Upload
uyfjyfjf
View
215
Download
0
Embed Size (px)
Citation preview
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
1/228
iManager U2000 Unified Network Management
System
V100R002C01
Operation Guide for WDM End-to-
End Management
Issue 02
Date 2010-09-24
HUAWEI TECHNOLOGIES CO., LTD.
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
2/228
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
3/228
Copyright Huawei Technologies Co., Ltd. 2010. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website: http://www.huawei.com
Email: [email protected]
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
i
http://www.huawei.com/8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
4/228
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
5/228
About This Document
Related Version
The following table lists the product version related to this document.
Product Name Version
iManager U2000 V100R002C01
Intended Audience
This document describes how to configure an WDM network by using the end-to-end function.
This document guides you to manage an WDM network by using the trail management function.
This document is intended for:
l Network Monitoring Engineer
l Data Configuration Engineer
l NM Administrator
l System Maintenance Engineer
Symbol ConventionsThe symbols that may be found in this document are defined as follows.
Symbol Description
DANGER
Indicates a hazard with a high level of risk, which if not
avoided, will result in death or serious injury.
WARNING
Indicates a hazard with a medium or low level of risk, which
if not avoided, could result in minor or moderate injury.
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management About This Document
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iii
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
6/228
Symbol Description
CAUTION
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
performance degradation, or unexpected results.
TIP Indicates a tip that may help you solve a problem or save
time.
NOTE Provides additional information to emphasize or supplement
important points of the main text.
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Boldface The keywords of a command line are in boldface.
Italic Command arguments are in italics.
[ ] Items (keywords or arguments) in brackets [ ] are optional.
{ x | y | ... } Optional items are grouped in braces and separated by
vertical bars. One item is selected.
[ x | y | ... ] Optional items are grouped in brackets and separated byvertical bars. One item is selected or no item is selected.
{ x | y | ... }* Optional items are grouped in braces and separated by
vertical bars. A minimum of one item or a maximum of all
items can be selected.
[ x | y | ... ]* Optional items are grouped in brackets and separated by
vertical bars. Several items or no item can be selected.
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Boldface Buttons, menus, parameters, tabs, window, and dialog titles
are in boldface. For example, click OK.
> Multi-level menus are in boldfaceand separated by the ">"
signs. For example, choose File> Create> Folder.
About This Document
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
iv Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
7/228
Update History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Updates in Issue 02 (2010-09-24) Based on Product Version V100R002C01
The second release of the iManager U2000 V100R002C01.
Some bugs in the manual of the previous version are fixed.
Updates in Issue 01 (2010-08-16) Based on Product Version V100R002C01
The first release of the iManager U2000 V100R002C01.
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management About This Document
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
v
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
8/228
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
9/228
Contents
About This Document...................................................................................................................iii
1 Managing WDMProtection Subnets.....................................................................................1-1
1.1 Basic Concepts................................................................................................................................................1-2
1.1.1 Protection Subnet...................................................................................................................................1-21.1.2 Isolated Node..........................................................................................................................................1-2
1.2 Searchingfor Protection Subnets....................................................................................................................1-2
1.3 Configuring 1:N Wavelength Protection.........................................................................................................1-3
1.3.1 Creating1:N Optical Channel Protection...............................................................................................1-4
1.3.2 Searching for 1:N Wavelength Protection Subnet.................................................................................1-5
1.3.3 Setting 1:N Wavelength Protection Subnet Parameters.........................................................................1-6
1.3.4 Verifying the 1:N Wavelength Protection Switching............................................................................1-7
1.4 Configuring Protection for an ODUk SPRing.................................................................................................1-8
1.4.1 Creatingan ODUk SPRing Protection Group........................................................................................1-8
1.4.2 Searching for an ODUk SPRing Protection Subnet.............................................................................1-10
1.4.3 Setting Parameters of an ODUk SPRing Protection Subnet................................................................1-10
1.4.4 Verifying the ODUk SPRing Protection Switching.............................................................................1-11
1.5 Maintaining Protection Subnets....................................................................................................................1-12
1.5.1 Finding Protection Subnets..................................................................................................................1-13
1.5.2 Querying Protection Subnet Resources................................................................................................1-13
1.5.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet..................................1-14
1.5.4 Performing ODUk Ring Protection Switching.....................................................................................1-15
1.6 Deleting Isolated Nodes................................................................................................................................1-16
1.7 Deleting Protection Subnets..........................................................................................................................1-17
2 End-to-End WDM Management..............................................................................................2-1
2.1 Managing WDM Trails...................................................................................................................................2-2
2.1.1 Configuration Task Flow.......................................................................................................................2-3
2.1.2 Basic Concepts.......................................................................................................................................2-5
2.1.2.1 WDM Trail..........................................................................................................................................2-5
2.1.2.2 Conflict Trail.....................................................................................................................................2-10
2.1.2.3 Trail Creation Method.......................................................................................................................2-11
2.1.2.4 Process for Creating a Trail...............................................................................................................2-13
2.1.2.5 Platinum Service Group....................................................................................................................2-15
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management Contents
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
vii
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
10/228
2.1.3 Creating WDM Trails by Trail Search.................................................................................................2-17
2.1.3.1 Searching for WDM Trails................................................................................................................2-18
2.1.3.2 Viewing Discrete Services................................................................................................................2-19
2.1.3.3 Activating and Deactivating Discrete Services.................................................................................2-20
2.1.3.4 Acknowledging or Unacknowledging Discrete Services..................................................................2-21
2.1.3.5 Deleting Discrete Services................................................................................................................2-22
2.1.4 Configuring WDM Trails.....................................................................................................................2-22
2.1.4.1 Creating an OCh Trail.......................................................................................................................2-23
2.1.4.2 Creating an ODUk Trail....................................................................................................................2-27
2.1.4.3 Creating Client Trails........................................................................................................................2-31
2.1.4.4 Creating a Mono Nodal Trail............................................................................................................2-34
2.1.4.5 Creating a Multi-Layer OTN Trail....................................................................................................2-36
2.1.5 Creatinga Platinum Service.................................................................................................................2-37
2.1.6 Binding a Platinum Service Group.......................................................................................................2-38
2.1.7 Service Authorization Management.....................................................................................................2-39
2.1.7.1 Specifying a Customer for a Service.................................................................................................2-40
2.1.7.2 Authorizing a Customer to a U2000 User.........................................................................................2-41
2.1.7.3 Authorizing a Trail to a U2000 User.................................................................................................2-42
2.1.7.4 Modifying Trail Authorization Information......................................................................................2-42
2.1.8 ViewingWDM Trails...........................................................................................................................2-43
2.1.8.1 Viewing Route Information of WDM Trail......................................................................................2-44
2.1.8.2 Viewing the Signal Flow Diagram for a WDM Trail.......................................................................2-44
2.1.8.3 Viewing the WDM Single Station Signal Flow Diagram.................................................................2-462.1.8.4 Viewing the WDM NE Panel............................................................................................................2-47
2.1.8.5 Viewing Relevant Client Trails.........................................................................................................2-48
2.1.8.6 Browsing Related Server Trails........................................................................................................2-49
2.1.8.7 Viewing the Optical Power for the Trails.........................................................................................2-50
2.1.8.8 Browsing Associated Working and Protection Trails.......................................................................2-51
2.1.8.9 Viewing the Fiber Information of a Trail..........................................................................................2-52
2.1.9 Maintaining WDM Trails.....................................................................................................................2-52
2.1.9.1 Activating/Deactivating WDM Trails...............................................................................................2-53
2.1.9.2 Querying Cross-Connection Information..........................................................................................2-54
2.1.9.3 Locking or Unlocking a WDM Trail.................................................................................................2-55
2.1.9.4 Querying the 1+1 Protection for a WDM Trail.................................................................................2-55
2.1.9.5 Performing 1+1 Protection Switching for a WDM Trail..................................................................2-56
2.1.9.6 Querying the WXCP/SNCP Protection of a WDM Trail..................................................................2-57
2.1.9.7 Performing the WXCP/SNCP Protection Switching for a WDM Trail............................................2-58
2.1.9.8 Querying the DPPS Protection of a WDM Trail...............................................................................2-59
2.1.9.9 Configuring OTU Overhead on the OCh Trail.................................................................................2-59
2.1.9.10 Modifying the Optical Power Adjustment Mode of a WDM Trail.................................................2-61
2.1.10 Modifying WDM Trails.....................................................................................................................2-62
2.1.10.1 Changing the Source, Sink, and Route of a WDM Trail.................................................................2-62
Contents
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
viii Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
11/228
2.1.10.2 Modifying Trail Names in Batches.................................................................................................2-64
2.1.10.3 Changing the Route of a Platinum Service.....................................................................................2-64
2.1.10.4 Removing a Trail from a Platinum Service Group.........................................................................2-65
2.1.11 Deleting a WDM Trail.......................................................................................................................2-66
2.1.12 Configuration Example: Configuring GE Services on the OptiX BWS 1600G by Using a traditional
method...........................................................................................................................................................2-67
2.1.13 Sample Application: Configuring an OCh Trail................................................................................2-71
2.1.14 Application Example: Configuring an OCh Trail with OLP Protection by Using the End-To-End Trail
Management Function (OptiX OSN 6800)...................................................................................................2-76
2.1.14.1 Configuration Networking Diagram...............................................................................................2-76
2.1.14.2 Service Signal Flow and Parameter Planning.................................................................................2-78
2.1.14.3 Configuration Process.....................................................................................................................2-79
2.1.15 Application Example: Configuring an ODUk Trail by Using the Cross-Layer Creation Function (OptiX
OSN 6800).....................................................................................................................................................2-80
2.1.15.1 Configuration Networking Diagram...............................................................................................2-80
2.1.15.2 Service Signal Flow and Parameter Planning.................................................................................2-82
2.1.15.3 Configuration Process.....................................................................................................................2-86
2.1.16 Configuration Example: Configuring GE Services on the OptiX BWS 1600G by Using a traditional
method...........................................................................................................................................................2-87
2.1.17 Configuration Example: Configuring GE Services on the OptiX OSN 6800 by Using a traditional method
.......................................................................................................................................................................2-91
2.1.17.1 Networking Configuration..............................................................................................................2-91
2.1.17.2 Service Signal Flow and Parameter Planning.................................................................................2-93
2.1.17.3 Configuration Process.....................................................................................................................2-96
2.1.18 Configuration Example: Configuring GE Services on the OptiX OSN 6800 with the Cross-Layer Trail
Creation Method............................................................................................................................................2-99
2.1.18.1 Networking Configuration............................................................................................................2-100
2.1.18.2 Service Signal Flow and Parameter Planning...............................................................................2-101
2.1.18.3 Configuration Process...................................................................................................................2-104
2.1.19 Application Example: Configuring an ODU1 Trail by Using the Cross-Layer Creation Function
(52TOM, ODU0 Tributary-Line Mode(Any->ODU0->ODU1->OTU1))..................................................2-106
2.1.19.1 Configuration Networking Diagram.............................................................................................2-107
2.1.19.2 Service Signal Flow and Parameter Planning...............................................................................2-108
2.1.19.3 Configuration Process...................................................................................................................2-1102.1.20 Application Example: Configuring an Any Service by Using the Cross-Layer Creation Function
(52TOM, ODU0 Tributary Mode(Any->ODU0[->ODU1]))......................................................................2-113
2.1.20.1 Configuration Networking Diagram.............................................................................................2-113
2.1.20.2 Service Signal Flow and Parameter Planning...............................................................................2-115
2.1.20.3 Configuration Process...................................................................................................................2-117
2.2 Configuring Optical Layer Multipath Protection........................................................................................2-119
2.2.1 Configuring Optical Layer Multipath Protection Automatically.......................................................2-120
2.2.1.1 Configuration Principle...................................................................................................................2-120
2.2.1.2 Enabling the WSS Function on an NE............................................................................................2-121
2.2.1.3 Creating a Working Cross-Connection for an NE..........................................................................2-122
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management Contents
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ix
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
12/228
2.2.1.4 Searching for WDM Trails..............................................................................................................2-123
2.2.1.5 Creating Optical Layer Multipath Protection Automatically..........................................................2-125
2.2.1.6 Modifying the Parameters of Optical Layer Multipath Protection..................................................2-126
2.2.2 Configuring Optical Layer Multipath Protection Manually...............................................................2-128
2.2.2.1 Configuration Principle...................................................................................................................2-129
2.2.2.2 Enabling the WSS Function on an NE............................................................................................2-129
2.2.2.3 Creating a Working Cross-Connection for an NE..........................................................................2-130
2.2.2.4 Creating the Protection Cross-Connection on NEs.........................................................................2-131
2.2.2.5 Searching for WDM Trails..............................................................................................................2-133
2.2.2.6 Creating Optical Layer Multipath Protection Manually..................................................................2-134
2.2.2.7 Modifying the Parameters of Optical Layer Multipath Protection..................................................2-136
2.3 Configuring EAPE......................................................................................................................................2-137
2.3.1 EAPE..................................................................................................................................................2-138
2.3.2 Creatingan OCh Trail........................................................................................................................2-141
2.3.3 CreatingEAPE Objects......................................................................................................................2-145
2.3.4 Querying EAPE Objects.....................................................................................................................2-146
2.3.5 Starting EAPE Adjustment.................................................................................................................2-147
2.3.6 DeletingEAPE Objects......................................................................................................................2-148
2.4 Managing Alarms on WDM Trails.............................................................................................................2-148
2.4.1 ViewingCurrent Alarms of a WDM Trail.........................................................................................2-149
2.4.2 ViewingHistory Alarms of a WDM Trail.........................................................................................2-150
2.4.3 Managing Networkwide WDM Alarm Trails in Real Time..............................................................2-151
2.4.4 Analyzing WDM alarm correlation....................................................................................................2-1512.5 Managingthe Performance of WDM Trails................................................................................................2-152
2.5.1 ViewingCurrent Performance Data of WDM Trails.........................................................................2-153
2.5.2 ViewingHistory Performance Data of WDM Trails.........................................................................2-153
2.5.3 ViewingUAT of WDM Trails...........................................................................................................2-154
2.5.4 ViewingPerformance Threshold-Crossing Records of WDM Trails................................................2-155
2.5.5 Viewing Ethernet Performance of WDM Trails................................................................................2-156
2.5.6 Setting Performance Monitoring Parameters of an WDM Trail........................................................2-156
2.5.7 Setting WDM Trail Performance Threshold......................................................................................2-157
2.6 Configuring Board Parameters....................................................................................................................2-157
2.6.1 Configuring the Working Mode of the Board....................................................................................2-158
2.6.1.1 Aboutthe Working Modes..............................................................................................................2-158
2.6.1.2 Configuration Rules of the 52TOM board......................................................................................2-160
2.6.1.3 Configuring the Working Mode of the 52TOM Board...................................................................2-161
2.6.1.4 Configuring the Working Mode of the LQM2 board......................................................................2-161
2.6.1.5 Configuring the Working Modes of Ordinary OTUs......................................................................2-164
2.6.2 Configuring the Service Mode...........................................................................................................2-164
2.6.3 Service Type.......................................................................................................................................2-165
2.6.4 Configuring the Service Type............................................................................................................2-171
2.6.5 Modifying Port...................................................................................................................................2-172
Contents
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
x Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
13/228
2.6.6 Creating Cross-Connections...............................................................................................................2-173
2.6.7 Service Mode (WDM Interface).........................................................................................................2-175
2.6.8 Service Type (WDM Interface)..........................................................................................................2-177
2.6.9 GUI Parameter Description: WDM Cross-Connection Configuration..............................................2-179
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management Contents
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xi
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
14/228
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
15/228
Figures
Figure 2-1End-to-end WDM network management flow...................................................................................2-4
Figure 2-2Trail....................................................................................................................................................2-6
Figure 2-3OSC Trail............................................................................................................................................2-6
Figure 2-4ODUk (k = 1, 2, ...) trail.....................................................................................................................2-7
Figure 2-5ODUk (k = 0, 1, 2, ...) trail.................................................................................................................2-8
Figure 2-640G inverse multiplexing trail ...........................................................................................................2-9
Figure 2-710G inverse multiplexing trail .........................................................................................................2-10
Figure 2-8A conflict trail generated because a fiber is added...........................................................................2-10
Figure 2-9A conflict trail generated because a single station cross-connection is lost.....................................2-11
Figure 2-10Aconflict trail generated because a protection service is deleted on a per-NE basis....................2-11
Figure 2-11Creating trails by trail search..........................................................................................................2-14
Figure 2-12Creating trails in the automatic mode.............................................................................................2-15
Figure 2-13Platinum service group...................................................................................................................2-16
Figure 2-14Downgraded platinum service group..............................................................................................2-17Figure 2-15Service authorization management.................................................................................................2-40
Figure 2-16Network Design..............................................................................................................................2-68
Figure 2-17Station A.........................................................................................................................................2-68
Figure 2-18Station B.........................................................................................................................................2-69
Figure 2-19Station C.........................................................................................................................................2-69
Figure 2-20Station D.........................................................................................................................................2-69
Figure 2-21Network design...............................................................................................................................2-72
Figure 2-22NE panel on station A.....................................................................................................................2-73
Figure 2-23Signal flow of the trail from station B to station C........................................................................2-73
Figure 2-24Signal flow of the trail from station B to station D........................................................................2-74
Figure 2-25Signal flow of the trail from station D to station B........................................................................2-74
Figure 2-26Configuration networking diagram of an OCh trail.......................................................................2-77
Figure 2-27Card configuration..........................................................................................................................2-77
Figure 2-28Signal flow of an OCh trail.............................................................................................................2-78
Figure 2-29Intra-station signal flow of NE1 and NE2......................................................................................2-78
Figure 2-30Configuration networking diagram of an ODUk trail....................................................................2-81
Figure 2-31Card configuration..........................................................................................................................2-82
Figure 2-32Signal flow of an ODUk trail.........................................................................................................2-83
Figure 2-33Intra-station signal flow of NE1 and NE4......................................................................................2-84
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management Figures
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xiii
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
16/228
Figure 2-34Intra-station signal flow of NE2 and NE3......................................................................................2-84
Figure 2-35Network Design..............................................................................................................................2-88
Figure 2-36Station A.........................................................................................................................................2-88
Figure 2-37Station B.........................................................................................................................................2-89
Figure 2-38Station C.........................................................................................................................................2-89
Figure 2-39Station D.........................................................................................................................................2-89
Figure 2-40Networking configuration for a GE service....................................................................................2-92
Figure 2-41Card configuration..........................................................................................................................2-92
Figure 2-42GE service signal flow ...................................................................................................................2-93
Figure 2-43Intra-station signal flow of NE1 and NE4......................................................................................2-94
Figure 2-44Networking configuration for a GE service..................................................................................2-100
Figure 2-45Card configuration........................................................................................................................2-101
Figure 2-46GE service signal flow .................................................................................................................2-102
Figure 2-47Intra-station signal flow of NE1 and NE4....................................................................................2-102
Figure 2-48Configuration networking diagram of an ODU1 trail..................................................................2-107
Figure 2-49Card configuration........................................................................................................................2-108
Figure 2-50ODU1 service signal flow............................................................................................................2-108
Figure 2-51Intra-station signal flow of NE1 and NE2....................................................................................2-109
Figure 2-52Configuration networking diagram of an Any service.................................................................2-114
Figure 2-53Card configuration........................................................................................................................2-115
Figure 2-54Any service signal flow................................................................................................................2-116
Figure 2-55Intra-station signal flow of NE1 and NE2....................................................................................2-116
Figure 2-56Scenario of the single VOA unit that takes the common OTU as the source...............................2-139Figure 2-57Scenario of the dual VOA units that take the dual-fed and selective-receiving OTUs as the sources
...........................................................................................................................................................................2-140
Figure 2-58Scenario of the dual VOA units with the OLP protection units...................................................2-140
Figures
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
xiv Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
17/228
Tables
Table 2-1ODUk rate level...................................................................................................................................2-6
Table 2-2Comparison of methods for creating trails.........................................................................................2-12
Table 2-3Network data table.............................................................................................................................2-72
Table 2-4Parameter planning for an OCh trail..................................................................................................2-79
Table 2-5Parameter planning for an OCh trail..................................................................................................2-80
Table 2-6Parameter planning for an OCh trail..................................................................................................2-85
Table 2-7Parameter planning for an ODU1 trail...............................................................................................2-86
Table 2-8Parameter planning for an OCh trail..................................................................................................2-86
Table 2-9Parameter planning for an ODU1 trail...............................................................................................2-87
Table 2-10Parameter planning for an OCh trail................................................................................................2-95
Table 2-11Parameter planning for an ODU2 trail.............................................................................................2-95
Table 2-12Parameter planning for an ODU1 trail.............................................................................................2-95
Table 2-13Parameter planning for a GE service................................................................................................2-96
Table 2-14Parameter planning for an OCh trail................................................................................................2-98Table 2-15Parameter planning for an ODU2 trail.............................................................................................2-98
Table 2-16Parameter planning for an ODU1 trail.............................................................................................2-99
Table 2-17Parameter planning for a GE service................................................................................................2-99
Table 2-18Parameter planning for an OCh trail..............................................................................................2-103
Table 2-19Parameter planning for a GE service..............................................................................................2-104
Table 2-20Parameter planning for an OCh trail..............................................................................................2-105
Table 2-21Parameter planning for a GE service..............................................................................................2-106
Table 2-22Parameter planning for an OCh trail..............................................................................................2-110
Table 2-23Parameter planning for OTU1 cross-connections..........................................................................2-110
Table 2-24Parameter planning for an ODU1 trail...........................................................................................2-110
Table 2-25Parameter planning for an OCh trail..............................................................................................2-112
Table 2-26Parameter planning for OTU1 cross-connections..........................................................................2-112
Table 2-27Parameter planning for an ODU1 trail...........................................................................................2-112
Table 2-28Parameter planning for an OCh trail..............................................................................................2-117
Table 2-29Parameter planning for the Any service.........................................................................................2-117
Table 2-30Parameter planning for an OCh trail..............................................................................................2-119
Table 2-31Parameter planning for the Any service.........................................................................................2-119
Table 2-32Mapping between the working modes and signal flows of the 52TOM board..............................2-159
Table 2-33Service access function..................................................................................................................2-165
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management Tables
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xv
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
18/228
Table 2-34Service access function..................................................................................................................2-166
Table 2-35Types of Service Access................................................................................................................2-167
Table 2-36Service types supported by the system...........................................................................................2-169
Table 2-37Parameters of the Client-Side Port.................................................................................................2-173
Table 2-38WDM Cross-Connection Configuration........................................................................................2-181
Table 2-39Create Cross-connect Service........................................................................................................2-183
Table 2-40Create SNCP Service.....................................................................................................................2-185
Table 2-41Create WXCP Service....................................................................................................................2-190
Tables
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
xvi Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
19/228
1Managing WDM Protection SubnetsAbout This Chapter
A protection subnet has a structure of providing complete self-protection functions. The purpose
of managingprotection subnets is to configure and display network protection, for example,
browsing, deleting, modifying and searching for protection subnets, managing isolated nodes.
1.1 Basic Concepts
According tothe layered structure of transport network, protection subnet, belonging to the
network layer, refers to a network structure that has a comprehensive self-protection function.
The protection subnet is a network unit of composing the optical transport network. To have a
good understanding of the protection subnet, you need to learn some basic concepts of the
network layer.
1.2 Searching for Protection Subnets
By searchingfor a protection subnet, the configured protection attributes at the NE layer on the
U2000 are synchronized to the network layer on the U2000 to create protection subnets
automatically.
1.3 Configuring 1:N Wavelength Protection
On the U2000, you can create 1:N wavelength protection groups, search for 1:N wavelength
protection subnets, and perform an external switch from 1:N wavelength protection subnets.
1.4 Configuring Protection for an ODUk SPRing
By using the U2000, you can query the protection subnet resources for an ODUk SPRing, create
an ODUk protection group, search for the ODUk SPRing, perform data consistency check onthe ODUk SPRing, set the protection subnet parameters for the ODUk SPRing, and delete an
ODUk SPRing.
1.5 Maintaining Protection Subnets
On the U2000, you can maintain protection subnets.
1.6 Deleting Isolated Nodes
To release protection resources that are used by isolated nodes, you need to delete isolated nodes.
1.7 Deleting Protection Subnets
When an existing protection subnet is not suitable, you can delete the protection subnet.
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-1
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
20/228
1.1 Basic Concepts
According to the layered structure of transport network, protection subnet, belonging to thenetwork layer, refers to a network structure that has a comprehensive self-protection function.
The protection subnet is a network unit of composing the optical transport network. To have a
good understanding of the protection subnet, you need to learn some basic concepts of the
network layer.
1.1.1 Protection Subnet
A protection subnet refers to a network architecture that has a comprehensive self-protection
function. It is a network that composes the optical transmission network.
1.1.2 Isolated Node
An isolated node is not equal to an isolated NE. An isolated node refers to a special logical
system that is independent from any protection subnet. An isolated node does not belong to anyprotection subnet.
1.1.1 Protection Subnet
A protection subnet refers to a network architecture that has a comprehensive self-protection
function. It is a network that composes the optical transmission network.
In the U2000, a protection subnet is a network level concept. NEs and fiber connections are the
basic elements required to construct a protection subnet. You should create NEs, perform basic
configurations for them, and then properly create fiber connections between the NEs. You should
have access to sufficient resources to create a protection subnet.
1.1.2 Isolated Node
An isolated node is not equal to an isolated NE. An isolated node refers to a special logical
system that is independent from any protection subnet. An isolated node does not belong to any
protection subnet.
An isolated node is a node that is configured at NEs but cannot or does not compose a protection
subnet with other nodes. Currently, the WDM equipment supports the 1:N optical path protection
subnet and the ODUk SPRing protection subnet. The network node that is configured with the
1:N optical path protection group or the ODUk SPRing protection group but does not belong to
any protection subnet is an isolated node.
An isolated node should not exist in a transmission network that runs normally. The reason for
the existence of any isolated nodes can be as follows:
l The configuration is incorrect at the NE side.
l The fiber that should be connected to the node is not created on the U2000.
1.2 Searching for Protection Subnets
By searching for a protection subnet, the configured protection attributes at the NE layer on the
U2000 are synchronized to the network layer on the U2000 to create protection subnets
automatically.
1 Managing WDM Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
1-2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
21/228
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l The NE data must be configured, and fibers must be properly created.
Procedure
Step 1 Choose Service> WDM Protection Subnet> Search for WDM Protection Subnetfrom theMain Menu.
Step 2 In the Consistency Verification of Existing Subnetscreen, select the protection subnet andclick Next.
NOTE
If the verification is unsuccessful and the subnet becomes abnormal, the search menu is unavailable. In
this case, you need to delete the abnormal subnet from the network layer and then re-search for the subnet.
Step 3 Click Searchto start the search. The Subnet Name, Consistent Statusand Subnet Typeparameters ofthe searched protection subnet are automatically displayed.
Step 4 Click Nexttocheck consistency of the protection subnet.
NOTE
If there are isolated nodes searched out, you can delete the nodes that do not form any protection subnet.
Refer to 1.6 Deleting Isolated Nodes.
Step 5 Click Finish. The searched protection subnet is displayed in the Main Topology.
----End
1.3 Configuring 1:N Wavelength Protection
On the U2000, you can create 1:N wavelength protection groups, search for 1:N wavelength
protection subnets, and perform an external switch from 1:N wavelength protection subnets.
1.3.1 Creating 1:N Optical Channel Protection
1:N (N8) optical channel protection is created based on 1:N (N8) optical channel protection
group. To create 1:N (N8) optical channel protection, you need to create a 1:N (N8) optical
channel protection group for each node.
1.3.2 Searching for 1:N Wavelength Protection Subnet
After creating 1:N wavelength protection groups and searching for WDM trails, you need to
search for the 1:N wavelength protection subnet. In this way, you can manage the 1:N wavelength
protection as a protection subnet.
1.3.3 Setting 1:N Wavelength Protection Subnet Parameters
You can set parameters for a 1:N wavelength protection subnet.
1.3.4 Verifying the 1:N Wavelength Protection Switching
After you search out the 1:N wavelength protection subnet and set the related parameters, you
can verify whether the subnet works properly by performing the switching and querying the
switching status.
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-3
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
22/228
1.3.1 Creating 1:N Optical Channel Protection
1:N (N8) optical channel protection is created based on 1:N (N8) optical channel protection
group. To create 1:N (N8) optical channel protection, you need to create a 1:N (N8) optical
channel protection group for each node.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Fibers must be correctly created, and all internal and external fibers must be correctly
connected.
l An OCP card and two or more OTU cards of same kind must be created.
l Applies to the OptiX BWS 1600G, OptiX BWS 320GV3, OptiX BWS 1600G OLA and
OptiX BWS 1600S.
l Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA).
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration> 1:N Optical ChannelProtectionfrom the Function Tree.
Step 2 Click Queryto query the information about the protection from the NE.
Step 3 Click New. The Createdialog box is displayed.
Step 4 Double-click the Number of Working Channelsfield, and choose the proper number from thedrop-down list. For other parameters, refer to 1:N Optical Channel Protection.
Step 5 By referring to Step 4, set the corresponding OTU Optical Interface Numberfor ProtectionChanneland Working Channel, and set Protection Prioritiesfor Working Channel.
1 Managing WDM Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
1-4 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
23/228
NOTE
l OTUs that serve as the working and protection channels must be configured on the same NE.
l Every card in this protection group and the OCP card must be set in the same shelf.
l If you need to check the consistency of the parameters, you need to set Parameter Consistency Check
Flagto a proper value.
Step 6 Click OK. The created 1:N (N8) optical channel protection group is displayed.
Step 7 Repeat Step 1 through Step 6 to configure a 1:N (N8) wavelength protection group of theopposite NE.
----End
1.3.2 Searching for 1:N Wavelength Protection Subnet
After creating 1:N wavelength protection groups and searching for WDM trails, you need to
search for the 1:N wavelength protection subnet. In this way, you can manage the 1:N wavelength
protection as a protection subnet.
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l Applies to the OptiX BWS 1600G, OptiX BWS 1600G OLA, OptiX BWS 1600S and the
OptiX BWS 320GV3.
l Applies to the LWF, LWFS, LWS, LWC, LWC1, LBE, LBES, LBF, LBFS boards.
l Fibers must be created properly.
l The 1:N wavelength protection group must be created.
l The WDM trail must be created and the bidirectional client trail must be searched out.
Background Information
For two NEs that are preconfigured as a 1:N WDM protection subnet, the protection group IDs
of the WDM protection groups on the NEs must be consistent.
Procedure
Step 1 Choose Service> WDM Protection Subnet> Search for WDM Protection Subnetfrom theMain Menu.
Step 2Click Nextto perform the consistency check of the subnet.
Step 3 Click Searchto search for the protection subnet.
The existing 1:N wavelength protection subnet is displayed in the Protection View.
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-5
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
24/228
Step 4 Optional: Click Nextto query the information of the isolated nodes that are searched out.
Step 5 Click Finish.
----End
1.3.3 Setting 1:N Wavelength Protection Subnet Parameters
You can set parameters for a 1:N wavelength protection subnet.
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l The 1:N wavelength protection subnet must be searched out.
l Applies to the OptiX BWS 1600G, OptiX BWS 1600S and the OptiX BWS 320GV3.
Context
CAUTION
Changing the protection mode may interrupt services. Exercise caution when you perform thisoperation.
Procedure
Step 1 Choose Service> WDM Protection Subnet> Manage WDM Protection Subnetfrom theMain Menu.
Step 2 Select a protection link, right-click, and choose Protection Subnet Attributesfrom the shortcutmenu. The Protection Subnet Attributesuser interface is displayed. Click the Protection
Subnet Parameterstab.
Step 3 Set parameters for the protection subnet.
1 Managing WDM Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
1-6 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
25/228
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
26/228
Step 6 Click Queryto query whether the services on all nodes are already switched to the protectionpaths in the 1:N wavelength protection subnet.
Step 7 Select all nodes in the protection subnet one by one. Click Eastor West, and then selectClearfrom the drop-down menu to clear the switching on each node.
Step 8 Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.
----End
1.4 Configuring Protection for an ODUk SPRing
By using the U2000, you can query the protection subnet resources for an ODUk SPRing, create
an ODUk protection group, search for the ODUk SPRing, perform data consistency check on
the ODUk SPRing, set the protection subnet parameters for the ODUk SPRing, and delete an
ODUk SPRing.
1.4.1 Creating an ODUk SPRing Protection Group
The ODUk SPRing protection is used in a ring network that is configured with distributed
services. It occupies two ODUk channels, realizing the protection for multiple services among
all stations.
1.4.2 Searching for an ODUk SPRing Protection Subnet
The U2000 can search for and form ODUk SPRing protection subnets according to the created
fiber cables and ODUk SPRing protection groups. After you create an ODUk SPRing protection
group or search for WDM trails, you need to search for ODUk SPRing protection subnets. In
this way, ODUk SPRing networks can be managed as protection subnets.
1.4.3 Setting Parameters of an ODUk SPRing Protection Subnet
This section describes how to set parameters of an ODUk SPRing protection subnet.
1.4.4 Verifying the ODUk SPRing Protection Switching
This topic describes how to perform the external switching for an ODUk SPRing protection on
the U2000. During the deployment commissioning, the external switching is performed to test
whether the ODUk SPRing protection functions normally and provides protection.
1.4.1 Creating an ODUk SPRing Protection Group
The ODUk SPRing protection is used in a ring network that is configured with distributed
services. It occupies two ODUk channels, realizing the protection for multiple services among
all stations.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Currently, The ODU1/ODU2-level protection can be achieved.
When configuring the ODUk SPRing protection of ODU1 or ODU2 levels, the Service Mode
of the port on the line board should be set to ODU1or ODU2.
1 Managing WDM Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
1-8 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
27/228
Background Information
l When the protection channel forms a ring, you can search out an ODUk protection subnet
at the network layer.
l The ODUk SPRing protection of the ODU1 and ODU2 levels is supported currently.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration> ODUk SPRingfrom the FunctionTree.
Step 2 Click New. The New ODUk Ring Network Protectiondialog box is displayed.
Step 3 Set Protection Group IDand Levelas required. In the Select Mapping Directionarea, set theWest Working Unit, West Protection Unit, East Working Unit, and East Protection Unit.
To set a unit, select one channel from the Available Channeland click .
NOTE
l The services in the east and west directions must be configured on different NS2/ND2 boards.
l The working and protection channels in the east and west directions of an ODUk protection group can be
on different NS2/ND2 boards.
l You can create a protection group when the Selected Channelcontains at least East Protection Unitand
West Protection Unit.
Step 4 Click OK. After successful operation, click Closein the Operation Resultdialog box.
Step 5 Select one protection group. In Channel Mapping Relation, select West Working UnitandEast Working Unit. Right-click them, and select Bound Span ID.
NOTE
l Before binding the span IDs, ensure that a bidirectional cross-connection is created successfully
between the working unit in the protection group in the corresponding direction and the add/drop board.
l The span IDs need be bound only on the stations that add or drop services. In the case of those stations
that do not add or drop services, you need not perform such an operation.
Step 6 In the Bound Span IDwindow, set Span ID, and then click OK. Span IDwill be updated.
Step 7 Select one protection group. Right-click the Management Node, and select YES. Then clickApply. Management Nodewill be updated.
Step 8 Select one protection group, and you can set parameters such as WTR Time(s)and EnableSD. In Channel Mapping Relation, double-click the Hold-Off Time(s)and set the hold-off
time.NOTE
The hold-off time of the protection unit should be longer than that of the working unit.
Step 9 In the case of the NEs in other stations on the ring, start the NE Explorer. Then, refer to Steps1 through 8 to create the ODUk SPRing protection on the local NE, to complete the creation of
the protection ring.
NOTE
In a ODUk SPRing protection group, there must be only one management node.
Step 10 After the protection ring is created, select one protection group, and click Start Protocoltomake the protection group take effect.
----End
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-9
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
28/228
Postrequisite
Select one protection group and click Delete. Click OKon the Confirmdialog box displayed.
The protection group is deleted.
1.4.2 Searching for an ODUk SPRing Protection Subnet
The U2000 can search for and form ODUk SPRing protection subnets according to the created
fiber cables and ODUk SPRing protection groups. After you create an ODUk SPRing protection
group or search for WDM trails, you need to search for ODUk SPRing protection subnets. In
this way, ODUk SPRing networks can be managed as protection subnets.
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l Applies to the OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I.
l Fiber connections must be created. All internal and external fibers are correctly connected.
l The bidirectional server trail must be searched out.
l An ODUk protection group must be created.
Context
NOTE
The search of an ODUk SPRing protection subnet supports only the scenario in which an ODU1 or ODU2 trail
exists between the ports of adjacent protection groups.
Procedure
Step 1 Choose Service> WDM Protection Subnet> Search for WDM Protection Subnetfrom theMain Menu.
Step 2 Click Nextto check consistency of the protection subnet.
Step 3 Click Searchto search for the protection subnet.
The ODUk SPRing protection subnet that is searched out is displayed.
Step 4 Optional: Click Nextto query the information of the isolated nodes that are searched out.
Step 5 Click Finish.
----End
1.4.3 Setting Parameters of an ODUk SPRing Protection Subnet
This section describes how to set parameters of an ODUk SPRing protection subnet.
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l Applies to the OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I.
l The ODUk SPRing protection subnet must be searched out.
1 Managing WDM Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
1-10 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
29/228
Context
CAUTION
Changing the protection mode may interrupt services. Exercise caution when you perform this
operation.
Procedure
Step 1 Choose Service> WDM Protection Subnet> Manage WDM Protection Subnetfrom theMain Menu.
Step 2 Right-click a protection link and choose Protection Subnet Attributesfrom the shortcut menu.
The Protection Subnet Attributesuser interface is displayed. Click the Protection SubnetParameterstab.
Step 3 Click Queryto query the parameters of the protection subnet from the NE side.
Step 4 Set the WTR Time(s), SD Condition, and Management Nodeas required.
Step 5 Optional: Click Calculate Span ID. The calculated span ID is displayed in the Span IDfield.
Step 6 Click Apply. After the operation succeeds, click Closein the Operation Resultdialog box.
Step 7 Click Closeto return to the Protection View.
----End
1.4.4 Verifying the ODUk SPRing Protection Switching
This topic describes how to perform the external switching for an ODUk SPRing protection on
the U2000. During the deployment commissioning, the external switching is performed to test
whether the ODUk SPRing protection functions normally and provides protection.
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l The ODUk SPRing protection subnet must be searched out.
Context
CAUTION
The protection switching may affect the services or the functions that are already configured.
Procedure
Step 1 Choose Service> WDM Protection Subnet> Maintain WDM Protection Subnetfrom theMain Menu.
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-11
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
30/228
Step 2 The Protection Subnet Attributeswindow is displayed. Select the protection subnet and clickthe Protection Subnet Maintenancetab.
Step 3 Click Queryto query the statuses of protocol controller, east, and west of the protection subnetfrom the NE.
NOTE
If the protocol on a node is disabled, enable the protocol first.
Step 4 Perform the manual, forced or exercise switching on all nodes in the protection subnet one byone in the corresponding direction.
l To perform a manual switching, click Eastor Westand select Manual Switch to
Protection-Ringfrom the drop-down menu.
l To perform a forced switching, click Eastor Westand select Forced Switch to Protection-
Ringfrom the drop-down menu.
l To perform a exercise switching, click Eastor Westand select Exercise-Ringfrom the
drop-down menu.
NOTE
When performing the switching, maintenance or lockout on a node, you cannot select East and West at the
same time.
Step 5 Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.
Step 6 Click Queryto query whether the services on all nodes are already switched to the protectionpaths in the ODUk SPRing protection subnet.
Step 7 Select all nodes in the protection subnet one by one. Click Eastor West, and then select ClearAllfrom the drop-down menu to clear the switching on each node.
Step 8 Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.
----End
1.5 Maintaining Protection Subnets
On the U2000, you can maintain protection subnets.
1.5.1 Finding Protection Subnets
When there are a number of protection subnets in a network, you use the search function toquickly find the desired protection subnet.
1.5.2 Querying Protection Subnet Resources
After you search out a protection subnet, you can query the usage of subnet resources, so that
you can plan and manage the subnet in a better way.
1.5.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet
You can run an external switching command to perform or clear the switching for a 1:N
wavelength protection subnet. External switching commands include: forced switching, manual
switching, and lockout. In the deployment and commissioning, you can perform switching to
test whether the 1:N wavelength protection switching works properly. In the fault maintenance,
you can perform this operation to locate faults.
1.5.4 Performing ODUk Ring Protection Switching
1 Managing WDM Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
1-12 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
31/228
On the U2000, you can perform or clear external switching for an ODUk ring network. During
the deployment and commissioning, you can perform external switching to test whether ODUk
ring switching works properly. During the fault maintenance, you can perform this operation
for fault location.
1.5.1 Finding Protection Subnets
When there are a number of protection subnets in a network, you use the search function to
quickly find the desired protection subnet.
Prerequisite
l You must be an NM user with "network monitor" authority or higher.
l The protection subnet must be created.
Procedure
Step 1 Right-click in the Main Topology and choose Search WDM Protection Subnet. The SearchProtection Subnetdialog box is displayed.
NOTE
You need to select the Protectioncheck box on the upper right corner of the Main Topology in advance.
Step 2 Set the search condition and enter the keyword.
Step 3 Click Searchand the protection subnet that is searched out is highlighted in the Network View.
----End
1.5.2 Querying Protection Subnet Resources
After you search out a protection subnet, you can query the usage of subnet resources, so that
you can plan and manage the subnet in a better way.
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l The protection subnet must be searched out.
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-13
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
32/228
Procedure
Step 1 Choose Service> WDM Protection Subnet> Manage WDM Protection Subnetfrom theMain Menu.
Step 2 Right-click a protection link, and choose Protection Subnet Attributesfrom the shortcut menu.The Protection Subnet Attributeswindow is displayed. Click the Resource Descriptiontab.
Step 3 Click Queryto query the usage of the protection subnet resources.
----End
1.5.3 Performing the Protection Switching for a 1:N WavelengthProtection Subnet
You can run an external switching command to perform or clear the switching for a 1:N
wavelength protection subnet. External switching commands include: forced switching, manual
switching, and lockout. In the deployment and commissioning, you can perform switching to
test whether the 1:N wavelength protection switching works properly. In the fault maintenance,
you can perform this operation to locate faults.
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l The 1:N wavelength protection group must be searched out.
l Applies to the OptiX BWS 1600G, OptiX BWS 1600S and OptiX BWS 320GV3.
l Applies to the LWF, LWFS, LWC1, LBE, LBES, LBF and LBFS boards.
l Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA).
l Applies to the LWF, LWFS, LWC1, LBE and LBES boards.
Context
CAUTION
Force switching and manual switching may interrupt services.
Procedure
Step 1 Choose Service> WDM Protection Subnet> Maintain WDM Protection Subnetfrom theMain Menu.
Step 2 The Protection Subnet Attributeswindow is displayed. Select the protection subnet and clickthe Protection Subnet Maintenancetab.
Step 3 Click Queryto query whether the nodes are switched and whether the protocols are enabled inthe 1:N wavelength protection subnet.
Step 4 To enable or disable the protocol, click Start Protocoland select Startor Stopfrom the drop-down menu.
1 Managing WDM Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
1-14 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
33/228
NOTE
If you want to enable or disable the protocol for the entire protection subnet, select Start the Protocol
Networkwideor Stop the Protocol Networkwidefrom the drop-down menu.
Step 5 Perform the manual or forced switching on all nodes in the protection subnet one by one in thecorresponding direction.
l To perform a manual switching, click Eastor Westand select Manual Switchingfrom
the drop-down menu.
l To perform a forced switching, click Eastor Westand select Forced Switchingfrom the
drop-down menu.
NOTE
When performing the switching, maintenance or lockout on a node, you cannot select east and west direction
at the same time.
Step 6 Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicating that the
operation is successful. Click OK.
Step 7 Optional: Perform the lockout operation. Select a desired node, click Lock Eastor LockWest, and select Lockout of Protection.
Step 8 Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicating that theoperation is successful. Click OK.
Step 9 Optional: To clear protection switching, select a node, click Eastor West, and then selectClearfrom the drop-down menu.
Step 10 Optional: Click Yesin the Protection Attributesdialog box. A prompt is displayed, indicatingthat the operation is successful. Click OK.
----End
1.5.4 Performing ODUk Ring Protection Switching
On the U2000, you can perform or clear external switching for an ODUk ring network. During
the deployment and commissioning, you can perform external switching to test whether ODUk
ring switching works properly. During the fault maintenance, you can perform this operation
for fault location.
Prerequisite
l You must be an NM user with "network operator" authority or higher.
l The ODUk ring protection subnet must be searched out.
Context
CAUTION
The protection switching may affect the services or the functions that are already configured.
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-15
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
34/228
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
35/228
l One or more isolated nodes must exist.
l Applies to the isolated node which node type is ODUk SPRing.
Context
CAUTION
Deleting isolated nodes may interrupt services. Exercise caution when you perform this
operation.
Procedure
Step 1 Choose Service> WDM Protection Subnet> Manage WDM Isolated Nodefrom the Main
Menu.
Step 2 Select the isolated node you want to delete, right-click and choose Delete.
Step 3 Click Yesin the confirmation dialog box.
----End
1.7 Deleting Protection Subnets
When an existing protection subnet is not suitable, you can delete the protection subnet.
Prerequisite
You must be an NM user with "network maintainer" authority or higher.
Context
NOTE
The deletion of a protection subnet will leave the equipment or services unprotected. Hence, exercise
caution before this operation.
Procedure
Step 1 Choose Service> WDM Protection Subnet> Manage WDM Protection Subnetfrom theMain Menu.
Step 2 Right-click the protection subnet to be deleted and choose Delete from the NMor Delete fromthe NEor Delete All from the NMfrom the shortcut menu.
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management 1 Managing WDM Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-17
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
36/228
NOTE
The methods to delete a protection subnet are as follows:
l Delete from the NM: Deletes the relation between the protection subnet and logical systems at the NE
side, to allow deleting of fibers, re-uploading, and so on. This command is not delivered to the NE and
does not affect the services. The deleted protection subnet can be located by using the search feature.
The U2000 locates it according to the NE layer protection information.
l Delete from the NE: Deletes the protection subnet, logical systems at the NE side, and all traffic in
the protection subnet. The deleted protection subnet cannot be restored without being created again.
l Delete All from the NM: Deletes data other than fibers in the network layer. After the deletion, you
can search out trails and protection subnets again by using the search feature. It is recommended that
you do not select this option, because a large amount of data will be deleted.
Step 3 In the Operation Promptdialog box, click Yes.
NOTE
If Delete from the NEis selected, you need to confirm the operation once more.
Step 4 After completion, click Closein the dialog box displayed to complete the operation.
----End
1 Managing WDM Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
1-18 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
37/228
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
38/228
2.1 Managing WDM Trails
This section describes how to manage end-to-end WDM services based on the trail management
function of the U2000.
Prerequisite
A U2000 user can manage all the trails that the user creates. To manage a trail that is created by
another U2000 user, a U2000 user must meet any of the following conditions:
l The U2000 user belongs to the Administrators user group.
l The right to manage the required trail is allocated to the U2000 user.
2.1.1 Configuration Task Flow
A configuration task flow describes the operation tasks that manage an WDM network by using
the end-to-end function of the U2000. In addition, the relationships between the operation tasksare described.
2.1.2 Basic Concepts
This section describes the basic concepts of the WDM end-to-end management.
2.1.3 Creating WDM Trails by Trail Search
After a new network is set up or services are configuredon a per-NE basis, you need to perform
an WDM trail search so that you can manage configured services by using the trail management
function.
2.1.4 Configuring WDM Trails
After searching out the relevant trail information on the U2000, you can create OCh, ODUk or
client trails by specifying the sources and sinks of the trails.2.1.5 Creating a Platinum Service
In a platinum service group, the WDM trails do not pass through the same NE, fiber or fiber/
cable pipe, sothat the risk that multiple trails are interrupted is lowered.
2.1.6 Bindinga Platinum Service Group
You can bind a trail or trails when you need to add an existing trail to a platinum service group
or bind existing trails as a platinum service group.
2.1.7 ServiceAuthorization Management
If there are multiple service trails maintained by differentoperators, they may care about only
the trails in their own responsibility but ignore the other services. Service authorization can filter
the information not in concern of an operator, who then views and manages only the trails in theresponsibility. In this manner, the management and maintenance efficiency is improved.
2.1.8 Viewing WDM Trails
This section describes how to view the connection relation of all boards on a WDM NE.
2.1.9 Maintaining WDM Trails
The end-to-end trails are carriers of services of the customers. In the routine maintenance, the
administrator and maintainer must find out the status of the trails to ensure that all the services
are transmitted correctly.
2.1.10 Modifying WDM Trails
Due to service requirements, sometimes, you need to modify the configuration of a WDM trail.
U2000 supports manually modifying the source and sink of an exisiting WDM trail and the trailnames in batches, instead of creating WDM trails. This greatly simplifies the operations.
2 End-to-End WDM Management
iManager U2000 Unified Network Management System
Operation Guide for WDM End-to-End Management
2-2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
8/10/2019 OG for WDM End-To-End Management-(V100R002C01_02)
39/228
2.1.11 Deleting a WDM Trail
The operation deletes the WDM trails from the network layer or from the NE layer. You need
to delete the trails if the network will be adjusted or rebuilt.
2.1.12 Configuration Example: Configuring GE Services on the OptiX BWS 1600G by Using