Network

VGMP VRRP Group Management Protocol

VRRP Virtual Router Redundancy Protocol

VVR Veritas Volume Replication

VVR VERITAS Volume Replicator

VxVM Veritas Volume Manager

W

WDM Wavelength Division Multiplexing

WSF Work Station Function

WTR Wait-to-Restore

WXCP Wavelength Cross-Connection Protection

Page 260: IManager U2000 Product Description V100R002C00 03

B Acronyms and Abbreviations

iManager U2000 Unified Network Management System

Product Description

B-8 Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)