Operation Guide for RTN End-to-End Management-(V100R002C01_02)

Embed Size (px)

Citation preview

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    1/385

    iManager U2000 Unified Network Management

    System

    V100R002C01

    Operation Guide for RTN End-to-End

    Management

    Issue 02

    Date 2010-09-24

    HUAWEI TECHNOLOGIES CO., LTD.

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    2/385

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    3/385

    Copyright Huawei Technologies Co., Ltd. 2010. All rights reserved.

    No part of this document may be reproduced or transmitted in any form or by any means without prior written

    consent of Huawei Technologies Co., Ltd.

    Trademarks and Permissions

    and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.

    All other trademarks and trade names mentioned in this document are the property of their respective holders.

    Notice

    The purchased products, services and features are stipulated by the contract made between Huawei and the

    customer. All or part of the products, services and features described in this document may not be within the

    purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,and recommendations in this document are provided "AS IS" without warranties, guarantees or representations

    of any kind, either express or implied.

    The information in this document is subject to change without notice. Every effort has been made in the

    preparation of this document to ensure accuracy of the contents, but all statements, information, and

    recommendations in this document do not constitute the warranty of any kind, express or implied.

    Huawei Technologies Co., Ltd.

    Address: Huawei Industrial Base

    Bantian, Longgang

    Shenzhen 518129

    People's Republic of China

    Website: http://www.huawei.com

    Email: [email protected]

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    i

    http://www.huawei.com/
  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    4/385

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    5/385

    About This Document

    Related Version

    The following table lists the product version related to this document.

    Product Name Version

    iManager U2000 V100R002C01

    Intended Audience

    This document describes how to configure an RTN network by using the end-to-end function.

    This document guides you to manage an RTN network by using the trail management function.

    This document is intended for:

    l Network Monitoring Engineer

    l Data Configuration Engineer

    l NM Administrator

    l System Maintenance Engineer

    Symbol ConventionsThe symbols that may be found in this document are defined as follows.

    Symbol Description

    DANGER

    Indicates a hazard with a high level of risk, which if not

    avoided, will result in death or serious injury.

    WARNING

    Indicates a hazard with a medium or low level of risk, which

    if not avoided, could result in minor or moderate injury.

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management About This Document

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    iii

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    6/385

    Symbol Description

    CAUTION

    Indicates a potentially hazardous situation, which if not

    avoided, could result in equipment damage, data loss,

    performance degradation, or unexpected results.

    TIP Indicates a tip that may help you solve a problem or save

    time.

    NOTE Provides additional information to emphasize or supplement

    important points of the main text.

    Command Conventions

    The command conventions that may be found in this document are defined as follows.

    Convention Description

    Boldface The keywords of a command line are in boldface.

    Italic Command arguments are in italics.

    [ ] Items (keywords or arguments) in brackets [ ] are optional.

    { x | y | ... } Optional items are grouped in braces and separated by

    vertical bars. One item is selected.

    [ x | y | ... ] Optional items are grouped in brackets and separated byvertical bars. One item is selected or no item is selected.

    { x | y | ... }* Optional items are grouped in braces and separated by

    vertical bars. A minimum of one item or a maximum of all

    items can be selected.

    [ x | y | ... ]* Optional items are grouped in brackets and separated by

    vertical bars. Several items or no item can be selected.

    GUI Conventions

    The GUI conventions that may be found in this document are defined as follows.

    Convention Description

    Boldface Buttons, menus, parameters, tabs, window, and dialog titles

    are in boldface. For example, clickOK.

    > Multi-level menus are in boldface and separated by the ">"

    signs. For example, choose File > Create > Folder.

    About This Document

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management

    iv Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    7/385

    Update History

    Updates between document versions are cumulative. Therefore, the latest document version

    contains all updates made to previous versions.

    Updates in Issue 02 (2010-09-24) Based on Product Version V100R002C01

    The second release of the iManager U2000 V100R002C01.

    Some bugs in the manual of the previous version are fixed.

    Updates in Issue 01 (2010-08-16) Based on Product Version V100R002C01

    The first release of the iManager U2000 V100R002C01.

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management About This Document

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    v

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    8/385

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    9/385

    Contents

    About This Document...................................................................................................................iii

    1 Managing RTN Protection Subnets........................................................................................1-1

    1.1 Basic Concepts................................................................................................................................................1-3

    1.1.1 Protection Subnet...................................................................................................................................1-31.1.2 Isolated Node..........................................................................................................................................1-3

    1.2 Searching for Protection Subnets....................................................................................................................1-4

    1.3 Configuring an MSP Ring...............................................................................................................................1-4

    1.3.1 Creating an MS Ring Protection Subnet................................................................................................1-5

    1.3.2 Checking Networkwide Multiplex Section Parameters.........................................................................1-7

    1.3.3 Verifying MSP Protection Switching.....................................................................................................1-7

    1.4 Configuring Linear MSP.................................................................................................................................1-9

    1.4.1 Creating a Linear MS Protection Subnet................................................................................................1-9

    1.4.2 Checking Networkwide Multiplex Section Parameters.......................................................................1-11

    1.4.3 Verifying MSP Protection Switching...................................................................................................1-12

    1.5 Creating an Path Protection Ring..................................................................................................................1-13

    1.6 Configuring a Non-Protection Ring..............................................................................................................1-14

    1.7 Configuring a Non-Protection Chain............................................................................................................1-15

    1.8 Configuring DNI Protection..........................................................................................................................1-16

    1.9 Configuring IF 1+1 Protection......................................................................................................................1-17

    1.10 Configuring IF N+1 Protection...................................................................................................................1-18

    1.11 Maintaining Protection Subnets..................................................................................................................1-19

    1.11.1 Finding Protection Subnets................................................................................................................1-20

    1.11.2 Querying Protection Subnet Resources..............................................................................................1-211.11.3 Collecting Statistics on the SDH Protection Subnet Resources.........................................................1-21

    1.11.4 Checking MS Protection Switching Status........................................................................................1-22

    1.11.5 Setting Protection Subnet Parameters................................................................................................1-22

    1.11.6 Checking TPS Switching status.........................................................................................................1-23

    1.11.7 Performing MSP Switching...............................................................................................................1-23

    1.11.8 Performing SNCP Service Switching................................................................................................1-24

    1.11.9 Adjusting the Capacity of an MSP Ring............................................................................................1-25

    1.11.10 Adjusting the Capacity of a Linear MSP.........................................................................................1-26

    1.11.11 Changing an NP Chain to a 1+1 Linear MSP..................................................................................1-26

    1.11.12 Checking IF 1+1 Protection Switching Status.................................................................................1-29

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management Contents

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    vii

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    10/385

    1.11.13 Checking IF N+1 Protection Switching Status................................................................................1-29

    1.12 Deleting Protection Subnets........................................................................................................................1-29

    1.13 Deleting Isolated Nodes..............................................................................................................................1-30

    2 End-to-End RTN Management................................................................................................2-12.1 Managing SDH Trails.....................................................................................................................................2-2

    2.1.1 Configuration Task Flow.......................................................................................................................2-3

    2.1.2 Basic Concepts.......................................................................................................................................2-4

    2.1.2.1 SDH Trail............................................................................................................................................2-5

    2.1.2.2 Radio Trails.........................................................................................................................................2-7

    2.1.2.3 Conflict Trail.......................................................................................................................................2-9

    2.1.2.4 Trail Creation Method.......................................................................................................................2-10

    2.1.2.5 Process for Creating a Trail...............................................................................................................2-12

    2.1.2.6 Trail Protection Strategy...................................................................................................................2-15

    2.1.2.7 Trail Resource Use Strategy..............................................................................................................2-17

    2.1.2.8 Principles for Selecting Timeslots During the Trail Creation...........................................................2-17

    2.1.2.9 Platinum Service Group....................................................................................................................2-19

    2.1.3 Disabling a Fiber..................................................................................................................................2-20

    2.1.4 Creating SDH Trails by Trail Search...................................................................................................2-21

    2.1.4.1 Searching for SDH Trails..................................................................................................................2-21

    2.1.4.2 Viewing Discrete Services................................................................................................................2-22

    2.1.4.3 Discrete Service Causes and Handling Measures.............................................................................2-23

    2.1.4.4 Setting the Remarks of a Discrete Service........................................................................................2-24

    2.1.4.5 Activating and Deactivating Discrete Services.................................................................................2-26

    2.1.4.6 Acknowledging or Unacknowledging Discrete Services..................................................................2-26

    2.1.4.7 Deleting Discrete Services................................................................................................................2-27

    2.1.5 Automatically Creating VC4 Trails.....................................................................................................2-28

    2.1.5.1 Creating a Non-SNCP VC4 Trail......................................................................................................2-28

    2.1.5.2 Creating an SNCP VC4 Trail............................................................................................................2-30

    2.1.5.3 Verifying the SNCP Trail Protection Switching...............................................................................2-33

    2.1.6 Automatically Creating VC12 and VC3 Trails....................................................................................2-33

    2.1.6.1 Creating a VC4 Server Trail..............................................................................................................2-34

    2.1.6.2 Creating a Non-SNCP VC12 or VC3 Trail.......................................................................................2-362.1.6.3 Creating an SNCP VC12 or VC3 Trail.............................................................................................2-38

    2.1.6.4 Verifying the SNCP Trail Protection Switching...............................................................................2-41

    2.1.7 Creating a Platinum Service Group......................................................................................................2-42

    2.1.8 Bound Platinum Service Group............................................................................................................2-43

    2.1.9 Creating an SDH Trail Manually.........................................................................................................2-44

    2.1.10 Creating PDH Radio Trails................................................................................................................2-45

    2.1.10.1 Creating a Link Server Trail............................................................................................................2-45

    2.1.10.2 Creating a PDH Radio Trail............................................................................................................2-47

    2.1.11 Creating SDH Radio Trails................................................................................................................2-49

    2.1.11.1 Creating a VC4 Server Trail............................................................................................................2-49

    Contents

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management

    viii Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    11/385

    2.1.11.2 Creating an SDH Radio Trail..........................................................................................................2-51

    2.1.12 Copying SDH Trails...........................................................................................................................2-52

    2.1.13 Modifying an SDH Trail....................................................................................................................2-54

    2.1.13.1 Modifying the Port/Timeslot/Route of an SDH Trail.....................................................................2-54

    2.1.13.2 Modifying the SNC Service Control of SDH Trails.......................................................................2-55

    2.1.13.3 Modifying Trail Names in Batches.................................................................................................2-56

    2.1.13.4 Modifying the Trails in a Platinum Service Group.........................................................................2-57

    2.1.14 Removing a Trail from a Platinum Service Group............................................................................2-57

    2.1.15 Configuring Overhead Bytes of an SDH Trail...................................................................................2-58

    2.1.15.1 Setting the Trace Byte.....................................................................................................................2-58

    2.1.15.2 Setting the C2 Byte.........................................................................................................................2-60

    2.1.15.3 Setting the V5 Byte.........................................................................................................................2-61

    2.1.15.4 Setting the Overhead Termination..................................................................................................2-62

    2.1.15.5 Setting Service Load Signals...........................................................................................................2-63

    2.1.16 Changing Between SNCP and Non-SNCP Trails..............................................................................2-64

    2.1.16.1 Changing a Non-SNCP Trail to an SNCP Trail..............................................................................2-64

    2.1.16.2 Changing an SNCP Trail to a Non-SNCP Trail..............................................................................2-66

    2.1.17 Enabling or Disabling VC4 Server Trails..........................................................................................2-66

    2.1.17.1 Disabling VC4 Server Trails...........................................................................................................2-67

    2.1.17.2 Enabling VC4 Server Trails............................................................................................................2-67

    2.1.18 Joining and Splitting VC4 Server Trails............................................................................................2-68

    2.1.18.1 Joining VC4 Server Trails...............................................................................................................2-69

    2.1.18.2 Splitting a VC4 Server Trail............................................................................................................2-702.1.19 Service Authorization Management...................................................................................................2-71

    2.1.19.1 Specifying a Customer for a Service...............................................................................................2-72

    2.1.19.2 Authorizing a Customer to a U2000 User.......................................................................................2-73

    2.1.19.3 Authorizing a Trail to a U2000 User...............................................................................................2-74

    2.1.19.4 Modifying Trail Authorization Information....................................................................................2-74

    2.1.20 Viewing SDH Trails...........................................................................................................................2-75

    2.1.20.1 Viewing SDH Trail Details.............................................................................................................2-75

    2.1.20.2 Viewing the Use Information of a VC4 Server Trail......................................................................2-76

    2.1.20.3 Viewing Relevant Client Trails.......................................................................................................2-77

    2.1.20.4 Viewing the Optical Power for the Trails.......................................................................................2-77

    2.1.20.5 Viewing the Status of the Fiber Break on an SDH Trail.................................................................2-78

    2.1.20.6 Viewing Fiber Information of a Trail..............................................................................................2-79

    2.1.21 Maintaining SDH Trails.....................................................................................................................2-79

    2.1.21.1 Locking or Unlocking an SDH Trail...............................................................................................2-80

    2.1.21.2 Activating or Deactivating an SDH Trail........................................................................................2-81

    2.1.21.3 Setting a Loopback for a Trail.........................................................................................................2-82

    2.1.21.4 Performing the Protection Switching for a Single SNCP Trail.......................................................2-84

    2.1.21.5 Performing the SNCP Trail Switching in Batches..........................................................................2-85

    2.1.21.6 Verifying Platinum Service Groups in Batches..............................................................................2-87

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management Contents

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    ix

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    12/385

    2.1.21.7 Converting SDH Discrete Services to Mono Nodal Trails.............................................................2-87

    2.1.22 Deleting SDH Trails...........................................................................................................................2-88

    2.2 Managing Ethernet Trails..............................................................................................................................2-90

    2.2.1 Basic Concepts.....................................................................................................................................2-91

    2.2.1.1 Ethernet End-to-End Management....................................................................................................2-91

    2.2.1.2 Ethernet Services...............................................................................................................................2-93

    2.2.1.3 Relation Between SDH/Radio Trails and Ethernet Trails.................................................................2-94

    2.2.1.4 Tag Attributes....................................................................................................................................2-95

    2.2.2 Creating Ethernet Trails by Trail Search..............................................................................................2-96

    2.2.2.1 Searching for Ethernet Trails............................................................................................................2-96

    2.2.2.2 Viewing Ethernet Discrete Services..................................................................................................2-98

    2.2.3 Configuring EPL Service.....................................................................................................................2-98

    2.2.3.1 Creating a VC4 Server Trail..............................................................................................................2-99

    2.2.3.2 Creating a Trunk Link.....................................................................................................................2-101

    2.2.3.3 Creating an EPL Trail.....................................................................................................................2-103

    2.2.3.4 Verifying Ethernet Services............................................................................................................2-104

    2.2.3.5 Sample Application: Configuring EPL Services.............................................................................2-105

    2.2.4 Configuring an Unterminated EPL Service.......................................................................................2-111

    2.2.4.1 Creating a VC4 Server Trail............................................................................................................2-112

    2.2.4.2 Creating an Unterminated Trunk Link............................................................................................2-114

    2.2.4.3 Creating a Trunk Link.....................................................................................................................2-115

    2.2.4.4 Creating an Unterminated EPL Trail..............................................................................................2-116

    2.2.4.5 Verifying Ethernet Services............................................................................................................2-1172.2.5 Configuring EVPL Services...............................................................................................................2-118

    2.2.5.1 Creating a VC4 Server Trail............................................................................................................2-118

    2.2.5.2 Creating a Trunk Link.....................................................................................................................2-120

    2.2.5.3 Creating an EVPL Trail...................................................................................................................2-122

    2.2.5.4 Verifying Ethernet Services............................................................................................................2-123

    2.2.6 Configuring EPLAN Service.............................................................................................................2-124

    2.2.6.1 Creating a VC4 Server Trail............................................................................................................2-124

    2.2.6.2 Creating a Trunk Link.....................................................................................................................2-127

    2.2.6.3 Creating an EPLAN Trail................................................................................................................2-128

    2.2.6.4 Adjusting VB Mount Ports in an EPLAN.......................................................................................2-131

    2.2.6.5 Verifying Ethernet Services............................................................................................................2-132

    2.2.7 Configuring EVPL (QinQ) Service ...................................................................................................2-133

    2.2.7.1 Creating a VC4 Server Trail............................................................................................................2-133

    2.2.7.2 Creating a Trunk Link.....................................................................................................................2-135

    2.2.7.3 Creating an EVPL (QinQ) Trail......................................................................................................2-137

    2.2.7.4 Verifying Ethernet Services............................................................................................................2-138

    2.2.8 Specifying a Customer for a Created Trail.........................................................................................2-139

    2.2.9 Checking the Connectivity of Ethernet Link......................................................................................2-140

    2.2.9.1 Ethernet OAM.................................................................................................................................2-140

    Contents

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management

    x Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    13/385

    2.2.9.2 Creating MPs...................................................................................................................................2-141

    2.2.9.3 Performing a CC Check..................................................................................................................2-142

    2.2.9.4 Performing an LB Check.................................................................................................................2-142

    2.2.9.5 Performing an LT Check.................................................................................................................2-143

    2.2.9.6 Performing a Ping Test....................................................................................................................2-144

    2.2.9.7 Performing Performance Detection.................................................................................................2-145

    2.2.10 Viewing Ethernet Services...............................................................................................................2-145

    2.2.10.1 Viewing Trunk Links....................................................................................................................2-146

    2.2.10.2 Analyzing the Trunk Link Fault....................................................................................................2-146

    2.2.10.3 Viewing Relevant Trails of a Trunk Link.....................................................................................2-147

    2.2.10.4 Viewing Ethernet Trails................................................................................................................2-148

    2.2.10.5 Viewing the Server Trail of an Ethernet Trail...............................................................................2-148

    2.2.10.6 Analyzing the Ethernet Trail Fault................................................................................................2-149

    2.2.10.7 Viewing the Connectivity of Ethernet Services Networkwide.....................................................2-150

    2.2.11 Maintaining Ethernet Trails.............................................................................................................2-150

    2.2.11.1 Adjusting the Ethernet Trail Bandwidth.......................................................................................2-150

    2.2.11.2 Activating or Deactivating Ethernet Services...............................................................................2-151

    2.2.12 Deleting Ethernet Services...............................................................................................................2-152

    2.2.12.1 Deleting Ethernet Trails................................................................................................................2-152

    2.2.12.2 Deleting Trunk Links....................................................................................................................2-153

    2.3 Managing Alarms of an SDH Trail.............................................................................................................2-154

    2.3.1 Viewing Current Alarms of an SDH Trail.........................................................................................2-155

    2.3.2 Viewing History Alarms of an SDH Trail.........................................................................................2-1562.3.3 Setting Alarm Reversion for an SDH Trail........................................................................................2-156

    2.3.4 Inserting an Alarm on an SDH Trail..................................................................................................2-157

    2.3.5 Managing Networkwide SDH Alarm Trails in Real Time.................................................................2-158

    2.3.6 Analyzing SDH alarm correlation......................................................................................................2-158

    2.3.7 Browsing Relevant WDM Trails........................................................................................................2-159

    2.4 Managing the Performance of SDH Trails..................................................................................................2-160

    2.4.1 Viewing Current Performance Data of an SDH Trail........................................................................2-160

    2.4.2 Viewing History Performance Data of an SDH Trail........................................................................2-161

    2.4.3 Viewing UAT of SDH Trails.............................................................................................................2-162

    2.4.4 Viewing Performance Threshold-Crossing Records of SDH Trails..................................................2-162

    2.4.5 Setting Performance Monitoring Parameters of an SDH Trail..........................................................2-163

    2.4.6 Setting SDH Trail Performance Threshold........................................................................................2-164

    2.5 Managing Ethernet Trail Alarms.................................................................................................................2-164

    2.5.1 Viewing Current Alarms of a Trunk Link..........................................................................................2-165

    2.5.2 Viewing History Alarms of a Trunk Link..........................................................................................2-166

    2.5.3 Viewing Current Alarms of an Ethernet Trail....................................................................................2-166

    2.5.4 Viewing History Alarms of an Ethernet Trail....................................................................................2-167

    2.5.5 Managing Networkwide ETH Alarm Trails in Real Time.................................................................2-168

    2.6 Browsing the Performance of an Ethernet Trail..........................................................................................2-168

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management Contents

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xi

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    14/385

    3 End-to-End RTN IP Management...........................................................................................3-1

    3.1 Process of Configuring RTN IP Services........................................................................................................3-2

    3.2 Automatically Searching RTN IP Services.....................................................................................................3-3

    3.3 Managing Tunnel............................................................................................................................................3-4

    3.3.1 Introduction to the Tunnel......................................................................................................................3-5

    3.3.1.1 Introduction to the Tunnel...................................................................................................................3-5

    3.3.1.2 Standards and Protocols Compliance of the Tunnel...........................................................................3-7

    3.3.1.3 Basic Concepts of the Tunnel..............................................................................................................3-9

    3.3.1.4 Working Principles............................................................................................................................3-10

    3.3.1.5 Tunnel Protection Group...................................................................................................................3-11

    3.3.1.6 Application of the Tunnel.................................................................................................................3-13

    3.3.2 Tunnel Configuration Flow..................................................................................................................3-14

    3.3.3 Configuring a Tunnel...........................................................................................................................3-16

    3.3.3.1 Creating a Tunnel..............................................................................................................................3-17

    3.3.3.2 Creating Tunnels in Batches.............................................................................................................3-20

    3.3.3.3 Creating a Protection Group..............................................................................................................3-21

    3.3.3.4 Configuring OAM for a Tunnel........................................................................................................3-23

    3.3.3.5 Automatic Search for Protection Groups..........................................................................................3-24

    3.3.3.6 Deploying a Tunnel...........................................................................................................................3-25

    3.3.3.7 Viewing a Discrete Tunnel................................................................................................................3-26

    3.3.3.8 Deleting a Tunnel..............................................................................................................................3-26

    3.3.4 Monitoring a Tunnel.............................................................................................................................3-27

    3.3.4.1 Viewing the VPN Service Carried on a Tunnel................................................................................3-27

    3.3.4.2 Viewing the Topology of a Tunnel...................................................................................................3-28

    3.3.4.3 Viewing the Performance of a Tunnel..............................................................................................3-29

    3.3.4.4 Viewing the Alarms of a Tunnel.......................................................................................................3-29

    3.3.4.5 Monitoring the Running Status of a Tunnel......................................................................................3-30

    3.3.4.6 Viewing the LSP Topology of a Tunnel...........................................................................................3-30

    3.3.4.7 Diagnosing a Tunnel.........................................................................................................................3-31

    3.3.5 Configuration Example (Static CR Tunnel).........................................................................................3-32

    3.3.5.1 Networking Diagram.........................................................................................................................3-32

    3.3.5.2 Service Planning................................................................................................................................3-333.3.5.3 Configuration Process (Creating a Static CR Tunnel)......................................................................3-35

    3.3.6 Configuration Example (RSVP TE Tunnel)........................................................................................3-44

    3.3.6.1 Networking Diagram.........................................................................................................................3-44

    3.3.6.2 Service Planning................................................................................................................................3-45

    3.3.6.3 Configuration Process (Creating a RSVP TE Tunnel)......................................................................3-47

    3.4 Configuring a Service Template...................................................................................................................3-59

    3.4.1 Creating a Service Template................................................................................................................3-60

    3.4.2 Creating a Service by Using a Template..............................................................................................3-60

    3.5 Viewing a Service Resource.........................................................................................................................3-61

    3.5.1 Querying Public Resources..................................................................................................................3-61

    Contents

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management

    xii Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    15/385

    3.5.2 Querying CTP Resources.....................................................................................................................3-62

    3.6 Managing PWE3 Services.............................................................................................................................3-62

    3.6.1 Overview of PWE3..............................................................................................................................3-63

    3.6.1.1 Introduction.......................................................................................................................................3-64

    3.6.1.2 Reference Standards and Protocols...................................................................................................3-64

    3.6.1.3 PWE3 Basic Principle.......................................................................................................................3-65

    3.6.1.4 PW Template.....................................................................................................................................3-69

    3.6.1.5 VCCV................................................................................................................................................3-70

    3.6.1.6 Static and Dynamic Hybrid Multi-Hop PW......................................................................................3-70

    3.6.1.7 PW Protection...................................................................................................................................3-71

    3.6.1.8 ATM Cell Transparent Transmission................................................................................................3-74

    3.6.1.9 The Application of PWE3 Service....................................................................................................3-77

    3.6.2 PWE3 Configuration Process...............................................................................................................3-78

    3.6.3 PWE3 Operation Tasks........................................................................................................................3-83

    3.6.3.1 Creating a CES Service.....................................................................................................................3-83

    3.6.3.2 Creating an ETH Service...................................................................................................................3-86

    3.6.3.3 Creating an ATM Service.................................................................................................................3-88

    3.6.3.4 Creating a PWE3 Service Through Duplication...............................................................................3-92

    3.6.3.5 Deploying a PWE3 Service...............................................................................................................3-94

    3.6.3.6 Adjusting a Discrete PWE3 Service..................................................................................................3-94

    3.6.4 PWE3 Service Monitoring...................................................................................................................3-95

    3.6.4.1 Viewing the PWE3 Service Topology..............................................................................................3-96

    3.6.4.2 Monitoring Performance of a PWE3 Service....................................................................................3-963.6.4.3 Monitoring Alarms of a PWE3 Service............................................................................................3-97

    3.6.5 Locating a PWE3 Service Fault...........................................................................................................3-98

    3.6.5.1 CES Service Troubleshooting...........................................................................................................3-98

    3.6.5.2 ATM Service Troubleshooting........................................................................................................3-101

    3.6.5.3 Ethernet Service Troubleshooting...................................................................................................3-104

    3.6.6 Example for Configuring a CES Emulation Service..........................................................................3-107

    3.6.6.1 Networking Diagram.......................................................................................................................3-107

    3.6.6.2 Service Planning..............................................................................................................................3-108

    3.6.6.3 Configuration Process.....................................................................................................................3-111

    3.6.7 Example for Configuring an ATM Emulation Service......................................................................3-127

    3.6.7.1 Networking Diagram.......................................................................................................................3-128

    3.6.7.2 Service Planning..............................................................................................................................3-128

    3.6.7.3 Configuration Process.....................................................................................................................3-132

    3.6.8 Example for Configuring an Ethernet Private Line Emulation Service.............................................3-147

    3.6.8.1 Networking Diagram.......................................................................................................................3-147

    3.6.8.2 Service Planning..............................................................................................................................3-147

    3.6.8.3 Configuration Process.....................................................................................................................3-149

    3.7 Modifying Configurations...........................................................................................................................3-158

    3.7.1 Modifying Tunnel Attributes.............................................................................................................3-159

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management Contents

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xiii

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    16/385

    3.7.1.1 Modifying a Tunnel.........................................................................................................................3-159

    3.7.1.2 Deleting a Tunnel............................................................................................................................3-159

    3.7.2 Modifying PWE3 Attributes..............................................................................................................3-160

    3.7.2.1 Modifying a PWE3 Service.............................................................................................................3-160

    3.7.2.2 Deleting a PWE3 Service................................................................................................................3-160

    3.7.2.3 Deleting a PWE3 Service on the Network Side..............................................................................3-161

    3.7.2.4 Undeploying a PWE3 Service.........................................................................................................3-161

    Contents

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management

    xiv Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    17/385

    Figures

    Figure 1-1 DNI protection example.................................................................................... ...............................1-16

    Figure 2-1 End-to-end RTN network management flow.....................................................................................2-4

    Figure 2-2 A conflict trail generated because a fiber is added.............................................................................2-9

    Figure 2-3 A conflict trail generated because a single station cross-connection is lost.......................................2-9

    Figure 2-4 A conflict trail generated because a protection service is deleted on a per-NE basis......................2-10

    Figure 2-5 Creating trails by trail search............................................................................................................2-13

    Figure 2-6 Creating trails in the automatic mode...............................................................................................2-14

    Figure 2-7 Creating trails in the manual mode...................................................................................................2-15

    Figure 2-8 Platinum service group.....................................................................................................................2-19

    Figure 2-9 Downgraded platinum service group...................................... ..........................................................2-20

    Figure 2-10 Joining and splitting VC4 server trails...........................................................................................2-68

    Figure 2-11 Restrictions on VC4 server trail joining.........................................................................................2-69

    Figure 2-12 Restrictions on VC4 server trail joining.........................................................................................2-70

    Figure 2-13 Service authorization management.............................................................................. ...................2-72Figure 2-14 Loopback to Source........................................................................................................................2-82

    Figure 2-15 Loopback to Sink............................................................................ ................................................2-83

    Figure 2-16 Basic hierarchy of the Ethernet feature..........................................................................................2-93

    Figure 2-17 EPL services of the Port type.........................................................................................................2-93

    Figure 2-18 EPL services sharing a PORT port.................................................................................................2-94

    Figure 2-19 EPL services sharing a VCTRUNK port........................................................................................2-94

    Figure 2-20 Relation Between SDH Trails and Ethernet Trails.........................................................................2-95

    Figure 2-21 Networking diagram.....................................................................................................................2-106

    Figure 2-22 IDU board configuration .............................................................................................................2-106

    Figure 2-23 Configuring Ethernet services......................................................................................................2-106

    Figure 2-24 Timeslot allocation of Ethernet services.......................................................................................2-107

    Figure 2-25 Server trail for an unterminated EPL service...............................................................................2-111

    Figure 2-26 EPLAN between different boards on an NE.................................................................................2-129

    Figure 3-1 Process of configuring RTN IP services.............................................................................................3-2

    Figure 3-2 MPLS tunnel on the MPLS network..................................................................................................3-6

    Figure 3-3 ATM PWE3 over IP tunnel................................................................................................................3-7

    Figure 3-4 Process of creating a tunnel..............................................................................................................3-10

    Figure 3-5 Working process of a tunnel.............................................................................................................3-11

    Figure 3-6 Principles of the tunnel protection....................................................................................................3-13

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management Figures

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xv

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    18/385

    Figure 3-7 Transparent transmission of point-to-point data packets..................................................................3-14

    Figure 3-8 Tunnel configuration flow................................................................................................................3-15

    Figure 3-9 The figure of tunnel protection group...............................................................................................3-22

    Figure 3-10 Networking diagram of the MPLS tunnel...................................................................................... 3-32

    Figure 3-11 Networking diagram of the MPLS tunnel...................................................................................... 3-44

    Figure 3-12 Basic transmission components of the PWE3................................................................................3-66

    Figure 3-13 PWE3 single-hop topology.............................................................................................................3-67

    Figure 3-14 PWE3 multi-hop topology..............................................................................................................3-68

    Figure 3-15 Network of the static and dynamic hybrid multi-hop PW..............................................................3-71

    Figure 3-16 PW redundancy protection............................................................................................................. 3-72

    Figure 3-17 CE symmetrical access dual-homing protection.............................................................................3-72

    Figure 3-18 Backup protection...........................................................................................................................3-73

    Figure 3-19 PW APS protection.........................................................................................................................3-73

    Figure 3-20 Application of the PWE3................................................................................................................3-77

    Figure 3-21 CES service configuration process.................................................................................................3-78

    Figure 3-22 ATM service configuration process................................................................................................3-80

    Figure 3-23 Flow of configuring an IP line service........................................................................................... 3-82

    Figure 3-24 Flowchart for troubleshooting CES service faults........................................................................3-100

    Figure 3-25 Flowchart for troubleshooting ATM service faults......................................................................3-103

    Figure 3-26 Flowchart for troubleshooting Ethernet service faults..................................................................3-106

    Figure 3-27 Networking diagram of the CES service......................................................................................3-107

    Figure 3-28 Networking diagram of the IMA service......................................................................................3-128

    Figure 3-29 Networking diagram of the Ethernet service................................................................................3-147

    Figures

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management

    xvi Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    19/385

    Tables

    Table 2-1 SDH trail level......................................................................................................................................2-7

    Table 2-2 Comparison of methods for creating trails.........................................................................................2-11

    Table 2-3 Priority relations of protection strategies...........................................................................................2-16

    Table 2-4 Scheme for managing timeslot resources...........................................................................................2-18

    Table 2-5 Processing policy at ingress...............................................................................................................2-95

    Table 2-6 Processing policy at egress.................................................................................................................2-96

    Table 3-1 Tunnel configuration tasks.................................................................................................................3-15

    Table 3-2 Microwave port planning...................................................................................................................3-33

    Table 3-3 NE parameter planning......................................................................................................................3-33

    Table 3-4 Tunnel planning.................................................................................................................................3-34

    Table 3-5 Planning of protection group parameters...........................................................................................3-35

    Table 3-6 Microwave port planning...................................................................................................................3-45

    Table 3-7 NE parameter planning......................................................................................................................3-45

    Table 3-8 Control plane planning.......................................................................................................................3-46Table 3-9 Tunnel planning.................................................................................................................................3-46

    Table 3-10 Features of the ATM cell transparent transmission services............................................................3-76

    Table 3-11 Applicable scenarios of various connection types............................................................... ............3-76

    Table 3-12 Comparison between 1-to-1 and N-to-1 modes...............................................................................3-77

    Table 3-13 Tasks for configuring a CES service................................................................................................3-79

    Table 3-14 Tasks for configuring an ATM service............................................................................................3-80

    Table 3-15 Operation tasks for configuring an IP line service...........................................................................3-82

    Table 3-16 List of common symptoms of CES service faults............................................................................3-99

    Table 3-17 List of common symptoms of ATM service faults........................................................................3-102

    Table 3-18 List of common symptoms of Ethernet service faults....................................................................3-104

    Table 3-19 Service port planning.....................................................................................................................3-108

    Table 3-20 Parameters for configuring the CES service: NE2-NE3 (The E1 timeslots are partially occupied.)

    ...........................................................................................................................................................................3-108

    Table 3-21 Parameters for configuring the CES service: NE2-NE3 (The E1 timeslots are fully occupied.)

    ...........................................................................................................................................................................3-109

    Table 3-22 Parameters for configuring the CES service: NE1-NE3 (The E1 timeslots are fully occupied.)

    ...........................................................................................................................................................................3-110

    Table 3-23 Parameters of general attributes.....................................................................................................3-114

    Table 3-24 Parameters of the source node........................................................................................................3-115

    Table 3-25 Parameters of the sink node...........................................................................................................3-116

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management Tables

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xvii

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    20/385

    Table 3-26 PW parameters...............................................................................................................................3-118

    Table 3-27 Parameters of advanced attributes..................................................................................................3-120

    Table 3-28 Parameters of general attributes.....................................................................................................3-121

    Table 3-29 Parameters of the source node........................................................................................................3-121

    Table 3-30 Parameters of the sink node...........................................................................................................3-121

    Table 3-31 PW parameters...............................................................................................................................3-122

    Table 3-32 Parameters of advanced attributes..................................................................................................3-123

    Table 3-33 Parameters of general attributes.....................................................................................................3-124

    Table 3-34 Parameters of the source node........................................................................................................3-124

    Table 3-35 Parameters of the sink node...........................................................................................................3-125

    Table 3-36 PW parameters...............................................................................................................................3-125

    Table 3-37 Parameters of advanced attributes..................................................................................................3-127

    Table 3-38 Service port planning.....................................................................................................................3-129

    Table 3-39 IMA planning.................................................................................................................................3-129

    Table 3-40 ATM QoS policy planning.............................................................................................................3-130

    Table 3-41 ATM service planning....................................................................................................................3-130

    Table 3-42 Parameters of general attributes.....................................................................................................3-136

    Table 3-43 Parameters of the source node........................................................................................................3-137

    Table 3-44 Parameters of the sink node...........................................................................................................3-138

    Table 3-45 PW parameters...............................................................................................................................3-138

    Table 3-46 Parameter for configuring a ATM connection...............................................................................3-140

    Table 3-47 Parameters of advanced attributes..................................................................................................3-141

    Table 3-48 Parameters of general attributes.....................................................................................................3-142Table 3-49 Parameters of the source node........................................................................................................3-142

    Table 3-50 Parameters of the sink node...........................................................................................................3-143

    Table 3-51 PW parameters...............................................................................................................................3-143

    Table 3-52 Parameter for configuring a ATM connection...............................................................................3-145

    Table 3-53 Parameters of advanced attributes..................................................................................................3-146

    Table 3-54 Service port planning.....................................................................................................................3-148

    Table 3-55 Ethernet service planning...............................................................................................................3-148

    Table 3-56 Parameters of general attributes.....................................................................................................3-151

    Table 3-57 Parameters of the source node........................................................................................................3-151

    Table 3-58 Parameters of the sink node...........................................................................................................3-151

    Table 3-59 PW parameters...............................................................................................................................3-152

    Table 3-60 Service parameters.........................................................................................................................3-154

    Table 3-61 PW QoS parameters.......................................................................................................................3-154

    Table 3-62 Parameters of advanced attributes..................................................................................................3-154

    Table 3-63 Parameters of general attributes.....................................................................................................3-155

    Table 3-64 Parameters of the source node........................................................................................................3-155

    Table 3-65 Parameters of the sink node...........................................................................................................3-156

    Table 3-66 PW parameters...............................................................................................................................3-156

    Table 3-67 Service parameters.........................................................................................................................3-157

    Tables

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management

    xviii Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    21/385

    Table 3-68 PW QoS parameters.......................................................................................................................3-158

    Table 3-69 Parameters of advanced attributes..................................................................................................3-158

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management Tables

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xix

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    22/385

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    23/385

    1Managing RTN Protection SubnetsAbout This Chapter

    A protection subnet has a structure of providing complete self-protection functions. The purpose

    of managing RTN protection subnets is to configure and display network protection, for example,

    viewing, creating, deleting, modifying and searching for protection subnets, managing NNIs,

    and managing isolated nodes.

    1.1 Basic Concepts

    According to the layered structure of transport network, protection subnet, belonging to the

    network layer, refers to a network structure that has a comprehensive self-protection function.

    The protection subnet is a network unit of composing the optical transport network. To have a

    good understanding of the protection subnet, you need to learn some basic concepts of thenetwork layer.

    1.2 Searching for Protection Subnets

    By searching for a protection subnet, the configured protection attributes at the NE layer on the

    U2000 are synchronized to the network layer on the U2000 to create protection subnets

    automatically.

    1.3 Configuring an MSP Ring

    In a ring network topology or when a service exists between rings or between a ring and a chain,

    you can configure an MSP ring to protect the service if a fault occurs.

    1.4 Configuring Linear MSP

    In the linear network topology, you can configure the linear MSP to protect the network sectionby section.

    1.5 Creating an Path Protection Ring

    A path protection ring is used to protect a private ring network. Normally, the protection path

    also transmits the primary service. STM-N signals can be quickly protected at a VC level without

    runnig a switching protocol.

    1.6 Configuring a Non-Protection Ring

    When services on a ring do not need protection, you can configure a non-protection (NP) ring.

    All timeslots on the ring can be used to transmit services.

    1.7 Configuring a Non-Protection Chain

    If a service in the chain does not need to be protected, you can configure a non-protection chain.In this case, all the timeslots in the chain can be used to transmit the service.

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management 1 Managing RTN Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-1

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    24/385

    1.8 Configuring DNI Protection

    You can create DNI protection for the interworking nodes of two rings, and for the protection

    of the interworking services between two ring networks. The network can be a combination of

    equipment from different vendors or different protection modes. Moreover, DNI is also available

    to fiber and node failures.

    1.9 Configuring IF 1+1 Protection

    IF 1+1 protection uses a standby path to protect an active service.

    1.10 Configuring IF N+1 Protection

    IF N+1 protection uses a standby path to protect N active services.

    1.11 Maintaining Protection Subnets

    When the protection status of a network is abnormal or when adjusting a network, you need to

    maintain the protection subnet.

    1.12 Deleting Protection Subnets

    When an existing protection subnet is not suitable, you can delete the protection subnet.

    1.13 Deleting Isolated Nodes

    To release protection resources that are used by isolated nodes, you need to delete isolated nodes.

    1 Managing RTN Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management

    1-2 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    25/385

    1.1 Basic Concepts

    According to the layered structure of transport network, protection subnet, belonging to the

    network layer, refers to a network structure that has a comprehensive self-protection function.

    The protection subnet is a network unit of composing the optical transport network. To have a

    good understanding of the protection subnet, you need to learn some basic concepts of the

    network layer.

    1.1.1 Protection Subnet

    A protection subnet refers to a network architecture that has a comprehensive self-protection

    function. It is a network that composes the optical transmission network. In the U2000, the

    protection subnet is a generalized concept that includes not only the network architecture with

    the comprehensive self-protection function, such as the MSP ring and PP ring, but also the

    network architecture without the self-protection function, such as the non-protection ring and

    non-protection chain.

    1.1.2 Isolated Node

    An isolated node is not equal to an isolated NE. An isolated node refers to a special logical

    system that is independent from any protection subnet. It is independent from any protection

    subnet.

    1.1.1 Protection Subnet

    A protection subnet refers to a network architecture that has a comprehensive self-protection

    function. It is a network that composes the optical transmission network. In the U2000, the

    protection subnet is a generalized concept that includes not only the network architecture with

    the comprehensive self-protection function, such as the MSP ring and PP ring, but also thenetwork architecture without the self-protection function, such as the non-protection ring and

    non-protection chain.

    In the U2000, a protection subnet is a network level concept rather than merely an MSP ring or

    a PP ring. NEs and fiber connections are the basic elements required to construct a protection

    subnet. You should create NEs, perform basic configurations for them, and then properly create

    fiber connections between the NEs. You should have access to sufficient resources to create a

    protection subnet.

    1.1.2 Isolated Node

    An isolated node is not equal to an isolated NE. An isolated node refers to a special logical

    system that is independent from any protection subnet. It is independent from any protection

    subnet.

    An isolated node is a node that is configured at NEs but cannot or does not compose a protection

    subnet with other nodes.

    An isolated node should not exist in a transmission network that runs normally. The reason for

    the existence of any isolated nodes can be as follows:

    l The fiber that should be connected to the node is not created on the U2000.

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management 1 Managing RTN Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-3

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    26/385

    1.2 Searching for Protection Subnets

    By searching for a protection subnet, the configured protection attributes at the NE layer on the

    U2000 are synchronized to the network layer on the U2000 to create protection subnets

    automatically.

    Prerequisite

    l You must be an NM user with "network maintainer" authority or higher.

    l The NE data must be configured, and fibers must be properly created.

    Procedure

    Step 1 Choose Service > SDH Protection Subnet > Search for SDH Protection Subnet from the

    Main Menu.

    Step 2 In the Consistency Verification of Existing Subnet screen, select the protection subnet andclickNext.

    NOTE

    If the verification is unsuccessful and the subnet becomes abnormal, the search menu is unavailable. In

    this case, you need to delete the abnormal subnet from the network layer and then re-search for the subnet.

    Step 3 ClickSearch to start the search. The Subnet Name, Consistent Status and Subnet Typeparameters of the searched protection subnet are automatically displayed.

    Step 4 ClickNext. The isolated nodes are displayed in the upper left pane of the window.

    Step 5 Optional: Select the nodes that do not form any protection subnet, and clickDelete. ClickYes in the Operation Prompt dialog box.

    Step 6 ClickFinish. The searched protection subnet is displayed in the Main Topology.

    ----End

    1.3 Configuring an MSP Ring

    In a ring network topology or when a service exists between rings or between a ring and a chain,

    you can configure an MSP ring to protect the service if a fault occurs.

    1.3.1 Creating an MS Ring Protection SubnetThe MS ring protection scheme is adopted in a common ring network. Normally, it is adopted

    to protect a channel to transmit additional services. By running the APS protocol, it achieves the

    MS level protection.

    1.3.2 Checking Networkwide Multiplex Section Parameters

    In the same MSP subnet, each NE should have the same multiplex section parameter settings.

    After configuring or adjusting an MSP subnet, you need to check the parameters for the

    networkwide multiplex section.

    1.3.3 Verifying MSP Protection Switching

    After creating a protection scheme and setting the related parameters, you can check whether

    the protection scheme functions normally by performing a switching operation and query theswitching status.

    1 Managing RTN Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management

    1-4 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    27/385

    1.3.1 Creating an MS Ring Protection Subnet

    The MS ring protection scheme is adopted in a common ring network. Normally, it is adopted

    to protect a channel to transmit additional services. By running the APS protocol, it achieves the

    MS level protection.

    Prerequisite

    l You must be an NM user with "network maintainer" authority or higher.

    l The NE data must be configured, and fibers must be properly created.

    Context

    l The number of nodes in an MSP ring cannot exceed 16.

    l When creating a protection subnet, select SDH NEs only. It is not required to select REG

    or WDM equipment.

    Procedure

    Step 1 Choose Service > SDH Protection Subnet > Create 2f_MS SPRing from the Main Menu. ThePrompt dialog box is displayed. ClickOK.

    NOTE

    l To create a four-fiber bidirectional MS shared protection ring, choose Service > SDH Protection Subnet

    > Create 4f_MS SPRing from the Main Menu to display the related dialog box.

    l To create a two-fiber unidirectional MS shared protection ring, choose Service > SDH Protection

    Subnet > Create 2f_MS DPRing from the Main Menu to display the related dialog box.

    Step 2 Enter the name of the protection subnet. The default name is usually used, for example, 2f_MSSPRing_1.

    Step 3 Select the rate of the protection subnet, for example, STM-4.

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management 1 Managing RTN Protection Subnets

    Issue 02 (2010-09-24) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-5

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    28/385

    Step 4 Select Resource Sharing and Assigned by VC4 as needed.

    NOTE

    l Resource Sharing indicates that a port is mapped into multiple protection subnets. If multiple

    protection subnets uses one port of a board, you need to check the Resource Sharing check box. If

    different protection subnets use different ports of a board, do not check this check box. If MSP Sharing

    is enabled, you can check the Resource Sharing check box to map a port of the board to multiple

    MSPs.

    l Select the Assigned by VC4 option when there are different VC4s belonging to different protection

    subnets to achieve virtual optical path protection. For example, for an STM-16 fiber, the VC4 1-4

    belong to an STM-4 MSP, and VC4 5-8 belong to a non-protection ring.

    Step 5 Add nodes to the protection subnet to be created. Double-click the NE on the Main Topology

    to add it to the node list in the left-hand pane. Meanwhile, is displayed on the NE icon. If you

    want to cancel the selection, double-click the NE again.

    NOTE

    For easy maintenance, the nodes should be added anticlockwise to the protection subnet.

    Step 6 Set the attribute of the nodes. Select MSP Node in this example.

    1 Managing RTN Protection Subnets

    iManager U2000 Unified Network Management System

    Operation Guide for RTN End-to-End Management

    1-6 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 02 (2010-09-24)

  • 8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)

    29/385

    Step 7 ClickNext to proceed to the Select Linkscreen of the wizard. Set parameters, such as PhysicalLink Information.

    NOTE

    l If there are multiple fibers between two NEs, select them from the Physical Link Information dro