OG for WDM End-To-End Management-(V100R002C01_02)

Embed Size (px)

Citation preview

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    1/228

    iManager U2000 Unified Network Management

    System

    V100R002C01

    Operation Guide for WDM End-to-

    End Management

    Issue 02

    Date 2010-09-24

    HUAWEI TECHNOLOGIES CO., LTD.

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    2/228

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    3/228

    Copyright Huawei Technologies Co., Ltd. 2010. All rights reserved.

    No part of this document may be reproduced or transmitted in any form or by any means without prior written

    consent of Huawei Technologies Co., Ltd.

    Trademarks and Permissions

    and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.

    All other trademarks and trade names mentioned in this document are the property of their respective holders.

    Notice

    The purchased products, services and features are stipulated by the contract made between Huawei and the

    customer. All or part of the products, services and features described in this document may not be within the

    purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,and recommendations in this document are provided "AS IS" without warranties, guarantees or representations

    of any kind, either express or implied.

    The information in this document is subject to change without notice. Every effort has been made in the

    preparation of this document to ensure accuracy of the contents, but all statements, information, and

    recommendations in this document do not constitute the warranty of any kind, express or implied.

    Huawei Technologies Co., Ltd.

    Address: Huawei Industrial Base

    Bantian, Longgang

    Shenzhen 518129

    People's Republic of China

    Website: http://www.huawei.com

    Email: [email protected]

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    i

    http://www.huawei.com/
  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    4/228

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    5/228

    About This Document

    Related Version

    The following table lists the product version related to this document.

    Product Name Version

    iManager U2000 V100R002C01

    Intended Audience

    This document describes how to configure an WDM network by using the end-to-end function.

    This document guides you to manage an WDM network by using the trail management function.

    This document is intended for:

    l Network Monitoring Engineer

    l Data Configuration Engineer

    l NM Administrator

    l System Maintenance Engineer

    Symbol ConventionsThe symbols that may be found in this document are defined as follows.

    Symbol Description

    DANGER

    Indicates a hazard with a high level of risk, which if not

    avoided, will result in death or serious injury.

    WARNING

    Indicates a hazard with a medium or low level of risk, which

    if not avoided, could result in minor or moderate injury.

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management About This Document

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    iii

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    6/228

    Symbol Description

    CAUTION

    Indicates a potentially hazardous situation, which if not

    avoided, could result in equipment damage, data loss,

    performance degradation, or unexpected results.

    TIP Indicates a tip that may help you solve a problem or save

    time.

    NOTE Provides additional information to emphasize or supplement

    important points of the main text.

    Command Conventions

    The command conventions that may be found in this document are defined as follows.

    Convention Description

    Boldface The keywords of a command line are in boldface.

    Italic Command arguments are in italics.

    [ ] Items (keywords or arguments) in brackets [ ] are optional.

    { x | y | ... } Optional items are grouped in braces and separated by

    vertical bars. One item is selected.

    [ x | y | ... ] Optional items are grouped in brackets and separated byvertical bars. One item is selected or no item is selected.

    { x | y | ... }* Optional items are grouped in braces and separated by

    vertical bars. A minimum of one item or a maximum of all

    items can be selected.

    [ x | y | ... ]* Optional items are grouped in brackets and separated by

    vertical bars. Several items or no item can be selected.

    GUI Conventions

    The GUI conventions that may be found in this document are defined as follows.

    Convention Description

    Boldface Buttons, menus, parameters, tabs, window, and dialog titles

    are in boldface. For example, click OK.

    > Multi-level menus are in boldfaceand separated by the ">"

    signs. For example, choose File> Create> Folder.

    About This Document

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    iv Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    7/228

    Update History

    Updates between document versions are cumulative. Therefore, the latest document version

    contains all updates made to previous versions.

    Updates in Issue 02 (2010-09-24) Based on Product Version V100R002C01

    The second release of the iManager U2000 V100R002C01.

    Some bugs in the manual of the previous version are fixed.

    Updates in Issue 01 (2010-08-16) Based on Product Version V100R002C01

    The first release of the iManager U2000 V100R002C01.

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management About This Document

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    v

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    8/228

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    9/228

    Contents

    About This Document...................................................................................................................iii

    1 Managing WDMProtection Subnets.....................................................................................1-1

    1.1 Basic Concepts................................................................................................................................................1-2

    1.1.1 Protection Subnet...................................................................................................................................1-21.1.2 Isolated Node..........................................................................................................................................1-2

    1.2 Searchingfor Protection Subnets....................................................................................................................1-2

    1.3 Configuring 1:N Wavelength Protection.........................................................................................................1-3

    1.3.1 Creating1:N Optical Channel Protection...............................................................................................1-4

    1.3.2 Searching for 1:N Wavelength Protection Subnet.................................................................................1-5

    1.3.3 Setting 1:N Wavelength Protection Subnet Parameters.........................................................................1-6

    1.3.4 Verifying the 1:N Wavelength Protection Switching............................................................................1-7

    1.4 Configuring Protection for an ODUk SPRing.................................................................................................1-8

    1.4.1 Creatingan ODUk SPRing Protection Group........................................................................................1-8

    1.4.2 Searching for an ODUk SPRing Protection Subnet.............................................................................1-10

    1.4.3 Setting Parameters of an ODUk SPRing Protection Subnet................................................................1-10

    1.4.4 Verifying the ODUk SPRing Protection Switching.............................................................................1-11

    1.5 Maintaining Protection Subnets....................................................................................................................1-12

    1.5.1 Finding Protection Subnets..................................................................................................................1-13

    1.5.2 Querying Protection Subnet Resources................................................................................................1-13

    1.5.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet..................................1-14

    1.5.4 Performing ODUk Ring Protection Switching.....................................................................................1-15

    1.6 Deleting Isolated Nodes................................................................................................................................1-16

    1.7 Deleting Protection Subnets..........................................................................................................................1-17

    2 End-to-End WDM Management..............................................................................................2-1

    2.1 Managing WDM Trails...................................................................................................................................2-2

    2.1.1 Configuration Task Flow.......................................................................................................................2-3

    2.1.2 Basic Concepts.......................................................................................................................................2-5

    2.1.2.1 WDM Trail..........................................................................................................................................2-5

    2.1.2.2 Conflict Trail.....................................................................................................................................2-10

    2.1.2.3 Trail Creation Method.......................................................................................................................2-11

    2.1.2.4 Process for Creating a Trail...............................................................................................................2-13

    2.1.2.5 Platinum Service Group....................................................................................................................2-15

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management Contents

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    vii

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    10/228

    2.1.3 Creating WDM Trails by Trail Search.................................................................................................2-17

    2.1.3.1 Searching for WDM Trails................................................................................................................2-18

    2.1.3.2 Viewing Discrete Services................................................................................................................2-19

    2.1.3.3 Activating and Deactivating Discrete Services.................................................................................2-20

    2.1.3.4 Acknowledging or Unacknowledging Discrete Services..................................................................2-21

    2.1.3.5 Deleting Discrete Services................................................................................................................2-22

    2.1.4 Configuring WDM Trails.....................................................................................................................2-22

    2.1.4.1 Creating an OCh Trail.......................................................................................................................2-23

    2.1.4.2 Creating an ODUk Trail....................................................................................................................2-27

    2.1.4.3 Creating Client Trails........................................................................................................................2-31

    2.1.4.4 Creating a Mono Nodal Trail............................................................................................................2-34

    2.1.4.5 Creating a Multi-Layer OTN Trail....................................................................................................2-36

    2.1.5 Creatinga Platinum Service.................................................................................................................2-37

    2.1.6 Binding a Platinum Service Group.......................................................................................................2-38

    2.1.7 Service Authorization Management.....................................................................................................2-39

    2.1.7.1 Specifying a Customer for a Service.................................................................................................2-40

    2.1.7.2 Authorizing a Customer to a U2000 User.........................................................................................2-41

    2.1.7.3 Authorizing a Trail to a U2000 User.................................................................................................2-42

    2.1.7.4 Modifying Trail Authorization Information......................................................................................2-42

    2.1.8 ViewingWDM Trails...........................................................................................................................2-43

    2.1.8.1 Viewing Route Information of WDM Trail......................................................................................2-44

    2.1.8.2 Viewing the Signal Flow Diagram for a WDM Trail.......................................................................2-44

    2.1.8.3 Viewing the WDM Single Station Signal Flow Diagram.................................................................2-462.1.8.4 Viewing the WDM NE Panel............................................................................................................2-47

    2.1.8.5 Viewing Relevant Client Trails.........................................................................................................2-48

    2.1.8.6 Browsing Related Server Trails........................................................................................................2-49

    2.1.8.7 Viewing the Optical Power for the Trails.........................................................................................2-50

    2.1.8.8 Browsing Associated Working and Protection Trails.......................................................................2-51

    2.1.8.9 Viewing the Fiber Information of a Trail..........................................................................................2-52

    2.1.9 Maintaining WDM Trails.....................................................................................................................2-52

    2.1.9.1 Activating/Deactivating WDM Trails...............................................................................................2-53

    2.1.9.2 Querying Cross-Connection Information..........................................................................................2-54

    2.1.9.3 Locking or Unlocking a WDM Trail.................................................................................................2-55

    2.1.9.4 Querying the 1+1 Protection for a WDM Trail.................................................................................2-55

    2.1.9.5 Performing 1+1 Protection Switching for a WDM Trail..................................................................2-56

    2.1.9.6 Querying the WXCP/SNCP Protection of a WDM Trail..................................................................2-57

    2.1.9.7 Performing the WXCP/SNCP Protection Switching for a WDM Trail............................................2-58

    2.1.9.8 Querying the DPPS Protection of a WDM Trail...............................................................................2-59

    2.1.9.9 Configuring OTU Overhead on the OCh Trail.................................................................................2-59

    2.1.9.10 Modifying the Optical Power Adjustment Mode of a WDM Trail.................................................2-61

    2.1.10 Modifying WDM Trails.....................................................................................................................2-62

    2.1.10.1 Changing the Source, Sink, and Route of a WDM Trail.................................................................2-62

    Contents

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    viii Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    11/228

    2.1.10.2 Modifying Trail Names in Batches.................................................................................................2-64

    2.1.10.3 Changing the Route of a Platinum Service.....................................................................................2-64

    2.1.10.4 Removing a Trail from a Platinum Service Group.........................................................................2-65

    2.1.11 Deleting a WDM Trail.......................................................................................................................2-66

    2.1.12 Configuration Example: Configuring GE Services on the OptiX BWS 1600G by Using a traditional

    method...........................................................................................................................................................2-67

    2.1.13 Sample Application: Configuring an OCh Trail................................................................................2-71

    2.1.14 Application Example: Configuring an OCh Trail with OLP Protection by Using the End-To-End Trail

    Management Function (OptiX OSN 6800)...................................................................................................2-76

    2.1.14.1 Configuration Networking Diagram...............................................................................................2-76

    2.1.14.2 Service Signal Flow and Parameter Planning.................................................................................2-78

    2.1.14.3 Configuration Process.....................................................................................................................2-79

    2.1.15 Application Example: Configuring an ODUk Trail by Using the Cross-Layer Creation Function (OptiX

    OSN 6800).....................................................................................................................................................2-80

    2.1.15.1 Configuration Networking Diagram...............................................................................................2-80

    2.1.15.2 Service Signal Flow and Parameter Planning.................................................................................2-82

    2.1.15.3 Configuration Process.....................................................................................................................2-86

    2.1.16 Configuration Example: Configuring GE Services on the OptiX BWS 1600G by Using a traditional

    method...........................................................................................................................................................2-87

    2.1.17 Configuration Example: Configuring GE Services on the OptiX OSN 6800 by Using a traditional method

    .......................................................................................................................................................................2-91

    2.1.17.1 Networking Configuration..............................................................................................................2-91

    2.1.17.2 Service Signal Flow and Parameter Planning.................................................................................2-93

    2.1.17.3 Configuration Process.....................................................................................................................2-96

    2.1.18 Configuration Example: Configuring GE Services on the OptiX OSN 6800 with the Cross-Layer Trail

    Creation Method............................................................................................................................................2-99

    2.1.18.1 Networking Configuration............................................................................................................2-100

    2.1.18.2 Service Signal Flow and Parameter Planning...............................................................................2-101

    2.1.18.3 Configuration Process...................................................................................................................2-104

    2.1.19 Application Example: Configuring an ODU1 Trail by Using the Cross-Layer Creation Function

    (52TOM, ODU0 Tributary-Line Mode(Any->ODU0->ODU1->OTU1))..................................................2-106

    2.1.19.1 Configuration Networking Diagram.............................................................................................2-107

    2.1.19.2 Service Signal Flow and Parameter Planning...............................................................................2-108

    2.1.19.3 Configuration Process...................................................................................................................2-1102.1.20 Application Example: Configuring an Any Service by Using the Cross-Layer Creation Function

    (52TOM, ODU0 Tributary Mode(Any->ODU0[->ODU1]))......................................................................2-113

    2.1.20.1 Configuration Networking Diagram.............................................................................................2-113

    2.1.20.2 Service Signal Flow and Parameter Planning...............................................................................2-115

    2.1.20.3 Configuration Process...................................................................................................................2-117

    2.2 Configuring Optical Layer Multipath Protection........................................................................................2-119

    2.2.1 Configuring Optical Layer Multipath Protection Automatically.......................................................2-120

    2.2.1.1 Configuration Principle...................................................................................................................2-120

    2.2.1.2 Enabling the WSS Function on an NE............................................................................................2-121

    2.2.1.3 Creating a Working Cross-Connection for an NE..........................................................................2-122

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management Contents

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    ix

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    12/228

    2.2.1.4 Searching for WDM Trails..............................................................................................................2-123

    2.2.1.5 Creating Optical Layer Multipath Protection Automatically..........................................................2-125

    2.2.1.6 Modifying the Parameters of Optical Layer Multipath Protection..................................................2-126

    2.2.2 Configuring Optical Layer Multipath Protection Manually...............................................................2-128

    2.2.2.1 Configuration Principle...................................................................................................................2-129

    2.2.2.2 Enabling the WSS Function on an NE............................................................................................2-129

    2.2.2.3 Creating a Working Cross-Connection for an NE..........................................................................2-130

    2.2.2.4 Creating the Protection Cross-Connection on NEs.........................................................................2-131

    2.2.2.5 Searching for WDM Trails..............................................................................................................2-133

    2.2.2.6 Creating Optical Layer Multipath Protection Manually..................................................................2-134

    2.2.2.7 Modifying the Parameters of Optical Layer Multipath Protection..................................................2-136

    2.3 Configuring EAPE......................................................................................................................................2-137

    2.3.1 EAPE..................................................................................................................................................2-138

    2.3.2 Creatingan OCh Trail........................................................................................................................2-141

    2.3.3 CreatingEAPE Objects......................................................................................................................2-145

    2.3.4 Querying EAPE Objects.....................................................................................................................2-146

    2.3.5 Starting EAPE Adjustment.................................................................................................................2-147

    2.3.6 DeletingEAPE Objects......................................................................................................................2-148

    2.4 Managing Alarms on WDM Trails.............................................................................................................2-148

    2.4.1 ViewingCurrent Alarms of a WDM Trail.........................................................................................2-149

    2.4.2 ViewingHistory Alarms of a WDM Trail.........................................................................................2-150

    2.4.3 Managing Networkwide WDM Alarm Trails in Real Time..............................................................2-151

    2.4.4 Analyzing WDM alarm correlation....................................................................................................2-1512.5 Managingthe Performance of WDM Trails................................................................................................2-152

    2.5.1 ViewingCurrent Performance Data of WDM Trails.........................................................................2-153

    2.5.2 ViewingHistory Performance Data of WDM Trails.........................................................................2-153

    2.5.3 ViewingUAT of WDM Trails...........................................................................................................2-154

    2.5.4 ViewingPerformance Threshold-Crossing Records of WDM Trails................................................2-155

    2.5.5 Viewing Ethernet Performance of WDM Trails................................................................................2-156

    2.5.6 Setting Performance Monitoring Parameters of an WDM Trail........................................................2-156

    2.5.7 Setting WDM Trail Performance Threshold......................................................................................2-157

    2.6 Configuring Board Parameters....................................................................................................................2-157

    2.6.1 Configuring the Working Mode of the Board....................................................................................2-158

    2.6.1.1 Aboutthe Working Modes..............................................................................................................2-158

    2.6.1.2 Configuration Rules of the 52TOM board......................................................................................2-160

    2.6.1.3 Configuring the Working Mode of the 52TOM Board...................................................................2-161

    2.6.1.4 Configuring the Working Mode of the LQM2 board......................................................................2-161

    2.6.1.5 Configuring the Working Modes of Ordinary OTUs......................................................................2-164

    2.6.2 Configuring the Service Mode...........................................................................................................2-164

    2.6.3 Service Type.......................................................................................................................................2-165

    2.6.4 Configuring the Service Type............................................................................................................2-171

    2.6.5 Modifying Port...................................................................................................................................2-172

    Contents

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    x Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    13/228

    2.6.6 Creating Cross-Connections...............................................................................................................2-173

    2.6.7 Service Mode (WDM Interface).........................................................................................................2-175

    2.6.8 Service Type (WDM Interface)..........................................................................................................2-177

    2.6.9 GUI Parameter Description: WDM Cross-Connection Configuration..............................................2-179

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management Contents

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xi

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    14/228

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    15/228

    Figures

    Figure 2-1End-to-end WDM network management flow...................................................................................2-4

    Figure 2-2Trail....................................................................................................................................................2-6

    Figure 2-3OSC Trail............................................................................................................................................2-6

    Figure 2-4ODUk (k = 1, 2, ...) trail.....................................................................................................................2-7

    Figure 2-5ODUk (k = 0, 1, 2, ...) trail.................................................................................................................2-8

    Figure 2-640G inverse multiplexing trail ...........................................................................................................2-9

    Figure 2-710G inverse multiplexing trail .........................................................................................................2-10

    Figure 2-8A conflict trail generated because a fiber is added...........................................................................2-10

    Figure 2-9A conflict trail generated because a single station cross-connection is lost.....................................2-11

    Figure 2-10Aconflict trail generated because a protection service is deleted on a per-NE basis....................2-11

    Figure 2-11Creating trails by trail search..........................................................................................................2-14

    Figure 2-12Creating trails in the automatic mode.............................................................................................2-15

    Figure 2-13Platinum service group...................................................................................................................2-16

    Figure 2-14Downgraded platinum service group..............................................................................................2-17Figure 2-15Service authorization management.................................................................................................2-40

    Figure 2-16Network Design..............................................................................................................................2-68

    Figure 2-17Station A.........................................................................................................................................2-68

    Figure 2-18Station B.........................................................................................................................................2-69

    Figure 2-19Station C.........................................................................................................................................2-69

    Figure 2-20Station D.........................................................................................................................................2-69

    Figure 2-21Network design...............................................................................................................................2-72

    Figure 2-22NE panel on station A.....................................................................................................................2-73

    Figure 2-23Signal flow of the trail from station B to station C........................................................................2-73

    Figure 2-24Signal flow of the trail from station B to station D........................................................................2-74

    Figure 2-25Signal flow of the trail from station D to station B........................................................................2-74

    Figure 2-26Configuration networking diagram of an OCh trail.......................................................................2-77

    Figure 2-27Card configuration..........................................................................................................................2-77

    Figure 2-28Signal flow of an OCh trail.............................................................................................................2-78

    Figure 2-29Intra-station signal flow of NE1 and NE2......................................................................................2-78

    Figure 2-30Configuration networking diagram of an ODUk trail....................................................................2-81

    Figure 2-31Card configuration..........................................................................................................................2-82

    Figure 2-32Signal flow of an ODUk trail.........................................................................................................2-83

    Figure 2-33Intra-station signal flow of NE1 and NE4......................................................................................2-84

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management Figures

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xiii

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    16/228

    Figure 2-34Intra-station signal flow of NE2 and NE3......................................................................................2-84

    Figure 2-35Network Design..............................................................................................................................2-88

    Figure 2-36Station A.........................................................................................................................................2-88

    Figure 2-37Station B.........................................................................................................................................2-89

    Figure 2-38Station C.........................................................................................................................................2-89

    Figure 2-39Station D.........................................................................................................................................2-89

    Figure 2-40Networking configuration for a GE service....................................................................................2-92

    Figure 2-41Card configuration..........................................................................................................................2-92

    Figure 2-42GE service signal flow ...................................................................................................................2-93

    Figure 2-43Intra-station signal flow of NE1 and NE4......................................................................................2-94

    Figure 2-44Networking configuration for a GE service..................................................................................2-100

    Figure 2-45Card configuration........................................................................................................................2-101

    Figure 2-46GE service signal flow .................................................................................................................2-102

    Figure 2-47Intra-station signal flow of NE1 and NE4....................................................................................2-102

    Figure 2-48Configuration networking diagram of an ODU1 trail..................................................................2-107

    Figure 2-49Card configuration........................................................................................................................2-108

    Figure 2-50ODU1 service signal flow............................................................................................................2-108

    Figure 2-51Intra-station signal flow of NE1 and NE2....................................................................................2-109

    Figure 2-52Configuration networking diagram of an Any service.................................................................2-114

    Figure 2-53Card configuration........................................................................................................................2-115

    Figure 2-54Any service signal flow................................................................................................................2-116

    Figure 2-55Intra-station signal flow of NE1 and NE2....................................................................................2-116

    Figure 2-56Scenario of the single VOA unit that takes the common OTU as the source...............................2-139Figure 2-57Scenario of the dual VOA units that take the dual-fed and selective-receiving OTUs as the sources

    ...........................................................................................................................................................................2-140

    Figure 2-58Scenario of the dual VOA units with the OLP protection units...................................................2-140

    Figures

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    xiv Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    17/228

    Tables

    Table 2-1ODUk rate level...................................................................................................................................2-6

    Table 2-2Comparison of methods for creating trails.........................................................................................2-12

    Table 2-3Network data table.............................................................................................................................2-72

    Table 2-4Parameter planning for an OCh trail..................................................................................................2-79

    Table 2-5Parameter planning for an OCh trail..................................................................................................2-80

    Table 2-6Parameter planning for an OCh trail..................................................................................................2-85

    Table 2-7Parameter planning for an ODU1 trail...............................................................................................2-86

    Table 2-8Parameter planning for an OCh trail..................................................................................................2-86

    Table 2-9Parameter planning for an ODU1 trail...............................................................................................2-87

    Table 2-10Parameter planning for an OCh trail................................................................................................2-95

    Table 2-11Parameter planning for an ODU2 trail.............................................................................................2-95

    Table 2-12Parameter planning for an ODU1 trail.............................................................................................2-95

    Table 2-13Parameter planning for a GE service................................................................................................2-96

    Table 2-14Parameter planning for an OCh trail................................................................................................2-98Table 2-15Parameter planning for an ODU2 trail.............................................................................................2-98

    Table 2-16Parameter planning for an ODU1 trail.............................................................................................2-99

    Table 2-17Parameter planning for a GE service................................................................................................2-99

    Table 2-18Parameter planning for an OCh trail..............................................................................................2-103

    Table 2-19Parameter planning for a GE service..............................................................................................2-104

    Table 2-20Parameter planning for an OCh trail..............................................................................................2-105

    Table 2-21Parameter planning for a GE service..............................................................................................2-106

    Table 2-22Parameter planning for an OCh trail..............................................................................................2-110

    Table 2-23Parameter planning for OTU1 cross-connections..........................................................................2-110

    Table 2-24Parameter planning for an ODU1 trail...........................................................................................2-110

    Table 2-25Parameter planning for an OCh trail..............................................................................................2-112

    Table 2-26Parameter planning for OTU1 cross-connections..........................................................................2-112

    Table 2-27Parameter planning for an ODU1 trail...........................................................................................2-112

    Table 2-28Parameter planning for an OCh trail..............................................................................................2-117

    Table 2-29Parameter planning for the Any service.........................................................................................2-117

    Table 2-30Parameter planning for an OCh trail..............................................................................................2-119

    Table 2-31Parameter planning for the Any service.........................................................................................2-119

    Table 2-32Mapping between the working modes and signal flows of the 52TOM board..............................2-159

    Table 2-33Service access function..................................................................................................................2-165

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management Tables

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xv

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    18/228

    Table 2-34Service access function..................................................................................................................2-166

    Table 2-35Types of Service Access................................................................................................................2-167

    Table 2-36Service types supported by the system...........................................................................................2-169

    Table 2-37Parameters of the Client-Side Port.................................................................................................2-173

    Table 2-38WDM Cross-Connection Configuration........................................................................................2-181

    Table 2-39Create Cross-connect Service........................................................................................................2-183

    Table 2-40Create SNCP Service.....................................................................................................................2-185

    Table 2-41Create WXCP Service....................................................................................................................2-190

    Tables

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    xvi Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    19/228

    1Managing WDM Protection SubnetsAbout This Chapter

    A protection subnet has a structure of providing complete self-protection functions. The purpose

    of managingprotection subnets is to configure and display network protection, for example,

    browsing, deleting, modifying and searching for protection subnets, managing isolated nodes.

    1.1 Basic Concepts

    According tothe layered structure of transport network, protection subnet, belonging to the

    network layer, refers to a network structure that has a comprehensive self-protection function.

    The protection subnet is a network unit of composing the optical transport network. To have a

    good understanding of the protection subnet, you need to learn some basic concepts of the

    network layer.

    1.2 Searching for Protection Subnets

    By searchingfor a protection subnet, the configured protection attributes at the NE layer on the

    U2000 are synchronized to the network layer on the U2000 to create protection subnets

    automatically.

    1.3 Configuring 1:N Wavelength Protection

    On the U2000, you can create 1:N wavelength protection groups, search for 1:N wavelength

    protection subnets, and perform an external switch from 1:N wavelength protection subnets.

    1.4 Configuring Protection for an ODUk SPRing

    By using the U2000, you can query the protection subnet resources for an ODUk SPRing, create

    an ODUk protection group, search for the ODUk SPRing, perform data consistency check onthe ODUk SPRing, set the protection subnet parameters for the ODUk SPRing, and delete an

    ODUk SPRing.

    1.5 Maintaining Protection Subnets

    On the U2000, you can maintain protection subnets.

    1.6 Deleting Isolated Nodes

    To release protection resources that are used by isolated nodes, you need to delete isolated nodes.

    1.7 Deleting Protection Subnets

    When an existing protection subnet is not suitable, you can delete the protection subnet.

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-1

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    20/228

    1.1 Basic Concepts

    According to the layered structure of transport network, protection subnet, belonging to thenetwork layer, refers to a network structure that has a comprehensive self-protection function.

    The protection subnet is a network unit of composing the optical transport network. To have a

    good understanding of the protection subnet, you need to learn some basic concepts of the

    network layer.

    1.1.1 Protection Subnet

    A protection subnet refers to a network architecture that has a comprehensive self-protection

    function. It is a network that composes the optical transmission network.

    1.1.2 Isolated Node

    An isolated node is not equal to an isolated NE. An isolated node refers to a special logical

    system that is independent from any protection subnet. An isolated node does not belong to anyprotection subnet.

    1.1.1 Protection Subnet

    A protection subnet refers to a network architecture that has a comprehensive self-protection

    function. It is a network that composes the optical transmission network.

    In the U2000, a protection subnet is a network level concept. NEs and fiber connections are the

    basic elements required to construct a protection subnet. You should create NEs, perform basic

    configurations for them, and then properly create fiber connections between the NEs. You should

    have access to sufficient resources to create a protection subnet.

    1.1.2 Isolated Node

    An isolated node is not equal to an isolated NE. An isolated node refers to a special logical

    system that is independent from any protection subnet. An isolated node does not belong to any

    protection subnet.

    An isolated node is a node that is configured at NEs but cannot or does not compose a protection

    subnet with other nodes. Currently, the WDM equipment supports the 1:N optical path protection

    subnet and the ODUk SPRing protection subnet. The network node that is configured with the

    1:N optical path protection group or the ODUk SPRing protection group but does not belong to

    any protection subnet is an isolated node.

    An isolated node should not exist in a transmission network that runs normally. The reason for

    the existence of any isolated nodes can be as follows:

    l The configuration is incorrect at the NE side.

    l The fiber that should be connected to the node is not created on the U2000.

    1.2 Searching for Protection Subnets

    By searching for a protection subnet, the configured protection attributes at the NE layer on the

    U2000 are synchronized to the network layer on the U2000 to create protection subnets

    automatically.

    1 Managing WDM Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    1-2 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    21/228

    Prerequisite

    l You must be an NM user with "network maintainer" authority or higher.

    l The NE data must be configured, and fibers must be properly created.

    Procedure

    Step 1 Choose Service> WDM Protection Subnet> Search for WDM Protection Subnetfrom theMain Menu.

    Step 2 In the Consistency Verification of Existing Subnetscreen, select the protection subnet andclick Next.

    NOTE

    If the verification is unsuccessful and the subnet becomes abnormal, the search menu is unavailable. In

    this case, you need to delete the abnormal subnet from the network layer and then re-search for the subnet.

    Step 3 Click Searchto start the search. The Subnet Name, Consistent Statusand Subnet Typeparameters ofthe searched protection subnet are automatically displayed.

    Step 4 Click Nexttocheck consistency of the protection subnet.

    NOTE

    If there are isolated nodes searched out, you can delete the nodes that do not form any protection subnet.

    Refer to 1.6 Deleting Isolated Nodes.

    Step 5 Click Finish. The searched protection subnet is displayed in the Main Topology.

    ----End

    1.3 Configuring 1:N Wavelength Protection

    On the U2000, you can create 1:N wavelength protection groups, search for 1:N wavelength

    protection subnets, and perform an external switch from 1:N wavelength protection subnets.

    1.3.1 Creating 1:N Optical Channel Protection

    1:N (N8) optical channel protection is created based on 1:N (N8) optical channel protection

    group. To create 1:N (N8) optical channel protection, you need to create a 1:N (N8) optical

    channel protection group for each node.

    1.3.2 Searching for 1:N Wavelength Protection Subnet

    After creating 1:N wavelength protection groups and searching for WDM trails, you need to

    search for the 1:N wavelength protection subnet. In this way, you can manage the 1:N wavelength

    protection as a protection subnet.

    1.3.3 Setting 1:N Wavelength Protection Subnet Parameters

    You can set parameters for a 1:N wavelength protection subnet.

    1.3.4 Verifying the 1:N Wavelength Protection Switching

    After you search out the 1:N wavelength protection subnet and set the related parameters, you

    can verify whether the subnet works properly by performing the switching and querying the

    switching status.

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-3

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    22/228

    1.3.1 Creating 1:N Optical Channel Protection

    1:N (N8) optical channel protection is created based on 1:N (N8) optical channel protection

    group. To create 1:N (N8) optical channel protection, you need to create a 1:N (N8) optical

    channel protection group for each node.

    Prerequisite

    l You must be an NM user with "NE operator" authority or higher.

    l Fibers must be correctly created, and all internal and external fibers must be correctly

    connected.

    l An OCP card and two or more OTU cards of same kind must be created.

    l Applies to the OptiX BWS 1600G, OptiX BWS 320GV3, OptiX BWS 1600G OLA and

    OptiX BWS 1600S.

    l Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA).

    Procedure

    Step 1 In the NE Explorer, select an NE and choose Configuration> 1:N Optical ChannelProtectionfrom the Function Tree.

    Step 2 Click Queryto query the information about the protection from the NE.

    Step 3 Click New. The Createdialog box is displayed.

    Step 4 Double-click the Number of Working Channelsfield, and choose the proper number from thedrop-down list. For other parameters, refer to 1:N Optical Channel Protection.

    Step 5 By referring to Step 4, set the corresponding OTU Optical Interface Numberfor ProtectionChanneland Working Channel, and set Protection Prioritiesfor Working Channel.

    1 Managing WDM Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    1-4 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    23/228

    NOTE

    l OTUs that serve as the working and protection channels must be configured on the same NE.

    l Every card in this protection group and the OCP card must be set in the same shelf.

    l If you need to check the consistency of the parameters, you need to set Parameter Consistency Check

    Flagto a proper value.

    Step 6 Click OK. The created 1:N (N8) optical channel protection group is displayed.

    Step 7 Repeat Step 1 through Step 6 to configure a 1:N (N8) wavelength protection group of theopposite NE.

    ----End

    1.3.2 Searching for 1:N Wavelength Protection Subnet

    After creating 1:N wavelength protection groups and searching for WDM trails, you need to

    search for the 1:N wavelength protection subnet. In this way, you can manage the 1:N wavelength

    protection as a protection subnet.

    Prerequisite

    l You must be an NM user with "network operator" authority or higher.

    l Applies to the OptiX BWS 1600G, OptiX BWS 1600G OLA, OptiX BWS 1600S and the

    OptiX BWS 320GV3.

    l Applies to the LWF, LWFS, LWS, LWC, LWC1, LBE, LBES, LBF, LBFS boards.

    l Fibers must be created properly.

    l The 1:N wavelength protection group must be created.

    l The WDM trail must be created and the bidirectional client trail must be searched out.

    Background Information

    For two NEs that are preconfigured as a 1:N WDM protection subnet, the protection group IDs

    of the WDM protection groups on the NEs must be consistent.

    Procedure

    Step 1 Choose Service> WDM Protection Subnet> Search for WDM Protection Subnetfrom theMain Menu.

    Step 2Click Nextto perform the consistency check of the subnet.

    Step 3 Click Searchto search for the protection subnet.

    The existing 1:N wavelength protection subnet is displayed in the Protection View.

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-5

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    24/228

    Step 4 Optional: Click Nextto query the information of the isolated nodes that are searched out.

    Step 5 Click Finish.

    ----End

    1.3.3 Setting 1:N Wavelength Protection Subnet Parameters

    You can set parameters for a 1:N wavelength protection subnet.

    Prerequisite

    l You must be an NM user with "network operator" authority or higher.

    l The 1:N wavelength protection subnet must be searched out.

    l Applies to the OptiX BWS 1600G, OptiX BWS 1600S and the OptiX BWS 320GV3.

    Context

    CAUTION

    Changing the protection mode may interrupt services. Exercise caution when you perform thisoperation.

    Procedure

    Step 1 Choose Service> WDM Protection Subnet> Manage WDM Protection Subnetfrom theMain Menu.

    Step 2 Select a protection link, right-click, and choose Protection Subnet Attributesfrom the shortcutmenu. The Protection Subnet Attributesuser interface is displayed. Click the Protection

    Subnet Parameterstab.

    Step 3 Set parameters for the protection subnet.

    1 Managing WDM Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    1-6 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    25/228

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    26/228

    Step 6 Click Queryto query whether the services on all nodes are already switched to the protectionpaths in the 1:N wavelength protection subnet.

    Step 7 Select all nodes in the protection subnet one by one. Click Eastor West, and then selectClearfrom the drop-down menu to clear the switching on each node.

    Step 8 Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

    ----End

    1.4 Configuring Protection for an ODUk SPRing

    By using the U2000, you can query the protection subnet resources for an ODUk SPRing, create

    an ODUk protection group, search for the ODUk SPRing, perform data consistency check on

    the ODUk SPRing, set the protection subnet parameters for the ODUk SPRing, and delete an

    ODUk SPRing.

    1.4.1 Creating an ODUk SPRing Protection Group

    The ODUk SPRing protection is used in a ring network that is configured with distributed

    services. It occupies two ODUk channels, realizing the protection for multiple services among

    all stations.

    1.4.2 Searching for an ODUk SPRing Protection Subnet

    The U2000 can search for and form ODUk SPRing protection subnets according to the created

    fiber cables and ODUk SPRing protection groups. After you create an ODUk SPRing protection

    group or search for WDM trails, you need to search for ODUk SPRing protection subnets. In

    this way, ODUk SPRing networks can be managed as protection subnets.

    1.4.3 Setting Parameters of an ODUk SPRing Protection Subnet

    This section describes how to set parameters of an ODUk SPRing protection subnet.

    1.4.4 Verifying the ODUk SPRing Protection Switching

    This topic describes how to perform the external switching for an ODUk SPRing protection on

    the U2000. During the deployment commissioning, the external switching is performed to test

    whether the ODUk SPRing protection functions normally and provides protection.

    1.4.1 Creating an ODUk SPRing Protection Group

    The ODUk SPRing protection is used in a ring network that is configured with distributed

    services. It occupies two ODUk channels, realizing the protection for multiple services among

    all stations.

    Prerequisite

    You must be an NM user with "NE operator" authority or higher.

    Currently, The ODU1/ODU2-level protection can be achieved.

    When configuring the ODUk SPRing protection of ODU1 or ODU2 levels, the Service Mode

    of the port on the line board should be set to ODU1or ODU2.

    1 Managing WDM Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    1-8 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    27/228

    Background Information

    l When the protection channel forms a ring, you can search out an ODUk protection subnet

    at the network layer.

    l The ODUk SPRing protection of the ODU1 and ODU2 levels is supported currently.

    Procedure

    Step 1 In the NE Explorer, select an NE and choose Configuration> ODUk SPRingfrom the FunctionTree.

    Step 2 Click New. The New ODUk Ring Network Protectiondialog box is displayed.

    Step 3 Set Protection Group IDand Levelas required. In the Select Mapping Directionarea, set theWest Working Unit, West Protection Unit, East Working Unit, and East Protection Unit.

    To set a unit, select one channel from the Available Channeland click .

    NOTE

    l The services in the east and west directions must be configured on different NS2/ND2 boards.

    l The working and protection channels in the east and west directions of an ODUk protection group can be

    on different NS2/ND2 boards.

    l You can create a protection group when the Selected Channelcontains at least East Protection Unitand

    West Protection Unit.

    Step 4 Click OK. After successful operation, click Closein the Operation Resultdialog box.

    Step 5 Select one protection group. In Channel Mapping Relation, select West Working UnitandEast Working Unit. Right-click them, and select Bound Span ID.

    NOTE

    l Before binding the span IDs, ensure that a bidirectional cross-connection is created successfully

    between the working unit in the protection group in the corresponding direction and the add/drop board.

    l The span IDs need be bound only on the stations that add or drop services. In the case of those stations

    that do not add or drop services, you need not perform such an operation.

    Step 6 In the Bound Span IDwindow, set Span ID, and then click OK. Span IDwill be updated.

    Step 7 Select one protection group. Right-click the Management Node, and select YES. Then clickApply. Management Nodewill be updated.

    Step 8 Select one protection group, and you can set parameters such as WTR Time(s)and EnableSD. In Channel Mapping Relation, double-click the Hold-Off Time(s)and set the hold-off

    time.NOTE

    The hold-off time of the protection unit should be longer than that of the working unit.

    Step 9 In the case of the NEs in other stations on the ring, start the NE Explorer. Then, refer to Steps1 through 8 to create the ODUk SPRing protection on the local NE, to complete the creation of

    the protection ring.

    NOTE

    In a ODUk SPRing protection group, there must be only one management node.

    Step 10 After the protection ring is created, select one protection group, and click Start Protocoltomake the protection group take effect.

    ----End

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-9

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    28/228

    Postrequisite

    Select one protection group and click Delete. Click OKon the Confirmdialog box displayed.

    The protection group is deleted.

    1.4.2 Searching for an ODUk SPRing Protection Subnet

    The U2000 can search for and form ODUk SPRing protection subnets according to the created

    fiber cables and ODUk SPRing protection groups. After you create an ODUk SPRing protection

    group or search for WDM trails, you need to search for ODUk SPRing protection subnets. In

    this way, ODUk SPRing networks can be managed as protection subnets.

    Prerequisite

    l You must be an NM user with "network operator" authority or higher.

    l Applies to the OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I.

    l Fiber connections must be created. All internal and external fibers are correctly connected.

    l The bidirectional server trail must be searched out.

    l An ODUk protection group must be created.

    Context

    NOTE

    The search of an ODUk SPRing protection subnet supports only the scenario in which an ODU1 or ODU2 trail

    exists between the ports of adjacent protection groups.

    Procedure

    Step 1 Choose Service> WDM Protection Subnet> Search for WDM Protection Subnetfrom theMain Menu.

    Step 2 Click Nextto check consistency of the protection subnet.

    Step 3 Click Searchto search for the protection subnet.

    The ODUk SPRing protection subnet that is searched out is displayed.

    Step 4 Optional: Click Nextto query the information of the isolated nodes that are searched out.

    Step 5 Click Finish.

    ----End

    1.4.3 Setting Parameters of an ODUk SPRing Protection Subnet

    This section describes how to set parameters of an ODUk SPRing protection subnet.

    Prerequisite

    l You must be an NM user with "network operator" authority or higher.

    l Applies to the OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I.

    l The ODUk SPRing protection subnet must be searched out.

    1 Managing WDM Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    1-10 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    29/228

    Context

    CAUTION

    Changing the protection mode may interrupt services. Exercise caution when you perform this

    operation.

    Procedure

    Step 1 Choose Service> WDM Protection Subnet> Manage WDM Protection Subnetfrom theMain Menu.

    Step 2 Right-click a protection link and choose Protection Subnet Attributesfrom the shortcut menu.

    The Protection Subnet Attributesuser interface is displayed. Click the Protection SubnetParameterstab.

    Step 3 Click Queryto query the parameters of the protection subnet from the NE side.

    Step 4 Set the WTR Time(s), SD Condition, and Management Nodeas required.

    Step 5 Optional: Click Calculate Span ID. The calculated span ID is displayed in the Span IDfield.

    Step 6 Click Apply. After the operation succeeds, click Closein the Operation Resultdialog box.

    Step 7 Click Closeto return to the Protection View.

    ----End

    1.4.4 Verifying the ODUk SPRing Protection Switching

    This topic describes how to perform the external switching for an ODUk SPRing protection on

    the U2000. During the deployment commissioning, the external switching is performed to test

    whether the ODUk SPRing protection functions normally and provides protection.

    Prerequisite

    l You must be an NM user with "network operator" authority or higher.

    l The ODUk SPRing protection subnet must be searched out.

    Context

    CAUTION

    The protection switching may affect the services or the functions that are already configured.

    Procedure

    Step 1 Choose Service> WDM Protection Subnet> Maintain WDM Protection Subnetfrom theMain Menu.

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-11

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    30/228

    Step 2 The Protection Subnet Attributeswindow is displayed. Select the protection subnet and clickthe Protection Subnet Maintenancetab.

    Step 3 Click Queryto query the statuses of protocol controller, east, and west of the protection subnetfrom the NE.

    NOTE

    If the protocol on a node is disabled, enable the protocol first.

    Step 4 Perform the manual, forced or exercise switching on all nodes in the protection subnet one byone in the corresponding direction.

    l To perform a manual switching, click Eastor Westand select Manual Switch to

    Protection-Ringfrom the drop-down menu.

    l To perform a forced switching, click Eastor Westand select Forced Switch to Protection-

    Ringfrom the drop-down menu.

    l To perform a exercise switching, click Eastor Westand select Exercise-Ringfrom the

    drop-down menu.

    NOTE

    When performing the switching, maintenance or lockout on a node, you cannot select East and West at the

    same time.

    Step 5 Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

    Step 6 Click Queryto query whether the services on all nodes are already switched to the protectionpaths in the ODUk SPRing protection subnet.

    Step 7 Select all nodes in the protection subnet one by one. Click Eastor West, and then select ClearAllfrom the drop-down menu to clear the switching on each node.

    Step 8 Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

    ----End

    1.5 Maintaining Protection Subnets

    On the U2000, you can maintain protection subnets.

    1.5.1 Finding Protection Subnets

    When there are a number of protection subnets in a network, you use the search function toquickly find the desired protection subnet.

    1.5.2 Querying Protection Subnet Resources

    After you search out a protection subnet, you can query the usage of subnet resources, so that

    you can plan and manage the subnet in a better way.

    1.5.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet

    You can run an external switching command to perform or clear the switching for a 1:N

    wavelength protection subnet. External switching commands include: forced switching, manual

    switching, and lockout. In the deployment and commissioning, you can perform switching to

    test whether the 1:N wavelength protection switching works properly. In the fault maintenance,

    you can perform this operation to locate faults.

    1.5.4 Performing ODUk Ring Protection Switching

    1 Managing WDM Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    1-12 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    31/228

    On the U2000, you can perform or clear external switching for an ODUk ring network. During

    the deployment and commissioning, you can perform external switching to test whether ODUk

    ring switching works properly. During the fault maintenance, you can perform this operation

    for fault location.

    1.5.1 Finding Protection Subnets

    When there are a number of protection subnets in a network, you use the search function to

    quickly find the desired protection subnet.

    Prerequisite

    l You must be an NM user with "network monitor" authority or higher.

    l The protection subnet must be created.

    Procedure

    Step 1 Right-click in the Main Topology and choose Search WDM Protection Subnet. The SearchProtection Subnetdialog box is displayed.

    NOTE

    You need to select the Protectioncheck box on the upper right corner of the Main Topology in advance.

    Step 2 Set the search condition and enter the keyword.

    Step 3 Click Searchand the protection subnet that is searched out is highlighted in the Network View.

    ----End

    1.5.2 Querying Protection Subnet Resources

    After you search out a protection subnet, you can query the usage of subnet resources, so that

    you can plan and manage the subnet in a better way.

    Prerequisite

    l You must be an NM user with "network operator" authority or higher.

    l The protection subnet must be searched out.

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-13

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    32/228

    Procedure

    Step 1 Choose Service> WDM Protection Subnet> Manage WDM Protection Subnetfrom theMain Menu.

    Step 2 Right-click a protection link, and choose Protection Subnet Attributesfrom the shortcut menu.The Protection Subnet Attributeswindow is displayed. Click the Resource Descriptiontab.

    Step 3 Click Queryto query the usage of the protection subnet resources.

    ----End

    1.5.3 Performing the Protection Switching for a 1:N WavelengthProtection Subnet

    You can run an external switching command to perform or clear the switching for a 1:N

    wavelength protection subnet. External switching commands include: forced switching, manual

    switching, and lockout. In the deployment and commissioning, you can perform switching to

    test whether the 1:N wavelength protection switching works properly. In the fault maintenance,

    you can perform this operation to locate faults.

    Prerequisite

    l You must be an NM user with "network operator" authority or higher.

    l The 1:N wavelength protection group must be searched out.

    l Applies to the OptiX BWS 1600G, OptiX BWS 1600S and OptiX BWS 320GV3.

    l Applies to the LWF, LWFS, LWC1, LBE, LBES, LBF and LBFS boards.

    l Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA).

    l Applies to the LWF, LWFS, LWC1, LBE and LBES boards.

    Context

    CAUTION

    Force switching and manual switching may interrupt services.

    Procedure

    Step 1 Choose Service> WDM Protection Subnet> Maintain WDM Protection Subnetfrom theMain Menu.

    Step 2 The Protection Subnet Attributeswindow is displayed. Select the protection subnet and clickthe Protection Subnet Maintenancetab.

    Step 3 Click Queryto query whether the nodes are switched and whether the protocols are enabled inthe 1:N wavelength protection subnet.

    Step 4 To enable or disable the protocol, click Start Protocoland select Startor Stopfrom the drop-down menu.

    1 Managing WDM Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    1-14 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    33/228

    NOTE

    If you want to enable or disable the protocol for the entire protection subnet, select Start the Protocol

    Networkwideor Stop the Protocol Networkwidefrom the drop-down menu.

    Step 5 Perform the manual or forced switching on all nodes in the protection subnet one by one in thecorresponding direction.

    l To perform a manual switching, click Eastor Westand select Manual Switchingfrom

    the drop-down menu.

    l To perform a forced switching, click Eastor Westand select Forced Switchingfrom the

    drop-down menu.

    NOTE

    When performing the switching, maintenance or lockout on a node, you cannot select east and west direction

    at the same time.

    Step 6 Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicating that the

    operation is successful. Click OK.

    Step 7 Optional: Perform the lockout operation. Select a desired node, click Lock Eastor LockWest, and select Lockout of Protection.

    Step 8 Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.

    Step 9 Optional: To clear protection switching, select a node, click Eastor West, and then selectClearfrom the drop-down menu.

    Step 10 Optional: Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicatingthat the operation is successful. Click OK.

    ----End

    1.5.4 Performing ODUk Ring Protection Switching

    On the U2000, you can perform or clear external switching for an ODUk ring network. During

    the deployment and commissioning, you can perform external switching to test whether ODUk

    ring switching works properly. During the fault maintenance, you can perform this operation

    for fault location.

    Prerequisite

    l You must be an NM user with "network operator" authority or higher.

    l The ODUk ring protection subnet must be searched out.

    Context

    CAUTION

    The protection switching may affect the services or the functions that are already configured.

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-15

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    34/228

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    35/228

    l One or more isolated nodes must exist.

    l Applies to the isolated node which node type is ODUk SPRing.

    Context

    CAUTION

    Deleting isolated nodes may interrupt services. Exercise caution when you perform this

    operation.

    Procedure

    Step 1 Choose Service> WDM Protection Subnet> Manage WDM Isolated Nodefrom the Main

    Menu.

    Step 2 Select the isolated node you want to delete, right-click and choose Delete.

    Step 3 Click Yesin the confirmation dialog box.

    ----End

    1.7 Deleting Protection Subnets

    When an existing protection subnet is not suitable, you can delete the protection subnet.

    Prerequisite

    You must be an NM user with "network maintainer" authority or higher.

    Context

    NOTE

    The deletion of a protection subnet will leave the equipment or services unprotected. Hence, exercise

    caution before this operation.

    Procedure

    Step 1 Choose Service> WDM Protection Subnet> Manage WDM Protection Subnetfrom theMain Menu.

    Step 2 Right-click the protection subnet to be deleted and choose Delete from the NMor Delete fromthe NEor Delete All from the NMfrom the shortcut menu.

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-17

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    36/228

    NOTE

    The methods to delete a protection subnet are as follows:

    l Delete from the NM: Deletes the relation between the protection subnet and logical systems at the NE

    side, to allow deleting of fibers, re-uploading, and so on. This command is not delivered to the NE and

    does not affect the services. The deleted protection subnet can be located by using the search feature.

    The U2000 locates it according to the NE layer protection information.

    l Delete from the NE: Deletes the protection subnet, logical systems at the NE side, and all traffic in

    the protection subnet. The deleted protection subnet cannot be restored without being created again.

    l Delete All from the NM: Deletes data other than fibers in the network layer. After the deletion, you

    can search out trails and protection subnets again by using the search feature. It is recommended that

    you do not select this option, because a large amount of data will be deleted.

    Step 3 In the Operation Promptdialog box, click Yes.

    NOTE

    If Delete from the NEis selected, you need to confirm the operation once more.

    Step 4 After completion, click Closein the dialog box displayed to complete the operation.

    ----End

    1 Managing WDM Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    1-18 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    37/228

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    38/228

    2.1 Managing WDM Trails

    This section describes how to manage end-to-end WDM services based on the trail management

    function of the U2000.

    Prerequisite

    A U2000 user can manage all the trails that the user creates. To manage a trail that is created by

    another U2000 user, a U2000 user must meet any of the following conditions:

    l The U2000 user belongs to the Administrators user group.

    l The right to manage the required trail is allocated to the U2000 user.

    2.1.1 Configuration Task Flow

    A configuration task flow describes the operation tasks that manage an WDM network by using

    the end-to-end function of the U2000. In addition, the relationships between the operation tasksare described.

    2.1.2 Basic Concepts

    This section describes the basic concepts of the WDM end-to-end management.

    2.1.3 Creating WDM Trails by Trail Search

    After a new network is set up or services are configuredon a per-NE basis, you need to perform

    an WDM trail search so that you can manage configured services by using the trail management

    function.

    2.1.4 Configuring WDM Trails

    After searching out the relevant trail information on the U2000, you can create OCh, ODUk or

    client trails by specifying the sources and sinks of the trails.2.1.5 Creating a Platinum Service

    In a platinum service group, the WDM trails do not pass through the same NE, fiber or fiber/

    cable pipe, sothat the risk that multiple trails are interrupted is lowered.

    2.1.6 Bindinga Platinum Service Group

    You can bind a trail or trails when you need to add an existing trail to a platinum service group

    or bind existing trails as a platinum service group.

    2.1.7 ServiceAuthorization Management

    If there are multiple service trails maintained by differentoperators, they may care about only

    the trails in their own responsibility but ignore the other services. Service authorization can filter

    the information not in concern of an operator, who then views and manages only the trails in theresponsibility. In this manner, the management and maintenance efficiency is improved.

    2.1.8 Viewing WDM Trails

    This section describes how to view the connection relation of all boards on a WDM NE.

    2.1.9 Maintaining WDM Trails

    The end-to-end trails are carriers of services of the customers. In the routine maintenance, the

    administrator and maintainer must find out the status of the trails to ensure that all the services

    are transmitted correctly.

    2.1.10 Modifying WDM Trails

    Due to service requirements, sometimes, you need to modify the configuration of a WDM trail.

    U2000 supports manually modifying the source and sink of an exisiting WDM trail and the trailnames in batches, instead of creating WDM trails. This greatly simplifies the operations.

    2 End-to-End WDM Management

    iManager U2000 Unified Network Management System

    Operation Guide for WDM End-to-End Management

    2-2 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)

    39/228

    2.1.11 Deleting a WDM Trail

    The operation deletes the WDM trails from the network layer or from the NE layer. You need

    to delete the trails if the network will be adjusted or rebuilt.

    2.1.12 Configuration Example: Configuring GE Services on the OptiX BWS 1600G by Using